Skip to main content
Log in

Detecting and locating digital audio forgeries based on singularity analysis with wavelet packet

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Audio watermarking and signature are widely used for authentication. However, these techniques will become powerless in many actual situations because of their requirement of additional information. Audio forensic techniques are necessary for digital audio. In this paper, we propose an audio forensics scheme to detect and locate speech audio forged operations in time domain (including deletion, insertion, substitution and splicing) by performing discrete wavelet packet decomposition and analyzing singularity points of audio signals. We first analyze the forged operations and find that the audio signals will often generate new singular points because of the decrease or breaking of the correlation property of those samples close to the tampering position. Then we utilize the singularity analysis based on wavelet packet and design five parameters (which is different for the sample rate of digital audio file) to propose an approach which can detect and locate audio forgeries in time domain. Finally, extensive experimental results have demonstrated that the proposed method can better achieve the goals that identify whether a given speech file has been tampered (e.g., part of the content deleted or replaced) previously and further locate the forged positions in time domain.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

References

  1. Buchhholz R, Kraetzer C, Dittmann J (2009) Microphone Classification Using Fourier Coefficients, in Proceedings of the 11th International Workshop on Information Hiding, pp 235–246, Darmstadt, Germany

  2. Chen G, Kong X, Zhong W, Wang B (2012) Detection of Double MP3 Compression Based on fluctuation intensity of Quantized MDCT Coefficients, in Proceedings of CIHW, pp 164–167, Beijing, China

  3. Chen J, Xiang S, Liu W, Huang H (2013) Exposing digital audio forgeries in time domain by using singularity analysis with wavelets, in Proc. of 1st ACM workshop on Information hiding and multimedia security, pp 149–158, Montpellier, France

  4. Farid H (1999) Detecting digital forgeries using bispectral analysis. MIT AI Memo AIM-1657, MIT

  5. Fu L, Markham PN, Conners RW (2013) An Improved Discrete Fourier Transform-Based Algorithm for Electric Network Frequency Extraction. IEEE Transactions on Information Forensics and Security 8(7):1173–1181

    Article  Google Scholar 

  6. Gigoras C (2005) Digital audio recording analysis: The electric network frequency (ENF) criterion. The International Journal of Speech Language and the Law:63–76

  7. Gupta S, Cho S, Jay Kuo C-C (2012) Current developments and future trends in audio authentication. IEEE Multimed 19(2):50–59

    Article  Google Scholar 

  8. Hanil C, Ertas F (2013) Optimizing acoustic features for source cell-phone recognition using speech signals, in Proc. of Proceedings of the first ACM workshop on Information hiding and multimedia security, pp 141–148, Montpellier, France

  9. Ikram S, Malik H (2010) Digital audio forensics using background noise, in Proceedings of ICME, pp 106–110, Suntec City, Singapore

  10. Kotropoulos C (2013) Telephone handset identification using sparse representations of spectral feature sketches, in Proceedings of IWBF, pp 1–4, Lisbon, Portugal

  11. Kraetzer C, Oermann A, Dittmann J, Lang A (2007) Digital audio forensics: A first practical evaluation on microphone and environment classification, in Proceedings of the 9th workshop on Multimedia and Security, pp 63–74, Dallas, USA

  12. Luo D, Luo W, Yang R, Huang J (2012) Compression history identification for digital audio signal, in Proceedings of ICASSP, pp 1733–1736, Kyoto, Japan

  13. Liu Q, Sung AH, Qiao M (2010) Detection of Double MP3 Compression. Cognitive Computation 4(2):291–296

    Article  MATH  Google Scholar 

  14. Mallat S (1991) Zero-Crossings of a Wavelet Transform. IEEE Trans on IT 37(4):1019–1033

    Article  MathSciNet  Google Scholar 

  15. Mallat S, Hwang WL (1992) Singularity Detection and Processing with Wavelets. IEEE Trans on IT 38(2):617–643

    Article  MathSciNet  MATH  Google Scholar 

  16. Mallat S, Zhong S (1992) Characterization of signal from multiscale edges. IEEE Trans on PAMI 14(7):710–732

    Article  Google Scholar 

  17. Malik H, Farid H (2010) Audio forensics from acoustic reverberation, in Proceedings of ICASSP, pp 1710–1713, Dallas, USA

  18. Malik H, Zhao H (2012) Recording environment identification using acoustic reverberation, in Proceedings of ICASSP, pp 1833–1836, Kyoto, Japan

  19. Nicolalde DP, Apolinario JA (2009) Evaluating digital audio authenticity with spectral distances and ENF phase change, in Proceedings of ICASSP, pp 1417–1420, Taipei

  20. Nicolalde DP, Apolinario JA (2010) Audio authenticity: detecting ENF discontinuity with high precision phase analysis. IEEE Transactions on Information Forensics and Security 5(3):534–543

    Article  Google Scholar 

  21. Pan X, Zhang X, Lyu S (2012) Detecting splicing in digital audios using local noise level estimation, in Proceedings of ICASSP, pp 1841–1844, Kyoto, Japan

  22. Qi D, Xijian P (2010) Audio Tampering Detection Based on Band-Partitioning Spectral Smoothness. Applied Sciences, Electronics and Information Engineering 28(2):142–146

    Google Scholar 

  23. Qiao M, Sung AH, Liu Q (2010) Revealing Real Quality of Double Compressed MP3 Audio, in Proc. of the international conference on Multimedia, pp 1011–1014 , New York, USA

  24. Quiming Y, Peiqi C, Guorong X, Zhiqiang Y, Yunqing S (2006) Audio re-sampling detection in audio forensics based on EM algorithm. Comput Appl 26(11):2598–2601

    Google Scholar 

  25. Samet H, Erkam U, Taha SH (2013) Methods for identifying traces of compression in audio, in Proceedings of ICASSP, pp 1–6, Sharjah

  26. Shi Q, Ma X (2011) Detection of Audio Interpolation Based on Singular Value Decomposition, Awareness Science and Technology (iCAST), pp 287–290, Dalian

  27. Songnian S, Zheng H, Chen X, Shaopei S, Xu Y (2009) Research on Correlation of Digital Audio and Recording Device. Comput Eng 35(19):224–227

    Google Scholar 

  28. Yang R, Qu Z, Huang J (2008) Detecting Digital Audio Forgeries by Checking Frame Offsets, in Proceedings of 10th ACM Multimedia and Security Workshop:21–26

  29. Yang R, Qu Z, Huang J (2010) Exposing MP3 Audio Forgeries Using Frame Offsets. ACM Trans Multimed Comput Commun Appl 8(2):35:1–20

    Google Scholar 

  30. Yang R, Shi YQ, Huang J (2009) Defeating Fake-Quality MP3, in Proceedings of 11th ACM Multimedia and Security Workshop. ACM Press, New York, pp 117–124

    Google Scholar 

  31. Yang R, Shi YQ, Jiwu H (2010) Detecting double compression of audio signal, in Proceedings of SPIE 7541, Media Forensics and Security II

  32. Zhao H, Malik H (2012) Audio forensics using acoustic environment traces, in Proceedings of IEEE Statistical Processing Workshop, pp 373–376, Ann Arbor

  33. http://www.51voa.com/

  34. http://www.voxforge.org/

  35. http://www.wavsource.com/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Weiping Liu.

Additional information

This work was supported in part by NSFC (No.61272414), and in part by The University-Industry-Science Partnership Project of Guangdong Province and National Education Ministry (2012B091000155).

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chen, J., Xiang, S., Huang, H. et al. Detecting and locating digital audio forgeries based on singularity analysis with wavelet packet. Multimed Tools Appl 75, 2303–2325 (2016). https://doi.org/10.1007/s11042-014-2406-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-014-2406-3

Keywords

Navigation