Inspired by results from the Break Our Watermarking System (BOWS) contest, we explored techniques to reverse-engineer watermarking algorithms via oracle attacks. We exploit a principle called "superrobustness," which allows a watermarking algorithm to be characterized by its resistance to specific distortions. The generic application of this principle to an oracle attack seeks to find a severe false alarm, or a point on the watermark detection region as far as possible from the watermarked image. For specific types of detection regions, these severe false positives can leak information about the feature space as well as detector parameters. We explore the specific case of detectors using normalized correlation, or correlation coefficient.
[1]
Min Wu,et al.
Reading Between the Lines: Lessons from the SDMI Challenge
,
2001,
USENIX Security Symposium.
[2]
Ingemar J. Cox,et al.
Applying informed coding and embedding to design a robust high-capacity watermark
,
2004,
IEEE Transactions on Image Processing.
[3]
Jean-Paul M. G. Linnartz,et al.
Analysis of the Sensitivity Attack against Electronic Watermarks in Images
,
1998,
Information Hiding.
[4]
Jun Yu,et al.
How we broke the BOWS watermark
,
2007,
Electronic Imaging.
[5]
F. Pérez-González,et al.
Blind newton sensitivity attack
,
2006
.