”Break Our Steganographic System”: The Ins and Outs of Organizing BOSS

  • Patrick Bas
  • Tomáš Filler
  • Tomáš Pevný
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6958)


This paper summarizes the first international challenge on steganalysis called BOSS (an acronym for Break Our Steganographic System). We explain the motivations behind the organization of the contest, its rules together with reasons for them, and the steganographic algorithm developed for the contest. Since the image databases created for the contest significantly influenced the development of the contest, they are described in a great detail. Paper also presents detailed analysis of results submitted to the challenge. One of the main difficulty the participants had to deal with was the discrepancy between training and testing source of images – the so-called cover-source mismatch, which forced the participants to design steganalyzers robust w.r.t. a specific source of images. We also point to other practical issues related to designing steganographic systems and give several suggestions for future contests in steganalysis.


False Negative Rate Cover Image Image Model Grayscale Image Stego Image 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Bas, P., Furon, T.: BOWS-2 (July 2007),
  2. 2.
    Filler, T., Fridrich, J.: Gibbs construction in steganography. IEEE Transactions on Information Forensics and Security 5(4), 705–720 (2010)CrossRefGoogle Scholar
  3. 3.
    Filler, T., Judas, J., Fridrich, J.: Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Transactions on Information Forensics and Security (2010); under review Google Scholar
  4. 4.
    Fridrich, J., Goljan, M., Kodovský, J., Holub, V.: Steganalysis of spatially-adaptive steganography. In: Filler, T., Pevný, T., Ker, A., Craver, S. (eds.) IH 2011. LNCS, vol. 6958, pp. 102–117. Springer, Heidelberg (2011)Google Scholar
  5. 5.
    Fridrich, J., Kodovský, J., Goljan, M., Holub, V.: Breaking hugo - the process discovery. In: Filler, T., Pevný, T., Ker, A., Craver, S. (eds.) IH 2011. LNCS, vol. 6958, pp. 85–101. Springer, Heidelberg (2011)Google Scholar
  6. 6.
    Gul, G., Kurugoiiu, F.: A new methodology in steganalysis: Breaking highly undetactable steganograpy (hugo). In: Filler, T., Pevný, T., Ker, A., Craver, S. (eds.) IH 2011. LNCS, vol. 6958, pp. 71–84. Springer, Heidelberg (2011)Google Scholar
  7. 7.
    Goldenstein, S., Boult, T.: The first IEEE workitorial on vision of the unseen (2008),
  8. 8.
    Gower, J.: Some distance properties of latent root and vector methods used in multivariate analysis. Biometrika 53(3-4), 325 (1966)MathSciNetCrossRefzbMATHGoogle Scholar
  9. 9.
    Kodovský, J., Fridrich, J.: On completeness of feature spaces in blind steganalysis. In: Ker, A.D., Dittmann, J., Fridrich, J. (eds.) Proceedings of the 10th ACM Multimedia & Security Workshop, Oxford, UK, September 22-23, pp. 123–132 (2008)Google Scholar
  10. 10.
    Kodovský, J., Pevný, T., Fridrich, J.: Modern steganalysis can detect YASS. In: Memon, N.D., Delp, E.J., Wong, P.W., Dittmann, J. (eds.) Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XII, San Jose, CA, January 17-21, vol. 7541, pp. 02-01–02-11 (2010)Google Scholar
  11. 11.
    Pevný, T., Bas, P., Fridrich, J.: Steganalysis by subtractive pixel adjacency matrix. In: Dittmann, J., Craver, S., Fridrich, J. (eds.) Proceedings of the 11th ACM Multimedia & Security Workshop, Princeton, NJ, September 7-8, pp. 75–84 (2009)Google Scholar
  12. 12.
    Pevný, T., Filler, T., Bas, P.: Using high-dimensional image models to perform highly undetectable steganography. In: Böhme, R., Fong, P.W.L., Safavi-Naini, R. (eds.) IH 2010. LNCS, vol. 6387, pp. 161–177. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  13. 13.
    Piva, A., Barni, M.: The first BOWS contest: Break our watermarking system. In: Delp, E.J., Wong, P.W. (eds.) Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, San Jose, CA, January 29-February 1, vol. 6505 (2007)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Patrick Bas
    • 1
  • Tomáš Filler
    • 2
  • Tomáš Pevný
    • 3
  1. 1.CNRS - LAGIS, LilleFrance
  2. 2.State University of New York at BinghamtonUSA
  3. 3.Czech Technical University in PragueCzech Republic

Personalised recommendations