DocumentCode
3207121
Title
Security of robust audio hashes
Author
Thiemert, Stefan ; Nürnberger, Stefan ; Steinebach, Martin ; Zmudzinski, Sascha
Author_Institution
Fraunhofer SIT, Darmstadt, Germany
fYear
2009
fDate
6-9 Dec. 2009
Firstpage
126
Lastpage
130
Abstract
Robust hash algorithms can be used as tools for identifying or discriminating content, e.g. for automated tracking systems and filters for file sharing networks. When they are used in security relevant applications, such as in content-fragile watermarks or for recognizing illegal content, the security of the hash value generation becomes an important issue. In this paper we discuss possible attacks on robust hash algorithms. As an example we describe a possible attack on the audio fingerprint of Haitsma et al., resulting in a different hash value while keeping the audio files perceptually similar.
Keywords
audio signal processing; cryptography; file organisation; audio fingerprint; automated tracking systems; content-fragile watermarks; file sharing; robust audio hash security; Algorithm design and analysis; Authentication; Data security; Filters; Fingerprint recognition; Humans; Peer to peer computing; Protection; Robustness; Watermarking; Audio fingerprints; Robust hash functions;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Forensics and Security, 2009. WIFS 2009. First IEEE International Workshop on
Conference_Location
London
Print_ISBN
978-1-4244-5279-8
Electronic_ISBN
978-1-4244-5280-4
Type
conf
DOI
10.1109/WIFS.2009.5386470
Filename
5386470
Link To Document