... A. Piva and M. Barni 3 (a) (b)Figure 2: The BOWS interface to upload the attacked images and run the detector, as it appears before a successful attack (a) , and after a successful attack ... I.J.Cox,M.L.Miller,andJ .A. Bloom,Digital Watermarking,Morgan Kaufmann, San Francisco, Calif, USA, 2001.[5]S .A. Craver,I.Atakli,andJ.Yu.,“HowwebroketheBOWSwatermark,” in Security, Steganography, and Watermarking ... original form.By looking at the quality of the attacked images, we cansee that often the attacks concentrated on very small areas of the image (see Figure 5, where a particular of an attackedimage...