scholarly journals Verifying the Audio Evidence to Assist Forensic Investigation

2021 ◽  
Vol 14 (3) ◽  
pp. 25
Author(s):  
Hasan Fayyad-Kazan ◽  
Ale Hejase ◽  
Imad Moukadem ◽  
Sondos Kassem-Moussa

Audio forensics is a field in forensics that is used to authenticate, enhance, and analyze audio files to aid in solving different crime investigations. Audio as a forensic evidence must be enhanced and analyzed to be admissible in courts of law. But more importantly, it must be authenticated in order to prove that it is authentic and no manipulations were done to it. In this paper, an overview on audio forensics is presented, previous related work to this topic is shown, and methodologies for audio enhancement and authentication are explained along with audio tampering ways and signatures presentation.

2011 ◽  
Vol 62 (4) ◽  
pp. 199-205 ◽  
Author(s):  
Ghulam Muhammad ◽  
Khalid Alghathbar

Environment Recognition for Digital Audio Forensics Using MPEG-7 and MEL Cepstral FeaturesEnvironment recognition from digital audio for forensics application is a growing area of interest. However, compared to other branches of audio forensics, it is a less researched one. Especially less attention has been given to detect environment from files where foreground speech is present, which is a forensics scenario. In this paper, we perform several experiments focusing on the problems of environment recognition from audio particularly for forensics application. Experimental results show that the task is easier when audio files contain only environmental sound than when they contain both foreground speech and background environment. We propose a full set of MPEG-7 audio features combined with mel frequency cepstral coefficients (MFCCs) to improve the accuracy. In the experiments, the proposed approach significantly increases the recognition accuracy of environment sound even in the presence of high amount of foreground human speech.


2021 ◽  
Vol 15 (1) ◽  
pp. 41-47
Author(s):  
Sunardi Sunardi ◽  
Imam Riadi ◽  
Rusydi Umar ◽  
Muhammad Fauzan Gustafi

Audio is one of the digital items that can reveal a happened case. However, audio evidence can also be manipulated and changed to hide information. Forensics audio is a technique to identify the sound’s owner from the audio using pitch, formant, and spectrogram parameters. The conducted research examines the similarity of the original sound with the manipulated voice to determine the owner of the sound. It analyzes the level of similarity or identical sound using spectrogram analysis with the Digital Forensics Research Workshop (DFRWS) Method. The research objects are original and manipulated files. Both files are in mp3 format, which is encoded to WAV format. Then, the live forensics method is used by picking up the data on a smartphone. Several applications are also used. The results show that the research successfully gets digital evidence on a smartphone with the Oxygen Forensic application. It extracts digital evidence in the form of two audio files and two video files. Then, by the hashing process, the four obtained files are proven to be authentic. Around 90% of the data are identical to the original voice recording. Only 10% of the data are not identical.


2017 ◽  
Vol 12 (3) ◽  
pp. 105-109
Author(s):  
S. V. Aramilev ◽  
E. S. Kiseleva ◽  
P. V. Fomenko

The late 20th century saw the development of a new special framework for the conservation of large mammals – both tigers and their prey, mostly ungulates, – along with their habitats in the Far East of Russia. Tightening controls on poaching, illicit trafficking and trade in wild animals and their parts, as well as enforcement of adequate penalties for these crimes rely on effective crime detection procedures and quality forensic investigation, which provides important grounds for prosecution. There are currently only four organizations conducting such forensic investigations within the geographic range of the Amur tiger.Efforts to facilitate forensic assistance have included production of the monograph “The Basics of Wildlife Forensics”, establishment of a veterinary treatment and diagnostic center for post-mortem examinations and a carcass storage facility for preservation of forensic evidence, and ongoing work to create biorepositories.However, there is still no streamlined system for state-supported forensic investigation of crimes against wildlife and forensic examinations of wild animals, their parts and derivatives.Such examinations should be conducted by specialized centers under designated conservation authorities of the constituent subjects of the Russian Federation, similar to the forensic bureaus of the Ministry of the Interior.


2012 ◽  
Author(s):  
Pritheega Magalingam ◽  
Azizah Abdul Manaf ◽  
Zuraimi Yahya ◽  
Rabiah Ahmad

Analisis forensik perkakasan melibatkan proses menganalisa data yang di perolehi secara elektronik untuk menunjukkan bukti sama ada peralatan elektronik adalah digunakan untuk melakukan jenayah, mengandungi bukti jenayah atau ia adalah satu sasaran jenayah. Penyalahgunaan mesin permainan merupakan sumber utama permainan haram dijalankan. Kerja penyelidikan ini memperkenalkan kaedah mendapatkan maklumat dari satu mesin permainan yang telah dirampas oleh PDRM dan menganalisis data yang diterjemahkan untuk membuktikan bahawa mesin permainan tersebut digunakan secara haram. Prosedur mendapatkan bukti digital ini dibina untuk membantu pihak polis atau penyiasat dalam penganalisaan maklumat digital dan ia boleh dijadikan sebagai satu garis panduan untuk mengenalpasti bukti yang relevan untuk menunjukan aktiviti perjudian haram dijalankan. Kata kunci: Forensik digital, analisis forensik, mesin judi, kaedah pengambilan informasi, penterjemahan, pencarian kata Hardware forensic analysis involves the process of analyzing digital evidence derived from digital sources. The analysis is done to facilitate and prove either the device is used to commit crime, whether it contains evidence of a crime or is the target of a crime. Gambling machines serve as the main source by which illegal games are conducted. This paper presents a method for retrieving information from a seized gaming machine, along with an analysis of the interpreted information to prove that the gaming machine was used illegally. The proposed procedures for the gambling machine forensic process will be important for forensic investigators (e.g., the police or private investigators), as they will assist these individuals in the digital forensic evidence analysis necessary to produce evidence relevant to illegal gambling. Key words: digital forensic, forensic analysis, gambling machine, information retrieval method, interpretation, string search


2014 ◽  
Vol 55 ◽  
Author(s):  
Hector Quintus Beyers ◽  
Martin S Olivier ◽  
Gerhard P Hancke

The application schema layer of a Database Management System (DBMS) can be modified to deliver results that may warrant a forensic investigation. Table structures can be corrupted by changing the metadata of a database or operators of the database can be altered to deliver incorrect results when used in queries. This paper will discuss categories of possibilities that exist to alter the application schema with some practical examples. Two forensic environments are introduced where a forensic investigation can take place in. Arguments are provided why these environments are important. Methods are presented how these environments can be achieved for the application schema layer of a DBMS. A process is proposed on how forensic evidence should be extracted from the application schema layer of a DBMS. The application schema forensic evidence identification process can be applied to a wide range of forensic settings.


2013 ◽  
Vol 5 (2) ◽  
pp. 1-22 ◽  
Author(s):  
Benjamin Aziz ◽  
Clive Blackwell ◽  
Shareeful Islam

Digital forensics investigations are an important task for collecting evidence based on the artifacts left in computer systems for computer related crimes. The requirements of such investigations are often a neglected aspect in most of the existing models of digital investigations. Therefore, a formal and systematic approach is needed to provide a framework for modeling and reasoning about the requirements of digital investigations. In addition, anti-forensics situations make the forensic investigation process challenging by contaminating any stage of the investigation process, its requirements, or by destroying the evidence. Therefore, successful forensic investigations require understanding the possible anti-forensic issues during the investigation. In this paper, the authors present a new method for guiding digital forensics investigations considering the anti-forensics based on goal-driven requirements engineering methodologies, in particular KAOS. Methodologies like KAOS facilitate modeling and reasoning about goals, requirements and obstacles, as well as their operationalization and responsibility assignments. The authors believe that this new method will lead in the future to better management and organization of the various steps of forensics investigations in cyberspace as well as provide more robust grounds for reasoning about forensic evidence.


Author(s):  
K. Culbreth

The introduction of scanning electron microscopy and energy dispersive x-ray analysis to forensic science has provided additional methods by which investigative evidence can be analyzed. The importance of evidence from the scene of a crime or from the personal belongings of a victim and suspect has resulted in the development and evaluation of SEM/x-ray analysis applications to various types of forensic evidence. The intent of this paper is to describe some of these applications and to relate their importance to the investigation of criminal cases.The depth of field and high resolution of the SEM are an asset to the evaluation of evidence with respect to surface phenomena and physical matches (1). Fig. 1 shows a Phillips screw which has been reconstructed after the head and shank were separated during a hit-and-run accident.


2018 ◽  
Vol 49 (2) ◽  
pp. 245
Author(s):  
Susan Glazebrook

This article examines the role expert evidence plays in court and some of the risks surrounding such evidence. Through the examination of several tragic cases of miscarriage of justice, this article warns of the dangers of relying unquestionably on expert evidence and calls for a careful consideration of the evidence as each case comes before the courts. The value of good forensic evidence in the investigation and prosecution of crime is nevertheless recognised.


Author(s):  
IRMA SAFITRI ◽  
NUR IBRAHIM ◽  
HERLAMBANG YOGASWARA

ABSTRAKPenelitian ini mengembangkan teknik Compressive Sensing (CS) untuk audio watermarking dengan metode Lifting Wavelet Transform (LWT) dan Quantization Index Modulation (QIM). LWT adalah salah satu teknik mendekomposisi sinyal menjadi 2 sub-band, yaitu sub-band low dan high. QIM adalah suatu metode yang efisien secara komputasi atau perhitungan watermarking dengan menggunakan informasi tambahan. Audio watermarking dilakukan menggunakan file audio dengan format *.wav berdurasi 10 detik dan menggunakan 4 genre musik, yaitu pop, classic, rock, dan metal. Watermark yang disisipkan berupa citra hitam putih dengan format *.bmp yang masing-masing berukuran 32x32 dan 64x64 pixel. Pengujian dilakukan dengan mengukur nilai SNR, ODG, BER, dan PSNR. Audio yang telah disisipkan watermark, diuji ketahanannya dengan diberikan 7 macam serangan berupa LPF, BPF, HPF, MP3 compression, noise, dan echo. Penelitian ini memiliki hasil optimal dengan nilai SNR 85,32 dB, ODG -8,34x10-11, BER 0, dan PSNR ∞.Kata kunci: Audio watermarking, QIM, LWT, Compressive Sensing. ABSTRACTThis research developed Compressive Sensing (CS) technique for audio watermarking using Wavelet Transform (LWT) and Quantization Index Modulation (QIM) methods. LWT is one technique to decompose the signal into 2 sub-bands, namely sub-band low and high. QIM is a computationally efficient method or watermarking calculation using additional information. Audio watermarking was done using audio files with *.wav format duration of 10 seconds and used 4 genres of music, namely pop, classic, rock, and metal. Watermark was inserted in the form of black and white image with *.bmp format each measuring 32x32 and 64x64 pixels. The test was done by measuring the value of SNR, ODG, BER, and PSNR. Audio that had been inserted watermark was tested its durability with given 7 kinds of attacks such as LPF, BPF, HPF, MP3 Compression, Noise, and Echo. This research had optimal result with SNR value of 85.32 dB, ODG value of -8.34x10-11, BER value of 0, and PSNR value of ∞.Keywords: Audio watermarking, QIM, LWT, Compressive Sensing.


Sign in / Sign up

Export Citation Format

Share Document