• Title/Summary/Keyword: Audio Forgery Detection

Search Result 7, Processing Time 0.021 seconds

Microphone Type Classification for Digital Audio Forgery Detection (디지털 오디오 위조검출을 위한 마이크로폰 타입 인식)

  • Seok, Jongwon
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.3
    • /
    • pp.323-329
    • /
    • 2015
  • In this paper we applied pattern recognition approach to detect audio forgery. Classification of the microphone types and models can help determining the authenticity of the recordings. Canonical correlation analysis was applied to extract feature for microphone classification. We utilized the linear dependence between two near-silence regions. To utilize the advantage of multi-feature based canonical correlation analysis, we selected three commonly used features to capture the temporal and spectral characteristics. Using three different microphones, we tested the usefulness of multi-feature based characteristics of canonical correlation analysis and compared the results with single feature based method. The performance of classification rate was carried out using the backpropagation neural network. Experimental results show the promise of canonical correlation features for microphone classification.

Compression history detection for MP3 audio

  • Yan, Diqun;Wang, Rangding;Zhou, Jinglei;Jin, Chao;Wang, Zhifeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.662-675
    • /
    • 2018
  • Compression history detection plays an important role in digital multimedia forensics. Most existing works, however, mainly focus on digital image and video. Additionally, the existed audio compression detection algorithms aim to detect the trace of double compression. In real forgery scenario, multiple compression is more likely to happen. In this paper, we proposed a detection algorithm to reveal the compression history for MP3 audio. The statistics of the scale factor and Huffman table index which are the parameters of MP3 codec have been extracted as the detecting features. The experimental results have shown that the proposed method can effectively identify whether the testing audio has been previously treated with single/double/triple compression.

A Study on Authentication Analysis Procedure of Digital Audio Files (디지털 오디오 파일의 편집 여부 분석 절차에 대한 연구)

  • 박남인;심규선;전옥엽
    • Journal of Digital Forensics
    • /
    • v.13 no.4
    • /
    • pp.257-270
    • /
    • 2019
  • Recently, due to the popularization of smart devices such as smartphones and the like, photography and video recording audio recordings are frequently and efficiently performed. Thus the use of digital files of those types is increasing. For these digital files to be legally valid as digital evidence, the proof of origin for digital evidence was essential. Mainly, due to the characteristics of the digital audio file, it is possible to make a sophisticated forgery and falsification through the mass copying and digital editing program from the original record. In this way, it has been increasing more and more cases of manipulating digital audio files. In this paper, we propose the procedure of analyzing the file format of digital audio files and the audio signal after the analysis of various actual cases. As a result, it has confirmed that the digital audio files can be not original through traces generated during the manipulation of the digital audio file in case of the manipulated data. Moreover, it has confirmed that the proposed authentication analysis procedure may not clarify whether or not the digital audio file has been a forgery in some specific condition.

A Study on Forgery Techniques of Smartphone Voice Recording File Structure and Metadata (스마트폰 음성녹음 파일 구조 및 메타데이터의 위변조 기법에 관한 연구)

  • Park, Jae Wan;Kwak, Won Jun;Lee, John Sanghyun
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.6
    • /
    • pp.807-812
    • /
    • 2022
  • Recently, as the number of voice recording files submitted as court evidence increases, the number of cases claiming forgery is also increasing. If the audio recording file structure and metadata, which are objective grounds, are completely forged, it is actually impossible to detect forgery of the sophisticated audio recording file. It is extremely rare for the court to reject the file structure and metadata analysis performed with the forged audio recording file. The purpose of this study is to prove that forgery of voice recording file structure and metadata is easily possible. To this end, in this study, it was introduced that forgery detection is impossible when the 'mixed paste' function, which enables sophisticated editing based on the typification of the editing method of voice recording files, is applied. Moreover, it has been proven through experiments that forgery of file structure and metadata is possible. Therefore, a stricter standard for judging the admissibility of evidence is required when the audio recording file is adopted as digital evidence. This study will not only contribute to the standard of integrity in the adoption of digital evidence by judges, but will also contribute to the method of constructing a dataset for artificial intelligence in detecting forgery of recorded files that is expected to be developed in the future.

An Automatic Method of Detecting Audio Signal Tampering in Forensic Phonetics (법음성학에서의 오디오 신호의 위변조 구간 자동 검출 방법 연구)

  • Yang, Il-Ho;Kim, Kyung-Wha;Kim, Myung-Jae;Baek, Rock-Seon;Heo, Hee-Soo;Yu, Ha-Jin
    • Phonetics and Speech Sciences
    • /
    • v.6 no.2
    • /
    • pp.21-28
    • /
    • 2014
  • We propose a novel scheme for digital audio authentication of given audio files which are edited by inserting small audio segments from different environmental sources. The purpose of this research is to detect inserted sections from given audio files. We expect that the proposed method will assist human investigators by notifying suspected audio section which considered to be recorded or transmitted on different environments. GMM-UBM and GSV-SVM are applied for modeling the dominant environment of a given audio file. Four kinds of likelihood ratio based scores and SVM score are used to measure the likelihood for a dominant environment model. We also use an ensemble score which is a combination of the aforementioned five kinds of scores. In the experimental results, the proposed method shows the lowest average equal error rate when we use the ensemble score. Even when dominant environments were unknown, the proposed method gives a similar accuracy.

ENF based Detection of Forgery and Falsification of Digital Files due to Quadratic Interpolation (이차 보간에 따른 ENF 기반의 위변조 디지털 파일 탐지 기법)

  • Park, Se Jin;Yoon, Ji Won
    • Journal of KIISE
    • /
    • v.45 no.3
    • /
    • pp.311-320
    • /
    • 2018
  • Recently, the use of digital audio and video as proof in criminal and all kinds of litigation is increasing, and scientific investigation using digital forensic technique is developing. With the development of computing and file editing technologies, anyone can simply manipulate video files, and the number of cases of manipulating digital data is increasing. As a result, the integrity of the evidence and the reliability of the evidence Is required. In this paper, we propose a technique for extracting the Electrical Network Frequency (ENF) through a grid of power grids according to the geographical environment for power supply, and then performing signal processing for peak detection using QIFFT. Through the detection algorithm using the standard deviation, it was confirmed that the video file was falsified with 73% accuracy and the forgery point was found.

A comparative analysis of metadata structures and attributes of Samsung smartphone voice recording files for forensic use (법과학적 활용을 위한 삼성 스마트폰 음성 녹음 파일의 메타데이터 구조 및 속성 비교 분석 연구)

  • Ahn, Seo-Yeong;Ryu, Se-Hui;Kim, Kyung-Wha;Hong, Ki-Hyung
    • Phonetics and Speech Sciences
    • /
    • v.14 no.3
    • /
    • pp.103-112
    • /
    • 2022
  • Due to the popularization of smartphones, most of the recorded speech files submitted as evidence of recent crimes are produced by smartphones, and the integrity (forgery) of the submitted speech files based on smartphones is emerging as a major issue in the investigation and trial process. Samsung smartphones with the highest domestic market share are distributed with built-in speech recording applications that can record calls and voice, and can edit recorded speech. Unlike editing through third-party speech (audio) applications, editing by their own builtin speech applications has a high similarity to the original file in metadata structures and attributes, so more precise analysis techniques need to prove integrity. In this study, we constructed a speech file metadata database for speech files (original files) recorded by 34 Samsung smartphones and edited speech files edited by their built-in speech recording applications. We analyzed by comparing the metadata structures and attributes of the original files to their edited ones. As a result, we found significant metadata differences between the original speech files and the edited ones.