A Workbench for the BOWS Contest
نویسنده
چکیده
The first break our watermarking system (BOWS) contest challenged researchers to remove the watermark from three given images. Participants could submit altered versions of the images to an online detector. For a successful attack, the watermark had to be unreadable to this detector with a quality above 30 dB peak signal-to-noise ratio. We implemented our experiments in R, a language for statistical computing. This paper presents the BOWS package, an extension for R, along with examples for using this experimental environment. The BOWS package provides an offline detector for several platforms. Furthermore, the particular watermarking algorithm used in the contest is analysed. We show how to find single coefficient attacks and derive high-quality images (62.6 dB PSNR) with full knowledge of the key.
منابع مشابه
Design and Analysis of the First BOWS Contest
The break our watermarking system (BOWS) contest was launched in the framework of the activities carried out by the European Network of Excellence for Cryptology ECRYPT. The aim of the contest was to investigate how and when an image watermarking system can be broken while preserving the highest possible quality of the content, in the case the watermarking system is subject to a massive worldwi...
متن کاملTackling BOWS with the sensitivity attack
We present our results in the first BOWS challenge (Break Our Watermarking System). There were three given digital photos containing an invisible watermark that was introduced using informed coding and embedding. The goal was to remove the watermark from the photos while keeping a minimum quality of at least 30 dB PSNR (peak signal to noise ratio). We focus on the method used to win the second ...
متن کاملReverse-Engineering a Watermark Detector Using an Oracle
The Break Our Watermarking System (BOWS) contest gave researchers three months to defeat an unknown watermark, given three marked images and online access to a watermark detector. The authors participated in the first phase of the contest, defeating the mark while retaining the highest average quality among attacked images. The techniques developed in this contest led to general methods for rev...
متن کاملFast Determination of Sensitivity in the Presence of Countermeasures in BOWS-2
The second Break Our Watermarking System (BOWS-2) contest exposed a watermarking algorithm named Broken Arrows (BA) to worldwide attacks. In its second episode, the previously existing daily limit of 30 oracle calls per IP address was lifted to allow for sensitivity analysis. Often disrespected because of their extensive oracle use, sensitivity attacks can reveal up to one bit of information ab...
متن کامل"Break Our Steganographic System": The Ins and Outs of Organizing BOSS
This paper summarizes the rst international challenge on steganalysis called BOSS (an acronym for Break Our Steganographic System). We explain the motivations behind the organization of the contest, its rules together with reasons for them, and the steganographic algorithm developed for the contest. Since the image databases created for the contest signi cantly in uenced the development of the ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- EURASIP J. Information Security
دوره 2007 شماره
صفحات -
تاریخ انتشار 2007