audio forensics
Recently Published Documents


TOTAL DOCUMENTS

40
(FIVE YEARS 15)

H-INDEX

10
(FIVE YEARS 2)

2021 ◽  
Vol 14 (3) ◽  
pp. 25
Author(s):  
Hasan Fayyad-Kazan ◽  
Ale Hejase ◽  
Imad Moukadem ◽  
Sondos Kassem-Moussa

Audio forensics is a field in forensics that is used to authenticate, enhance, and analyze audio files to aid in solving different crime investigations. Audio as a forensic evidence must be enhanced and analyzed to be admissible in courts of law. But more importantly, it must be authenticated in order to prove that it is authentic and no manipulations were done to it. In this paper, an overview on audio forensics is presented, previous related work to this topic is shown, and methodologies for audio enhancement and authentication are explained along with audio tampering ways and signatures presentation.


2021 ◽  
Vol 9 (1) ◽  
pp. 1-8
Author(s):  
Mifta Nur Farid ◽  
Dani Dwi Putra ◽  
Barokatun Hasanah

Audio forensics is a field of science that analyzes audio such as sound recordings. Voice recordings always have information in the form of frequency characteristics, the identities of these frequencies can be identified. Furthermore, an analysis of changes in pitch and formant will be carried out. This study used pitch analysis and analysis of variance on formants. With the correct procedure for handling recorded sound evidence which is then followed by procedural examination and analysis, it is hoped that the results of the voice recognition examination can scientifically show the ownership of the voice in the recording. Based on the results of the overall analysis of the sound recordings of evidence and comparison after carrying out various stages of analysis, the voice recordings are "not identical" from the same person. The thing that causes the inequality in voice identification is the difference in intonation or tone of the subject's speech when the voice is recorded.


2021 ◽  
Vol 15 (1) ◽  
pp. 41-47
Author(s):  
Sunardi Sunardi ◽  
Imam Riadi ◽  
Rusydi Umar ◽  
Muhammad Fauzan Gustafi

Audio is one of the digital items that can reveal a happened case. However, audio evidence can also be manipulated and changed to hide information. Forensics audio is a technique to identify the sound’s owner from the audio using pitch, formant, and spectrogram parameters. The conducted research examines the similarity of the original sound with the manipulated voice to determine the owner of the sound. It analyzes the level of similarity or identical sound using spectrogram analysis with the Digital Forensics Research Workshop (DFRWS) Method. The research objects are original and manipulated files. Both files are in mp3 format, which is encoded to WAV format. Then, the live forensics method is used by picking up the data on a smartphone. Several applications are also used. The results show that the research successfully gets digital evidence on a smartphone with the Oxygen Forensic application. It extracts digital evidence in the form of two audio files and two video files. Then, by the hashing process, the four obtained files are proven to be authentic. Around 90% of the data are identical to the original voice recording. Only 10% of the data are not identical.


IEEE Access ◽  
2021 ◽  
pp. 1-1
Author(s):  
Mustafa Qamhan ◽  
Hamdi Altaheri ◽  
Ali Hamid Meftah ◽  
Ghulam Muhammad ◽  
Yousef A. Alotaibi

2020 ◽  
Vol 12 (3) ◽  
pp. 45-57
Author(s):  
Biaoli Tao ◽  
Rangding Wang ◽  
Diqun Yan ◽  
Chao Jin

The widespread availability of audio editing software has made it easy to create acoustically convincing digital audio forgeries. To address this problem, more and more attention has been paid to the field of digital audio forensics. There has been little work, however, in the field of anti-forensics, which seeks to develop a set of techniques designed to fool current forensic methodologies. The compression history of an audio sample can be used to provide evidence of audio forgeries. In this work, we present a simple method for distinguishing the MP3 compression history of an audio sample. We show the proposed anti-forensics method to remove the artifacts of MP3 double compression by destroying the audio frame structure. In addition, effectiveness of the proposed method is verified by three double compression detection methods. The experimental results show that the proposed method can effectively resist detection from three methods.


Author(s):  
Xinchao Huang ◽  
Zihan Liu ◽  
Wei Lu ◽  
Hongmei Liu ◽  
Shijun Xiang

Detecting digital audio forgeries is a significant research focus in the field of audio forensics. In this article, the authors focus on a special form of digital audio forgery—copy-move—and propose a fast and effective method to detect doctored audios. First, the article segments the input audio data into syllables by voice activity detection and syllable detection. Second, the authors select the points in the frequency domain as feature by applying discrete Fourier transform (DFT) to each audio segment. Furthermore, this article sorts every segment according to the features and gets a sorted list of audio segments. In the end, the article merely compares one segment with some adjacent segments in the sorted list so that the time complexity is decreased. After comparisons with other state of the art methods, the results show that the proposed method can identify the authentication of the input audio and locate the forged position fast and effectively.


Author(s):  
Rashmika Kiran Patole ◽  
Priti Paresh Rege

The field of audio forensics has seen a huge advancement in recent years with an increasing number of techniques used for the analysis of the audio recordings submitted as evidence in legal investigations. Audio forensics involves authentication of the evidentiary audio recordings, which is an important procedure to verify the integrity of audio recordings. This chapter focuses two audio authentication procedures, namely acoustic environment identification and tampering detection. The authors provide a framework for the above-mentioned procedures discussing in detail the methodology and feature sets used in the two tasks. The main objective of this chapter is to introduce the readers to different machine learning algorithms that can be used for environment identification and forgery detection. The authors also provide some promising results that prove the utility of machine learning algorithms in this interesting field.


Sign in / Sign up

Export Citation Format

Share Document