CFP last date
20 May 2024
Reseach Article

A Review of Audio Fingerprinting and Comparison of Algorithms

by H. B. Kekre, Nikita Bhandari, Nisha Nair, Purnima Padmanabhan, Shravya Bhandari
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 70 - Number 13
Year of Publication: 2013
Authors: H. B. Kekre, Nikita Bhandari, Nisha Nair, Purnima Padmanabhan, Shravya Bhandari
10.5120/12022-8054

H. B. Kekre, Nikita Bhandari, Nisha Nair, Purnima Padmanabhan, Shravya Bhandari . A Review of Audio Fingerprinting and Comparison of Algorithms. International Journal of Computer Applications. 70, 13 ( May 2013), 24-30. DOI=10.5120/12022-8054

@article{ 10.5120/12022-8054,
author = { H. B. Kekre, Nikita Bhandari, Nisha Nair, Purnima Padmanabhan, Shravya Bhandari },
title = { A Review of Audio Fingerprinting and Comparison of Algorithms },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 70 },
number = { 13 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 24-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume70/number13/12022-8054/ },
doi = { 10.5120/12022-8054 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:32:46.161040+05:30
%A H. B. Kekre
%A Nikita Bhandari
%A Nisha Nair
%A Purnima Padmanabhan
%A Shravya Bhandari
%T A Review of Audio Fingerprinting and Comparison of Algorithms
%J International Journal of Computer Applications
%@ 0975-8887
%V 70
%N 13
%P 24-30
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

An audio finger print is a small set of features that uniquely identifies a song. An audio fingerprint can be used for broadcast monitoring, audience measurement, meta-data collection. The general framework for building an audio fingerprint includes a front- end and a finger print modeling block. This paper details various uses and properties of an audio fingerprint and also the various stages included in the front end. Two algorithms namely - PRH and MLH have been discussed.

References
  1. Modeling Audio Fingerprints : Structure, Distortion, Capacity by P. J. O Doets
  2. A Review of Audio Fingerprinting by Pedro Cano AndEloi Battle.
  3. E. Batlle, J. Masip, and E. Guaus. Automatic song identification in noisy broadcast audio. In IASTED International Conference on Signal and Image Processing, August 2002.
  4. J. Dittmann. Content-fragile watermarking for image authentication in Security, steganography, and watermarking of multimedia contents III, volume 4314 of Proceedings of the SPIE, pages 175 – 184, January 2001
  5. J. Dittmann, A. Steinmetz, and R. Steinmetz. Content-based digital signature for motion pictures authentication and content-fragile watermarking. In International Conference on Multimedia Computing and Systems (ICMCS), volume 2, pages 209 – 213, 1999.
  6. E. G´omez, P. Cano, L. Gomes, E. Batlle, and M. Bonnet. Mixed watermarking fingerprinting approach for integrity verification of audio recordings. In IEEE International Telecommunications Symposium, September 2002.
  7. C. -P. Wu and C. -C. J. Kuo. Speech content integrity verification integrated with. itu g. 723. 1 speech coding. In IEEE International Conference on Information Technology: Coding and Computing, pages 680 – 684, April 2001
  8. D. Delannay and B. Macq. Watermarking relying on cover signal content to hide synchronization marks. IEEE Transactions on Information Forensics and Security, 1(1):87 – 101, March 2006. W. Jonker and J. -P. Linnartz. Digital rights management in consumer electronics products. IEEE Signal Processing Magazine, 21(2):82 – 91, March 2004
  9. S. R. Subramanya and B. K. Yi. Digital rights management. IEEE Potentials, 25(2):31 – 34, March / April 2006
  10. R. Baeza-Yates and B. Ribeiro-Neto, Modern Information Retrieval. Addison Wesley, 1999
  11. S. Theodoris and K. Koutroumbas, Pattern Recognition. Academic Press, 1999
  12. G. Richly, L. Varga, F. Kov´acs, and G. Hossz´u, "Short-term sound stream characterisation for reliable, real-time occurrence monitoring of given sound-prints," in Proc. 10th Mediterranean Electrotechnical Conference, MEleCon, 2000
  13. F. Kurth, A. Ribbrock, and M. Clausen, "Identification of highly distorted audio material for querying large scale databases," in Proc. AES 112th Int. Conv. , Munich, Germany, May 2002.
  14. E. Allamanche, J. Herre, O. Helmuth, B. Fr¨oba, T. Kasten, and M. Cremer, "Content-based identification of audio material using mpeg-7 low level description," in Proc. of the Int. Symp. of Music Information Retrieval, Indiana, USA, Oct. 2002
  15. J. Haitsma and A. Kalker, "A Highly Robust Audio Fingerprinting System," International Symposium on Music Information Retrieval (ISMIR), pp. 107-115, 2002.
  16. D. P. W. Ellis. (2009) Robust Landmark-Based Audio Fingerprinting. http://labrosa. ee. columbia. edu/matlab/fingerprint
  17. A Review of Algorithms for Audio Fingerprinting by Pedro Cano and EloiBatlle and TonKalker and JaapHaitsma
  18. Comparison of Algorithms for Audio Fingerprinting by Heinrich A. van Nieuwenhuizen, Willie C. Venter and Leenta M. J. Grobler
  19. F. Balado, N. Hurley, E. McCarthy, and G. Silvestre, "Performance analysis of robust audio hashing," IEEE Trans. Inform. Forensics Security, vol. 2, no. 2, pp. 254–266, June 2007.
  20. P. Doets and R. Lagendijk, "Distortion estimation in compressed music using only audio fingerprints," IEEE Trans. Audio, Speech, Lang. Process. , vol. 16, no. 2, pp. 302–317, Feb. 2008.
  21. Audio Fingerprinting Based on Multiple Hashing in DCT Domain Yu Liu, Hwan Sik Yun, and Nam Soo Kim, Member, IEEE
  22. K. Rao and P. Yip, Discrete Cosine Transform: Algorithms,Advantages, Applications. New York: Academic, 1990.
  23. N. Ahmed, T. Natarajan, and K. Rao, "Discrete cosine transform," IEEE Trans. Comput. , pp. 90–93, Jan. 1974.
Index Terms

Computer Science
Information Sciences

Keywords

CBID Philips Robust Hashing Algorithm Multiple Hashing Algorithm