Institute of Electrical & Electronic Engineers
Robust hash algorithms can be used as tools for identifying or discriminating content, e.g. for automated tracking systems and filters for file sharing networks. When they are used in security relevant applications, such as in content-fragile watermarks or for recognizing illegal content, the security of the hash value generation becomes an important issue. In this paper the authors discuss possible attacks on robust hash algorithms. As an example they describe a possible attack on the audio fingerprint of haitsma et al., resulting in a different hash value while keeping the audio files perceptually similar.