Efficient retrieval for browsing large image databases
CIKM '96 Proceedings of the fifth international conference on Information and knowledge management
A robust audio classification and segmentation method
MULTIMEDIA '01 Proceedings of the ninth ACM international conference on Multimedia
A Perceptual Audio Hashing Algorithm: A Tool for Robust Audio Identification and Information Hiding
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Hierarchical classification of audio data for archiving and retrieving
ICASSP '99 Proceedings of the Acoustics, Speech, and Signal Processing, 1999. on 1999 IEEE International Conference - Volume 06
Histogram-based image hashing scheme robust against geometric deformations
Proceedings of the 9th workshop on Multimedia & security
Key-dependent JPEG2000-based robust hashing for secure image authentication
EURASIP Journal on Information Security
Speech Hashing Algorithm Based on Short-Time Stability
ICANN '09 Proceedings of the 19th International Conference on Artificial Neural Networks: Part II
WAMUS'07 Proceedings of the 7th WSEAS international conference on Wavelet analysis & multirate systems
Random Gray code and its performance analysis for image hashing
Signal Processing
Histogram-based image hashing for searching content-preserving copies
Transactions on data hiding and multimedia security VI
Digital Signal Processing
A local fingerprinting approach for audio copy detection
Signal Processing
Hi-index | 0.00 |
Perceptual hash functions provide a tool for fast and reliable identification of content. We present new audio hash functions based on summarization of the time-frequency spectral characteristics of an audio document. The proposed hash functions are based on the periodicity series of the fundamental frequency and on singular-value description of the cepstral frequencies. They are found, on one hand, to perform very satisfactorily in identification and verification tests, and on the other hand, to be very resilient to a large variety of attacks. Moreover, we address the issue of security of hashes and propose a keying technique, and thereby a key-dependent hash function.