skip to main content
10.1145/1288869.1288879acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
Article

Digital audio forensics: a first practical evaluation on microphone and environment classification

Published: 20 September 2007 Publication History

Abstract

In this paper a first approach for digital media forensics is presented to determine the used microphones and the environments of recorded digital audio samples by using known audio steganalysis features. Our first evaluation is based on a limited exemplary test set of 10 different audio reference signals recorded as mono audio data by four microphones in 10 different rooms with 44.1 kHz sampling rate and 16 bit quantisation. Note that, of course, a generalisation of the results cannot be achieved. Motivated by the syntactical and semantical analysis of information and in particular by known audio steganalysis approaches, a first set of specific features are selected for classification to evaluate, whether this first feature set can support correct classifications. The idea was mainly driven by the existing steganalysis features and the question of applicability within a first and limited test set. In the tests presented in this paper, an inter-device analysis with different device characteristics is performed while intra-device evaluations (identical microphone models of the same manufacturer) are not considered. For classification the data mining tool WEKA with K-means as a clustering and Naive Bayes as a classification technique are applied with the goal to evaluate their classification in regard to the classification accuracy on known audio steganalysis features. Our results show, that for our test set, the used classification techniques and selected steganalysis features, microphones can be better classified than environments. These first tests show promising results but of course are based on a limited test and training set as well a specific test set generation. Therefore additional and enhanced features with different test set generation strategies are necessary to generalise the findings.

References

[1]
C. Borgelt, H. Timm, and R. Kruse. Probabilistic networks and fuzzy clustering as generalizations of naive bayes classifiers. In B. Reusch and K. -H. Temme, editors, Computational Intelligence in Theory and Practice (Advances in Soft Computing), pages 121--138. Physica-Verlag, Heidelberg, Germany, Heidelberg, Germany, 2001.
[2]
J. Dittmann, D. Hesse, and R. Hillert. Steganography and steganalysis in Voice over IP scenarios: Operational aspects and first experiences with a new steganalysis tool set. In E. J. D. III and P. W. Wong, editors, Security, Steganography, and Watermarking of Multimedia Contents VII, Electronic Imaging Science and Technology, pages 607--618, San Jose, California, USA, 2005. SPIE and IS&T, SPIE. ISBN 0-8194-5654-3.
[3]
J. Fridrich, J. Lukas, and M. Goljan. Digital camera identification from sensor noise. In IEEE Transactions on Information Security and Forensics, June 2006, Vol. 1(2), pages 205--214. IEEE, 2006.
[4]
D. Hand, H. Mannila, and P. Smyth. Principles of Data Mining. MIT Press, Cambridge, MA, USA, 2001.
[5]
2007. Andrew Moore: K-means and Hierarchical Clustering - Tutorial Slides, http://www-2.cs.cmu.edu/ awm/tutorials/kmeans.html.
[6]
N. Khanna, A. K. Mikkilineni, A. F. Martone, G. N. Ali, G. T. -C. Chiu, J. P. Allebach, and E. J. Delp. A survey of forensic characterization methods for physical devices. In Proceedings of the 6th Digital Forensics Research Workshop (DFRWS), Lafayette, Indiana, USA, August 2006, 17--28, 2006.
[7]
C. Kraetzer and J. Dittmann. Mel-cepstrum based steganalysis for voip-steganography. In E. J. Delp and P. W. Wong, editors, Security, Steganography, and Watermarking of Multimedia Contents IX, Electronic Imaging Science and Technology, SPIE Vol. 6505, San Jose, CA, USA, 2007. SPIE and IS&T, SPIE.
[8]
C. Kraetzer, J. Dittmann, and A. Lang. Transparency benchmarking on audio watermarks and steganography. In SPIE conference, at the Security, Steganography, and Watermarking of Multimedia Contents VIII, IS&T/SPIE Symposium on Electronic Imaging, 15-19th January, 2006, San Jose, USA, 2006.
[9]
J. Lukas, J. Fridrich, and M. Goljan. Determining digital image origin using sensor imperfections. In Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents VII, IS&T/SPIE Symposium on Electronic Imaging, 16-20th January, 2005, San Jose, USA, pages 249--260, 2005.
[10]
J. B. MacQueen. Some methods for classification and analysis of multivariate observations. In Proceedings of 5-th Berkeley Symposium on Mathematical Statistics and Probability, pages 281--297. Berkeley, University of California Press, 1967.
[11]
A. Mikkilineni, O. Arslan, P. -J. Chiang, R. Kumontoy, J. Allebach, and G. -C. Chiu. Printer forensics using SVM techniques. In Proceedings of the IS&Ts NIP21: International Conference on Digital Printing Technologies, Baltimore, USA, October 2005, Vol. 21, pages 223--226, 2005.
[12]
A. K. Mikkilineni, P. -J. Chiang, G. N. Ali, G. T. C. Chiu, J. P. Allebach, and E. J. Delp. Printer identification based on graylevel co-occurrence features for security and forensic applications. In Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents VII, IS&T/SPIE Symposium on Electronic Imaging, 16-20th January, 2005, San Jose, USA, pages 430--440, 2005.
[13]
A. Oermann, A. Lang, and J. Dittmann. Verifyer-tupel for audio-forensic to determine speaker environment. In Proceedings of the ACM Multimedia and Security Workshop 2005, pages 57--62, New York, USA, 2005. ACM.
[14]
A. Oermann, C. Vielhauer, and J. Dittmann. Digitale Handschrift: Extraktion Gerätespezifischer Merkmale. In Proceedings of D-A-CH Security 2007, 2007.
[15]
A. Oermann, C. Vielhauer, and J. Dittmann. Identifying pen digitizers by statistical multimedia signal processing. In Proceedings of SPIE Electronic Imaging - Multimedia on Mobile Devices III, number SPIE Vol. 6507 in Electronic Imaging Science and Technology, San Jose, California, USA, 2007. SPIE and IS&T, SPIE.
[16]
G. T. Waters. Sound quality assessment material recordings for subjective tests. Users' handbook for the EBU - SQAM compact disc, European Broadcasting Union, Avenue Albert Lancaster 32, 1180 Bruxelles (Belgique), 1988.
[17]
2007. WEKA 3http://www.cs.waikato.ac.nz/ml/weka/.
[18]
I. H. Witten and E. Frank. Data Mining: Practical machine learning tools and techniques. Morgan Kaufmann, San Francisco, 2nd edition, 2005.

Cited By

View all
  • (2024)A Novel Car Interior Sound Classification Method based on Multileveled Local Binary Four Patterns and Iterative ReliefFTurkish Journal of Science and Technology10.55525/tjst.157184520:1(63-76)Online publication date: 23-Dec-2024
  • (2024)Detecting Forged Audio Files Using “Mixed Paste” Command: A Deep Learning Approach Based on Korean Phonemic FeaturesSensors10.3390/s2406187224:6(1872)Online publication date: 14-Mar-2024
  • (2024)A Novel Audio Forgery Detection Method Based on Short-time Power Spectral Density2024 IEEE 12th International Conference on Computer Science and Network Technology (ICCSNT)10.1109/ICCSNT62291.2024.10776625(98-102)Online publication date: 19-Oct-2024
  • Show More Cited By

Index Terms

  1. Digital audio forensics: a first practical evaluation on microphone and environment classification

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    MM&Sec '07: Proceedings of the 9th workshop on Multimedia & security
    September 2007
    260 pages
    ISBN:9781595938572
    DOI:10.1145/1288869
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 20 September 2007

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. digital media forensics
    2. multimedia authentication

    Qualifiers

    • Article

    Conference

    MM&Sec '07
    Sponsor:
    MM&Sec '07: Multimedia and Security Workshop
    September 20 - 21, 2007
    Texas, Dallas, USA

    Acceptance Rates

    Overall Acceptance Rate 128 of 318 submissions, 40%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)38
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 08 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)A Novel Car Interior Sound Classification Method based on Multileveled Local Binary Four Patterns and Iterative ReliefFTurkish Journal of Science and Technology10.55525/tjst.157184520:1(63-76)Online publication date: 23-Dec-2024
    • (2024)Detecting Forged Audio Files Using “Mixed Paste” Command: A Deep Learning Approach Based on Korean Phonemic FeaturesSensors10.3390/s2406187224:6(1872)Online publication date: 14-Mar-2024
    • (2024)A Novel Audio Forgery Detection Method Based on Short-time Power Spectral Density2024 IEEE 12th International Conference on Computer Science and Network Technology (ICCSNT)10.1109/ICCSNT62291.2024.10776625(98-102)Online publication date: 19-Oct-2024
    • (2024)Speech Audio Deepfake Detection via Convolutional Neural Networks2024 IEEE International Conference on Evolving and Adaptive Intelligent Systems (EAIS)10.1109/EAIS58494.2024.10569111(1-6)Online publication date: 23-May-2024
    • (2024)An Attack-Independent Audio Forgery Detection Technique Based on Cochleagram Images of Segments With Dynamic ThresholdIEEE Access10.1109/ACCESS.2024.340954312(82660-82675)Online publication date: 2024
    • (2024)Spatio-temporal representation learning enhanced source cell-phone recognition from speech recordingsJournal of Information Security and Applications10.1016/j.jisa.2023.10367280(103672)Online publication date: Feb-2024
    • (2024)Faked speech detection with zero prior knowledgeDiscover Applied Sciences10.1007/s42452-024-05893-36:6Online publication date: 22-May-2024
    • (2024)Discriminative Component Analysis Enhanced Feature Fusion of Electrical Network Frequency for Digital Audio Tampering DetectionCircuits, Systems, and Signal Processing10.1007/s00034-024-02787-y43:11(7173-7201)Online publication date: 26-Jul-2024
    • (2023)Non-Facial Video Spatiotemporal Forensic Analysis Using Deep Learning TechniquesProceedings of Engineering and Technology Innovation10.46604/peti.2023.1029023(01-14)Online publication date: 1-Jan-2023
    • (2023)An End-to-End Transfer Learning Framework of Source Recording Device Identification for Audio Sustainable SecuritySustainability10.3390/su15141127215:14(11272)Online publication date: 19-Jul-2023
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media