2013 IEEE 15th International Workshop on Multimedia Signal Processing (MMSP) 2013
DOI: 10.1109/mmsp.2013.6659284
|View full text |Cite
|
Sign up to set email alerts
|

Audio tampering detection via microphone classification

Abstract: In this paper, we present a new approach for audio tampering detection based on microphone classification. The underlying algorithm is based on a blind channel estimation, specifically designed for recordings from mobile devices. It is applied to detect a specific type of tampering, i.e., to detect whether footprints from more than one microphone exist within a given content item. As will be shown, the proposed method achieves an accuracy above 95% for AAC, MP3 and PCM-encoded recordings

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
19
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
2
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 54 publications
(19 citation statements)
references
References 5 publications
0
19
0
Order By: Relevance
“…The device information in the audio can be analyzed to determine whether the audio has been edited [7]. Cuccovillo et al [8] analyzes the microphones of recorded audio to detect the presence of multiple microphones in single audio for tampering detection. When recording audio, the surrounding environment mainly contains background noise, which can be used for audio tampering detection by analyzing background noise.…”
Section: Detection Methods Based On Shallow Featuresmentioning
confidence: 99%
“…The device information in the audio can be analyzed to determine whether the audio has been edited [7]. Cuccovillo et al [8] analyzes the microphones of recorded audio to detect the presence of multiple microphones in single audio for tampering detection. When recording audio, the surrounding environment mainly contains background noise, which can be used for audio tampering detection by analyzing background noise.…”
Section: Detection Methods Based On Shallow Featuresmentioning
confidence: 99%
“…To prevent or detect tampering, digital signatures [4], information hiding [1], [2], [3], [5], [6], [7], [8], [9], [10], [11], [12], and other alternatives based on noise, device, and environment identification [13], [14], [15] iechizen@nii.ac.jp are widely used. In digital signature systems, a digital signature is appended to the header of the content and once it is removed, the content can no longer be verified.…”
Section: Introductionmentioning
confidence: 99%
“…In digital signature systems, a digital signature is appended to the header of the content and once it is removed, the content can no longer be verified. Technologies [13], [14], [15] can be used to detect whether material has been spliced with recordings from different acoustic environments or recording devices. In information hiding methods, the information for verification is embedded within the content itself.…”
Section: Introductionmentioning
confidence: 99%
“…Many people have done the identification of audio recording devices for numerous proposes in numerous conditions. Luca Cuccovillo et al [1] used microphone classification to perform audio tampering detection, and the underlying algorithm was based on blind channel estimation and applied to detect a specific type of tampering. Constantine Kotropoulos et al [2] performed research on mobile phone identification using recorded speech signals, and they used Mel frequency cepstral coefficients extracted from recorded speech signals to train a Gaussian Mixture Model with diagonal covariance matrices, thus providing templates for each device.…”
Section: Introductionmentioning
confidence: 99%