Perceptual Digest Function for Verifying Integrity in Audio Forensics

Main Article Content

Dora María Ballesteros Diego Renza Héctor Duvan Ortiz


In this work we propose a function that allows to calculate a summary code from the parameters of a voice signal. This function is based on ordering of spectral coefficients obtained by means of the application of the Fast Fourier Transform (FFT), using a locally generated reference function (Gaussian random noise). The proposed method is oriented to the verification of integrity in forensic voice signals. The proposed methodology has a perceptual approach, which implies that the resulting code is maintained, even when modifications are made, particularly those that do not affect the sensitive content of the signal, such as re-quantization processes. 


Download data is not yet available.

Article Details

How to Cite
BALLESTEROS, Dora María; RENZA, Diego; DUVAN ORTIZ, Héctor. Perceptual Digest Function for Verifying Integrity in Audio Forensics. Ingeniería y Ciencia | ing.cienc., [S.l.], v. 13, n. 25, p. 167-183, may 2017. ISSN 2256-4314. Available at: <>. Date accessed: 19 nov. 2017. doi:
Hash function; perceptual hash; integrity; audio forensics


[1] N. Chen, H.-D. Xiao, and W. Wan, “Audio hash function based on non-negative matrix factorisation of mel-frequency cepstral coefficients,”IET In-formation Security, vol. 5, no. 1, pp. 19–25, 2011.

[2] H. Malik, “Acoustic environment identification and its applications to audioforensics,”IEEE Transactions on Information Forensics and Security, vol. 8,no. 11, pp. 1827–1837, 2013.

[3] M. Ayoob and W. Adi, “Improving system reliability by joint usage of hashfunction bits and error correction coding,” inEmerging Security Technologies(EST), 2015 Sixth International Conference on. IEEE, 2015, pp. 1–6.

[4] M. Zamani and A. B. A. Manaf, “Genetic algorithm for fragile audio wa-termarking,”Telecommunication Systems, vol. 59, no. 3, pp. 291–304, 2015.

[5] J. Fridrich and M. Goljan, “Robust hash functions for digital watermarking,”inInformation Technology: Coding and Computing, 2000. Proceedings. In-ternational Conference on. IEEE, 2000, pp. 178–183.

[6] B. Lei, Y. Soon, and E.-L. Tan, “Robust svd-based audio watermarking sche-me with differential evolution optimization,”IEEE transactions on audio,speech, and language processing, vol. 21, no. 11, pp. 2368–2378, 2013.

[7] I. M. Maung, Y. Tew, and K. Wong, “Authentication for aac compressed au-dio using data hiding,” inConsumer Electronics-Taiwan (ICCE-TW), 2016IEEE International Conference on. IEEE, 2016, pp. 1–2.

[8] J. Haitsma, T. Kalker, and J. Oostveen, “Robust audio hashing for contentidentification,” inInternational Workshop on Content-Based Multimedia In-dexing, vol. 4. Citeseer, 2001, pp. 117–124.

[9] J. Li, H. Wang, and Y. Jing, “Audio perceptual hashing based on nmf andmdct coefficients,”Chinese Journal of Electronics, vol. 24, no. 3, pp. 579–588,2015.

[10] M. S. Jain, M. V. Doshi, and M. T. Goyal, “Cryptanalytic jh and blakehash function for authentication and proposed work over blake-256 using c,”INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNO-LOGY, vol. 1, no. 4, pp. 1862–1866, 2013.

[11] R. Sobti and G. Geetha, “Cryptographic hash functions: a review,”IJCSIInternational Journal of Computer Science Issues, vol. 9, no. 2, pp. 461–479,2012.

[12] C. Qin, X. Chen, D. Ye, J. Wang, and X. Sun, “A novel image hashing sche-me with perceptual robustness using block truncation coding,”InformationSciences, vol. 361, pp. 84–99, 2016.

[13] X. Lv and Z. J. Wang, “Perceptual image hashing based on shape contextsand local feature points,”IEEE Transactions on Information Forensics andSecurity, vol. 7, no. 3, pp. 1081–1093, 2012.

[14] A. Neelima and K. M. Singh, “A short survey on perceptual hash function,”ADBU Journal of Engineering Technology, vol. 1, 2014.

[15] Z. Qiu-yu, R. Zhan-wei, X. Peng-fei, H. Yi-bo, and Y. Shuang, “Securityanalysis of speech perceptual hashing authentication algorithm,”Internatio-nal Journal of Security and Its Applications, vol. 10, no. 1, pp. 103–118, 2016.

[16] H. E. Michail, A. Kotsiolis, A. Kakarountas, G. Athanasiou, and C. Goutis,“Hardware implementation of the totally self-checking sha-256 hash core,” inEUROCON 2015-International Conference on Computer as a Tool (EURO-CON), IEEE. IEEE, 2015, pp. 1–5.

[17] N. Chidambaram, P. Raj, K. Thenmozhi, and R. Amirtharajan, “Enhancingthe security of customer data in cloud environments using a novel digital fin-gerprinting technique,”International Journal of Digital Multimedia Broad-casting, vol. 2016, p. 1, 2016.

[18] D. Tomović, I. Ognjanović, and R. Šendelj, “Security challenges of integrationof hash functions into cloud systems,” inEmbedded Computing (MECO),2015 4th Mediterranean Conference on. IEEE, 2015, pp. 110–114.

[19] D. M. Ballesteros L., D. Renza, and S. Camacho, “An unconditionally securespeech scrambling scheme based on an imitation process to a gaussian noisesignal,”J. Inf. Hiding Multimedia Sig. Process, vol. 7, no. 2, pp. 233–242,2016.

[20] D. M. Ballesteros L, D. Renza, and S. Camacho, “High scrambling degree inaudio through imitation of an unintelligible signal,”Lecture Notes in Com-puter Science, vol. 9703, pp. 251–259, 2016.

[21] D. M. Ballesteros L., D. Renza, and S. Camacho, “Security analysis of thespeech scrambling method based on imitation of a super-gaussian signal,”J.Inf. Hiding Multimedia Sig. Process, vol. 8, no. 1, pp. 156–167, 2017.