Reverse-engineering a watermark detector using an Oracle

1Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

The Break Our Watermarking System (BOWS) contest gave researchers three months to defeat an unknown watermark, given three marked images and online access to a watermark detector. The authors participated in the first phase of the contest, defeatingthe mark while retaining the highest average quality among attacked images. The techniques developed in this contest led to general methods for reverse-engineering a watermark algorithmvia experimental images fed to its detector. The techniques exploit the tendency of watermarkalgorithms to admit characteristic false positives, which can be used to identify an algorithm or estimatecertain parameters.

Cite

CITATION STYLE

APA

Craver, S., Atakli, I., & Yu, J. (2007). Reverse-engineering a watermark detector using an Oracle. Eurasip Journal on Information Security, 2007. https://doi.org/10.1155/2007/43034

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free