Swap Attack: An adversarial manipulation where valid watermarked content from one modality (e.g., video) is paired with fake/unwatermarked content from another (e.g., audio)
Manifold: In this context, a specific subset of the joint latent space where valid, entangled audio-video pairs reside
Inverse Transform Sampling: A method to generate random numbers from any probability distribution given its cumulative distribution function (CDF); used here to map bits to Gaussian noise
Rectified Flow: A generative model formulation that defines a straight path between noise and data, enabling efficient and invertible sampling via ODE solvers
ODE: Ordinary Differential Equation—used in diffusion models to deterministically map noise to data and vice versa
HMAC: Hash-based Message Authentication Code—a cryptographic construction for verifying integrity and authenticity using a secret key
Avalanche Effect: A property of cryptographic hashes where a small change in input results in a significantly different output, ensuring independence of bits
Hoeffding's Inequality: A theorem providing an upper bound on the probability that the sum of bounded independent random variables deviates from its expected value