This preview shows page 1. Sign up to view the full content.
Unformatted text preview: ion attacks modify the content of the file to prevent
detection of mark. - Interpretation attacks involve finding a situation which prevents
assertion of ownership. - Implementation attacks take advantage of poorly implemented
software. Copyrights are reserved @ 2010 for Dr.
Alomari, CIS, JU 7 Simple spread spectrum techniques vulnerable to timing
Adjusting the length of an audio file, while leaving the pitch
unaffected can remove hidden data. Copyrights are reserved @ 2010 for Dr.
Alomari, CIS, JU Basic attacks take advantage of weaknesses in embedding
technique. Copyrights are reserved @ 2010 for Dr.
Alomari, CIS, JU - 8 2 ROBUSTNESS ATTACKS Try to anticipate pirate’s actions and design to cope with them. If software implementation is poor it can allow some attacks.
Digimarc requires users to register ID and password.
Attacker broke into software and disabled password checks.
Could then change the ID,...
View Full Document
- Spring '13
- Information Security