Juan Jose Gomez-Ricardez, José Juan García-Hernández
{"title":"带水印音频信号中不一致大小内容替换攻击的数学模型","authors":"Juan Jose Gomez-Ricardez, José Juan García-Hernández","doi":"10.1109/ENC56672.2022.9882928","DOIUrl":null,"url":null,"abstract":"An important aspect of any watermarking scheme is its robustness against attacks. For this, it is essential to know the behavior of the attack when handling a signal. The discordant size content replacement attack is a very severe attack against audio watermarking schemes. This attack replaces a set of samples of an audio signal with another collection of samples of different sizes. This study presents two mathematical models that describe the discordant size content replacement attack using different approaches: matrix representation and decimation, and interpolation. Each model includes content replacement attacks of equal, larger, and smaller sizes. Evaluations are carried out with different degrees of manipulation. The objective is to obtain a mathematical description that analyzes the behavior of the attack on an audio signal, and use the models to design self-restorable schemes of audio signals that are robust against this attack. The models showed proper functioning in their evaluations.","PeriodicalId":145622,"journal":{"name":"2022 IEEE Mexican International Conference on Computer Science (ENC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"On Mathematical Models for the Discordant Size Content Replacement Attack in Watermarked Audio Signals\",\"authors\":\"Juan Jose Gomez-Ricardez, José Juan García-Hernández\",\"doi\":\"10.1109/ENC56672.2022.9882928\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"An important aspect of any watermarking scheme is its robustness against attacks. For this, it is essential to know the behavior of the attack when handling a signal. The discordant size content replacement attack is a very severe attack against audio watermarking schemes. This attack replaces a set of samples of an audio signal with another collection of samples of different sizes. This study presents two mathematical models that describe the discordant size content replacement attack using different approaches: matrix representation and decimation, and interpolation. Each model includes content replacement attacks of equal, larger, and smaller sizes. Evaluations are carried out with different degrees of manipulation. The objective is to obtain a mathematical description that analyzes the behavior of the attack on an audio signal, and use the models to design self-restorable schemes of audio signals that are robust against this attack. The models showed proper functioning in their evaluations.\",\"PeriodicalId\":145622,\"journal\":{\"name\":\"2022 IEEE Mexican International Conference on Computer Science (ENC)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-08-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE Mexican International Conference on Computer Science (ENC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ENC56672.2022.9882928\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE Mexican International Conference on Computer Science (ENC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ENC56672.2022.9882928","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
On Mathematical Models for the Discordant Size Content Replacement Attack in Watermarked Audio Signals
An important aspect of any watermarking scheme is its robustness against attacks. For this, it is essential to know the behavior of the attack when handling a signal. The discordant size content replacement attack is a very severe attack against audio watermarking schemes. This attack replaces a set of samples of an audio signal with another collection of samples of different sizes. This study presents two mathematical models that describe the discordant size content replacement attack using different approaches: matrix representation and decimation, and interpolation. Each model includes content replacement attacks of equal, larger, and smaller sizes. Evaluations are carried out with different degrees of manipulation. The objective is to obtain a mathematical description that analyzes the behavior of the attack on an audio signal, and use the models to design self-restorable schemes of audio signals that are robust against this attack. The models showed proper functioning in their evaluations.