no

Audio Re-sampling Detection in Audio Forensics Based on Second-Order Derivative

Expand
  • School of Communication and Information Engineering, Shanghai University, Shanghai 200444, China

Received date: 2013-02-24

  Online published: 2014-06-26

Abstract

Audio tampering is often accompanied with re-sampling especially in audio plicing, re-compression, time-scale and pitch-scale modification, quality faking and other perations. Therefore, re-sampling detection is an important means in audio forensics. his paper proposes a new method to detect audio re-sampling. It is theoretically shown hat, if an original audio signal is re-sampled, significant peaks can be found in second-order erivative of the spectrum, and the peak position is related to re-sampling factor. This ethod is applicable to common nonlinear interpolation. Detection performance influenced by audio duration or content or format is discussed. Finally, an automatic detection scheme is described, and experimental results show that the algorithm can be used to detect resampled audio effectively.

Cite this article

HOU Li-min, WU Wei-qi, ZHANG Xin-peng . Audio Re-sampling Detection in Audio Forensics Based on Second-Order Derivative[J]. Journal of Shanghai University, 2014 , 20(3) : 304 -312 . DOI: 10.3969/j.issn.1007-2861.2013.07.028

References

[1] Maher R C. Audio forensic examination: authenticity, enhancement, and interpretation [J]. IEEE Signal Processing Magazine, 2009, 26(2): 84-94.

[2] Fridrich J. Security of fragile authentication watermarks with localization [C]// Proc SPIE, Security and Watermarking of Multimedia Contents. 2002: 691-700.

[3] Wong P W. A public key watermark for image verification and authentication [C]// IEEE International Conference on Image Processing. 1998: 455-459.

[4] Farid H. Image forgery detection [J]. IEEE Signal Processing Magazine, 2009, 26(2):16-26.

[5] Popescu A C, Farid H. Exposing digital forgeries by detecting traces of re-sampling [J]. IEEE Transactions on Signal Processing, 2005, 53(2): 758-767.

[6] 姚秋明, 柴佩琪, 宣国荣, 等. 基于期望最大化算法的音频取证中的篡改检测[J]. 计算机应用, 2006, 26(11): 2598-2601.

[7] 丁琦, 平西建. 基于子带平滑度的音频篡改检测[J]. 应用科学学报, 2010, 28(2): 142-146.

[8] Gallagher A C. Detection of linear and cubic interpolation in JPEG compressed images [C]// The 2nd Canadian Conference on Computer and Robot Vision. 2005: 65-72.

[9] Mahdian B, Saic S. Blind authentication using periodic properties of interpolation [J]. IEEE Transactions on Information Forensics and Security, 2008, 3(3): 529-538.

[10] WeiWM,Wang S Z, Zhang X P, et al. Estimation of image rotation angle using interpolationrelated spectral signatures with application to blind detection of image forgery [J]. IEEE Transactions on Information Forensics and Security, 2010, 5(3): 507-517.

[11] 宋枫溪, 高林. 文本分类器性能评估指标[J]. 计算机工程, 2004, 30(13): 107-109.
Outlines

/