Skip to main content

A Perceptual Audio Hashing Algorithm: A Tool for Robust Audio Identification and Information Hiding

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2137))

Abstract

Assuming that watermarking is feasible (say, against a limited set of attacks of significant interest), current methods use a secret key to generate and embed a watermark. However, if the same key is used to watermark different items, then each instance may leak partial information and it is possible that one may extract the whole secret from a collection of watermarked items. Thus it will be ideal to derive content dependent keys, using a perceptual hashing algorithm (with its own secret key) that is resistant to small changes and otherwise having randomness and unpredictability properties analogous to cryptographic MACs.

The techniques here are also useful for synchronizing in streams to find fixed locations against insertion and deletion attacks. Say, one may watermark a frame in a stream and can synchronize oneself to that frame using keyed perceptual hash and a known value for that frame. Our techniques can be used for identification of audio clips as well as database lookups in a way resistant to formatting and compression. We propose a novel audio hashing algorithm to be used for audio watermarking applications, that uses signal processing and traditional algorithmic analysis (against an adversary).

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. M. K. Myhçak, R. Venkatesan and M. H. Jakubowski, “Blind image watermarking via derivation and quantization of robust semi-global statistics I,” preprint.

    Google Scholar 

  2. R. Venkatesan, S.-M. Koon, M. H. Jakubowski and P. Moulin, “Robust image hashing,” Proc. IEEE ICIP, Vancouver, Canada, September 2000.

    Google Scholar 

  3. H. S. Malvar, “A modulated complex lapped transform and applications to audio processing,”, Proc. IEEE ICASSP, Phoenix, AZ, March 1999.

    Google Scholar 

  4. H. S. Malvar, Signal Processing with Lapped Transforms. Norwood, MA: Artech House, 1992.

    MATH  Google Scholar 

  5. S. Shlien, “The modulated lapped transform, its time-varying forms, and applications to audio coding,” IEEE Trans. Speech Audio Processing, vol. 5, pp. 359–366, July 1997.

    Google Scholar 

  6. Windows Media Player

    Google Scholar 

  7. D. Kirovski, H. S. Malvar and M. H. Jakubowski, “Audio watermarking with dual watermarks,” U. S. Patent Application Serial No. 09/316,899, filed on May 22, 1999, assigned to Microsoft Corporation.

    Google Scholar 

  8. R. Blahut, Theory and Practice of Error Control Codes, 1983.

    Google Scholar 

  9. See http://www.syntrillium.com/cooledit/.

  10. M. K. Mhçak and R. Venkatesan, “Iterative Geometric Methods for Robust Perceptual Image Hashing,” preprint.

    Google Scholar 

  11. See http://www.research.microsoft.com/venkie.

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mıhçak, M.K., Venkatesan, R. (2001). A Perceptual Audio Hashing Algorithm: A Tool for Robust Audio Identification and Information Hiding. In: Moskowitz, I.S. (eds) Information Hiding. IH 2001. Lecture Notes in Computer Science, vol 2137. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45496-9_5

Download citation

  • DOI: https://doi.org/10.1007/3-540-45496-9_5

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42733-9

  • Online ISBN: 978-3-540-45496-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics