Image quality assessment: from error visibility to structural similarity
IEEE Transactions on Image Processing
Applying informed coding and embedding to design a robust high-capacity watermark
IEEE Transactions on Image Processing
Reverse-engineering a watermark detector using an oracle
EURASIP Journal on Information Security
Breaking the BOWS watermarking system: key guessing and sensitivity attacks
EURASIP Journal on Information Security
A workbench for the BOWS contest
EURASIP Journal on Information Security
A regression-based restoration technique for automated watermark removal
Proceedings of the 10th ACM workshop on Multimedia and security
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
Hi-index | 0.00 |
In the first BOWS Contest, a watermarking system was exposed to attacks from all over the world--not to prove that the system is resistant to attacks or to claim that it is unbreakable, rather to learn more about the level of weakness and perhaps new possible attacks. The goal was to wipe the watermark while keeping the best possible quality of the images. This paper highlights some of our tests and results. We analysed the interaction between attack strength and quality measure and described two more successful approaches to remove the watermark: (1) to reduce artefacts that are introduced by the watermarking algorithm, which renders embedded information unreadable and (2) a specialised sensitivity attack.