带水印音频信号中不一致大小内容替换攻击的数学模型

Juan Jose Gomez-Ricardez, José Juan García-Hernández
{"title":"带水印音频信号中不一致大小内容替换攻击的数学模型","authors":"Juan Jose Gomez-Ricardez, José Juan García-Hernández","doi":"10.1109/ENC56672.2022.9882928","DOIUrl":null,"url":null,"abstract":"An important aspect of any watermarking scheme is its robustness against attacks. For this, it is essential to know the behavior of the attack when handling a signal. The discordant size content replacement attack is a very severe attack against audio watermarking schemes. This attack replaces a set of samples of an audio signal with another collection of samples of different sizes. This study presents two mathematical models that describe the discordant size content replacement attack using different approaches: matrix representation and decimation, and interpolation. Each model includes content replacement attacks of equal, larger, and smaller sizes. Evaluations are carried out with different degrees of manipulation. The objective is to obtain a mathematical description that analyzes the behavior of the attack on an audio signal, and use the models to design self-restorable schemes of audio signals that are robust against this attack. The models showed proper functioning in their evaluations.","PeriodicalId":145622,"journal":{"name":"2022 IEEE Mexican International Conference on Computer Science (ENC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"On Mathematical Models for the Discordant Size Content Replacement Attack in Watermarked Audio Signals\",\"authors\":\"Juan Jose Gomez-Ricardez, José Juan García-Hernández\",\"doi\":\"10.1109/ENC56672.2022.9882928\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"An important aspect of any watermarking scheme is its robustness against attacks. For this, it is essential to know the behavior of the attack when handling a signal. The discordant size content replacement attack is a very severe attack against audio watermarking schemes. This attack replaces a set of samples of an audio signal with another collection of samples of different sizes. This study presents two mathematical models that describe the discordant size content replacement attack using different approaches: matrix representation and decimation, and interpolation. Each model includes content replacement attacks of equal, larger, and smaller sizes. Evaluations are carried out with different degrees of manipulation. The objective is to obtain a mathematical description that analyzes the behavior of the attack on an audio signal, and use the models to design self-restorable schemes of audio signals that are robust against this attack. The models showed proper functioning in their evaluations.\",\"PeriodicalId\":145622,\"journal\":{\"name\":\"2022 IEEE Mexican International Conference on Computer Science (ENC)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-08-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE Mexican International Conference on Computer Science (ENC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ENC56672.2022.9882928\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE Mexican International Conference on Computer Science (ENC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ENC56672.2022.9882928","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

任何水印方案的一个重要方面是它对攻击的鲁棒性。为此,在处理信号时了解攻击行为是至关重要的。不一致大小内容替换攻击是针对音频水印方案的一种非常严重的攻击。这种攻击将音频信号的一组样本替换为另一组不同大小的样本。本研究提出了两个数学模型来描述使用不同方法的不一致大小内容替换攻击:矩阵表示和抽取,以及插值。每个模型包括大小相等、较大和较小的内容替换攻击。评估是以不同程度的操纵进行的。目标是获得分析音频信号攻击行为的数学描述,并使用模型来设计音频信号的自恢复方案,以抵御这种攻击。模型在评估中显示出适当的功能。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
On Mathematical Models for the Discordant Size Content Replacement Attack in Watermarked Audio Signals
An important aspect of any watermarking scheme is its robustness against attacks. For this, it is essential to know the behavior of the attack when handling a signal. The discordant size content replacement attack is a very severe attack against audio watermarking schemes. This attack replaces a set of samples of an audio signal with another collection of samples of different sizes. This study presents two mathematical models that describe the discordant size content replacement attack using different approaches: matrix representation and decimation, and interpolation. Each model includes content replacement attacks of equal, larger, and smaller sizes. Evaluations are carried out with different degrees of manipulation. The objective is to obtain a mathematical description that analyzes the behavior of the attack on an audio signal, and use the models to design self-restorable schemes of audio signals that are robust against this attack. The models showed proper functioning in their evaluations.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信