replacement attack
Recently Published Documents


TOTAL DOCUMENTS

18
(FIVE YEARS 2)

H-INDEX

5
(FIVE YEARS 0)

Computers ◽  
2021 ◽  
Vol 10 (7) ◽  
pp. 87
Author(s):  
Juan Jose Gomez-Ricardez ◽  
Jose Juan Garcia-Hernandez

Although the development of watermarking techniques has enabled designers to tackle normal processing attacks (e.g., amplitude scaling, noise addition, re-compression), robustness against malicious attacks remains a challenge. The discordant size content replacement attack is an attack against watermarking schemes which performs content replacement that increases or reduces the number of samples in the signal. This attack modifies the content and length of the signal, as well as desynchronizes the position of the watermark and its removal. In this paper, a source-channel coding approach for protecting an audio signal against this attack was applied. Before applying the source-channel encoding, a decimation technique was performed to reduce by one-half the number of samples in the original signal. This technique allowed compressing at a bit rate of 64 kbps and obtaining a watermarked audio signal with an excellent quality scale. In the watermark restoration, an interpolation was applied after the source-channel decoding to recover the content and the length. The procedure of decimation–interpolation was taken because it is a linear and time-invariant operation and is useful in digital audio. A synchronization strategy was designed to detect the positions where the number of samples in the signal was increased or reduced. The restoration ability of the proposed scheme was tested with a mathematical model of the discordant size content replacement attack. The attack model confirmed that it is necessary to design a synchronizing strategy to correctly extract the watermark and to recover the tampered signal. Experimental results show that the scheme has better restoration ability than state-of-the-art schemes. The scheme was able to restore a tampered area of around 20% with very good quality, and up to 58.3% with acceptable quality. The robustness against the discordant size content replacement attack was achieved with a transparency threshold above −2.


3D Research ◽  
2017 ◽  
Vol 8 (1) ◽  
Author(s):  
Morteza Bashardoost ◽  
Mohd Shafry Mohd Rahim ◽  
Tanzila Saba ◽  
Amjad Rehman

2016 ◽  
Vol 76 (12) ◽  
pp. 14197-14224 ◽  
Author(s):  
Alejandra Menendez-Ortiz ◽  
Claudia Feregrino-Uribe ◽  
Jose Juan Garcia-Hernandez ◽  
Zobeida Jezabel Guzman-Zavaleta

2015 ◽  
Vol 24 (1) ◽  
pp. 013016
Author(s):  
Xiaofeng Wang ◽  
Chengcheng Wei ◽  
Xiao Han

2014 ◽  
Vol 2014 ◽  
pp. 1-12 ◽  
Author(s):  
Yang Lu ◽  
Jiguo Li

Signcryption is a useful cryptographic primitive that achieves confidentiality and authentication in an efficient manner. As an extension of signcryption in certificate-based cryptography, certificate-based signcryption preserves the merits of certificate-based cryptography and signcryption simultaneously. In this paper, we present an improved security model of certificate-based signcryption that covers both public key replacement attack and insider security. We show that an existing certificate-based signcryption scheme is insecure in our model. We also propose a new certificate-based signcryption scheme that achieves security against both public key replacement attacks and insider attacks. We prove in the random oracle model that the proposed scheme is chosen-ciphertext secure and existentially unforgeable. Performance analysis shows that the proposed scheme outperforms all the previous certificate-based signcryption schemes in the literature.


Sign in / Sign up

Export Citation Format

Share Document