On Mathematical Models for the Discordant Size Content Replacement Attack in Watermarked Audio Signals

Juan Jose Gomez-Ricardez, José Juan García-Hernández
{"title":"On Mathematical Models for the Discordant Size Content Replacement Attack in Watermarked Audio Signals","authors":"Juan Jose Gomez-Ricardez, José Juan García-Hernández","doi":"10.1109/ENC56672.2022.9882928","DOIUrl":null,"url":null,"abstract":"An important aspect of any watermarking scheme is its robustness against attacks. For this, it is essential to know the behavior of the attack when handling a signal. The discordant size content replacement attack is a very severe attack against audio watermarking schemes. This attack replaces a set of samples of an audio signal with another collection of samples of different sizes. This study presents two mathematical models that describe the discordant size content replacement attack using different approaches: matrix representation and decimation, and interpolation. Each model includes content replacement attacks of equal, larger, and smaller sizes. Evaluations are carried out with different degrees of manipulation. The objective is to obtain a mathematical description that analyzes the behavior of the attack on an audio signal, and use the models to design self-restorable schemes of audio signals that are robust against this attack. The models showed proper functioning in their evaluations.","PeriodicalId":145622,"journal":{"name":"2022 IEEE Mexican International Conference on Computer Science (ENC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE Mexican International Conference on Computer Science (ENC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ENC56672.2022.9882928","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

An important aspect of any watermarking scheme is its robustness against attacks. For this, it is essential to know the behavior of the attack when handling a signal. The discordant size content replacement attack is a very severe attack against audio watermarking schemes. This attack replaces a set of samples of an audio signal with another collection of samples of different sizes. This study presents two mathematical models that describe the discordant size content replacement attack using different approaches: matrix representation and decimation, and interpolation. Each model includes content replacement attacks of equal, larger, and smaller sizes. Evaluations are carried out with different degrees of manipulation. The objective is to obtain a mathematical description that analyzes the behavior of the attack on an audio signal, and use the models to design self-restorable schemes of audio signals that are robust against this attack. The models showed proper functioning in their evaluations.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
带水印音频信号中不一致大小内容替换攻击的数学模型
任何水印方案的一个重要方面是它对攻击的鲁棒性。为此,在处理信号时了解攻击行为是至关重要的。不一致大小内容替换攻击是针对音频水印方案的一种非常严重的攻击。这种攻击将音频信号的一组样本替换为另一组不同大小的样本。本研究提出了两个数学模型来描述使用不同方法的不一致大小内容替换攻击:矩阵表示和抽取,以及插值。每个模型包括大小相等、较大和较小的内容替换攻击。评估是以不同程度的操纵进行的。目标是获得分析音频信号攻击行为的数学描述,并使用模型来设计音频信号的自恢复方案,以抵御这种攻击。模型在评估中显示出适当的功能。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Uso de plataforma de videojuegos de conducción para analizar el desempeño visual de los conductores: estudio piloto Design, development, and evaluation of a medical system for estimating dosimetry levels in a public hospital Characterization of the environment of teachers, students and parents of basic education based on the GQM Quality Model Detection of Atypical Data in Point Cloud of Technical Vision System using Digital Filtering Creation of a Dataset for personality and professional interest recognition
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1