Robust hash algorithms can be used as tools for identifying or discriminating content, e.g. for automated tracking systems and filters for file sharing networks. When they are used in security relevant applications, such as in content-fragile watermarks or for recognizing illegal content, the security of the hash value generation becomes an important issue. In this paper we discuss possible attacks on robust hash algorithms. As an example we describe a possible attack on the audio fingerprint of Haitsma et al., resulting in a different hash value while keeping the audio files perceptually similar
Semi-fragile watermarking methods aim at detecting unacceptable malicious manipulations, while allow...
Within a forensic examination of a computer for illegal image content, robust hashing can be used to...
Driven by the recent advances in digital entertainment technologies, digital multimedia content (suc...
Current systems and protocols based on cryptographic methods for integrity and authenticity verifica...
Audio fingerprinting is an audio feature vector and a technique to identify the music source by comp...
Perceptual hashing has to deal with the constraints of robustness, accuracy and security. After mode...
Digital audio watermarking has become an accepted technology for e.g. protection of music downloads....
Paper Abstract Current systems and protocols for integrity and authenticity verification of media da...
Existing security algorithms for data authentication like cryptographic hash functions for example, ...
In certain application fields digital audio recordings contain sensitive content. Examples are histo...
Current systems and protocols based on cryptographic methods for integrity and authenticity verifica...
The increasing development of peer-to-peer networks for delivering and sharing multimedia files pose...
Perceptual hashing is a promising tool for multimedia content authentication. Digital watermarking i...
Digital multimedia content (especially audio) is becoming a major part of the average computer user ...
Perceptual hashing is an emerging solution for multimedia content authentication. Due to their robus...
Semi-fragile watermarking methods aim at detecting unacceptable malicious manipulations, while allow...
Within a forensic examination of a computer for illegal image content, robust hashing can be used to...
Driven by the recent advances in digital entertainment technologies, digital multimedia content (suc...
Current systems and protocols based on cryptographic methods for integrity and authenticity verifica...
Audio fingerprinting is an audio feature vector and a technique to identify the music source by comp...
Perceptual hashing has to deal with the constraints of robustness, accuracy and security. After mode...
Digital audio watermarking has become an accepted technology for e.g. protection of music downloads....
Paper Abstract Current systems and protocols for integrity and authenticity verification of media da...
Existing security algorithms for data authentication like cryptographic hash functions for example, ...
In certain application fields digital audio recordings contain sensitive content. Examples are histo...
Current systems and protocols based on cryptographic methods for integrity and authenticity verifica...
The increasing development of peer-to-peer networks for delivering and sharing multimedia files pose...
Perceptual hashing is a promising tool for multimedia content authentication. Digital watermarking i...
Digital multimedia content (especially audio) is becoming a major part of the average computer user ...
Perceptual hashing is an emerging solution for multimedia content authentication. Due to their robus...
Semi-fragile watermarking methods aim at detecting unacceptable malicious manipulations, while allow...
Within a forensic examination of a computer for illegal image content, robust hashing can be used to...
Driven by the recent advances in digital entertainment technologies, digital multimedia content (suc...