Skip to main content Skip to main navigation


Security of Robust Audio Hashes

Stefan Thiemert; Stefan Nürnberger; Martin Steinebach; Sascha Zmudzinski
In: Proceedings of the 2009 First IEEE International Workshop on Information Forensics and Security. IEEE International Workshop on Information Forensics and Security (WIFS-2009), December 6-9, London, United Kingdom, Pages 126-130, ISBN 978-1-4244-5280-4, IEEE, 2009.


Robust hash algorithms can be used as tools for identifying or discriminating content, e.g. for automated tracking systems and filters for file sharing networks. When they are used in security relevant applications, such as in content-fragile watermarks or for recognizing illegal content, the security of the hash value generation becomes an important issue. In this paper we discuss possible attacks on robust hash algorithms. As an example we describe a possible attack on the audio fingerprint of Haitsma et al., resulting in a different hash value while keeping the audio files perceptually similar.