Breaking the BOWS Watermarking System: Key Guessing and Sensitivity Attacks

نویسندگان

  • Pedro Comesaña Alfaro
  • Fernando Pérez-González
چکیده

From December 15, 2005 to June 15, 2006 the watermarking community was challenged to remove the watermark from 3 different 512 × 512 watermarked images while maximizing the Peak Signal to Noise Ratio (PSNR) measured by comparing the watermarked signals with their attacked counterparts. This challenge, which bore the inviting name of Break Our Watermarking System (BOWS) [1], had as its main objective to enlarge the current knowledge on attacks to watermarking systems; In this paper the main results obtained by the authors when attacking the BOWS system are presented and compared with strategies followed by other groups. Essentially, two different approaches have been followed: exhaustive search of the secret key and blind sensitivity attacks. This work was partially funded by Xunta de Galicia under projects PGIDT04 TIC322013PR, PGIDT04 PXIC32202PM, and Competitive research units program Ref. 150/2006; MEC project DIPSTICK, reference TEC2004-02551/TCM and European Comission through the IST Programme under Contract IST-2002-507932 ECRYPT. ECRYPT disclaimer: The information in this paper is provided as is, and no guarantee or warranty is given or implied that the information is fit for any particular purpose. The user thereof uses the information at its sole risk and liability. Signal Theory and Communications Department, University of Vigo, Vigo 36310, Spain. E-mail: {pcomesan, fperez}@gts.tsc.uvigo.es.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Two different approaches for attacking BOWS

From December 15, 2005 to June 15, 2006 the watermarking community was challenged to remove the watermark from 3 different 512×512 watermarked images while maximizing the Peak Signal to Noise Ratio (PSNR) measured by comparing the watermarked signals with their attacked counterparts. This challenge, which bore the inviting name of Break Our Watermarking System (BOWS), and was part of the activi...

متن کامل

Fast Determination of Sensitivity in the Presence of Countermeasures in BOWS-2

The second Break Our Watermarking System (BOWS-2) contest exposed a watermarking algorithm named Broken Arrows (BA) to worldwide attacks. In its second episode, the previously existing daily limit of 30 oracle calls per IP address was lifted to allow for sensitivity analysis. Often disrespected because of their extensive oracle use, sensitivity attacks can reveal up to one bit of information ab...

متن کامل

Design and Analysis of the First BOWS Contest

The break our watermarking system (BOWS) contest was launched in the framework of the activities carried out by the European Network of Excellence for Cryptology ECRYPT. The aim of the contest was to investigate how and when an image watermarking system can be broken while preserving the highest possible quality of the content, in the case the watermarking system is subject to a massive worldwi...

متن کامل

A Workbench for the BOWS Contest

The first break our watermarking system (BOWS) contest challenged researchers to remove the watermark from three given images. Participants could submit altered versions of the images to an online detector. For a successful attack, the watermark had to be unreadable to this detector with a quality above 30 dB peak signal-to-noise ratio. We implemented our experiments in R, a language for statis...

متن کامل

Tackling BOWS with the sensitivity attack

We present our results in the first BOWS challenge (Break Our Watermarking System). There were three given digital photos containing an invisible watermark that was introduced using informed coding and embedding. The goal was to remove the watermark from the photos while keeping a minimum quality of at least 30 dB PSNR (peak signal to noise ratio). We focus on the method used to win the second ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • EURASIP J. Information Security

دوره 2007  شماره 

صفحات  -

تاریخ انتشار 2007