Title :
Security of robust audio hashes
Author :
Thiemert, Stefan ; Nürnberger, Stefan ; Steinebach, Martin ; Zmudzinski, Sascha
Author_Institution :
Fraunhofer SIT, Darmstadt, Germany
Abstract :
Robust hash algorithms can be used as tools for identifying or discriminating content, e.g. for automated tracking systems and filters for file sharing networks. When they are used in security relevant applications, such as in content-fragile watermarks or for recognizing illegal content, the security of the hash value generation becomes an important issue. In this paper we discuss possible attacks on robust hash algorithms. As an example we describe a possible attack on the audio fingerprint of Haitsma et al., resulting in a different hash value while keeping the audio files perceptually similar.
Keywords :
audio signal processing; cryptography; file organisation; audio fingerprint; automated tracking systems; content-fragile watermarks; file sharing; robust audio hash security; Algorithm design and analysis; Authentication; Data security; Filters; Fingerprint recognition; Humans; Peer to peer computing; Protection; Robustness; Watermarking; Audio fingerprints; Robust hash functions;
Conference_Titel :
Information Forensics and Security, 2009. WIFS 2009. First IEEE International Workshop on
Conference_Location :
London
Print_ISBN :
978-1-4244-5279-8
Electronic_ISBN :
978-1-4244-5280-4
DOI :
10.1109/WIFS.2009.5386470