• DocumentCode
    3207121
  • Title

    Security of robust audio hashes

  • Author

    Thiemert, Stefan ; Nürnberger, Stefan ; Steinebach, Martin ; Zmudzinski, Sascha

  • Author_Institution
    Fraunhofer SIT, Darmstadt, Germany
  • fYear
    2009
  • fDate
    6-9 Dec. 2009
  • Firstpage
    126
  • Lastpage
    130
  • Abstract
    Robust hash algorithms can be used as tools for identifying or discriminating content, e.g. for automated tracking systems and filters for file sharing networks. When they are used in security relevant applications, such as in content-fragile watermarks or for recognizing illegal content, the security of the hash value generation becomes an important issue. In this paper we discuss possible attacks on robust hash algorithms. As an example we describe a possible attack on the audio fingerprint of Haitsma et al., resulting in a different hash value while keeping the audio files perceptually similar.
  • Keywords
    audio signal processing; cryptography; file organisation; audio fingerprint; automated tracking systems; content-fragile watermarks; file sharing; robust audio hash security; Algorithm design and analysis; Authentication; Data security; Filters; Fingerprint recognition; Humans; Peer to peer computing; Protection; Robustness; Watermarking; Audio fingerprints; Robust hash functions;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Forensics and Security, 2009. WIFS 2009. First IEEE International Workshop on
  • Conference_Location
    London
  • Print_ISBN
    978-1-4244-5279-8
  • Electronic_ISBN
    978-1-4244-5280-4
  • Type

    conf

  • DOI
    10.1109/WIFS.2009.5386470
  • Filename
    5386470