skip to main content
10.1145/3206004.3206005acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
short-paper

Identification of Audio Processing Operations Based on Convolutional Neural Network

Authors Info & Claims
Published:14 June 2018Publication History

ABSTRACT

To reduce the tampering artifacts and/or enhance audio quality, some audio processing operations are often applied in the resulting tampered audio. Like image forensics, the detection of various post processing operations has become very important for audio authentication. In this paper, we propose a convolutional neural network (CNN) to detect audio processing operations. In the proposed method, we carefully design the network architecture, with particular attention to the frequency representation for the audio input, the activation function and the depth of the network. In our experiments, we evaluate the proposed method on audio clips with 12 commonly used audio processing operations and of three different small sizes. The experimental results show that our method can significantly outperform related methods based on hand-crafted features and other CNN architectures, and can achieve state-of-the-art results for both binary and multiple classification.

References

  1. Mart'ın Abadi, Ashish Agarwal, Paul Barham, Eugene Brevdo, Zhifeng Chen, Craig Citro, Greg S Corrado, Andy Davis, Jeffrey Dean, Matthieu Devin, et almbox. . 2016. Tensorflow: Large-scale machine learning on heterogeneous distributed systems. arXiv preprint arXiv:1603.04467 (2016).Google ScholarGoogle Scholar
  2. Mauro Barni, Luca Bondi, Nicolò Bonettini, Paolo Bestagini, Andrea Costanzo, Marco Maggini, Benedetta Tondi, and Stefano Tubaro . 2017. Aligned and non-aligned double JPEG detection using convolutional neural networks. Journal of Visual Communication and Image Representation Vol. 49 (2017), 153--163. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Belhassen Bayar and Matthew C Stamm . 2016. A deep learning approach to universal image manipulation detection using a new convolutional layer. In Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security. ACM, 5--10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Belhassen Bayar and Matthew C Stamm . 2017. Design principles of convolutional neural networks for multimedia forensics. Electronic Imaging Vol. 2017, 7 (2017), 77--86.Google ScholarGoogle ScholarCross RefCross Ref
  5. Tiziano Bianchi, Alessia De Rosa, Marco Fontani, Giovanni Rocciolo, and Alessandro Piva . 2013. Detection and classification of double compressed MP3 audio tracks Proceedings of the first ACM workshop on Information hiding and multimedia security. 159--164. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Bolin Chen, Weiqi Luo, and Haodong Li . 2017. Audio Steganalysis with Convolutional Neural Network Proceedings of the ACM Workshop on Information Hiding and Multimedia Security. 85--90. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Jiansheng Chen, Xiangui Kang, Ye Liu, and Z Jane Wang . 2015. Median filtering forensics based on convolutional neural networks. IEEE Signal Processing Letters Vol. 22, 11 (2015), 1849--1853.Google ScholarGoogle ScholarCross RefCross Ref
  8. Djork-Arné Clevert, Thomas Unterthiner, and Sepp Hochreiter . 2016. Fast and accurate deep network learning by exponential linear units (ELUs) Proceedings of International Conference on Learning Representations.Google ScholarGoogle Scholar
  9. Luca Cuccovillo, Sebastian Mann, Patrick Aichroth, Marco Tagliasacchi, and Christian Dittmar . 2013 a. Blind microphone analysis and stable tone phase analysis for audio tampering detection Audio Engineering Society Convention 135.Google ScholarGoogle Scholar
  10. Luca Cuccovillo, Sebastian Mann, Marco Tagliasacchi, and Patrick Aichroth . 2013 b. Audio tampering detection via microphone classification IEEE International Workshop on Multimedia Signal Processing. 177--182.Google ScholarGoogle Scholar
  11. Hany Farid . 1999. Detecting Digital Forgeries Using Bispectral Analysis. Tech. Rep. AIM-1657, MIT AI Memo, Mass. Inst. Technol., Cambridge, MA, USA (1999). Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Catalin Grigoras . 2005. Digital audio recording analysis--the electric network frequency criterion. International Journal of Speech Language and the Law Vol. 12, 1 (2005), 63--76.Google ScholarGoogle ScholarCross RefCross Ref
  13. Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun . 2015. Delving deep into rectifiers: Surpassing human-level performance on imagenet classification. In Proceedings of the IEEE international conference on computer vision. 1026--1034. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Sohaib Ikram and Hafiz Malik . 2010. Digital audio forensics using background noise. In IEEE International Conference on Multimedia and Expo. 106--110.Google ScholarGoogle ScholarCross RefCross Ref
  15. Xiaodan Lin, Jingxian Liu, and Xiangui Kang . 2016. Audio recapture detection with convolutional neural networks. IEEE Transactions on Multimedia Vol. 18, 8 (2016), 1480--1487. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Da Luo, Mengmeng Sun, and Jiwu Huang . 2016. Audio postprocessing detection based on amplitude cooccurrence vector feature. IEEE Signal Processing Letters Vol. 23, 5 (2016), 688--692.Google ScholarGoogle ScholarCross RefCross Ref
  17. Da Luo, Rui Yang, and Jiwu Huang . 2015. Identification of AMR decompressed audio. Digital Signal Processing Vol. 37 (2015), 85--91. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Da Luo, Rui Yang, Bin Li, and Jiwu Huang . 2017. Detection of Double Compressed AMR Audio Using Stacked Autoencoder. IEEE Transactions on Information Forensics and Security Vol. 12, 2 (2017), 432--444. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Weiqi Luo, Haodong Li, Qi Yan, Yang Rui, and Jiwu Huang . {n. d.}. Improved Audio Steganalytic Feature and Its Applications in Audio Forensics. ACM Transactions on Multimedia Computing, Communications, and Applications, accepted (. {n. d.}). Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Andrew L Maas, Awni Y Hannun, and Andrew Y Ng . 2013. Rectifier nonlinearities improve neural network acoustic models Proceedings of the International conference on Machine Learning.Google ScholarGoogle Scholar
  21. Hafiz Malik and Hany Farid . 2010. Audio forensics from acoustic reverberation. In IEEE International Conference on Acoustics Speech and Signal Processing. 1710--1713.Google ScholarGoogle ScholarCross RefCross Ref
  22. Catherine Paulin, Sid-Ahmed Selouani, and Eric Hervet . 2016. Audio steganalysis using deep belief networks. International Journal of Speech Technology Vol. 19, 3 (2016), 585--591.Google ScholarGoogle ScholarCross RefCross Ref
  23. Daniel Seichter, Luca Cuccovillo, and Patrick Aichroth . 2016. AAC encoding detection and bitrate estimation using a convolutional neural network IEEE International Conference on Acoustics, Speech and Signal Processing. 2069--2073.Google ScholarGoogle Scholar
  24. Nitish Srivastava, Geoffrey E Hinton, Alex Krizhevsky, Ilya Sutskever, and Ruslan Salakhutdinov . 2014. Dropout: a simple way to prevent neural networks from overfitting. Journal of machine learning research Vol. 15, 1 (2014), 1929--1958. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Ilya Sutskever, James Martens, George Dahl, and Geoffrey Hinton . 2013. On the importance of initialization and momentum in deep learning Proceedings of the International conference on Machine Learning. 1139--1147. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Rui Yang, Yun Q Shi, and Jiwu Huang . 2010. Detecting double compression of audio signal. In Proceedings of the SPIE Media Forensics and Security II. 75410K.Google ScholarGoogle Scholar

Index Terms

  1. Identification of Audio Processing Operations Based on Convolutional Neural Network

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      IH&MMSec '18: Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security
      June 2018
      152 pages
      ISBN:9781450356251
      DOI:10.1145/3206004

      Copyright © 2018 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 14 June 2018

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • short-paper

      Acceptance Rates

      IH&MMSec '18 Paper Acceptance Rate18of40submissions,45%Overall Acceptance Rate128of318submissions,40%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader