The Replacement Attack
Billions of dollars allegedly lost to piracy of multimedia have recently triggered the industry to rethink the way music and movies are distributed. As encryption is vulnerable to rerecording, currently all copyright protection mechanisms tend to rely on watermarking. A watermark is an imperceptive...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on audio, speech, and language processing speech, and language processing, 2007-08, Vol.15 (6), p.1922-1931 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1931 |
---|---|
container_issue | 6 |
container_start_page | 1922 |
container_title | IEEE transactions on audio, speech, and language processing |
container_volume | 15 |
creator | Kirovski, D. Petitcolas, F.A.P. Landau, Z. |
description | Billions of dollars allegedly lost to piracy of multimedia have recently triggered the industry to rethink the way music and movies are distributed. As encryption is vulnerable to rerecording, currently all copyright protection mechanisms tend to rely on watermarking. A watermark is an imperceptive secret hidden in a host signal. In this paper, we analyze the security of multimedia copyright protection systems that use watermarks by proposing a new breed of attacks on generic watermarking systems. A typical replacement attack relies upon the observation that multimedia content is often highly repetitive. Thus, the attack procedure replaces each signal block with another, perceptually similar block computed as a combination of other similar blocks found either within the same media clip or within a library of media clips. Assuming the blocks used to compute the replacement are marked with distinct secrets, we show that if the computed replacement block is at some minimal distance from the original marked block, a large portion of the embedded watermark is removed. We describe the logistics of the attack and an exemplary implementation against a spread-spectrum data hiding technology for audio signals. |
doi_str_mv | 10.1109/TASL.2007.900088 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_ieee_primary_4276756</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4276756</ieee_id><sourcerecordid>36361541</sourcerecordid><originalsourceid>FETCH-LOGICAL-c383t-e0512e6f2315e6a7e858672bcd0d7b0bded073ce256003b08c7f3105fc29e5573</originalsourceid><addsrcrecordid>eNp9kE1Lw0AQhhdRsFavIngpgnpKnf3eHEvxCwqC1vOy2UwwNU3qbnrw35uQUsGDpxmY551hHkIuKEwphfRuOXtbTBmAnqYAYMwBGVEpTaJTJg73PVXH5CTGFYDgStAROV9-4OQVN5XzuMa6ncza1vnPU3JUuCri2a6OyfvD_XL-lCxeHp_ns0XiueFtgiApQ1UwTiUqp9FIozTLfA65ziDLMQfNPTKpAHgGxuuCU5CFZylKqfmY3A57N6H52mJs7bqMHqvK1dhsozVagkqNgI68-ZfkiisqBe3Aqz_gqtmGuvvCplQLpbQQHQQD5EMTY8DCbkK5duHbUrC9T9v7tL1PO_jsIte7vS56VxXB1b6MvzmTCm14f_9y4EpE3I8F00pLxX8AXqB6aA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>917466744</pqid></control><display><type>article</type><title>The Replacement Attack</title><source>IEEE Electronic Library (IEL)</source><creator>Kirovski, D. ; Petitcolas, F.A.P. ; Landau, Z.</creator><creatorcontrib>Kirovski, D. ; Petitcolas, F.A.P. ; Landau, Z.</creatorcontrib><description>Billions of dollars allegedly lost to piracy of multimedia have recently triggered the industry to rethink the way music and movies are distributed. As encryption is vulnerable to rerecording, currently all copyright protection mechanisms tend to rely on watermarking. A watermark is an imperceptive secret hidden in a host signal. In this paper, we analyze the security of multimedia copyright protection systems that use watermarks by proposing a new breed of attacks on generic watermarking systems. A typical replacement attack relies upon the observation that multimedia content is often highly repetitive. Thus, the attack procedure replaces each signal block with another, perceptually similar block computed as a combination of other similar blocks found either within the same media clip or within a library of media clips. Assuming the blocks used to compute the replacement are marked with distinct secrets, we show that if the computed replacement block is at some minimal distance from the original marked block, a large portion of the embedded watermark is removed. We describe the logistics of the attack and an exemplary implementation against a spread-spectrum data hiding technology for audio signals.</description><identifier>ISSN: 1558-7916</identifier><identifier>ISSN: 2329-9290</identifier><identifier>EISSN: 1558-7924</identifier><identifier>EISSN: 2329-9304</identifier><identifier>DOI: 10.1109/TASL.2007.900088</identifier><identifier>CODEN: ITASD8</identifier><language>eng</language><publisher>Piscataway, NJ: IEEE</publisher><subject>Applied sciences ; Audio signals ; Blocking ; Clips ; Computation ; Copyright protection ; Copyrights ; Cryptography ; Embedded computing ; Exact sciences and technology ; Fingerprinting ; Image processing ; Information, signal and communications theory ; Libraries ; Logistics ; Media ; Motion pictures ; Multimedia ; multimedia similarity ; Multimedia systems ; pattern matching ; Pattern recognition ; replacement attack ; Security ; Signal and communications theory ; Signal processing ; Spread spectrum communication ; Telecommunications and information theory ; Watermarking</subject><ispartof>IEEE transactions on audio, speech, and language processing, 2007-08, Vol.15 (6), p.1922-1931</ispartof><rights>2007 INIST-CNRS</rights><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2007</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c383t-e0512e6f2315e6a7e858672bcd0d7b0bded073ce256003b08c7f3105fc29e5573</citedby><cites>FETCH-LOGICAL-c383t-e0512e6f2315e6a7e858672bcd0d7b0bded073ce256003b08c7f3105fc29e5573</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4276756$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,27924,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4276756$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=18947831$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><creatorcontrib>Kirovski, D.</creatorcontrib><creatorcontrib>Petitcolas, F.A.P.</creatorcontrib><creatorcontrib>Landau, Z.</creatorcontrib><title>The Replacement Attack</title><title>IEEE transactions on audio, speech, and language processing</title><addtitle>TASL</addtitle><description>Billions of dollars allegedly lost to piracy of multimedia have recently triggered the industry to rethink the way music and movies are distributed. As encryption is vulnerable to rerecording, currently all copyright protection mechanisms tend to rely on watermarking. A watermark is an imperceptive secret hidden in a host signal. In this paper, we analyze the security of multimedia copyright protection systems that use watermarks by proposing a new breed of attacks on generic watermarking systems. A typical replacement attack relies upon the observation that multimedia content is often highly repetitive. Thus, the attack procedure replaces each signal block with another, perceptually similar block computed as a combination of other similar blocks found either within the same media clip or within a library of media clips. Assuming the blocks used to compute the replacement are marked with distinct secrets, we show that if the computed replacement block is at some minimal distance from the original marked block, a large portion of the embedded watermark is removed. We describe the logistics of the attack and an exemplary implementation against a spread-spectrum data hiding technology for audio signals.</description><subject>Applied sciences</subject><subject>Audio signals</subject><subject>Blocking</subject><subject>Clips</subject><subject>Computation</subject><subject>Copyright protection</subject><subject>Copyrights</subject><subject>Cryptography</subject><subject>Embedded computing</subject><subject>Exact sciences and technology</subject><subject>Fingerprinting</subject><subject>Image processing</subject><subject>Information, signal and communications theory</subject><subject>Libraries</subject><subject>Logistics</subject><subject>Media</subject><subject>Motion pictures</subject><subject>Multimedia</subject><subject>multimedia similarity</subject><subject>Multimedia systems</subject><subject>pattern matching</subject><subject>Pattern recognition</subject><subject>replacement attack</subject><subject>Security</subject><subject>Signal and communications theory</subject><subject>Signal processing</subject><subject>Spread spectrum communication</subject><subject>Telecommunications and information theory</subject><subject>Watermarking</subject><issn>1558-7916</issn><issn>2329-9290</issn><issn>1558-7924</issn><issn>2329-9304</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2007</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNp9kE1Lw0AQhhdRsFavIngpgnpKnf3eHEvxCwqC1vOy2UwwNU3qbnrw35uQUsGDpxmY551hHkIuKEwphfRuOXtbTBmAnqYAYMwBGVEpTaJTJg73PVXH5CTGFYDgStAROV9-4OQVN5XzuMa6ncza1vnPU3JUuCri2a6OyfvD_XL-lCxeHp_ns0XiueFtgiApQ1UwTiUqp9FIozTLfA65ziDLMQfNPTKpAHgGxuuCU5CFZylKqfmY3A57N6H52mJs7bqMHqvK1dhsozVagkqNgI68-ZfkiisqBe3Aqz_gqtmGuvvCplQLpbQQHQQD5EMTY8DCbkK5duHbUrC9T9v7tL1PO_jsIte7vS56VxXB1b6MvzmTCm14f_9y4EpE3I8F00pLxX8AXqB6aA</recordid><startdate>20070801</startdate><enddate>20070801</enddate><creator>Kirovski, D.</creator><creator>Petitcolas, F.A.P.</creator><creator>Landau, Z.</creator><general>IEEE</general><general>Institute of Electrical and Electronics Engineers</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>IQODW</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20070801</creationdate><title>The Replacement Attack</title><author>Kirovski, D. ; Petitcolas, F.A.P. ; Landau, Z.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c383t-e0512e6f2315e6a7e858672bcd0d7b0bded073ce256003b08c7f3105fc29e5573</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2007</creationdate><topic>Applied sciences</topic><topic>Audio signals</topic><topic>Blocking</topic><topic>Clips</topic><topic>Computation</topic><topic>Copyright protection</topic><topic>Copyrights</topic><topic>Cryptography</topic><topic>Embedded computing</topic><topic>Exact sciences and technology</topic><topic>Fingerprinting</topic><topic>Image processing</topic><topic>Information, signal and communications theory</topic><topic>Libraries</topic><topic>Logistics</topic><topic>Media</topic><topic>Motion pictures</topic><topic>Multimedia</topic><topic>multimedia similarity</topic><topic>Multimedia systems</topic><topic>pattern matching</topic><topic>Pattern recognition</topic><topic>replacement attack</topic><topic>Security</topic><topic>Signal and communications theory</topic><topic>Signal processing</topic><topic>Spread spectrum communication</topic><topic>Telecommunications and information theory</topic><topic>Watermarking</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Kirovski, D.</creatorcontrib><creatorcontrib>Petitcolas, F.A.P.</creatorcontrib><creatorcontrib>Landau, Z.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>Pascal-Francis</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE transactions on audio, speech, and language processing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Kirovski, D.</au><au>Petitcolas, F.A.P.</au><au>Landau, Z.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>The Replacement Attack</atitle><jtitle>IEEE transactions on audio, speech, and language processing</jtitle><stitle>TASL</stitle><date>2007-08-01</date><risdate>2007</risdate><volume>15</volume><issue>6</issue><spage>1922</spage><epage>1931</epage><pages>1922-1931</pages><issn>1558-7916</issn><issn>2329-9290</issn><eissn>1558-7924</eissn><eissn>2329-9304</eissn><coden>ITASD8</coden><abstract>Billions of dollars allegedly lost to piracy of multimedia have recently triggered the industry to rethink the way music and movies are distributed. As encryption is vulnerable to rerecording, currently all copyright protection mechanisms tend to rely on watermarking. A watermark is an imperceptive secret hidden in a host signal. In this paper, we analyze the security of multimedia copyright protection systems that use watermarks by proposing a new breed of attacks on generic watermarking systems. A typical replacement attack relies upon the observation that multimedia content is often highly repetitive. Thus, the attack procedure replaces each signal block with another, perceptually similar block computed as a combination of other similar blocks found either within the same media clip or within a library of media clips. Assuming the blocks used to compute the replacement are marked with distinct secrets, we show that if the computed replacement block is at some minimal distance from the original marked block, a large portion of the embedded watermark is removed. We describe the logistics of the attack and an exemplary implementation against a spread-spectrum data hiding technology for audio signals.</abstract><cop>Piscataway, NJ</cop><pub>IEEE</pub><doi>10.1109/TASL.2007.900088</doi><tpages>10</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1558-7916 |
ispartof | IEEE transactions on audio, speech, and language processing, 2007-08, Vol.15 (6), p.1922-1931 |
issn | 1558-7916 2329-9290 1558-7924 2329-9304 |
language | eng |
recordid | cdi_ieee_primary_4276756 |
source | IEEE Electronic Library (IEL) |
subjects | Applied sciences Audio signals Blocking Clips Computation Copyright protection Copyrights Cryptography Embedded computing Exact sciences and technology Fingerprinting Image processing Information, signal and communications theory Libraries Logistics Media Motion pictures Multimedia multimedia similarity Multimedia systems pattern matching Pattern recognition replacement attack Security Signal and communications theory Signal processing Spread spectrum communication Telecommunications and information theory Watermarking |
title | The Replacement Attack |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T19%3A32%3A04IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=The%20Replacement%20Attack&rft.jtitle=IEEE%20transactions%20on%20audio,%20speech,%20and%20language%20processing&rft.au=Kirovski,%20D.&rft.date=2007-08-01&rft.volume=15&rft.issue=6&rft.spage=1922&rft.epage=1931&rft.pages=1922-1931&rft.issn=1558-7916&rft.eissn=1558-7924&rft.coden=ITASD8&rft_id=info:doi/10.1109/TASL.2007.900088&rft_dat=%3Cproquest_RIE%3E36361541%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=917466744&rft_id=info:pmid/&rft_ieee_id=4276756&rfr_iscdi=true |