Blind source computer device identification from recorded VoIP calls for forensic investigation.

The VoIP services provide fertile ground for criminal activity, thus identifying the transmitting computer devices from recorded VoIP call may help the forensic investigator to reveal useful information. It also proves the authenticity of the call recording submitted to the court as evidence. This paper extended the previous study on the use of recorded VoIP call for blind source computer device identification. Although initial results were promising but theoretical reasoning for this is yet to be found. The study suggested computing entropy of mel-frequency cepstrum coefficients (entropy-MFCC) from near-silent segments as an intrinsic feature set that captures the device response function due to the tolerances in the electronic components of individual computer devices. By applying the supervised learning techniques of naïve Bayesian, linear logistic regression, neural networks and support vector machines to the entropy-MFCC features, state-of-the-art identification accuracy of near 99.9% has been achieved on different sets of computer devices for both call recording and microphone recording scenarios. Furthermore, unsupervised learning techniques, including simple k-means, expectation-maximization and density-based spatial clustering of applications with noise (DBSCAN) provided promising results for call recording dataset by assigning the majority of instances to their correct clusters.

[1]  Richard C. Hendriks,et al.  Unbiased MMSE-Based Noise Power Estimation With Low Complexity and Low Tracking Delay , 2012, IEEE Transactions on Audio, Speech, and Language Processing.

[2]  Cemal Hanilçi,et al.  Optimizing acoustic features for source cell-phone recognition using speech signals , 2013, IH&MMSec '13.

[3]  Ömer Eskidere,et al.  Identifying acquisition devices from recorded speech signals using wavelet-based features , 2016 .

[4]  Dave Gleason Data Transformation , 2018, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..

[5]  Jana Dittmann,et al.  A context model for microphone forensics and its application in evaluations , 2011, Electronic Imaging.

[6]  Jana Dittmann,et al.  Unweighted fusion in microphone forensics using a decision tree and linear logistic regression models , 2009, MM&Sec '09.

[7]  Nor Badrul Anuar,et al.  Blind identification of source mobile devices using VoIP calls , 2014, 2014 IEEE REGION 10 SYMPOSIUM.

[8]  Hafiz Malik,et al.  Microphone Identification Using Higher-Order Statistics , 2012 .

[9]  Constantine Kotropoulos Telephone handset identification using sparse representations of spectral feature sketches , 2013, 2013 International Workshop on Biometrics and Forensics (IWBF).

[10]  Ainuddin Wahid Abdul Wahab,et al.  Blind source mobile device identification based on recorded call , 2014, Eng. Appl. Artif. Intell..

[11]  Cemal Hanilçi,et al.  Recognition of Brand and Models of Cell-Phones From Recorded Speech Signals , 2012, IEEE Transactions on Information Forensics and Security.

[12]  Douglas A. Reynolds,et al.  HTIMIT and LLHDB: speech corpora for the study of handset transducer effects , 1997, 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[13]  Constantine Kotropoulos,et al.  Telephone handset identification by feature selection and sparse representations , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[14]  Daniel Garcia-Romero,et al.  Automatic acquisition device identification from speech recordings , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[15]  Jana Dittmann,et al.  Extending a context model for microphone forensics , 2012, Other Conferences.

[16]  Homayoon Beigi,et al.  Fundamentals of Speaker Recognition , 2011 .

[17]  Tomi Kinnunen,et al.  Source cell-phone recognition from recorded speech using non-speech segments , 2014, Digit. Signal Process..

[18]  Haizhou Li,et al.  Low-Variance Multitaper MFCC Features: A Case Study in Robust Speaker Verification , 2012, IEEE Transactions on Audio, Speech, and Language Processing.

[19]  Ainuddin Wahid Abdul Wahab,et al.  Blind Source Computer Device Identification from Recorded Calls , 2015 .

[20]  Ömer Eskidere,et al.  Source microphone identification from speech recordings based on a Gaussian mixture model , 2014 .

[21]  Chih-Jen Lin,et al.  LIBSVM: A library for support vector machines , 2011, TIST.

[22]  Jana Dittmann,et al.  Digital audio forensics: a first practical evaluation on microphone and environment classification , 2007, MM&Sec.

[23]  Keikichi Hirose,et al.  On the effectiveness of MFCCs and their statistical distribution properties in speaker identification , 2004, 2004 IEEE Symposium on Virtual Environments, Human-Computer Interfaces and Measurement Systems, 2004. (VCIMS)..

[24]  Muhammad Ghulam,et al.  Environment Recognition for Digital Audio Forensics Using MPEG-7 and MEL Cepstral Features , 2011, Int. Arab J. Inf. Technol..

[25]  Yongli Ren,et al.  Identifying Microphone from Noisy Recordings by Using Representative Instance One Class-Classification Approach , 2012, J. Networks.

[26]  Jana Dittmann,et al.  Microphone Classification Using Fourier Coefficients , 2009, Information Hiding.

[27]  Constantine Kotropoulos,et al.  Automatic telephone handset identification by sparse representation of random spectral features , 2012, MM&Sec '12.

[28]  Min Wu,et al.  “Seeing” ENF: Power-Signature-Based Timestamp for Digital Multimedia via Optical Sensing and Signal Processing , 2013, IEEE Transactions on Information Forensics and Security.

[29]  Treebank Penn,et al.  Linguistic Data Consortium , 1999 .