Abstract
Assuming that watermarking is feasible (say, against a limited set of attacks of significant interest), current methods use a secret key to generate and embed a watermark. However, if the same key is used to watermark different items, then each instance may leak partial information and it is possible that one may extract the whole secret from a collection of watermarked items. Thus it will be ideal to derive content dependent keys, using a perceptual hashing algorithm (with its own secret key) that is resistant to small changes and otherwise having randomness and unpredictability properties analogous to cryptographic MACs.
The techniques here are also useful for synchronizing in streams to find fixed locations against insertion and deletion attacks. Say, one may watermark a frame in a stream and can synchronize oneself to that frame using keyed perceptual hash and a known value for that frame. Our techniques can be used for identification of audio clips as well as database lookups in a way resistant to formatting and compression. We propose a novel audio hashing algorithm to be used for audio watermarking applications, that uses signal processing and traditional algorithmic analysis (against an adversary).
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
M. K. Myhçak, R. Venkatesan and M. H. Jakubowski, “Blind image watermarking via derivation and quantization of robust semi-global statistics I,” preprint.
R. Venkatesan, S.-M. Koon, M. H. Jakubowski and P. Moulin, “Robust image hashing,” Proc. IEEE ICIP, Vancouver, Canada, September 2000.
H. S. Malvar, “A modulated complex lapped transform and applications to audio processing,”, Proc. IEEE ICASSP, Phoenix, AZ, March 1999.
H. S. Malvar, Signal Processing with Lapped Transforms. Norwood, MA: Artech House, 1992.
S. Shlien, “The modulated lapped transform, its time-varying forms, and applications to audio coding,” IEEE Trans. Speech Audio Processing, vol. 5, pp. 359–366, July 1997.
Windows Media Player
D. Kirovski, H. S. Malvar and M. H. Jakubowski, “Audio watermarking with dual watermarks,” U. S. Patent Application Serial No. 09/316,899, filed on May 22, 1999, assigned to Microsoft Corporation.
R. Blahut, Theory and Practice of Error Control Codes, 1983.
M. K. Mhçak and R. Venkatesan, “Iterative Geometric Methods for Robust Perceptual Image Hashing,” preprint.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mıhçak, M.K., Venkatesan, R. (2001). A Perceptual Audio Hashing Algorithm: A Tool for Robust Audio Identification and Information Hiding. In: Moskowitz, I.S. (eds) Information Hiding. IH 2001. Lecture Notes in Computer Science, vol 2137. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45496-9_5
Download citation
DOI: https://doi.org/10.1007/3-540-45496-9_5
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42733-9
Online ISBN: 978-3-540-45496-0
eBook Packages: Springer Book Archive