... of this second kind of attacksare the alteration of a piece of evidence in a criminal trial, orthe manipulation of public opinion through the use of falsewiretapping. Often, for the sake of ... Mıhc¸ak and R. Venkatesan, “A perceptual audiohashing algorithm: a tool for robust audio identification and information hiding,” in Proceedings of the 4th InternationalWorkshop on Information Hiding ... Kalker, and J. Haitsma, “A review of algorithms for audio fingerprinting,” in Proceedings of IEEEWorkshop on Multimedia Signal Processing (MMSP ’02),pp.169–173, St. Thomas, Virgin Islands, USA,...