On Practical Issues of Electric Network Frequency Based Audio Forensics

被引:20
作者
Hua, Guang [1 ]
Bi, Guoan [2 ]
Thing, Vrizlynn L. L. [3 ]
机构
[1] Wuhan Univ, Sch Elect Informat, Wuhan 430072, Hubei, Peoples R China
[2] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore 639798, Singapore
[3] Agcy Sci Technol & Res, Inst Infocomm Res, Singapore 138632, Singapore
关键词
Electric network frequency (ENF); audio forensics; audio timestamp verification; audio tampering detection; audio authentication; ENF CRITERION; RECORDINGS; AUTHENTICATION; IDENTIFICATION; TIMESTAMP; EXTRACTION; ALGORITHM; SIGNAL; TIME;
D O I
10.1109/ACCESS.2017.2647921
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The transmission frequency of power grids, i.e., electric network frequency (ENF), has become a common criterion to authenticate audio recordings during the past decade, drawing much attention from both the academic researchers and law enforcement agencies world widely. The properties of ENF enable forensic applications such as audio evidence timestamp verification and tampering detection. In this paper, based on a general review of existing works, we discuss several important practical problems and facts that have drawn less research attention or have not been formally studied, including ENF detection problems, limitations of the ENF-based tampering detection systems, and the difficulties in the ENF analysis. During ENF detection, the challenges come from not only the noise and the interference, but also the fact that audio recordings without captured ENF can still have signal components in the frequency band of interest (false positive). In ENF-based tampering detection systems, the weakness of commonly used assumptions and the limitations of several existing solutions are discussed. In addition, we reveal that in the most intensively studied ENF-based audio evidence timestamp verification, many works aiming at improving ENF estimation could only produce marginal performance improvement, while the main problems due to noise and interference remain open. All these analysis and discussions are related by a proposed big picture of ENF-based audio authentication systems. After that, we also investigate the strategies to design more reliable audio authentication systems based on the ENF, which consists of a series of research and investigation works.
引用
收藏
页码:20640 / 20651
页数:12
相关论文
共 37 条
[1]   Edit Detection in Speech Recordings via Instantaneous Electric Network Frequency Variations [J].
Andrade Esquef, Paulo Antonio ;
Apolinario, Jose Antonio, Jr. ;
Biscainho, Luiz W. P. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (12) :2314-2326
[2]   Electrical Network Frequency (ENF) Maximum-Likelihood Estimation Via a Multitone Harmonic Model [J].
Bykhovsky, D. ;
Cohen, A. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (05) :744-753
[3]  
Chai J., 2013, Audio Eng. Soc. Conv., V135, P1
[4]   Anti-Forensics and Countermeasures of Electrical Network Frequency Analysis [J].
Chuang, Wei-Hong ;
Garg, Ravi ;
Wu, Min .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (12) :2073-2088
[6]  
Cuccovillo L, 2013, IEEE INT WORKSH MULT, P177, DOI 10.1109/MMSP.2013.6659284
[7]   Extracting Electrical Network Frequency From Digital Recordings Using Frequency Demodulation [J].
Dosiek, Luke .
IEEE SIGNAL PROCESSING LETTERS, 2015, 22 (06) :691-695
[8]   New Forensic ENF Reference Database for Media Recording Authentication Based on Harmony Search Technique Using GIS and Wide Area Frequency Measurements [J].
Elmesalawy, Mahmoud M. ;
Eissa, M. M. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (04) :633-644
[9]   An Improved Discrete Fourier Transform-Based Algorithm for Electric Network Frequency Extraction [J].
Fu, Ling ;
Markham, Penn N. ;
Conners, Richard W. ;
Liu, Yilu .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (07) :1173-1181
[10]   "Seeing" ENF: Power-Signature-Based Timestamp for Digital Multimedia via Optical Sensing and Signal Processing [J].
Garg, Ravi ;
Varna, Avinash L. ;
Hajj-Ahmad, Adi ;
Wu, Min .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (09) :1417-1432