A Low Distortion Audio Self-Recovery Algorithm Robust to Discordant Size Content Replacement Attack

Although the development of watermarking techniques has enabled designers to tackle normal processing attacks (e.g., amplitude scaling, noise addition, re-compression), robustness against malicious attacks remains a challenge. The discordant size content replacement attack is an attack against water...

Full description

Bibliographic Details
Main Authors: Juan Jose Gomez-Ricardez, Jose Juan Garcia-Hernandez
Format: Article
Language:English
Published: MDPI AG 2021-07-01
Series:Computers
Subjects:
Online Access:https://www.mdpi.com/2073-431X/10/7/87
_version_ 1797527381405073408
author Juan Jose Gomez-Ricardez
Jose Juan Garcia-Hernandez
author_facet Juan Jose Gomez-Ricardez
Jose Juan Garcia-Hernandez
author_sort Juan Jose Gomez-Ricardez
collection DOAJ
description Although the development of watermarking techniques has enabled designers to tackle normal processing attacks (e.g., amplitude scaling, noise addition, re-compression), robustness against malicious attacks remains a challenge. The discordant size content replacement attack is an attack against watermarking schemes which performs content replacement that increases or reduces the number of samples in the signal. This attack modifies the content and length of the signal, as well as desynchronizes the position of the watermark and its removal. In this paper, a source-channel coding approach for protecting an audio signal against this attack was applied. Before applying the source-channel encoding, a decimation technique was performed to reduce by one-half the number of samples in the original signal. This technique allowed compressing at a bit rate of 64 kbps and obtaining a watermarked audio signal with an excellent quality scale. In the watermark restoration, an interpolation was applied after the source-channel decoding to recover the content and the length. The procedure of decimation–interpolation was taken because it is a linear and time-invariant operation and is useful in digital audio. A synchronization strategy was designed to detect the positions where the number of samples in the signal was increased or reduced. The restoration ability of the proposed scheme was tested with a mathematical model of the discordant size content replacement attack. The attack model confirmed that it is necessary to design a synchronizing strategy to correctly extract the watermark and to recover the tampered signal. Experimental results show that the scheme has better restoration ability than state-of-the-art schemes. The scheme was able to restore a tampered area of around 20% with very good quality, and up to <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mn>58.3</mn></mrow></semantics></math></inline-formula>% with acceptable quality. The robustness against the discordant size content replacement attack was achieved with a transparency threshold above <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mo>−</mo><mn>2</mn></mrow></semantics></math></inline-formula>.
first_indexed 2024-03-10T09:42:04Z
format Article
id doaj.art-55ca9ff3857b4141a74e76e210cc8a24
institution Directory Open Access Journal
issn 2073-431X
language English
last_indexed 2024-03-10T09:42:04Z
publishDate 2021-07-01
publisher MDPI AG
record_format Article
series Computers
spelling doaj.art-55ca9ff3857b4141a74e76e210cc8a242023-11-22T03:32:43ZengMDPI AGComputers2073-431X2021-07-011078710.3390/computers10070087A Low Distortion Audio Self-Recovery Algorithm Robust to Discordant Size Content Replacement AttackJuan Jose Gomez-Ricardez0Jose Juan Garcia-Hernandez1Cinvestav Unidad Tamaulipas, Parque Cientifico y Tecnologico TECNOTAM, Km. 5.5 Carr. a Soto la Marina, Ciudad Victoria 87130, Tamaulipas, MexicoCinvestav Unidad Tamaulipas, Parque Cientifico y Tecnologico TECNOTAM, Km. 5.5 Carr. a Soto la Marina, Ciudad Victoria 87130, Tamaulipas, MexicoAlthough the development of watermarking techniques has enabled designers to tackle normal processing attacks (e.g., amplitude scaling, noise addition, re-compression), robustness against malicious attacks remains a challenge. The discordant size content replacement attack is an attack against watermarking schemes which performs content replacement that increases or reduces the number of samples in the signal. This attack modifies the content and length of the signal, as well as desynchronizes the position of the watermark and its removal. In this paper, a source-channel coding approach for protecting an audio signal against this attack was applied. Before applying the source-channel encoding, a decimation technique was performed to reduce by one-half the number of samples in the original signal. This technique allowed compressing at a bit rate of 64 kbps and obtaining a watermarked audio signal with an excellent quality scale. In the watermark restoration, an interpolation was applied after the source-channel decoding to recover the content and the length. The procedure of decimation–interpolation was taken because it is a linear and time-invariant operation and is useful in digital audio. A synchronization strategy was designed to detect the positions where the number of samples in the signal was increased or reduced. The restoration ability of the proposed scheme was tested with a mathematical model of the discordant size content replacement attack. The attack model confirmed that it is necessary to design a synchronizing strategy to correctly extract the watermark and to recover the tampered signal. Experimental results show that the scheme has better restoration ability than state-of-the-art schemes. The scheme was able to restore a tampered area of around 20% with very good quality, and up to <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mn>58.3</mn></mrow></semantics></math></inline-formula>% with acceptable quality. The robustness against the discordant size content replacement attack was achieved with a transparency threshold above <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mo>−</mo><mn>2</mn></mrow></semantics></math></inline-formula>.https://www.mdpi.com/2073-431X/10/7/87audio signalcontent replacement attackdecimationdiscordant sizeinterpolationself-recovery
spellingShingle Juan Jose Gomez-Ricardez
Jose Juan Garcia-Hernandez
A Low Distortion Audio Self-Recovery Algorithm Robust to Discordant Size Content Replacement Attack
Computers
audio signal
content replacement attack
decimation
discordant size
interpolation
self-recovery
title A Low Distortion Audio Self-Recovery Algorithm Robust to Discordant Size Content Replacement Attack
title_full A Low Distortion Audio Self-Recovery Algorithm Robust to Discordant Size Content Replacement Attack
title_fullStr A Low Distortion Audio Self-Recovery Algorithm Robust to Discordant Size Content Replacement Attack
title_full_unstemmed A Low Distortion Audio Self-Recovery Algorithm Robust to Discordant Size Content Replacement Attack
title_short A Low Distortion Audio Self-Recovery Algorithm Robust to Discordant Size Content Replacement Attack
title_sort low distortion audio self recovery algorithm robust to discordant size content replacement attack
topic audio signal
content replacement attack
decimation
discordant size
interpolation
self-recovery
url https://www.mdpi.com/2073-431X/10/7/87
work_keys_str_mv AT juanjosegomezricardez alowdistortionaudioselfrecoveryalgorithmrobusttodiscordantsizecontentreplacementattack
AT josejuangarciahernandez alowdistortionaudioselfrecoveryalgorithmrobusttodiscordantsizecontentreplacementattack
AT juanjosegomezricardez lowdistortionaudioselfrecoveryalgorithmrobusttodiscordantsizecontentreplacementattack
AT josejuangarciahernandez lowdistortionaudioselfrecoveryalgorithmrobusttodiscordantsizecontentreplacementattack