Security of Robust Audio Hashes

Download Now
Provided by: Institute of Electrical & Electronic Engineers
Topic: Security
Format: PDF
Robust hash algorithms can be used as tools for identifying or discriminating content, e.g. for automated tracking systems and filters for file sharing networks. When they are used in security relevant applications, such as in content-fragile watermarks or for recognizing illegal content, the security of the hash value generation becomes an important issue. In this paper the authors discuss possible attacks on robust hash algorithms. As an example they describe a possible attack on the audio fingerprint of haitsma et al., resulting in a different hash value while keeping the audio files perceptually similar.
Download Now

Find By Topic