How to Combat Block Replacement Attacks? View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2005

AUTHORS

Gwenaël Doërr , Jean-Luc Dugelay

ABSTRACT

Block replacement attacks consist in exploiting the redundancy of the host signal to replace each signal block with another one or a combination of other ones. Such an attacking strategy has been recognized to be a major threat against watermarking systems e.g. additive spread-spectrum and quantization index modulation algorithms. In this paper, a novel embedding strategy will be introduced to circumvent this attack. The basic idea is to make the watermark inherit the self-similarities from the host signal. This can be achieved by imposing a linear structure on the watermark in a feature space e.g. the Gabor space. The relationship with existing multiplicative watermarking schemes will also be exhibited. Finally, experimental results will be presented and directions for future work will be discussed. More... »

PAGES

161-175

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/11558859_13

DOI

http://dx.doi.org/10.1007/11558859_13

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1022325362


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0802", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Computation Theory and Mathematics", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Eur\u00e9com Institute, Multimedia Communications Department, 2229 route des Cr\u00eates, B.P. 193, 06904 C\u00e9dex, Sophia-Antipolis, France", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "Eur\u00e9com Institute, Multimedia Communications Department, 2229 route des Cr\u00eates, B.P. 193, 06904 C\u00e9dex, Sophia-Antipolis, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Do\u00ebrr", 
        "givenName": "Gwena\u00ebl", 
        "id": "sg:person.011410103415.45", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011410103415.45"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Eur\u00e9com Institute, Multimedia Communications Department, 2229 route des Cr\u00eates, B.P. 193, 06904 C\u00e9dex, Sophia-Antipolis, France", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "Eur\u00e9com Institute, Multimedia Communications Department, 2229 route des Cr\u00eates, B.P. 193, 06904 C\u00e9dex, Sophia-Antipolis, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Dugelay", 
        "givenName": "Jean-Luc", 
        "id": "sg:person.015053427343.37", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015053427343.37"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2005", 
    "datePublishedReg": "2005-01-01", 
    "description": "Block replacement attacks consist in exploiting the redundancy of the host signal to replace each signal block with another one or a combination of other ones. Such an attacking strategy has been recognized to be a major threat against watermarking systems e.g. additive spread-spectrum and quantization index modulation algorithms. In this paper, a novel embedding strategy will be introduced to circumvent this attack. The basic idea is to make the watermark inherit the self-similarities from the host signal. This can be achieved by imposing a linear structure on the watermark in a feature space e.g. the Gabor space. The relationship with existing multiplicative watermarking schemes will also be exhibited. Finally, experimental results will be presented and directions for future work will be discussed.", 
    "editor": [
      {
        "familyName": "Barni", 
        "givenName": "Mauro", 
        "type": "Person"
      }, 
      {
        "familyName": "Herrera-Joancomart\u00ed", 
        "givenName": "Jordi", 
        "type": "Person"
      }, 
      {
        "familyName": "Katzenbeisser", 
        "givenName": "Stefan", 
        "type": "Person"
      }, 
      {
        "familyName": "P\u00e9rez-Gonz\u00e1lez", 
        "givenName": "Fernando", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/11558859_13", 
    "inLanguage": "en", 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-540-29039-1", 
        "978-3-540-31481-3"
      ], 
      "name": "Information Hiding", 
      "type": "Book"
    }, 
    "keywords": [
      "modulation algorithm", 
      "signal block", 
      "experimental results", 
      "host signal", 
      "systems e.", 
      "watermarking scheme", 
      "space E.", 
      "signals", 
      "linear structure", 
      "Gabor space", 
      "basic idea", 
      "future work", 
      "replacement attacks", 
      "watermark", 
      "e.", 
      "Quantization Index Modulation (QIM) algorithm", 
      "embedding strategy", 
      "structure", 
      "multiplicative watermarking scheme", 
      "scheme", 
      "direction", 
      "algorithm", 
      "work", 
      "redundancy", 
      "results", 
      "block", 
      "combination", 
      "strategies", 
      "space", 
      "attacks", 
      "one", 
      "inherit", 
      "major threat", 
      "idea", 
      "threat", 
      "relationship", 
      "paper"
    ], 
    "name": "How to Combat Block Replacement Attacks?", 
    "pagination": "161-175", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1022325362"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/11558859_13"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/11558859_13", 
      "https://app.dimensions.ai/details/publication/pub.1022325362"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-05-20T07:41", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220519/entities/gbq_results/chapter/chapter_115.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/11558859_13"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/11558859_13'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/11558859_13'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/11558859_13'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/11558859_13'


 

This table displays all metadata directly associated to this object as RDF triples.

119 TRIPLES      23 PREDICATES      63 URIs      56 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/11558859_13 schema:about anzsrc-for:08
2 anzsrc-for:0802
3 schema:author Nc5fe1e6fe17e412991eebe6e58aba47f
4 schema:datePublished 2005
5 schema:datePublishedReg 2005-01-01
6 schema:description Block replacement attacks consist in exploiting the redundancy of the host signal to replace each signal block with another one or a combination of other ones. Such an attacking strategy has been recognized to be a major threat against watermarking systems e.g. additive spread-spectrum and quantization index modulation algorithms. In this paper, a novel embedding strategy will be introduced to circumvent this attack. The basic idea is to make the watermark inherit the self-similarities from the host signal. This can be achieved by imposing a linear structure on the watermark in a feature space e.g. the Gabor space. The relationship with existing multiplicative watermarking schemes will also be exhibited. Finally, experimental results will be presented and directions for future work will be discussed.
7 schema:editor N824fe2a694b942f19f0ccbeb7387b81f
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree false
11 schema:isPartOf N6bd3214073a4421d9c8615150a2ed37d
12 schema:keywords Gabor space
13 Quantization Index Modulation (QIM) algorithm
14 algorithm
15 attacks
16 basic idea
17 block
18 combination
19 direction
20 e.
21 embedding strategy
22 experimental results
23 future work
24 host signal
25 idea
26 inherit
27 linear structure
28 major threat
29 modulation algorithm
30 multiplicative watermarking scheme
31 one
32 paper
33 redundancy
34 relationship
35 replacement attacks
36 results
37 scheme
38 signal block
39 signals
40 space
41 space E.
42 strategies
43 structure
44 systems e.
45 threat
46 watermark
47 watermarking scheme
48 work
49 schema:name How to Combat Block Replacement Attacks?
50 schema:pagination 161-175
51 schema:productId N841276de3b6049658b3b91490115318e
52 Nf15eca1ddbb7473d8e7c56ff3a664dc6
53 schema:publisher Naec6e235d64c42d69d11f1eaee3c01e1
54 schema:sameAs https://app.dimensions.ai/details/publication/pub.1022325362
55 https://doi.org/10.1007/11558859_13
56 schema:sdDatePublished 2022-05-20T07:41
57 schema:sdLicense https://scigraph.springernature.com/explorer/license/
58 schema:sdPublisher N71ac9aa7927d46ad9991f26d054ddb5b
59 schema:url https://doi.org/10.1007/11558859_13
60 sgo:license sg:explorer/license/
61 sgo:sdDataset chapters
62 rdf:type schema:Chapter
63 N223656ca3b294f4aa1a0667dbf0e3228 rdf:first sg:person.015053427343.37
64 rdf:rest rdf:nil
65 N338452f6a4844ec5a08bc7c3f54456c2 schema:familyName Herrera-Joancomartí
66 schema:givenName Jordi
67 rdf:type schema:Person
68 N41bceefc9be247bf858a9044598f95b3 rdf:first N468a5ee4d4c6484caa7c02c6ec8f3580
69 rdf:rest Ne86c93e937b944ccb3ab42b75382be6d
70 N468a5ee4d4c6484caa7c02c6ec8f3580 schema:familyName Katzenbeisser
71 schema:givenName Stefan
72 rdf:type schema:Person
73 N5111035e986b4919911b2f8b421c2744 schema:familyName Barni
74 schema:givenName Mauro
75 rdf:type schema:Person
76 N6bd3214073a4421d9c8615150a2ed37d schema:isbn 978-3-540-29039-1
77 978-3-540-31481-3
78 schema:name Information Hiding
79 rdf:type schema:Book
80 N70b686c587e24d86aac9f0594a8895c7 rdf:first N338452f6a4844ec5a08bc7c3f54456c2
81 rdf:rest N41bceefc9be247bf858a9044598f95b3
82 N71ac9aa7927d46ad9991f26d054ddb5b schema:name Springer Nature - SN SciGraph project
83 rdf:type schema:Organization
84 N824fe2a694b942f19f0ccbeb7387b81f rdf:first N5111035e986b4919911b2f8b421c2744
85 rdf:rest N70b686c587e24d86aac9f0594a8895c7
86 N841276de3b6049658b3b91490115318e schema:name doi
87 schema:value 10.1007/11558859_13
88 rdf:type schema:PropertyValue
89 Naec6e235d64c42d69d11f1eaee3c01e1 schema:name Springer Nature
90 rdf:type schema:Organisation
91 Nc5fe1e6fe17e412991eebe6e58aba47f rdf:first sg:person.011410103415.45
92 rdf:rest N223656ca3b294f4aa1a0667dbf0e3228
93 Ne6b8a7d209e640038228f66c93d13150 schema:familyName Pérez-González
94 schema:givenName Fernando
95 rdf:type schema:Person
96 Ne86c93e937b944ccb3ab42b75382be6d rdf:first Ne6b8a7d209e640038228f66c93d13150
97 rdf:rest rdf:nil
98 Nf15eca1ddbb7473d8e7c56ff3a664dc6 schema:name dimensions_id
99 schema:value pub.1022325362
100 rdf:type schema:PropertyValue
101 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
102 schema:name Information and Computing Sciences
103 rdf:type schema:DefinedTerm
104 anzsrc-for:0802 schema:inDefinedTermSet anzsrc-for:
105 schema:name Computation Theory and Mathematics
106 rdf:type schema:DefinedTerm
107 sg:person.011410103415.45 schema:affiliation grid-institutes:None
108 schema:familyName Doërr
109 schema:givenName Gwenaël
110 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011410103415.45
111 rdf:type schema:Person
112 sg:person.015053427343.37 schema:affiliation grid-institutes:None
113 schema:familyName Dugelay
114 schema:givenName Jean-Luc
115 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015053427343.37
116 rdf:type schema:Person
117 grid-institutes:None schema:alternateName Eurécom Institute, Multimedia Communications Department, 2229 route des Crêtes, B.P. 193, 06904 Cédex, Sophia-Antipolis, France
118 schema:name Eurécom Institute, Multimedia Communications Department, 2229 route des Crêtes, B.P. 193, 06904 Cédex, Sophia-Antipolis, France
119 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...