Toward a special issue
 
 
Dear participants, in order to apply for the organisation of a special issue devoted to the BOWS-2 challenge, we would like to know your feelings about the different topics that will be addressed. To guarantee a given consistency between paper related to the same episode, we have decided of a list of requirements.  
Comments about this draft are welcome before end of March,
you can contact us using bows2(AT)gipsa-lab(dot)fr.
 
You will find below the draft of the call.
 
Regards,
 
Patrick and Teddy
 
The BOWS-2 Watermarking Challenge: advances on robustness and security attacks
 
 
Context:
The second edition of "Break Our Watermarking System" has been hold between the 17th of July 2007 and the 18th of April 2008. This contest was divided into three parts and each part was devoted to a specific problem:
 - robustness of a watermarking technique,
 - security against oracle attacks: unlimited number of detector trials.
 - security against information leakages: 10 000 watermarked images and the source code of the technique available.
 
Goals:
The goal of this special issue is to stress the lessons learnt from the contest. The outlines are as follows:
 
  1.   A general presentation of the BA algorithm (this will be a reviewed
 version of the online paper)
 
  1.  Presentation of robustness attacks
Requirements:
- to give meaningful statistical results, work on 100 images selected by the organizers,
- An operating point of the attack is defined by the average PSNR (averaged MSE in dB) over these 100 images (abscissa) and percentage of successfully 'broken' pictures (ordinate). If possible, give a plot over a range of average PSNR,
- Provide a psychovisual evaluation of the attack using Komparator (http://autrusseau.florent.club.fr/Komparator/Komparator.zip),
- Propositions of counter-attacks improving the Broken Arrows technique will be appreciated.
- Arguments for guessing how the watermarking technique works, in order to design better attacks.
 
  1.  Presentation of oracle attacks
Requirements:
- Work on 3 images,
- For each images, a plot PSNR=f(nb of detector calls) when the attack is successful.
- Features of the attacks: parallel thread, batch, complexity per calls,
- Locations of the attacked images on the extended CMB plane (we need to define it) to see the evolution of the attack.
- Propositions of counter-attacks improving the Broken Arrows technique will be appreciated.
 
  1.  Presentation of WOA attacks
Requirements:
- Complexity needed for the estimation of the secret key for 10000 images,
- Plot PSNR_of_the_attack = f(Number of observations) when possible,
- Propositions of counter-attacks improving the Broken Arrows technique will be appreciated.
 
 
 
 
 
 
 
 
 
Toward a special issue
Thursday, March 20, 2008