{"id":"https://openalex.org/W2066806499","doi":"https://doi.org/10.1117/12.704233","title":"Two different approaches for attacking BOWS","display_name":"Two different approaches for attacking BOWS","publication_year":2007,"publication_date":"2007-02-26","ids":{"openalex":"https://openalex.org/W2066806499","doi":"https://doi.org/10.1117/12.704233","mag":"2066806499"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1117/12.704233","pdf_url":null,"source":{"id":"https://openalex.org/S183492911","display_name":"Proceedings of SPIE","issn_l":"0277-786X","issn":["0277-786X","1996-756X"],"is_oa":false,"is_in_doaj":false,"host_organization":"https://openalex.org/P4310315543","host_organization_name":"SPIE","host_organization_lineage":["https://openalex.org/P4310315543"],"host_organization_lineage_names":["SPIE"],"type":"journal"},"license":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038872849","display_name":"Pedro Comesa\u00f1a","orcid":null},"institutions":[{"id":"https://openalex.org/I6289922","display_name":"Universidade de Vigo","ror":"https://ror.org/05rdf8595","country_code":"ES","type":"education","lineage":["https://openalex.org/I6289922"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Pedro Comesa\u00f1a","raw_affiliation_string":"Univ. de Vigo (Spain)","raw_affiliation_strings":["Univ. de Vigo (Spain)"]},{"author_position":"last","author":{"id":"https://openalex.org/A5076826398","display_name":"Fernando P\u00e9rez-Gonz\u00e1lez","orcid":"https://orcid.org/0000-0002-0568-1373"},"institutions":[{"id":"https://openalex.org/I6289922","display_name":"Universidade de Vigo","ror":"https://ror.org/05rdf8595","country_code":"ES","type":"education","lineage":["https://openalex.org/I6289922"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Fernando P\u00e9rez-Gonz\u00e1lez","raw_affiliation_string":"Univ. de Vigo (Spain)","raw_affiliation_strings":["Univ. de Vigo (Spain)"]}],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":0,"cited_by_percentile_year":{"min":0,"max":68},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Digital Image Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Digital Image Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image Encryption Techniques","score":0.9996,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Image Forgery Detection and Identification","score":0.9989,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"keyword":"different approaches","score":0.4263}],"concepts":[{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.9117159},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.8115197},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.80822736},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6726037},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5686593},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.48248887},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.46101537},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4505355},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3926213},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.35453063},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.22575483},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.122731864},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1117/12.704233","pdf_url":null,"source":{"id":"https://openalex.org/S183492911","display_name":"Proceedings of SPIE","issn_l":"0277-786X","issn":["0277-786X","1996-756X"],"is_oa":false,"is_in_doaj":false,"host_organization":"https://openalex.org/P4310315543","host_organization_name":"SPIE","host_organization_lineage":["https://openalex.org/P4310315543"],"host_organization_lineage_names":["SPIE"],"type":"journal"},"license":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"referenced_works_count":5,"referenced_works":["https://openalex.org/W1968165353","https://openalex.org/W2035540258","https://openalex.org/W2108401082","https://openalex.org/W2162752880","https://openalex.org/W2798766386"],"related_works":["https://openalex.org/W2137394636","https://openalex.org/W2358993821","https://openalex.org/W1516446231","https://openalex.org/W1559740347","https://openalex.org/W2098152888","https://openalex.org/W2040356834","https://openalex.org/W2385289568","https://openalex.org/W2381486749","https://openalex.org/W1514507288","https://openalex.org/W2183032046"],"ngrams_url":"https://api.openalex.org/works/W2066806499/ngrams","abstract_inverted_index":{"From":[0],"December":[1],"15,":[2,6],"2005":[3],"to":[4,13,28,73,80,103,113],"June":[5],"2006":[7],"the":[8,15,25,35,46,59,62,75,92,95,106,109,120,125,129,135,152],"watermarking":[9,81,98],"community":[10],"was":[11,56,87],"challenged":[12],"remove":[14],"watermark":[16],"from":[17],"3":[18],"different":[19,107,143],"512\u00d7512":[20],"watermarked":[21,36],"images":[22],"while":[23],"maximizing":[24],"Peak":[26],"Signal":[27],"Noise":[29],"Ratio":[30],"(PSNR)":[31],"measured":[32],"by":[33,124],"comparing":[34],"signals":[37],"with":[38],"their":[39,115],"attacked":[40],"counterparts.":[41],"This":[42],"challenge,":[43],"which":[44],"bore":[45],"inviting":[47],"name":[48],"of":[49,58,61,65,94,151],"Break":[50],"Our":[51],"Watermarking":[52],"System":[53],"(BOWS),1":[54],"and":[55,148],"part":[57],"activities":[60],"European":[63],"Network":[64],"Excellence":[66],"ECRYPT,":[67],"had":[68],"as":[69],"its":[70],"main":[71,121],"objective":[72],"enlarge":[74],"current":[76],"knowledge":[77],"on":[78],"attacks":[79,147],"systems;":[82],"in":[83,105],"this":[84,118],"sense,":[85],"BOWS":[86,130],"not":[88],"aimed":[89],"at":[90],"checking":[91],"vulnerability":[93],"specific":[96],"chosen":[97],"scheme":[99],"against":[100],"attacks,":[101],"but":[102],"inquire":[104],"strategies":[108,136],"attackers":[110],"would":[111],"follow":[112],"achieve":[114],"target.":[116],"In":[117],"paper":[119],"results":[122],"obtained":[123],"authors":[126],"when":[127],"attacking":[128],"system":[131],"are":[132],"introduced.":[133],"Mainly,":[134],"followed":[137],"can":[138],"be":[139],"divided":[140],"into":[141],"two":[142],"approaches:":[144],"blind":[145],"sensitivity":[146],"exhaustive":[149],"search":[150],"secret":[153],"key.":[154]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2066806499","counts_by_year":[],"updated_date":"2024-03-03T12:24:28.617660","created_date":"2016-06-24"}