Fractal image compression: theory and application
Fractal image compression: theory and application
A course in computational algebraic number theory
A course in computational algebraic number theory
Digital watermarking
Attack modelling: towards a second generation watermarking benchmark
Signal Processing - Special section on information theoretic aspects of digital watermarking
Robust Covert Communication over a Public Audio Channel Using Spread Spectrum
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Analysis of security vulnerabilities in the movie production and distribution process
Proceedings of the 3rd ACM workshop on Digital rights management
New intra-video collusion attack using mosaicing
ICME '03 Proceedings of the 2003 International Conference on Multimedia and Expo - Volume 1
Blind pattern matching attack on watermarking systems
IEEE Transactions on Signal Processing
Security pitfalls of frame-by-frame approaches to video watermarking
IEEE Transactions on Signal Processing - Part II
Power-spectrum condition for energy-efficient watermarking
IEEE Transactions on Multimedia
Behavior forensics with side information for multimedia fingerprinting social networks
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
Countermeasures for collusion attacks exploiting host signal redundancy
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
How to combat block replacement attacks?
IH'05 Proceedings of the 7th international conference on Information Hiding
Partial encryption and watermarking scheme for audio files with controlled degradation of quality
Multimedia Tools and Applications
Hi-index | 0.00 |
Unauthorized digital copying is a major concern for multi-media content providers. Since copyright owners lose control over content distribution as soon as data is decrypted or unscrambled, digital watermarking has been introduced as a complementary protection technology. In an effort to anticipate hostile behaviors of adversaries, the research community is constantly introducing novel attacks to benchmark watermarking systems. In this paper, a generic block replacement attack will be presented. The underlying assumption is that multimedia content is highly repetitive. It should consequently be possible to exploit the self-similarities of the signal to replace each signal block with another perceptually similar one. Alternative methods to compute such a valid placement block will be surveyed in this paper. Then,experimental results on still images will be presented to the efficiency of the presented attack in comparison with other reference image processing operations. Finally, a will be conducted to exhibit the properties that a watermark should have to resist to this attack.