Privacy-enhanced Perceptual Hashing of Audio Data

被引:0
|
作者
Knospe, Heiko [1 ]
机构
[1] Cologne Univ Appl Sci, Inst Commun Engn, D-50679 Cologne, Germany
来源
PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013) | 2013年
关键词
Perceptual Hashing; Audio Hashing; Audio Fingerprinting; Acoustic Fingerprint; Privacy; Security; ROBUST;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Audio hashes are compact and robust representations of audio data and allow the efficient identification of specific recordings and their transformations. Audio hashing for music identification is well established and similar algorithms can also be used for speech data. A possible application is the identification of replayed telephone spam. This contribution investigates the security and privacy issues of perceptual hashes and follows an information-theoretic approach. The entropy of the hash should be large enough to prevent the exposure of audio content. We propose a privacy-enhanced randomized audio hash and analyze its entropy as well as its robustness and discrimination power over a large number of hashes.
引用
收藏
页码:549 / 554
页数:6
相关论文
共 50 条
  • [1] A roadmap for privacy-enhanced secure data provenance
    Bertino, Elisa
    Ghinita, Gabriel
    Kantarcioglu, Murat
    Dang Nguyen
    Park, Jae
    Sandhu, Ravi
    Sultana, Salmin
    Thuraisingham, Bhavani
    Xu, Shouhuai
    JOURNAL OF INTELLIGENT INFORMATION SYSTEMS, 2014, 43 (03) : 481 - 501
  • [2] A roadmap for privacy-enhanced secure data provenance
    Elisa Bertino
    Gabriel Ghinita
    Murat Kantarcioglu
    Dang Nguyen
    Jae Park
    Ravi Sandhu
    Salmin Sultana
    Bhavani Thuraisingham
    Shouhuai Xu
    Journal of Intelligent Information Systems, 2014, 43 : 481 - 501
  • [3] Privacy-Enhanced Data Collection Scheme for Smart-Metering
    Hajny, Jan
    Dzurenda, Petr
    Malina, Lukas
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2015, 2016, 9589 : 413 - 429
  • [4] A Privacy-Enhanced Access Control Model
    Xu, Fei
    He, Jingsha
    Wu, Xu
    Xu, Jing
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 703 - +
  • [5] Privacy-enhanced OptiSwap
    Avizheh, Sepideh
    Haffey, Preston
    Safavi-Naini, Reihaneh
    PROCEEDINGS OF THE 2021 CLOUD COMPUTING SECURITY WORKSHOP, CCSW 2021, 2021, : 39 - 57
  • [6] Privacy-enhanced BPMN: enabling data privacy analysis in business processes models
    Pullonen, Pille
    Tom, Jake
    Matulevicius, Raimundas
    Toots, Aivo
    SOFTWARE AND SYSTEMS MODELING, 2019, 18 (06) : 3235 - 3264
  • [7] Privacy-enhanced BPMN: enabling data privacy analysis in business processes models
    Pille Pullonen
    Jake Tom
    Raimundas Matulevičius
    Aivo Toots
    Software and Systems Modeling, 2019, 18 : 3235 - 3264
  • [8] A privacy-enhanced access control
    Department of Computer Science, Faculty of Science and Technology, Meiji University, Kawasaki, 214-8571, Japan
    不详
    不详
    不详
    Syst Comput Jpn, 2006, 5 (77-86): : 77 - 86
  • [9] Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation
    Guenther, Felix
    Manulis, Mark
    Peter, Andreas
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2014, 2014, 8813 : 321 - +
  • [10] A Privacy-Enhanced and Personalized Safe Route Planner with Crowdsourced Data and Computation
    Islam, Fariha Tabassum
    Hashem, Tanzima
    Shahriyar, Rifat
    2021 IEEE 37TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2021), 2021, : 229 - 240