The Replacement Attack

Billions of dollars allegedly lost to piracy of multimedia have recently triggered the industry to rethink the way music and movies are distributed. As encryption is vulnerable to rerecording, currently all copyright protection mechanisms tend to rely on watermarking. A watermark is an imperceptive...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on audio, speech, and language processing speech, and language processing, 2007-08, Vol.15 (6), p.1922-1931
Hauptverfasser: Kirovski, D., Petitcolas, F.A.P., Landau, Z.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1931
container_issue 6
container_start_page 1922
container_title IEEE transactions on audio, speech, and language processing
container_volume 15
creator Kirovski, D.
Petitcolas, F.A.P.
Landau, Z.
description Billions of dollars allegedly lost to piracy of multimedia have recently triggered the industry to rethink the way music and movies are distributed. As encryption is vulnerable to rerecording, currently all copyright protection mechanisms tend to rely on watermarking. A watermark is an imperceptive secret hidden in a host signal. In this paper, we analyze the security of multimedia copyright protection systems that use watermarks by proposing a new breed of attacks on generic watermarking systems. A typical replacement attack relies upon the observation that multimedia content is often highly repetitive. Thus, the attack procedure replaces each signal block with another, perceptually similar block computed as a combination of other similar blocks found either within the same media clip or within a library of media clips. Assuming the blocks used to compute the replacement are marked with distinct secrets, we show that if the computed replacement block is at some minimal distance from the original marked block, a large portion of the embedded watermark is removed. We describe the logistics of the attack and an exemplary implementation against a spread-spectrum data hiding technology for audio signals.
doi_str_mv 10.1109/TASL.2007.900088
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_ieee_primary_4276756</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4276756</ieee_id><sourcerecordid>36361541</sourcerecordid><originalsourceid>FETCH-LOGICAL-c383t-e0512e6f2315e6a7e858672bcd0d7b0bded073ce256003b08c7f3105fc29e5573</originalsourceid><addsrcrecordid>eNp9kE1Lw0AQhhdRsFavIngpgnpKnf3eHEvxCwqC1vOy2UwwNU3qbnrw35uQUsGDpxmY551hHkIuKEwphfRuOXtbTBmAnqYAYMwBGVEpTaJTJg73PVXH5CTGFYDgStAROV9-4OQVN5XzuMa6ncza1vnPU3JUuCri2a6OyfvD_XL-lCxeHp_ns0XiueFtgiApQ1UwTiUqp9FIozTLfA65ziDLMQfNPTKpAHgGxuuCU5CFZylKqfmY3A57N6H52mJs7bqMHqvK1dhsozVagkqNgI68-ZfkiisqBe3Aqz_gqtmGuvvCplQLpbQQHQQD5EMTY8DCbkK5duHbUrC9T9v7tL1PO_jsIte7vS56VxXB1b6MvzmTCm14f_9y4EpE3I8F00pLxX8AXqB6aA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>917466744</pqid></control><display><type>article</type><title>The Replacement Attack</title><source>IEEE Electronic Library (IEL)</source><creator>Kirovski, D. ; Petitcolas, F.A.P. ; Landau, Z.</creator><creatorcontrib>Kirovski, D. ; Petitcolas, F.A.P. ; Landau, Z.</creatorcontrib><description>Billions of dollars allegedly lost to piracy of multimedia have recently triggered the industry to rethink the way music and movies are distributed. As encryption is vulnerable to rerecording, currently all copyright protection mechanisms tend to rely on watermarking. A watermark is an imperceptive secret hidden in a host signal. In this paper, we analyze the security of multimedia copyright protection systems that use watermarks by proposing a new breed of attacks on generic watermarking systems. A typical replacement attack relies upon the observation that multimedia content is often highly repetitive. Thus, the attack procedure replaces each signal block with another, perceptually similar block computed as a combination of other similar blocks found either within the same media clip or within a library of media clips. Assuming the blocks used to compute the replacement are marked with distinct secrets, we show that if the computed replacement block is at some minimal distance from the original marked block, a large portion of the embedded watermark is removed. We describe the logistics of the attack and an exemplary implementation against a spread-spectrum data hiding technology for audio signals.</description><identifier>ISSN: 1558-7916</identifier><identifier>ISSN: 2329-9290</identifier><identifier>EISSN: 1558-7924</identifier><identifier>EISSN: 2329-9304</identifier><identifier>DOI: 10.1109/TASL.2007.900088</identifier><identifier>CODEN: ITASD8</identifier><language>eng</language><publisher>Piscataway, NJ: IEEE</publisher><subject>Applied sciences ; Audio signals ; Blocking ; Clips ; Computation ; Copyright protection ; Copyrights ; Cryptography ; Embedded computing ; Exact sciences and technology ; Fingerprinting ; Image processing ; Information, signal and communications theory ; Libraries ; Logistics ; Media ; Motion pictures ; Multimedia ; multimedia similarity ; Multimedia systems ; pattern matching ; Pattern recognition ; replacement attack ; Security ; Signal and communications theory ; Signal processing ; Spread spectrum communication ; Telecommunications and information theory ; Watermarking</subject><ispartof>IEEE transactions on audio, speech, and language processing, 2007-08, Vol.15 (6), p.1922-1931</ispartof><rights>2007 INIST-CNRS</rights><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2007</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c383t-e0512e6f2315e6a7e858672bcd0d7b0bded073ce256003b08c7f3105fc29e5573</citedby><cites>FETCH-LOGICAL-c383t-e0512e6f2315e6a7e858672bcd0d7b0bded073ce256003b08c7f3105fc29e5573</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4276756$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,27924,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4276756$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=18947831$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><creatorcontrib>Kirovski, D.</creatorcontrib><creatorcontrib>Petitcolas, F.A.P.</creatorcontrib><creatorcontrib>Landau, Z.</creatorcontrib><title>The Replacement Attack</title><title>IEEE transactions on audio, speech, and language processing</title><addtitle>TASL</addtitle><description>Billions of dollars allegedly lost to piracy of multimedia have recently triggered the industry to rethink the way music and movies are distributed. As encryption is vulnerable to rerecording, currently all copyright protection mechanisms tend to rely on watermarking. A watermark is an imperceptive secret hidden in a host signal. In this paper, we analyze the security of multimedia copyright protection systems that use watermarks by proposing a new breed of attacks on generic watermarking systems. A typical replacement attack relies upon the observation that multimedia content is often highly repetitive. Thus, the attack procedure replaces each signal block with another, perceptually similar block computed as a combination of other similar blocks found either within the same media clip or within a library of media clips. Assuming the blocks used to compute the replacement are marked with distinct secrets, we show that if the computed replacement block is at some minimal distance from the original marked block, a large portion of the embedded watermark is removed. We describe the logistics of the attack and an exemplary implementation against a spread-spectrum data hiding technology for audio signals.</description><subject>Applied sciences</subject><subject>Audio signals</subject><subject>Blocking</subject><subject>Clips</subject><subject>Computation</subject><subject>Copyright protection</subject><subject>Copyrights</subject><subject>Cryptography</subject><subject>Embedded computing</subject><subject>Exact sciences and technology</subject><subject>Fingerprinting</subject><subject>Image processing</subject><subject>Information, signal and communications theory</subject><subject>Libraries</subject><subject>Logistics</subject><subject>Media</subject><subject>Motion pictures</subject><subject>Multimedia</subject><subject>multimedia similarity</subject><subject>Multimedia systems</subject><subject>pattern matching</subject><subject>Pattern recognition</subject><subject>replacement attack</subject><subject>Security</subject><subject>Signal and communications theory</subject><subject>Signal processing</subject><subject>Spread spectrum communication</subject><subject>Telecommunications and information theory</subject><subject>Watermarking</subject><issn>1558-7916</issn><issn>2329-9290</issn><issn>1558-7924</issn><issn>2329-9304</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2007</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNp9kE1Lw0AQhhdRsFavIngpgnpKnf3eHEvxCwqC1vOy2UwwNU3qbnrw35uQUsGDpxmY551hHkIuKEwphfRuOXtbTBmAnqYAYMwBGVEpTaJTJg73PVXH5CTGFYDgStAROV9-4OQVN5XzuMa6ncza1vnPU3JUuCri2a6OyfvD_XL-lCxeHp_ns0XiueFtgiApQ1UwTiUqp9FIozTLfA65ziDLMQfNPTKpAHgGxuuCU5CFZylKqfmY3A57N6H52mJs7bqMHqvK1dhsozVagkqNgI68-ZfkiisqBe3Aqz_gqtmGuvvCplQLpbQQHQQD5EMTY8DCbkK5duHbUrC9T9v7tL1PO_jsIte7vS56VxXB1b6MvzmTCm14f_9y4EpE3I8F00pLxX8AXqB6aA</recordid><startdate>20070801</startdate><enddate>20070801</enddate><creator>Kirovski, D.</creator><creator>Petitcolas, F.A.P.</creator><creator>Landau, Z.</creator><general>IEEE</general><general>Institute of Electrical and Electronics Engineers</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>IQODW</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20070801</creationdate><title>The Replacement Attack</title><author>Kirovski, D. ; Petitcolas, F.A.P. ; Landau, Z.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c383t-e0512e6f2315e6a7e858672bcd0d7b0bded073ce256003b08c7f3105fc29e5573</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2007</creationdate><topic>Applied sciences</topic><topic>Audio signals</topic><topic>Blocking</topic><topic>Clips</topic><topic>Computation</topic><topic>Copyright protection</topic><topic>Copyrights</topic><topic>Cryptography</topic><topic>Embedded computing</topic><topic>Exact sciences and technology</topic><topic>Fingerprinting</topic><topic>Image processing</topic><topic>Information, signal and communications theory</topic><topic>Libraries</topic><topic>Logistics</topic><topic>Media</topic><topic>Motion pictures</topic><topic>Multimedia</topic><topic>multimedia similarity</topic><topic>Multimedia systems</topic><topic>pattern matching</topic><topic>Pattern recognition</topic><topic>replacement attack</topic><topic>Security</topic><topic>Signal and communications theory</topic><topic>Signal processing</topic><topic>Spread spectrum communication</topic><topic>Telecommunications and information theory</topic><topic>Watermarking</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Kirovski, D.</creatorcontrib><creatorcontrib>Petitcolas, F.A.P.</creatorcontrib><creatorcontrib>Landau, Z.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>Pascal-Francis</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE transactions on audio, speech, and language processing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Kirovski, D.</au><au>Petitcolas, F.A.P.</au><au>Landau, Z.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>The Replacement Attack</atitle><jtitle>IEEE transactions on audio, speech, and language processing</jtitle><stitle>TASL</stitle><date>2007-08-01</date><risdate>2007</risdate><volume>15</volume><issue>6</issue><spage>1922</spage><epage>1931</epage><pages>1922-1931</pages><issn>1558-7916</issn><issn>2329-9290</issn><eissn>1558-7924</eissn><eissn>2329-9304</eissn><coden>ITASD8</coden><abstract>Billions of dollars allegedly lost to piracy of multimedia have recently triggered the industry to rethink the way music and movies are distributed. As encryption is vulnerable to rerecording, currently all copyright protection mechanisms tend to rely on watermarking. A watermark is an imperceptive secret hidden in a host signal. In this paper, we analyze the security of multimedia copyright protection systems that use watermarks by proposing a new breed of attacks on generic watermarking systems. A typical replacement attack relies upon the observation that multimedia content is often highly repetitive. Thus, the attack procedure replaces each signal block with another, perceptually similar block computed as a combination of other similar blocks found either within the same media clip or within a library of media clips. Assuming the blocks used to compute the replacement are marked with distinct secrets, we show that if the computed replacement block is at some minimal distance from the original marked block, a large portion of the embedded watermark is removed. We describe the logistics of the attack and an exemplary implementation against a spread-spectrum data hiding technology for audio signals.</abstract><cop>Piscataway, NJ</cop><pub>IEEE</pub><doi>10.1109/TASL.2007.900088</doi><tpages>10</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1558-7916
ispartof IEEE transactions on audio, speech, and language processing, 2007-08, Vol.15 (6), p.1922-1931
issn 1558-7916
2329-9290
1558-7924
2329-9304
language eng
recordid cdi_ieee_primary_4276756
source IEEE Electronic Library (IEL)
subjects Applied sciences
Audio signals
Blocking
Clips
Computation
Copyright protection
Copyrights
Cryptography
Embedded computing
Exact sciences and technology
Fingerprinting
Image processing
Information, signal and communications theory
Libraries
Logistics
Media
Motion pictures
Multimedia
multimedia similarity
Multimedia systems
pattern matching
Pattern recognition
replacement attack
Security
Signal and communications theory
Signal processing
Spread spectrum communication
Telecommunications and information theory
Watermarking
title The Replacement Attack
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T19%3A32%3A04IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=The%20Replacement%20Attack&rft.jtitle=IEEE%20transactions%20on%20audio,%20speech,%20and%20language%20processing&rft.au=Kirovski,%20D.&rft.date=2007-08-01&rft.volume=15&rft.issue=6&rft.spage=1922&rft.epage=1931&rft.pages=1922-1931&rft.issn=1558-7916&rft.eissn=1558-7924&rft.coden=ITASD8&rft_id=info:doi/10.1109/TASL.2007.900088&rft_dat=%3Cproquest_RIE%3E36361541%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=917466744&rft_id=info:pmid/&rft_ieee_id=4276756&rfr_iscdi=true