How to Combat Block Replacement Attacks? View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2005

AUTHORS

Gwenaël Doërr , Jean-Luc Dugelay

ABSTRACT

Block replacement attacks consist in exploiting the redundancy of the host signal to replace each signal block with another one or a combination of other ones. Such an attacking strategy has been recognized to be a major threat against watermarking systems e.g. additive spread-spectrum and quantization index modulation algorithms. In this paper, a novel embedding strategy will be introduced to circumvent this attack. The basic idea is to make the watermark inherit the self-similarities from the host signal. This can be achieved by imposing a linear structure on the watermark in a feature space e.g. the Gabor space. The relationship with existing multiplicative watermarking schemes will also be exhibited. Finally, experimental results will be presented and directions for future work will be discussed. More... »

PAGES

161-175

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/11558859_13

DOI

http://dx.doi.org/10.1007/11558859_13

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1022325362


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0802", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Computation Theory and Mathematics", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Eur\u00e9com Institute, Multimedia Communications Department, 2229 route des Cr\u00eates, B.P. 193, 06904 C\u00e9dex, Sophia-Antipolis, France", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "Eur\u00e9com Institute, Multimedia Communications Department, 2229 route des Cr\u00eates, B.P. 193, 06904 C\u00e9dex, Sophia-Antipolis, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Do\u00ebrr", 
        "givenName": "Gwena\u00ebl", 
        "id": "sg:person.011410103415.45", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011410103415.45"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Eur\u00e9com Institute, Multimedia Communications Department, 2229 route des Cr\u00eates, B.P. 193, 06904 C\u00e9dex, Sophia-Antipolis, France", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "Eur\u00e9com Institute, Multimedia Communications Department, 2229 route des Cr\u00eates, B.P. 193, 06904 C\u00e9dex, Sophia-Antipolis, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Dugelay", 
        "givenName": "Jean-Luc", 
        "id": "sg:person.015053427343.37", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015053427343.37"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2005", 
    "datePublishedReg": "2005-01-01", 
    "description": "Block replacement attacks consist in exploiting the redundancy of the host signal to replace each signal block with another one or a combination of other ones. Such an attacking strategy has been recognized to be a major threat against watermarking systems e.g. additive spread-spectrum and quantization index modulation algorithms. In this paper, a novel embedding strategy will be introduced to circumvent this attack. The basic idea is to make the watermark inherit the self-similarities from the host signal. This can be achieved by imposing a linear structure on the watermark in a feature space e.g. the Gabor space. The relationship with existing multiplicative watermarking schemes will also be exhibited. Finally, experimental results will be presented and directions for future work will be discussed.", 
    "editor": [
      {
        "familyName": "Barni", 
        "givenName": "Mauro", 
        "type": "Person"
      }, 
      {
        "familyName": "Herrera-Joancomart\u00ed", 
        "givenName": "Jordi", 
        "type": "Person"
      }, 
      {
        "familyName": "Katzenbeisser", 
        "givenName": "Stefan", 
        "type": "Person"
      }, 
      {
        "familyName": "P\u00e9rez-Gonz\u00e1lez", 
        "givenName": "Fernando", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/11558859_13", 
    "inLanguage": "en", 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-540-29039-1", 
        "978-3-540-31481-3"
      ], 
      "name": "Information Hiding", 
      "type": "Book"
    }, 
    "keywords": [
      "attacks", 
      "host signal", 
      "combination", 
      "strategies", 
      "major threat", 
      "e.", 
      "relationship", 
      "signals", 
      "block", 
      "results", 
      "future work", 
      "one", 
      "threat", 
      "replacement attacks", 
      "signal block", 
      "systems e.", 
      "Quantization Index Modulation (QIM) algorithm", 
      "modulation algorithm", 
      "embedding strategy", 
      "basic idea", 
      "idea", 
      "structure", 
      "Gabor space", 
      "space", 
      "watermarking scheme", 
      "experimental results", 
      "direction", 
      "work", 
      "redundancy", 
      "algorithm", 
      "paper", 
      "inherit", 
      "linear structure", 
      "watermark", 
      "scheme", 
      "space E.", 
      "Block replacement attacks", 
      "watermarking systems e.", 
      "index modulation algorithms", 
      "novel embedding strategy", 
      "watermark inherit", 
      "feature space e.", 
      "multiplicative watermarking scheme", 
      "Combat Block Replacement Attacks"
    ], 
    "name": "How to Combat Block Replacement Attacks?", 
    "pagination": "161-175", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1022325362"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/11558859_13"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/11558859_13", 
      "https://app.dimensions.ai/details/publication/pub.1022325362"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-01-01T19:20", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220101/entities/gbq_results/chapter/chapter_358.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/11558859_13"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/11558859_13'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/11558859_13'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/11558859_13'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/11558859_13'


 

This table displays all metadata directly associated to this object as RDF triples.

126 TRIPLES      23 PREDICATES      70 URIs      63 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/11558859_13 schema:about anzsrc-for:08
2 anzsrc-for:0802
3 schema:author N6ca899a51d374bae9129fe3646cb922e
4 schema:datePublished 2005
5 schema:datePublishedReg 2005-01-01
6 schema:description Block replacement attacks consist in exploiting the redundancy of the host signal to replace each signal block with another one or a combination of other ones. Such an attacking strategy has been recognized to be a major threat against watermarking systems e.g. additive spread-spectrum and quantization index modulation algorithms. In this paper, a novel embedding strategy will be introduced to circumvent this attack. The basic idea is to make the watermark inherit the self-similarities from the host signal. This can be achieved by imposing a linear structure on the watermark in a feature space e.g. the Gabor space. The relationship with existing multiplicative watermarking schemes will also be exhibited. Finally, experimental results will be presented and directions for future work will be discussed.
7 schema:editor Ne81c6f30b2154d6296c562486a3e45be
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree false
11 schema:isPartOf N602cda4da2634faa94ba6f41ba1212ec
12 schema:keywords Block replacement attacks
13 Combat Block Replacement Attacks
14 Gabor space
15 Quantization Index Modulation (QIM) algorithm
16 algorithm
17 attacks
18 basic idea
19 block
20 combination
21 direction
22 e.
23 embedding strategy
24 experimental results
25 feature space e.
26 future work
27 host signal
28 idea
29 index modulation algorithms
30 inherit
31 linear structure
32 major threat
33 modulation algorithm
34 multiplicative watermarking scheme
35 novel embedding strategy
36 one
37 paper
38 redundancy
39 relationship
40 replacement attacks
41 results
42 scheme
43 signal block
44 signals
45 space
46 space E.
47 strategies
48 structure
49 systems e.
50 threat
51 watermark
52 watermark inherit
53 watermarking scheme
54 watermarking systems e.
55 work
56 schema:name How to Combat Block Replacement Attacks?
57 schema:pagination 161-175
58 schema:productId N36a4f29fcc4a4028a7f9f735040aafc1
59 N4860f89d6da542ddba0acae2c927c1ac
60 schema:publisher N1755a0f648164dd49ac08e755ebb4ac8
61 schema:sameAs https://app.dimensions.ai/details/publication/pub.1022325362
62 https://doi.org/10.1007/11558859_13
63 schema:sdDatePublished 2022-01-01T19:20
64 schema:sdLicense https://scigraph.springernature.com/explorer/license/
65 schema:sdPublisher N275d283d56e94f55ae5c0a74c3e86207
66 schema:url https://doi.org/10.1007/11558859_13
67 sgo:license sg:explorer/license/
68 sgo:sdDataset chapters
69 rdf:type schema:Chapter
70 N013d99f2496844c494d04908bd6cce18 schema:familyName Herrera-Joancomartí
71 schema:givenName Jordi
72 rdf:type schema:Person
73 N158cb5a9f1bf4d46a726e167c44f640e rdf:first N013d99f2496844c494d04908bd6cce18
74 rdf:rest N88e9dab287524ab5b2abf80ca6367b91
75 N1755a0f648164dd49ac08e755ebb4ac8 schema:name Springer Nature
76 rdf:type schema:Organisation
77 N26cb3ed3187749f49acfc45c3e29df88 schema:familyName Pérez-González
78 schema:givenName Fernando
79 rdf:type schema:Person
80 N275d283d56e94f55ae5c0a74c3e86207 schema:name Springer Nature - SN SciGraph project
81 rdf:type schema:Organization
82 N36a4f29fcc4a4028a7f9f735040aafc1 schema:name doi
83 schema:value 10.1007/11558859_13
84 rdf:type schema:PropertyValue
85 N4860f89d6da542ddba0acae2c927c1ac schema:name dimensions_id
86 schema:value pub.1022325362
87 rdf:type schema:PropertyValue
88 N50c63d0aa0a84b74ad766b882c39ae81 rdf:first N26cb3ed3187749f49acfc45c3e29df88
89 rdf:rest rdf:nil
90 N52a90b5b86ed44df843ba9dc5537e32c schema:familyName Katzenbeisser
91 schema:givenName Stefan
92 rdf:type schema:Person
93 N602cda4da2634faa94ba6f41ba1212ec schema:isbn 978-3-540-29039-1
94 978-3-540-31481-3
95 schema:name Information Hiding
96 rdf:type schema:Book
97 N6ca899a51d374bae9129fe3646cb922e rdf:first sg:person.011410103415.45
98 rdf:rest Nf42ebd56763846358648c4a230880e35
99 N88e9dab287524ab5b2abf80ca6367b91 rdf:first N52a90b5b86ed44df843ba9dc5537e32c
100 rdf:rest N50c63d0aa0a84b74ad766b882c39ae81
101 Nb0c68faf23d940e0ab2f761dfbe45118 schema:familyName Barni
102 schema:givenName Mauro
103 rdf:type schema:Person
104 Ne81c6f30b2154d6296c562486a3e45be rdf:first Nb0c68faf23d940e0ab2f761dfbe45118
105 rdf:rest N158cb5a9f1bf4d46a726e167c44f640e
106 Nf42ebd56763846358648c4a230880e35 rdf:first sg:person.015053427343.37
107 rdf:rest rdf:nil
108 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
109 schema:name Information and Computing Sciences
110 rdf:type schema:DefinedTerm
111 anzsrc-for:0802 schema:inDefinedTermSet anzsrc-for:
112 schema:name Computation Theory and Mathematics
113 rdf:type schema:DefinedTerm
114 sg:person.011410103415.45 schema:affiliation grid-institutes:None
115 schema:familyName Doërr
116 schema:givenName Gwenaël
117 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011410103415.45
118 rdf:type schema:Person
119 sg:person.015053427343.37 schema:affiliation grid-institutes:None
120 schema:familyName Dugelay
121 schema:givenName Jean-Luc
122 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015053427343.37
123 rdf:type schema:Person
124 grid-institutes:None schema:alternateName Eurécom Institute, Multimedia Communications Department, 2229 route des Crêtes, B.P. 193, 06904 Cédex, Sophia-Antipolis, France
125 schema:name Eurécom Institute, Multimedia Communications Department, 2229 route des Crêtes, B.P. 193, 06904 Cédex, Sophia-Antipolis, France
126 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...