Share Email Print

Proceedings Paper

Reverse-engineering a detector with false alarms
Author(s): Scott Craver; Jun Yu
Format Member Price Non-Member Price
PDF $14.40 $18.00
cover GOOD NEWS! Your organization subscribes to the SPIE Digital Library. You may be able to download this paper for free. Check Access

Paper Abstract

Inspired by results from the Break Our Watermarking System (BOWS) contest, we explored techniques to reverse-engineer watermarking algorithms via oracle attacks. We exploit a principle called "superrobustness," which allows a watermarking algorithm to be characterized by its resistance to specific distortions. The generic application of this principle to an oracle attack seeks to find a severe false alarm, or a point on the watermark detection region as far as possible from the watermarked image. For specific types of detection regions, these severe false positives can leak information about the feature space as well as detector parameters. We explore the specific case of detectors using normalized correlation, or correlation coefficient.

Paper Details

Date Published: 27 February 2007
PDF: 10 pages
Proc. SPIE 6505, Security, Steganography, and Watermarking of Multimedia Contents IX, 65050C (27 February 2007); doi: 10.1117/12.704389
Show Author Affiliations
Scott Craver, Binghamton Univ. (United States)
Jun Yu, Binghamton Univ. (United States)

Published in SPIE Proceedings Vol. 6505:
Security, Steganography, and Watermarking of Multimedia Contents IX
Edward J. Delp; Ping Wah Wong, Editor(s)

© SPIE. Terms of Use
Back to Top