lecture26_alomari

presentation attacks modify the content of the file

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: ion attacks modify the content of the file to prevent detection of mark. - Interpretation attacks involve finding a situation which prevents assertion of ownership. - Implementation attacks take advantage of poorly implemented software. Copyrights are reserved @ 2010 for Dr. Alomari, CIS, JU 7 Simple spread spectrum techniques vulnerable to timing errors. Adjusting the length of an audio file, while leaving the pitch unaffected can remove hidden data. Copyrights are reserved @ 2010 for Dr. Alomari, CIS, JU Basic attacks take advantage of weaknesses in embedding technique. Copyrights are reserved @ 2010 for Dr. Alomari, CIS, JU - 8 2 ROBUSTNESS ATTACKS Try to anticipate pirate’s actions and design to cope with them. If software implementation is poor it can allow some attacks. Digimarc requires users to register ID and password. Attacker broke into software and disabled password checks. Could then change the ID,...
View Full Document

Ask a homework question - tutors are online