IEEE Xplore will be upgraded between 11:00 AM and 10:00 PM EDT. During this time there may be intermittent impact on performance. For technical support, please contact us at firstname.lastname@example.org. We apologize for any inconvenience.
The ease with which early watermarking algorithms were broken has given rise to a new set of schemes that are usually robust to a wide variety of attacks. We argue that this has created an illusion of progress, when in reality there is none. Most published watermarking algorithms, like their predecessors, protect all objects in a neighborhood surrounding the marked object. We point out that while this is necessary, it is very far from being sufficient. To withstand adversarial attack, a watermarking scheme would have to protect all valuable variations of an object, not merely ones that are close to it.