Open Access

Reverse-Engineering a Watermark Detector Using an Oracle

EURASIP Journal on Information Security20072007:043034

https://doi.org/10.1155/2007/43034

Received: 7 May 2007

Accepted: 22 October 2007

Published: 11 December 2007

Abstract

The Break Our Watermarking System (BOWS) contest gave researchers three months to defeat an unknown watermark, given three marked images and online access to a watermark detector. The authors participated in the first phase of the contest, defeating the mark while retaining the highest average quality among attacked images. The techniques developed in this contest led to general methods for reverse-engineering a watermark algorithm via experimental images fed to its detector. The techniques exploit the tendency of watermark algorithms to admit characteristic false positives, which can be used to identify an algorithm or estimate certain parameters.

[12345678910]

Authors’ Affiliations

(1)
Department of Electrical and Computer Engineering, Binghamton University

References

  1. The Break Our Watermarking System (BOWS) contest http://lci.det.unifi.it/BOWS/
  2. Craver S, Atakli I, Yu J: How we broke the BOWS watermark. Security, Steganography, and Watermarking of Multimedia Contents IX, January 2007, San Jose, Calif, USA, Proceedings of SPIE 6505:Google Scholar
  3. A Westfeld: Tackling bows with the sensitivity attack. Security, Steganography, and Watermarking of Multimedia Contents IX, January 2007, San Jose, Calif, USA, Proceedings of SPIE 6505:Google Scholar
  4. Miller ML, Doerr GJ, Cox IJ: Applying informed coding and embedding to design a robust, high capacity watermark. IEEE Transactions on Image Processing 2004, 13(6):792-807. 10.1109/TIP.2003.821551View ArticleGoogle Scholar
  5. Cox IJ, Kilian J, Leighton FT, Shamoon T: Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing 1997, 6(12):1673-1687. 10.1109/83.650120View ArticleGoogle Scholar
  6. Westfeld A: Lessons from the bows contest. Proceedings of the Multimedia and Security Workshop, 2006, Geneva, Switzerland 2006: 208-213.Google Scholar
  7. Comesaña P, Pérez-González F: Two different approaches for attacking bows. Security, Steganography, and Watermarking of Multimedia Contents IX, January 2007, San Jose, Calif, USA, Proceedings of SPIE 6505:Google Scholar
  8. Craver S, Yu J: Reverse-engineering a detector with false alarms. Security, Steganography, and Watermarking of Multimedia Contents IX, January 2007, San Jose, Calif, USA, Proceedings of SPIE 6505:Google Scholar
  9. Miller ML, Cox IJ, Bloom JA: Digital Watermarking. Morgan Kaufman, San Francisco, Calif, USA; 2002.Google Scholar
  10. Hypersphere—from Wolfram MathWorld http://www.mathworld.wolfram.com/Hypersphere.html

Copyright

© Scott Craver et al. 2007

This article is published under license to BioMed Central Ltd. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.