Security of Robust Audio Hashes

Stefan Thiemert, Stefan Nürnberger, Martin Steinebach, Sascha Zmudzinski

In: Proceedings of the 2009 First IEEE International Workshop on Information Forensics and Security. IEEE International Workshop on Information Forensics and Security (WIFS-2009) December 6-9 London United Kingdom Seiten 126-130 ISBN 978-1-4244-5280-4 IEEE 2009.


Robust hash algorithms can be used as tools for identifying or discriminating content, e.g. for automated tracking systems and filters for file sharing networks. When they are used in security relevant applications, such as in content-fragile watermarks or for recognizing illegal content, the security of the hash value generation becomes an important issue. In this paper we discuss possible attacks on robust hash algorithms. As an example we describe a possible attack on the audio fingerprint of Haitsma et al., resulting in a different hash value while keeping the audio files perceptually similar.

nuernberger2009wifs_audiohash.pdf (pdf, 220 KB )

Deutsches Forschungszentrum für Künstliche Intelligenz
German Research Center for Artificial Intelligence