Tackling BOWS with the sensitivity attack

نویسنده

  • Andreas Westfeld
چکیده

We present our results in the first BOWS challenge (Break Our Watermarking System). There were three given digital photos containing an invisible watermark that was introduced using informed coding and embedding. The goal was to remove the watermark from the photos while keeping a minimum quality of at least 30 dB PSNR (peak signal to noise ratio). We focus on the method used to win the second phase of the contest with about 58 dB PSNR (18 dB ahead of the best fellow contributions). This method will be viewed from three different perspectives: Phase one and two of the contest as well as with complete knowledge about the implementation and the secret key.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Design and Analysis of the First BOWS Contest

The break our watermarking system (BOWS) contest was launched in the framework of the activities carried out by the European Network of Excellence for Cryptology ECRYPT. The aim of the contest was to investigate how and when an image watermarking system can be broken while preserving the highest possible quality of the content, in the case the watermarking system is subject to a massive worldwi...

متن کامل

A Workbench for the BOWS Contest

The first break our watermarking system (BOWS) contest challenged researchers to remove the watermark from three given images. Participants could submit altered versions of the images to an online detector. For a successful attack, the watermark had to be unreadable to this detector with a quality above 30 dB peak signal-to-noise ratio. We implemented our experiments in R, a language for statis...

متن کامل

Fast Determination of Sensitivity in the Presence of Countermeasures in BOWS-2

The second Break Our Watermarking System (BOWS-2) contest exposed a watermarking algorithm named Broken Arrows (BA) to worldwide attacks. In its second episode, the previously existing daily limit of 30 oracle calls per IP address was lifted to allow for sensitivity analysis. Often disrespected because of their extensive oracle use, sensitivity attacks can reveal up to one bit of information ab...

متن کامل

Dynamic Cargo Trains Scheduling for Tackling Network Constraints and Costs Emanating from Tardiness and Earliness

This paper aims to develop a multi-objective model for scheduling cargo trains faced by the costs of tardiness and earliness, time limitations, queue priority and limited station lines. Based upon the Islamic Republic of Iran Railway Corporation (IRIRC) regulations, passenger trains enjoy priority over other trains for departure. Therefore, the timetable of cargo trains must be determined based...

متن کامل

Two different approaches for attacking BOWS

From December 15, 2005 to June 15, 2006 the watermarking community was challenged to remove the watermark from 3 different 512×512 watermarked images while maximizing the Peak Signal to Noise Ratio (PSNR) measured by comparing the watermarked signals with their attacked counterparts. This challenge, which bore the inviting name of Break Our Watermarking System (BOWS), and was part of the activi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007