A review of audio fingerprinting (Cano et al. 2005)

Slides:



Advertisements
Similar presentations
Matthias Gruhne, Page 1 Fraunhofer Institut Integrierte Schaltungen Robust Audio Identification for Commercial Applications Matthias.
Advertisements

Digital rights management Audio watermark Jiamian.
Rob Farraher Ken Pickering Lim Vu
Content-based retrieval of audio Francois Thibault MUMT 614B McGill University.
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
FINGER PRINTING BASED AUDIO RETRIEVAL Query by example Content retrieval Srinija Vallabhaneni.
 Reader and Task The Forgotten Component of Text Complexity Sydnee Dickson, Utah State Office of Education Jimi Cannon, Scholastic Classroom and Community.
A Novel Scheme for Video Similarity Detection Chu-Hong Hoi, Steven March 5, 2003.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Advancing Wireless Link Signatures for Location Distinction J. Zhang, M. H. Firooz, N. Patwari, S. K. Kasera MobiCom’ 08 Presenter: Yuan Song.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Privacy and Integrity Preserving in Distributed Systems Presented for Ph.D. Qualifying Examination Fei Chen Michigan State University August 25 th, 2009.
Tools and Services for the Long Term Preservation and Access of Digital Archives Joseph JaJa, Mike Smorul, and Sangchul Song Institute for Advanced Computer.
Chapter 11 Integration Information Instructor: Prof. G. Bebis Represented by Reza Fall 2005.
Security in Databases. 2 Outline review of databases reliability & integrity protection of sensitive data protection against inference multi-level security.
05/06/2005CSIS © M. Gibbons On Evaluating Open Biometric Identification Systems Spring 2005 Michael Gibbons School of Computer Science & Information Systems.
Identification System Errors Guide to Biometrics – Chapter 6 Handbook of Fingerprint Recognition Presented By: Chris Miles.
A Brief Survey on Face Recognition Systems Amir Omidvarnia March 2007.
TEAM-1 JACKIE ABBAZIO SASHA PEREZ DENISE SILVA ROBERT TESORIERO Face Recognition Systems.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Robust Mesh-based Hashing for Copy Detection and Tracing of Images Chun-Shien Lu, Chao-Yong Hsu, Shih-Wei Sun, and Pao-Chi Chang Proc. IEEE Int. Conf.
True OMR Second Darkest Mark Detection For Erasure Analysis.
CPSC 601 Lecture Week 5 Hand Geometry. Outline: 1.Hand Geometry as Biometrics 2.Methods Used for Recognition 3.Illustrations and Examples 4.Some Useful.
MPEG-21 : Overview MUMT 611 Doug Van Nort. Introduction Rather than audiovisual content, purpose is set of standards to deliver multimedia in secure environment.
EE 492 ENGINEERING PROJECT LIP TRACKING Yusuf Ziya Işık & Ashat Turlibayev Yusuf Ziya Işık & Ashat Turlibayev Advisor: Prof. Dr. Bülent Sankur Advisor:
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Curtis Kelsey University of Missouri A FINGERPRINTING SYSTEM MOBILE MODEL FOR VIDEO COPY PROTECTION.
Audio Fingerprinting MUMT 611 Ichiro Fujinaga McGill University.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Dan Rosenbaum Nir Muchtar Yoav Yosipovich Faculty member : Prof. Daniel LehmannIndustry Representative : Music Genome.
MUMT611: Music Information Acquisition, Preservation, and Retrieval Presentation on Timbre Similarity Alexandre Savard March 2006.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #23 Biometrics Standards - II November 14, 2005.
ITGS Databases.
Audio Watermarking Denis Lebel presented by. MUMT-611: Music Information Acquisition, Preservation, and Retrieval 2 / 13 Presentation Outline Introduction.
S.A.T.H Conference. Aims of the session Higher History Overview of where we are What do we do as examiners How are the grades derived Issues arising Paper.
2005/12/021 Content-Based Image Retrieval Using Grey Relational Analysis Dept. of Computer Engineering Tatung University Presenter: Tienwei Tsai ( 蔡殿偉.
Event retrieval in large video collections with circulant temporal encoding CVPR 2013 Oral.
2005/12/021 Fast Image Retrieval Using Low Frequency DCT Coefficients Dept. of Computer Engineering Tatung University Presenter: Yo-Ping Huang ( 黃有評 )
1 Iris Recognition Ying Sun AICIP Group Meeting November 3, 2006.
I can be You: Questioning the use of Keystroke Dynamics as Biometrics Tey Chee Meng, Payas Gupta, Debin Gao Ke Chen.
Blind Quality Assessment System for Multimedia Communications Using Tracing Watermarking P. Campisi, M. Carli, G. Giunta and A. Neri IEEE Transactions.
Similarity Measurement and Detection of Video Sequences Chu-Hong HOI Supervisor: Prof. Michael R. LYU Marker: Prof. Yiu Sang MOON 25 April, 2003 Dept.
Audio Fingerprinting MUMT 611 Philippe Zaborowski March 2005.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Audio Fingerprinting Wes Hatch MUMT-614 Mar.13, 2003.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
David Sears MUMT November 2009
Large-Scale Content-Based Audio Retrieval from Text Queries
TJTS505: Master's Thesis Seminar
Hand Geometry Recognition
Cryptographic Hash Function
FACE RECOGNITION TECHNOLOGY
FACE DETECTION USING ARTIFICIAL INTELLIGENCE
Biometrics.
Introduction to Music Information Retrieval (MIR)
Audio Fingerprinting Wes Hatch MUMT-614 Mar.13, 2003.
Biometrics.
Database Systems Chapter 1
Improving Retrieval Performance of Zernike Moment Descriptor on Affined Shapes Dengsheng Zhang, Guojun Lu Gippsland School of Comp. & Info Tech Monash.
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
MUMT611: Music Information Acquisition, Preservation, and Retrieval
Module P4 Identify Data Products and Views So Their Requirements and Attributes Can Be Controlled Learning Objectives: Understand the value of data. Understand.
Presenter: Simon de Leon Date: March 2, 2006 Course: MUMT611
A maximum likelihood estimation and training on the fly approach
The ultimate in data organization
EE 492 ENGINEERING PROJECT
Advancing Wireless Link Signatures for Location Distinction
Voice Separation: A 15-minute Introduction
INTRODUCTION A Database system is basically a computer based record keeping system. The collection of data, usually referred to as the database, contains.
OBSERVER DATA MANAGEMENT PRINCIPLES AND BEST PRACTICE (Agenda Item 4)
Presentation transcript:

A review of audio fingerprinting (Cano et al. 2005) mainly based on A review of audio fingerprinting (Cano et al. 2005) My name is Denis Lebel and I will talk about Interactive Rendering of Suggestive Contours with Temporal Coherence. presented by Denis Lebel

Presentation Outline Introduction Desired Properties Usage Modes Applications Fingerprinting Framework Front-end Fingerprint Models Similarity Measures and Searching Methods Hypothesis Testing Conclusion References To start off this presentation, we will look at an example of suggestive contours vs true contours and clarify the terminology I will be using throughout my presentation. I will then give a brief overview of suggestive contours, so you get a better idea of what they actually are. Then, we’ll move the motivation behind the work of this paper and cover the various contributions by the author. I will end this presentation by giving you future challenges for suggestive contours. If time permits it, you will also have a chance to watch a live demonstration of suggestive contours… One more thing: feel free to ask questions if you don’t understand and I’ll do my best to answer or will refer you to a more adequate source of information. MUMT-611: Music Information Acquisition, Preservation, and Retrieval

Introduction Idea Audio Fingerprint Fingerprinting System An attempt to mimic human music recognition abilities Audio Fingerprint Unique identifier of an audio signal Content-based signature that summarizes an audio recording Uses relevant (perceptual) acoustics characteristics of signal Fingerprinting System Database of known fingerprints Query system Unidentified song Match Return Information Search Collection Of all known songs NO Match Keep Looking… Figure 1: General idea of a fingerprinting system MUMT-611: Music Information Acquisition, Preservation, and Retrieval

Desired Properties Accuracy Reliability Robustness Granularity Function of correct, missed, and wrong identifications Reliability Correct identification method Robustness Ability to accurately identify an item (no matter how compressed or distorted it is) Granularity Ability to identify a signal from a short excerpt Security Vulnerability to cracking MUMT-611: Music Information Acquisition, Preservation, and Retrieval

Desired Properties Versatility Scalability Complexity Fragility Ability to identify a signal regardless of audio format Scalability Performance with very large databases Complexity Computational costs of fingerprint extraction, size of fingerprint, search complexity, comparison complexity, etc. Fragility Integrity verification (detection of changes in content) MUMT-611: Music Information Acquisition, Preservation, and Retrieval

Desired Properties Properties are interrelated and dependent of system purpose Generally speaking, fingerprint should be: A perceptual digest of the recording Invariant to distortions Compact Easily computable MUMT-611: Music Information Acquisition, Preservation, and Retrieval

Usage Modes Identification Integrity Verification Content identification of an audio signal Integrity Verification Detection of data alteration Figure 2: Content-based audio identification framework. (Cano et al. 2005) Figure 3: Integrity verification framework. (Cano et al. 2005) MUMT-611: Music Information Acquisition, Preservation, and Retrieval

Usage Modes Watermarking support Audio fingerprints can be used to derive secrets keys from the audio content Content-based Audio Retrieval and Processing Extraction of audio features (i.e., low-level and high-level descriptors) Fingerprints can be used to retrieve similar content (i.e., query-by-example scheme) MUMT-611: Music Information Acquisition, Preservation, and Retrieval

Applications Audio Content Monitoring and Tracking At the distributor end At the transmission channel At the consumer end Added-Value Services Content information describing audio excerpt (e.g., tempo) Meta-data describing musical work (e.g., composer, year, …) Other information (e.g., album cover) Integrity Verification Systems Audio fingerprints can be used to ensure user’s audio files have the best quality available MUMT-611: Music Information Acquisition, Preservation, and Retrieval

Presentation Outline Introduction Desired Properties Usage Modes Applications Fingerprinting Framework Front-end Fingerprint Models Similarity Measures and Searching Methods Hypothesis Testing Conclusion References To start off this presentation, we will look at an example of suggestive contours vs true contours and clarify the terminology I will be using throughout my presentation. I will then give a brief overview of suggestive contours, so you get a better idea of what they actually are. Then, we’ll move the motivation behind the work of this paper and cover the various contributions by the author. I will end this presentation by giving you future challenges for suggestive contours. If time permits it, you will also have a chance to watch a live demonstration of suggestive contours… One more thing: feel free to ask questions if you don’t understand and I’ll do my best to answer or will refer you to a more adequate source of information. MUMT-611: Music Information Acquisition, Preservation, and Retrieval

Fingerprinting Framework Figure 4: Content-based audio identification framework. (Cano et al. 2005) MUMT-611: Music Information Acquisition, Preservation, and Retrieval

Fingerprinting Framework Fingerprint Extraction: Front-End Figure 5: Fingerprint Extraction Framework. (Cano et al. 2005) MUMT-611: Music Information Acquisition, Preservation, and Retrieval

Fingerprinting Framework Fingerprint Extraction: Fingerprint Modeling Idea: Reduce redundancies Reduce size of fingerprint Similarity measure and search method depends on the model chosen Several techniques can be used (for a summary: Cano et al. 2005) MUMT-611: Music Information Acquisition, Preservation, and Retrieval

Fingerprinting Framework Figure 4: Content-based audio identification framework. (Cano et al. 2005) MUMT-611: Music Information Acquisition, Preservation, and Retrieval

Fingerprinting Framework Fingerprint Extraction: Similarity Measures Related to type of model chosen Correlation metric is common Example: Euclidean distance Figure 6: a) Fingerprint block of original clip b) fingerprint block of a compressed version. c) Difference (error) (Haitsma et al. 2002) MUMT-611: Music Information Acquisition, Preservation, and Retrieval

Fingerprinting Framework Fingerprint Extraction: Searching Methods Using brute-force search is inappropriate for large database Idea: Optimizing the search Some possible optimizations Pre-computing distances offline Filtering unlikely candidates with a cheap similarity measure Candidate pruning Others… MUMT-611: Music Information Acquisition, Preservation, and Retrieval

Fingerprinting Framework Fingerprint Extraction: Hypothesis Testing Idea: Whether the query is present in the repository A threshold must be used and it depends on: Fingerprint model Similarity of fingerprints in the database Database size Discriminative information of the query The larger the database, the higher the probability of wrong match False Acceptance Rate (FAR) False Rejected Rate (FRR) MUMT-611: Music Information Acquisition, Preservation, and Retrieval

Conclusion Most existing systems fall more or less into this generic framework Large databases still represent a challenge (scalability, complexity, accuracy…) P2P systems might be the future (e.g., Music2Share) MUMT-611: Music Information Acquisition, Preservation, and Retrieval

References Cano, P., E. Batlle, T. Kalker, and J. Haitsma. 2005. A review of audio fingerprinting. The Journal of VLSI Signal Processing 41: 271–84. Haitsma, J., and T. Kalker. 2002. A highly robust audio fingerprinting system. Proceedings of the International Symposium on Music Information Retrieval. 107–15. Kalker, T., D. Epema, P. Hartel, R. Langendijk, and M. Van Steen. 2004. Music2Share: Copyright-compliant music sharing in P2P systems. Proceedings of the IEEE 92 (6): 961–70. MUMT-611: Music Information Acquisition, Preservation, and Retrieval

Links http://www.shazam.com/ http://www.relatable.com/ http://www.audiblemagic.com/ http://www.gracenote.com/ MUMT-611: Music Information Acquisition, Preservation, and Retrieval