{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T07:15:12Z","timestamp":1760166912957,"version":"build-2065373602"},"reference-count":24,"publisher":"MDPI AG","issue":"7","license":[{"start":{"date-parts":[[2021,7,14]],"date-time":"2021-07-14T00:00:00Z","timestamp":1626220800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100003141","name":"Consejo Nacional de Ciencia y Tecnolog\u00eda","doi-asserted-by":"publisher","award":["PN-2017-01-5814","335972"],"award-info":[{"award-number":["PN-2017-01-5814","335972"]}],"id":[{"id":"10.13039\/501100003141","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers"],"abstract":"<jats:p>Although the development of watermarking techniques has enabled designers to tackle normal processing attacks (e.g., amplitude scaling, noise addition, re-compression), robustness against malicious attacks remains a challenge. The discordant size content replacement attack is an attack against watermarking schemes which performs content replacement that increases or reduces the number of samples in the signal. This attack modifies the content and length of the signal, as well as desynchronizes the position of the watermark and its removal. In this paper, a source-channel coding approach for protecting an audio signal against this attack was applied. Before applying the source-channel encoding, a decimation technique was performed to reduce by one-half the number of samples in the original signal. This technique allowed compressing at a bit rate of 64 kbps and obtaining a watermarked audio signal with an excellent quality scale. In the watermark restoration, an interpolation was applied after the source-channel decoding to recover the content and the length. The procedure of decimation\u2013interpolation was taken because it is a linear and time-invariant operation and is useful in digital audio. A synchronization strategy was designed to detect the positions where the number of samples in the signal was increased or reduced. The restoration ability of the proposed scheme was tested with a mathematical model of the discordant size content replacement attack. The attack model confirmed that it is necessary to design a synchronizing strategy to correctly extract the watermark and to recover the tampered signal. Experimental results show that the scheme has better restoration ability than state-of-the-art schemes. The scheme was able to restore a tampered area of around 20% with very good quality, and up to 58.3% with acceptable quality. The robustness against the discordant size content replacement attack was achieved with a transparency threshold above \u22122.<\/jats:p>","DOI":"10.3390\/computers10070087","type":"journal-article","created":{"date-parts":[[2021,7,14]],"date-time":"2021-07-14T10:13:42Z","timestamp":1626257622000},"page":"87","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Low Distortion Audio Self-Recovery Algorithm Robust to Discordant Size Content Replacement Attack"],"prefix":"10.3390","volume":"10","author":[{"given":"Juan Jose","family":"Gomez-Ricardez","sequence":"first","affiliation":[{"name":"Cinvestav Unidad Tamaulipas, Parque Cientifico y Tecnologico TECNOTAM, Km. 5.5 Carr. a Soto la Marina, Ciudad Victoria 87130, Tamaulipas, Mexico"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1249-5413","authenticated-orcid":false,"given":"Jose Juan","family":"Garcia-Hernandez","sequence":"additional","affiliation":[{"name":"Cinvestav Unidad Tamaulipas, Parque Cientifico y Tecnologico TECNOTAM, Km. 5.5 Carr. a Soto la Marina, Ciudad Victoria 87130, Tamaulipas, Mexico"}]}],"member":"1968","published-online":{"date-parts":[[2021,7,14]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Cox, I., Miller, M., Bloom, J., Fridrich, J., and Kalker, T. (2008). Digital Watermarking and Steganography, Morgan Kaufmann Publishers Inc.. [2nd ed.].","DOI":"10.1016\/B978-012372585-1.50015-2"},{"key":"ref_2","first-page":"1917","article-title":"A Watermarking Method for Digital Speech Self-recovery","volume":"23","author":"Sarreshtedari","year":"2015","journal-title":"IEEE\/ACM Trans. Audio Speech Lang. Proc."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Gomez-Ricardez, J.J., and Garcia-Hernandez, J.J. (2018, January 5\u20138). An audio self-recovery scheme that is robust to discordant size content replacement attack. Proceedings of the IEEE 61st International Midwest Symposium on Circuits and Systems, MWSCAS 2018, Windsor, ON, Canada.","DOI":"10.1109\/MWSCAS.2018.8623934"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Gomez-Ricardez, J.J., Parra-Michel, R., and Garcia-Hernandez, J.J. (2019, January 2\u20133). Mathematical models for the discordant size content replacement attack. Proceedings of the 2019 7th International Workshop on Biometrics and Forensics (IWBF), Cancun, Mexico.","DOI":"10.1109\/IWBF.2019.8739198"},{"key":"ref_5","unstructured":"National Forensic Science Technology Center (NFSTC) (2010). NFSTC: A Simplified Guide to Forensics Audio and Video Analysis, Technical Report."},{"key":"ref_6","unstructured":"Newton, H. (2012). Music Censorship: An Overview, George Washington University."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Li, J., Lu, W., Zhang, C., Wei, J., Cao, X., and Dang, J. (2016, January 23\u201326). A Study on Detection and Recovery of Speech Signal Tampering. Proceedings of the 2016 IEEE Trustcom\/BigDataSE\/ISPA, Tianjin, China.","DOI":"10.1109\/TrustCom.2016.0125"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"14197","DOI":"10.1007\/s11042-016-3783-6","article-title":"Self-recovery scheme for audio restoration after a content replacement attack","volume":"76","year":"2017","journal-title":"Multimed. Tools Appl."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"180395","DOI":"10.1109\/ACCESS.2019.2958095","article-title":"Hybrid Blind Audio Watermarking for Proprietary Protection, Tamper Proofing, and Self-Recovery","volume":"7","author":"Hu","year":"2019","journal-title":"IEEE Access"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1037","DOI":"10.1007\/s11042-019-08095-x","article-title":"A source coding scheme for authenticating audio signal with capability of self-recovery and anti-synchronization counterfeiting attack","volume":"79","author":"Fan","year":"2019","journal-title":"Multimed. Tools Appl."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"18","DOI":"10.46604\/aiti.2020.4138","article-title":"Frame-synchronous Blind Audio Watermarking for Tamper Proofing and Self-Recovery","volume":"5","author":"Hu","year":"2020","journal-title":"Adv. Technol. Innov."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Jovanovic-Dolecek, G. (2001). Multirate Systems: Design and Applications: Design and Applications, Idea Group Pub.","DOI":"10.4018\/978-1-93070-830-3"},{"key":"ref_13","unstructured":"Oppenheim, A., Willsky, A., and Nawab, S. (1997). Signals & Systems, Prentice-Hall International."},{"key":"ref_14","unstructured":"Tan, L. (2007). Digital Signal Processing: Fundamentals and Applications, Elsevier Science. Digital Signal Processing SET."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Blahut, R.E. (2003). Algebraic Codes for Data Transmission, Cambridge University Press.","DOI":"10.1017\/CBO9780511800467"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Justesen, J., and Forchhammer, S. (2009). Two-Dimensional Information Theory and Coding: With Applications to Graphics Data and High-Density Storage Media, Cambridge University Press.","DOI":"10.1017\/CBO9780511840562"},{"key":"ref_17","unstructured":"Proakis, J., and Salehi, M. (2008). Digital Communications, McGraw-Hill Higher Education. [5th ed.]."},{"key":"ref_18","unstructured":"Xiph.Org Foundation (2020, December 10). Opus Interactive Audio Codec. Available online: https:\/\/opus-codec.org."},{"key":"ref_19","unstructured":"Faires, J., and Burden, R. (2012). Numerical Methods, Cengage Learning. [4th ed.]."},{"key":"ref_20","unstructured":"Gupta, S. (1995). Numerical Methods for Engineers, New Age International (P) Limited."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Garcia-Hernandez, J.J. (2019). Replication Data for: \u201cOn a Key-Based Secured Audio Data Hiding Scheme Robust to Volumetric Attack with Entropy-Based Embedding\u201d Submitted to Entropy, Harvard Dataverse.","DOI":"10.3390\/e21100996"},{"key":"ref_22","first-page":"3","article-title":"PEAQ\u2014The ITU Standard for Objective Measurement of Perceived Audio Quality","volume":"48","author":"Thiede","year":"2000","journal-title":"J. Audio Eng. Soc"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Bosi, M., and Goldberg, R.E. (2003). Introduction to Digital Audio Coding and Standards, Springer. Engineering and Computer Science.","DOI":"10.1007\/978-1-4615-0327-9"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Furht, B., and Kirovski, D. (2006). Multimedia Watermarking Techniques and Applications (Internet and Communications Series), Auerbach Publications.","DOI":"10.1201\/9781420013467"}],"container-title":["Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-431X\/10\/7\/87\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T06:30:15Z","timestamp":1760164215000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-431X\/10\/7\/87"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,14]]},"references-count":24,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2021,7]]}},"alternative-id":["computers10070087"],"URL":"https:\/\/doi.org\/10.3390\/computers10070087","relation":{},"ISSN":["2073-431X"],"issn-type":[{"type":"electronic","value":"2073-431X"}],"subject":[],"published":{"date-parts":[[2021,7,14]]}}}