Storage and Authentication of Audio Footage for IoAuT Devices Using Distributed Ledger Technology

Detection of fabricated or manipulated audio content to prevent, e.g., distribution of forgeries in digital media, is crucial, especially in political and reputational contexts. Better tools for protecting the integrity of media creation are desired. Within the paradigm of the Internet of Audio Things (IoAuT), we discuss the ability of the IoAuT network to verify the authenticity of original audio using distributed ledger technology. By storing audio recordings in combination with associated recording-specific metadata obtained by the IoAuT capturing device, this architecture enables secure distribution of original audio footage, authentication of unknown audio content, and referencing of original audio material in future derivative works. By developing a proof-of-concept system, the feasibility of the proposed architecture is evaluated and discussed.

[1]  Farinaz Koushanfar,et al.  Adversarial Deepfakes: Evaluating Vulnerability of Deepfake Detectors to Adversarial Examples , 2020, ArXiv.

[2]  Radu State,et al.  Blockchain-Based, Decentralized Access Control for IPFS , 2018, 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).

[3]  Run Wang,et al.  DeepSonar: Towards Effective and Robust Detection of AI-Synthesized Fake Voices , 2020, ACM Multimedia.

[4]  Yingjie Wang,et al.  A Survey on Privacy Protection of Blockchain: The Technology and Application , 2020, IEEE Access.

[5]  Patrick Aichroth,et al.  Copy-Move Forgery Detection and Localization via Partial Audio Matching , 2019 .

[6]  JPEG White paper: Towards a Standardized Framework for Media Blockchain and Distributed Ledger Technologies , 2019 .

[7]  Robert C. Maher Principles of Forensic Audio Analysis , 2018 .

[8]  Marc Pilkington,et al.  Blockchain Technology: Principles and Applications , 2015 .

[9]  Saman K. Halgamuge,et al.  Computational Intelligence for Modelling and Prediction , 2005, Studies in Computational Intelligence.

[10]  Pedro Cano,et al.  Audio Fingerprinting: Concepts And Applications , 2005, Computational Intelligence for Modelling and Prediction.

[11]  Bin Yan,et al.  Digital Audio Watermarking: Fundamentals, Techniques and Challenges , 2017 .

[12]  Zhen Li,et al.  An Overview of Blockchain Security Analysis , 2018, CNCERT.

[13]  Muhammad Imran,et al.  An Automatic Digital Audio Authentication/Forensics System , 2017, IEEE Access.

[14]  Diego Renza,et al.  A Machine Learning Model to Detect Fake Voice , 2020, ICAI.

[15]  Daniel Patricio Nicolalde Rodríguez,et al.  Evaluating digital audio authenticity with spectral distances and ENF phase change , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.

[16]  Rich Salz,et al.  A Universally Unique IDentifier (UUID) URN Namespace , 2005, RFC.

[17]  Tian Feng,et al.  The Jpeg-Blockchain Framework For Glam Services , 2018, 2018 IEEE International Conference on Multimedia & Expo Workshops (ICMEW).

[18]  Eddy B. Brixen Techniques for the Authentication of Digital Audio Recordings , 2007 .

[19]  Frédéric Bimbot,et al.  Audio thumbnails for spoken content without transcription based on a maximum motif coverage criterion , 2014, INTERSPEECH.