Blind Detection of Copy-Move Forgery in Digital Audio Forensics

Although copy-move forgery is one of the most common fabrication techniques, blind detection of such tampering in digital audio is mostly unexplored. Unlike active techniques, blind forgery detection is challenging, because it does not embed a watermark or signature in an audio that is unknown in most of the real-life scenarios. Therefore, forgery localization becomes more challenging, especially when using blind methods. In this paper, we propose a novel method for blind detection and localization of copy-move forgery. One of the most crucial steps in the proposed method is a voice activity detection (VAD) module for investigating audio recordings to detect and localize the forgery. The VAD module is equally vital for the development of the copy-move forgery database, wherein audio samples are generated by using the recordings of various types of microphones. We employ a chaotic theory to copy and move the text in generated forged recordings to ensure forgery localization at any place in a recording. The VAD module is responsible for the extraction of words in a forged audio, and these words are analyzed by applying a 1-D local binary pattern operator. This operator provides the patterns of extracted words in the form of histograms. The forged parts (copy and move text) have similar histograms. An accuracy of 96.59% is achieved, and the proposed method is deemed robust against noise.

[1]  Marco Tagliasacchi,et al.  Audio tampering detection via microphone classification , 2013, 2013 IEEE 15th International Workshop on Multimedia Signal Processing (MMSP).

[2]  Jana Dittmann,et al.  Digital audio forensics: a first practical evaluation on microphone and environment classification , 2007, MM&Sec.

[3]  J.P. Campbell,et al.  Forensic speaker recognition , 2009, IEEE Signal Processing Magazine.

[4]  Hongbing Hu,et al.  A spectral/temporal method for robust fundamental frequency tracking. , 2008, The Journal of the Acoustical Society of America.

[5]  Didier Meuwly,et al.  Empirical validation of likelihood ratio methods – A case study in forensic speaker recognition , 2016, 2016 4th International Conference on Biometrics and Forensics (IWBF).

[6]  Zulfiqar Habib,et al.  Copy-move and splicing image forgery detection and localization techniques: a review , 2017 .

[7]  Muhammad Ghulam,et al.  KSU Speech Database: Text Selection, Recording and Verification , 2013, 2013 European Modelling Symposium.

[8]  C.-C. Jay Kuo,et al.  Current Developments and Future Trends in Audio Authentication , 2012, IEEE MultiMedia.

[9]  Hong Zhao,et al.  Audio splicing detection and localization using environmental signature , 2014, Multimedia Tools and Applications.

[10]  Didier Meuwly,et al.  The inference of identity in forensic speaker recognition , 2000, Speech Commun..

[11]  Hyeontaek Lim,et al.  Formant-Based Robust Voice Activity Detection , 2015, IEEE/ACM Transactions on Audio, Speech, and Language Processing.

[12]  Rui Yang,et al.  Copy-move detection of audio recording with pitch similarity , 2015, 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[13]  Alan J. Cooper Detecting Butt-Spliced Edits in Forensic Digital Audio Recordings , 2010 .

[14]  Jana Dittmann,et al.  Microphone Classification Using Fourier Coefficients , 2009, Information Hiding.

[15]  Eliathamby Ambikairajah,et al.  A comparison of single-stage and two-stage modelling approaches for automatic forensic speaker recognition , 2013, 2013 IEEE 8th International Conference on Industrial and Information Systems.

[16]  Huaping Zhu,et al.  Audio recorder forensic identification in 21 audio recorders , 2015, 2015 IEEE International Conference on Progress in Informatics and Computing (PIC).

[17]  Muhammad Imran,et al.  An Automatic Digital Audio Authentication/Forensics System , 2017, IEEE Access.

[18]  Yongli Ren,et al.  Identifying Microphone from Noisy Recordings by Using Representative Instance One Class-Classification Approach , 2012, J. Networks.

[19]  Mansour Alsulaiman,et al.  KSU rich Arabic speech database , 2013 .

[20]  Shijun Xiang,et al.  Detecting and locating digital audio forgeries based on singularity analysis with wavelet packet , 2014, Multimedia Tools and Applications.

[21]  Bayya Yegnanarayana,et al.  Single Frequency Filtering Approach for Discriminating Speech and Nonspeech , 2015, IEEE/ACM Transactions on Audio, Speech, and Language Processing.

[22]  Robert C. Maher Overview of Audio Forensics , 2010, Intelligent Multimedia Analysis for Security Applications.

[23]  Juliane Junker Intelligent Multimedia Analysis For Security Applications , 2016 .

[24]  Abdel-Ouahab Boudraa,et al.  Audio Watermarking Via EMD , 2013, IEEE Transactions on Audio, Speech, and Language Processing.

[25]  Ghulam Muhammad,et al.  Environment Recognition Using Selected MPEG-7 Audio Features and Mel-Frequency Cepstral Coefficients , 2010, 2010 Fifth International Conference on Digital Telecommunications.

[26]  Robert L. Devaney Fractal patterns arising in chaotic dynamical systems , 1988 .

[27]  Xing Zhang,et al.  Detecting splicing in digital audios using local noise level estimation , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[28]  William M. Campbell,et al.  Understanding Scores in Forensic Speaker Recognition , 2006, 2006 IEEE Odyssey - The Speaker and Language Recognition Workshop.