Privacy-enhanced Perceptual Hashing of Audio Data

Heiko Knospe

Abstract

Audio hashes are compact and robust representations of audio data and allow the efficient identification of specific recordings and their transformations. Audio hashing for music identification is well established and similar algorithms can also be used for speech data. A possible application is the identification of replayed telephone spam. This contribution investigates the security and privacy issues of perceptual hashes and follows an information-theoretic approach. The entropy of the hash should be large enough to prevent the exposure of audio content. We propose a privacy-enhanced randomized audio hash and analyze its entropy as well as its robustness and discrimination power over a large number of hashes.

References

  1. Bavarian Archive for Speech Signals (1998). Verbmobil II.
  2. Bellare, M. (2006). New proofs for NMAC and HMAC: Security without collision-resistance. Advances in Cryptology-CRYPTO 2006, pages 602-619.
  3. Bellare, M., Canetti, R., and Krawczyk, H. (1996). Keying hash functions for message authentication. In Advances in Cryptology-CRYPTO'96, pages 1-15. Springer.
  4. Cano, P., Batlle, E., Kalker, T., and Haitsma, J. (2002). A Review of Algorithms for Audio Fingerprinting. In Multimedia Signal Processing, IEEE Workshop on, pages 169-173.
  5. Clausen, M. and Kurth, F. (2004). A unified approach to content-based and fault-tolerant music recognition. IEEE Transactions on Multimedia, 6(5):717-731.
  6. Cremer, M., Froba, B., Hellmuth, O., Herre, J., and Allamanche, E. (2001). AudioID: Towards Content-Based Identification of Audio Material. In Audio Engineering Society Convention 110.
  7. Doets, P. J. O. and Lagendijk, R. L. (2008). Distortion Estimation in Compressed Music Using Only Audio Fingerprints. IEEE Transactions on Audio, Speech, and Language Processing, 16(2).
  8. Fridrich, J. and Goljan, M. (2000). Robust Hash Functions for Digital Watermarking. In Information Technology: Coding and Computing, International Conference on, pages 178-183.
  9. Grutzek, G., Strobl, J., Mainka, B., Kurth, F., Poerschmann, C., and Knospe, H. (2012). Perceptual hashing for the identification of telephone speech. Speech Communication; 10. ITG Symposium; Proceedings of, pages 1-4.
  10. Haitsma, J. and Kalker, T. (2002). A highly robust audio fingerprinting system. In Proc. ISMIR, volume 2, pages 13-17.
  11. Koval, O., Voloshynovskiy, S., Bas, P., and Cayre, F. (2009). On security threats for robust perceptual hashing. In IS&T/SPIE Electronic Imaging 2009.
  12. Koval, O., Voloshynovskiy, S., Beekhof, F., and Pun, T. (2008). Security analysis of robust perceptual hashing. In IS&T/SPIE Electronic Imaging 2008.
  13. Kurth, F. and Müller, M. (2008). Efficient Index-Based Audio Matching. IEEE Transactions on Audio, Speech, and Language Processing, 16(2):382-395.
  14. Slaney, M. and Casey, M. (2008). Locality-sensitive hashing for finding nearest neighbors [lecture notes]. Signal Processing Magazine, IEEE, 25(2):128-131.
  15. Swaminathan, A., Mao, Y., and Wu, M. (2006). Robust and Secure Image Hashing. IEEE Transactions on Information Forensics and Security, 1(2):215-230.
  16. Thiemert, S., Nurnberger, S., Steinebach, M., and Zmudzinski, S. (2009). Security of robust audio hashes. In Information Forensics and Security, 2009. First IEEE International Workshop on, pages 126 -130.
  17. Wang, A. L.-C. (2003). An Industrial-Strength Audio Search Algorithm. ISMIR 2003, 4th Symposium Conference on Music Information Retrieval, pages 7-13.
  18. Wang, A. L.-C. and Smith III, J. O. (2008). Methods for recognizing unknown media samples using characteristics of known media samples.
  19. Weng, L. and Preneel, B. (2011). A secure perceptual hash algorithm for image content authentication. In Communications and Multimedia Security, pages 108- 121.
  20. Zmudzinski, S. and Steinebach, M. (2009). Perceptionbased Authentication Watermarking for Digital Audio Data. In IS&T/SPIE Electronic Imaging 2009.
Download


Paper Citation


in Harvard Style

Knospe H. (2013). Privacy-enhanced Perceptual Hashing of Audio Data . In Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013) ISBN 978-989-8565-73-0, pages 549-554. DOI: 10.5220/0004532605490554


in Bibtex Style

@conference{secrypt13,
author={Heiko Knospe},
title={Privacy-enhanced Perceptual Hashing of Audio Data},
booktitle={Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)},
year={2013},
pages={549-554},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004532605490554},
isbn={978-989-8565-73-0},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)
TI - Privacy-enhanced Perceptual Hashing of Audio Data
SN - 978-989-8565-73-0
AU - Knospe H.
PY - 2013
SP - 549
EP - 554
DO - 10.5220/0004532605490554