- Research Article
- Open access
- Published:
Reverse-Engineering a Watermark Detector Using an Oracle
EURASIP Journal on Information Security volume 2007, Article number: 043034 (2007)
Abstract
The Break Our Watermarking System (BOWS) contest gave researchers three months to defeat an unknown watermark, given three marked images and online access to a watermark detector. The authors participated in the first phase of the contest, defeating the mark while retaining the highest average quality among attacked images. The techniques developed in this contest led to general methods for reverse-engineering a watermark algorithm via experimental images fed to its detector. The techniques exploit the tendency of watermark algorithms to admit characteristic false positives, which can be used to identify an algorithm or estimate certain parameters.
References
The Break Our Watermarking System (BOWS) contest http://lci.det.unifi.it/BOWS/
Craver S, Atakli I, Yu J: How we broke the BOWS watermark. Security, Steganography, and Watermarking of Multimedia Contents IX, January 2007, San Jose, Calif, USA, Proceedings of SPIE 6505:
A Westfeld: Tackling bows with the sensitivity attack. Security, Steganography, and Watermarking of Multimedia Contents IX, January 2007, San Jose, Calif, USA, Proceedings of SPIE 6505:
Miller ML, Doerr GJ, Cox IJ: Applying informed coding and embedding to design a robust, high capacity watermark. IEEE Transactions on Image Processing 2004, 13(6):792-807. 10.1109/TIP.2003.821551
Cox IJ, Kilian J, Leighton FT, Shamoon T: Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing 1997, 6(12):1673-1687. 10.1109/83.650120
Westfeld A: Lessons from the bows contest. Proceedings of the Multimedia and Security Workshop, 2006, Geneva, Switzerland 2006: 208-213.
Comesaña P, Pérez-González F: Two different approaches for attacking bows. Security, Steganography, and Watermarking of Multimedia Contents IX, January 2007, San Jose, Calif, USA, Proceedings of SPIE 6505:
Craver S, Yu J: Reverse-engineering a detector with false alarms. Security, Steganography, and Watermarking of Multimedia Contents IX, January 2007, San Jose, Calif, USA, Proceedings of SPIE 6505:
Miller ML, Cox IJ, Bloom JA: Digital Watermarking. Morgan Kaufman, San Francisco, Calif, USA; 2002.
Hypersphere—from Wolfram MathWorld http://www.mathworld.wolfram.com/Hypersphere.html
Author information
Authors and Affiliations
Corresponding authors
Rights and permissions
Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
About this article
Cite this article
Craver, S., Atakli, I. & Yu, J. Reverse-Engineering a Watermark Detector Using an Oracle. EURASIP J. on Info. Security 2007, 043034 (2007). https://doi.org/10.1155/2007/43034
Received:
Accepted:
Published:
DOI: https://doi.org/10.1155/2007/43034