Translator Disclaimer
27 February 2007 Two different approaches for attacking BOWS
Author Affiliations +
Abstract
From December 15, 2005 to June 15, 2006 the watermarking community was challenged to remove the watermark from 3 different 512×512 watermarked images while maximizing the Peak Signal to Noise Ratio (PSNR) measured by comparing the watermarked signals with their attacked counterparts. This challenge, which bore the inviting name of Break Our Watermarking System (BOWS),1 and was part of the activities of the European Network of Excellence ECRYPT, had as its main objective to enlarge the current knowledge on attacks to watermarking systems; in this sense, BOWS was not aimed at checking the vulnerability of the specific chosen watermarking scheme against attacks, but to inquire in the different strategies the attackers would follow to achieve their target. In this paper the main results obtained by the authors when attacking the BOWS system are introduced. Mainly, the strategies followed can be divided into two different approaches: blind sensitivity attacks and exhaustive search of the secret key.
© (2007) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Pedro Comesaña and Fernando Pérez-González "Two different approaches for attacking BOWS", Proc. SPIE 6505, Security, Steganography, and Watermarking of Multimedia Contents IX, 65051B (27 February 2007); https://doi.org/10.1117/12.704233
PROCEEDINGS
9 PAGES


SHARE
Advertisement
Advertisement
RELATED CONTENT

Profiles for evaluation: the usage of audio WET
Proceedings of SPIE (February 17 2006)
Steganography capacity: a steganalysis perspective
Proceedings of SPIE (June 20 2003)
Dynamic matched filter for the detection of gravitational waves
Proceedings of SPIE (September 29 2004)
The blind Newton sensitivity attack
Proceedings of SPIE (February 15 2006)

Back to Top