The break our watermarking system (BOWS) contest was launched in the framework of the activities carried out by the European Network of Excellence for Cryptology ECRYPT. The aim of the contest was to investigate how and when an image watermarking system can be broken while preserving the highest possible quality of the content, in the case the watermarking system is subject to a massive worldwide attack. The great number of participants and the echo that the contest has had in the watermarking community contributed to make BOWS a great success. From a scientific point of view, many insights into the problems attackers have to face with when operating in a practical scenario have been obtained, confirming the threat posed by the sensitivity attack, which turned out to be the most successful attack. At the same time, several interesting modifications of such an attack have been proposed to make it work in a real scenario under limited communication and time resources. This paper describes how the contest has been designed and analyzes the general progress of the attacks during the contest.

A., P., Barni, M. (2007). Design and Analysis of the First BOWS Contest. EURASIP JOURNAL ON MULTIMEDIA AND INFORMATION SECURITY, 2007, 1-8 [10.1155/2007/98684].

Design and Analysis of the First BOWS Contest

BARNI, MAURO
2007-01-01

Abstract

The break our watermarking system (BOWS) contest was launched in the framework of the activities carried out by the European Network of Excellence for Cryptology ECRYPT. The aim of the contest was to investigate how and when an image watermarking system can be broken while preserving the highest possible quality of the content, in the case the watermarking system is subject to a massive worldwide attack. The great number of participants and the echo that the contest has had in the watermarking community contributed to make BOWS a great success. From a scientific point of view, many insights into the problems attackers have to face with when operating in a practical scenario have been obtained, confirming the threat posed by the sensitivity attack, which turned out to be the most successful attack. At the same time, several interesting modifications of such an attack have been proposed to make it work in a real scenario under limited communication and time resources. This paper describes how the contest has been designed and analyzes the general progress of the attacks during the contest.
2007
A., P., Barni, M. (2007). Design and Analysis of the First BOWS Contest. EURASIP JOURNAL ON MULTIMEDIA AND INFORMATION SECURITY, 2007, 1-8 [10.1155/2007/98684].
File in questo prodotto:
File Dimensione Formato  
1687-417X-2007-098684.pdf

non disponibili

Tipologia: Post-print
Licenza: NON PUBBLICO - Accesso privato/ristretto
Dimensione 692.96 kB
Formato Adobe PDF
692.96 kB Adobe PDF   Visualizza/Apri   Richiedi una copia

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11365/34443
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo