483 research outputs found
Statistical Based Audio Forensic on Identical Microphones
Microphone forensics has become a challenging field due to the proliferation of recording devices and explosion in video/audio recording. Video or audio recording helps a criminal investigator to analyze the scene and to collect evidences. In this regards, a robust method is required to assure the originality of some recordings. In this paper, we focus on digital audio forensics and study how to identify the microphone model. Defining microphone model will allow the investigators to conclude integrity of some recordings. We perform statistical analysis on the recording that is collected from two microphones of the same model. Experimental results and analysis indicate that the signal of sound recording of identical microphone is not exactly same and the difference is up to 1% - 3%
Audio Splicing Detection and Localization Based on Acquisition Device Traces
In recent years, the multimedia forensic community has put a great effort in developing solutions to assess the integrity and authenticity of multimedia objects, focusing especially on manipulations applied by means of advanced deep learning techniques. However, in addition to complex forgeries as the deepfakes, very simple yet effective manipulation techniques not involving any use of state-of-the-art editing tools still exist and prove dangerous. This is the case of audio splicing for speech signals, i.e., to concatenate and combine multiple speech segments obtained from different recordings of a person in order to cast a new fake speech. Indeed, by simply adding a few words to an existing speech we can completely alter its meaning. In this work, we address the overlooked problem of detection and localization of audio splicing from different models of acquisition devices. Our goal is to determine whether an audio track under analysis is pristine, or it has been manipulated by splicing one or multiple segments obtained from different device models. Moreover, if a recording is detected as spliced, we identify where the modification has been introduced in the temporal dimension. The proposed method is based on a Convolutional Neural Network (CNN) that extracts model-specific features from the audio recording. After extracting the features, we determine whether there has been a manipulation through a clustering algorithm. Finally, we identify the point where the modification has been introduced through a distance-measuring technique. The proposed method allows to detect and localize multiple splicing points within a recording
Microphone smart device fingerprinting from video recordings
This report aims at summarizing the on-going research activity carried out by DG-JRC in the framework of the institutional project Authors and Victims Identification of Child Abuse on-line, concerning the use of microphone fingerprinting for source device classification. Starting from an exhaustive study of the State of Art regarding the matter, this report describes a feasibility study about the adoption of microphone fingerprinting for source identification of video recordings. A set of operational scenarios have been established in collaboration with EUROPOL law enforcers, according to investigators needs. A critical analysis of the obtained results has demonstrated the feasibility of microphone fingerprinting and it has suggested a set of recommendations, both in terms of usability and future researches in the field.JRC.E.3-Cyber and Digital Citizens' Securit
Blind Detection of Copy-Move Forgery in Digital Audio Forensics
Although copy-move forgery is one of the most common fabrication techniques, blind detection of such tampering in digital audio is mostly unexplored. Unlike active techniques, blind forgery detection is challenging, because it does not embed a watermark or signature in an audio that is unknown in most of the real-life scenarios. Therefore, forgery localization becomes more challenging, especially when using blind methods. In this paper, we propose a novel method for blind detection and localization of copy-move forgery. One of the most crucial steps in the proposed method is a voice activity detection (VAD) module for investigating audio recordings to detect and localize the forgery. The VAD module is equally vital for the development of the copy-move forgery database, wherein audio samples are generated by using the recordings of various types of microphones. We employ a chaotic theory to copy and move the text in generated forged recordings to ensure forgery localization at any place in a recording. The VAD module is responsible for the extraction of words in a forged audio, and these words are analyzed by applying a 1-D local binary pattern operator. This operator provides the patterns of extracted words in the form of histograms. The forged parts (copy and move text) have similar histograms. An accuracy of 96.59% is achieved, and the proposed method is deemed robust against noise
Point to the Hidden: Exposing Speech Audio Splicing via Signal Pointer Nets
Verifying the integrity of voice recording evidence for criminal
investigations is an integral part of an audio forensic analyst's work. Here,
one focus is on detecting deletion or insertion operations, so called audio
splicing. While this is a rather easy approach to alter spoken statements,
careful editing can yield quite convincing results. For difficult cases or big
amounts of data, automated tools can support in detecting potential editing
locations. To this end, several analytical and deep learning methods have been
proposed by now. Still, few address unconstrained splicing scenarios as
expected in practice. With SigPointer, we propose a pointer network framework
for continuous input that uncovers splice locations naturally and more
efficiently than existing works. Extensive experiments on forensically
challenging data like strongly compressed and noisy signals quantify the
benefit of the pointer mechanism with performance increases between about 6 to
10 percentage points.Comment: accepted at Interspeech 202
Towards Unconstrained Audio Splicing Detection and Localization with Neural Networks
Freely available and easy-to-use audio editing tools make it straightforward
to perform audio splicing. Convincing forgeries can be created by combining
various speech samples from the same person. Detection of such splices is
important both in the public sector when considering misinformation, and in a
legal context to verify the integrity of evidence. Unfortunately, most existing
detection algorithms for audio splicing use handcrafted features and make
specific assumptions. However, criminal investigators are often faced with
audio samples from unconstrained sources with unknown characteristics, which
raises the need for more generally applicable methods.
With this work, we aim to take a first step towards unconstrained audio
splicing detection to address this need. We simulate various attack scenarios
in the form of post-processing operations that may disguise splicing. We
propose a Transformer sequence-to-sequence (seq2seq) network for splicing
detection and localization. Our extensive evaluation shows that the proposed
method outperforms existing dedicated approaches for splicing detection [3, 10]
as well as the general-purpose networks EfficientNet [28] and RegNet [25].Comment: Accepted at MMFORWILD 2022, ICPR Workshops - Code:
https://faui1-gitlab.cs.fau.de/denise.moussa/audio-splicing-localizatio
Survey and Systematization of Secure Device Pairing
Secure Device Pairing (SDP) schemes have been developed to facilitate secure
communications among smart devices, both personal mobile devices and Internet
of Things (IoT) devices. Comparison and assessment of SDP schemes is
troublesome, because each scheme makes different assumptions about out-of-band
channels and adversary models, and are driven by their particular use-cases. A
conceptual model that facilitates meaningful comparison among SDP schemes is
missing. We provide such a model. In this article, we survey and analyze a wide
range of SDP schemes that are described in the literature, including a number
that have been adopted as standards. A system model and consistent terminology
for SDP schemes are built on the foundation of this survey, which are then used
to classify existing SDP schemes into a taxonomy that, for the first time,
enables their meaningful comparison and analysis.The existing SDP schemes are
analyzed using this model, revealing common systemic security weaknesses among
the surveyed SDP schemes that should become priority areas for future SDP
research, such as improving the integration of privacy requirements into the
design of SDP schemes. Our results allow SDP scheme designers to create schemes
that are more easily comparable with one another, and to assist the prevention
of persisting the weaknesses common to the current generation of SDP schemes.Comment: 34 pages, 5 figures, 3 tables, accepted at IEEE Communications
Surveys & Tutorials 2017 (Volume: PP, Issue: 99
Non-Facial Video Spatiotemporal Forensic Analysis Using Deep Learning Techniques
Digital content manipulation software is working as a boon for people to edit recorded video or audio content. To prevent the unethical use of such readily available altering tools, digital multimedia forensics is becoming increasingly important. Hence, this study aims to identify whether the video and audio of the given digital content are fake or real. For temporal video forgery detection, the convolutional 3D layers are used to build a model which can identify temporal forgeries with an average accuracy of 85% on the validation dataset. Also, the identification of audio forgery, using a ResNet-34 pre-trained model and the transfer learning approach, has been achieved. The proposed model achieves an accuracy of 99% with 0.3% validation loss on the validation part of the logical access dataset, which is better than earlier models in the range of 90-95% accuracy on the validation set
- …