Discriminative Component Analysis Enhanced Feature Fusion of Electrical Network Frequency for Digital Audio Tampering Detection

被引:0
作者
Zeng, Chunyan [1 ]
Kong, Shuai [1 ]
Wang, Zhifeng [2 ]
Li, Kun [1 ]
Zhao, Yuhao [1 ]
Wan, Xiangkui [1 ]
Chen, Yunfan [1 ]
机构
[1] Hubei Univ Technol, Hubei Key Lab High Efficiency Utilizat Solar Energ, Nanli Rd, Wuhan 430068, Peoples R China
[2] Cent China Normal Univ, Dept Digital Media Technol, Luoyu Rd, Wuhan 430079, Peoples R China
基金
中国国家自然科学基金;
关键词
Audio forensics; ENF; Deep random forest; Curve fitting; COPY-MOVE DETECTION; RECOGNITION; RECORDINGS;
D O I
10.1007/s00034-024-02787-y
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Research in the domain of digital audio tampering detection has advanced significantly with the use of Electrical Network Frequency (ENF) analysis, presenting notable benefits for crime prevention and the enhancement of judicial integrity. However, the existing methodologies, particularly those analyzing ENF phase and frequency, are impeded by data clutter, redundancy, and incompatibilities with standard classification algorithms, leading to decreased detection efficacy. This study proposes a novel methodology employing Discriminant Component Analysis (DCA) for the fusion of ENF features, aiming to address these issues directly. By analyzing the distinct characteristics of ENF phase and frequency spectra, our approach uses DCA to merge these features effectively. This fusion not only amplifies the correlation between the features of phase and frequency but also simplifies the feature space through efficient dimensionality reduction. Additionally, to bridge the gap with traditional classification methods, we introduce a cascaded deep random forest algorithm, designed for intricate representational learning of the fused features. This sequential processing enhances the precision of our classification model significantly. Experimental results on both the Carioca and New Spanish public datasets demonstrate that our approach surpasses current state-of-the-art methods in terms of accuracy and robustness, establishing its superiority in the field of digital audio tampering detection. By integrating the DCA algorithm to accentuate feature uniqueness and maximize inter-feature correlation, alongside advanced representational learning via the deep random forest algorithm, our methodology markedly improves the accuracy of digital audio tampering detection.
引用
收藏
页码:7173 / 7201
页数:29
相关论文
共 50 条
  • [11] Detection of Electric Network Frequency in Audio Recordings-From Theory to Practical Detectors
    Hua, Guang
    Liao, Han
    Wang, Qingyi
    Zhang, Haijian
    Ye, Dengpan
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 236 - 248
  • [12] On Practical Issues of Electric Network Frequency Based Audio Forensics
    Hua, Guang
    Bi, Guoan
    Thing, Vrizlynn L. L.
    [J]. IEEE ACCESS, 2017, 5 : 20640 - 20651
  • [13] DIGITAL AUDIO FORENSICS USING BACKGROUND NOISE
    Ikram, Sohaib
    Malik, Hafiz
    [J]. 2010 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO (ICME 2010), 2010, : 106 - 110
  • [14] Jadhav S., 2019, INT CONF COMPUT, P1, DOI DOI 10.1109/icccnt45670.2019.8944345
  • [15] The Average Direct Current Offset Values for Small Digital Audio Recorders in an Acoustically Consistent Environment
    Koenig, Bruce E.
    Lacey, Douglas S.
    [J]. JOURNAL OF FORENSIC SCIENCES, 2014, 59 (04) : 960 - 966
  • [16] Kraetzer C, 2007, MM&SEC'07: PROCEEDINGS OF THE MULTIMEDIA & SECURITY WORKSHOP 2007, P63
  • [17] Lin XD, 2017, INT CONF ACOUST SPEE, P2142, DOI 10.1109/ICASSP.2017.7952535
  • [18] Exposing speech tampering via spectral phase analysis
    Lin, Xiaodan
    Kang, Xiangui
    [J]. DIGITAL SIGNAL PROCESSING, 2017, 60 : 63 - 74
  • [19] Fast Copy-Move Detection of Digital Audio
    Liu, Zihan
    Lu, Wei
    [J]. 2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 625 - 629
  • [20] Acoustic Environment Identification and Its Applications to Audio Forensics
    Malik, Hafiz
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (11) : 1827 - 1837