Skip to main content
  • Research Article
  • Open access
  • Published:

Design and Analysis of the First BOWS Contest

Abstract

The break our watermarking system (BOWS) contest was launched in the framework of the activities carried out by the European Network of Excellence for Cryptology ECRYPT. The aim of the contest was to investigate how and when an image watermarking system can be broken while preserving the highest possible quality of the content, in the case the watermarking system is subject to a massive worldwide attack. The great number of participants and the echo that the contest has had in the watermarking community contributed to make BOWS a great success. From a scientific point of view, many insights into the problems attackers have to face with when operating in a practical scenario have been obtained, confirming the threat posed by the sensitivity attack, which turned out to be the most successful attack. At the same time, several interesting modifications of such an attack have been proposed to make it work in a real scenario under limited communication and time resources. This paper describes how the contest has been designed and analyzes the general progress of the attacks during the contest.

[123456789101112131415161718]

References

  1. Ecrypt-european network of excellence for cryptology 2008.http://www.ecrypt.eu.org/http://www.ecrypt.eu.org/

  2. Kerckhoffs A: La cryptographie militaire. Journal des Sciences Militaire 1883, 9: 5-38.

    Google Scholar 

  3. Miller ML, Doërr GJ, Cox IJ: Applying informed coding and embedding to design a robust high-capacity watermark. IEEE Transactions on Image Processing 2004, 13(6):792-807. 10.1109/TIP.2003.821551

    Article  Google Scholar 

  4. Cox IJ, Miller ML, Bloom JA: Digital Watermarking. Morgan Kaufmann, San Francisco, Calif, USA; 2001.

    Google Scholar 

  5. Craver SA, Atakli I, Yu J: How we broke the BOWS watermark. In Security, Steganography, and Watermarking of Multimedia Contents IX, January 2007, San Jose, Calif, USA, Proceedings of SPIE Edited by: Delp EJ, Wong PW. 6505: 65051C.

    Chapter  Google Scholar 

  6. Cox IJ, Linnartz JPMG: Public watermarks and resistance to tampering. Proceedings of the 4th IEEE International Conference on Image Processing (ICIP '97), October 1997, Santa Barbara, Calif, USA 3: 3-6.

    Article  Google Scholar 

  7. Kalker T, Linnartz JP, van Dijk M: Watermark estimation through detector analysis. Proceedings of the 5th IEEE International Conference on Image Processing (ICIP '98), October 1998, Chicago, Ill, USA 1: 425-429.

    Google Scholar 

  8. Comesaña P, Pérez-Freire L, Pérez-González F: Blind newton sensitivity attack. IEE Proceedings on Information Security 2006, 153(3):115-125. 10.1049/ip-ifs:20055151

    Article  Google Scholar 

  9. Earl J: Sensitivity analysis for BOWS on the detection region boundary. to appear in EURASIP Journal on Information Security

  10. Westfeld A: A workbench for the BOWS contest. to appear in EURASIP Journal on Information Security

  11. Comesaña-Alfaro P, Pérez-González F: Breaking the BOWS watermarking system: key guessing and sensitivity attacks. to appear in EURASIP Journal on Information Security

  12. Craver SA, Atakli I, Y J: Reverse-engineering a watermark detector using an oracle. to appear in EURASIP Journal on Information Security

  13. Guelvouit GL, Furon T, Cayre F: The good, the bad, and the ugly: three different approaches to break their watermarking system. In Security, Steganography, and Watermarking of Multimedia Contents IX, January 2007, San Jose, Calif, USA, Proceedings of SPIE Edited by: Delp EJ, Wong PW. 6505: 650517.

    Chapter  Google Scholar 

  14. Bennour J, Dugelay J-L, Matta F: Watermarking attack: BOWS contest. In Security, Steganography, and Watermarking of Multimedia Contents IX, January 2007, San Jose, Calif, USA, Proceedings of SPIE Edited by: Delp EJ, Wong PW. 6505: 650518.

    Article  Google Scholar 

  15. Earl JW: Tangential sensitivity analysis of watermarks using prior information. In Security, Steganography, and Watermarking of Multimedia Contents IX, January 2007, San Jose, Calif, USA, Proceedings of SPIE Edited by: Delp EJ, Wong PW. 6505: 650519.

    Chapter  Google Scholar 

  16. Westfeld A: Tackling BOWS with the sensitivity attack. In Security, Steganography, and Watermarking of Multimedia Contents IX, January 2007, San Jose, Calif, USA, Proceedings of SPIE Edited by: Delp EJ, Wong PW. 6505: 65051A.

    Chapter  Google Scholar 

  17. Comesaña-Alfaro P, Pérez-González F: Two different approaches for attacking BOWS. In Security, Steganography, and Watermarking of Multimedia Contents IX, January 2007, San Jose, Calif, USA, Proceedings of SPIE Edited by: Delp EJ, Wong PW. 6505: 65051B.

    Chapter  Google Scholar 

  18. Wang Z, Bovik AC, Sheikh HR, Simoncelli EP: Image quality assessment: from error visibility to structural similarity. IEEE Transactions on Image Processing 2004, 13(4):600-612. 10.1109/TIP.2003.819861

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A Piva.

Rights and permissions

Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Reprints and permissions

About this article

Cite this article

Piva, A., Barni, M. Design and Analysis of the First BOWS Contest. EURASIP J. on Info. Security 2007, 098684 (2007). https://doi.org/10.1155/2007/98684

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1155/2007/98684

Keywords