Document Type
Article
Publication Date
8-3-2015
Publication Title
EAI Endorsed Transactions on Security and Safety
DOI
10.4108/icst.mobimedia.2015.259141
ISSN
2032-9393
Abstract
Advanced Audio Coding (AAC), a standardized lossy compression scheme for digital audio, which was designed to be the successor of the MP3 format, generally achieves better sound quality than MP3 at similar bit rates. While AAC is also the default or standard audio format for many devices and AAC audio files may be presented as important digital evidences, the authentication of the audio files is highly needed but relatively missing. In this paper, we propose a scheme to expose tampered AAC audio streams that are encoded at the same encoding bit-rate. Specifically, we design a shift-recompression based method to retrieve the differential features between the re-encoded audio stream at each shifting and original audio stream, learning classifier is employed to recognize different patterns of differential features of the doctored forgery files and original (untouched) audio files. Experimental results show that our approach is very promising and effective to detect the forgery of the same encoding bit-rate on AAC audio streams. Our study also shows that shift recompression-based differential analysis is very effective for detection of the MP3 forgery at the same bit rate.
Recommended Citation
Liu, Qingzhong, Andrew Sung, Lei Chen, Ming Yang, Zhongxue Chen, Yanxin Liu, Jing Zhang.
2015.
"A Method to Detect AAC Audio Forgery."
EAI Endorsed Transactions on Security and Safety, 15 (6): 1-7.
doi: 10.4108/icst.mobimedia.2015.259141 source: https://eudl.eu/doi/10.4108/icst.mobimedia.2015.259141
https://digitalcommons.georgiasouthern.edu/information-tech-facpubs/39
Copyright
Copyright © 2015 Q. Liu et al., licensed to EAI.
This is an open access article distributed under the terms of the Creative Commons Attribution license, which permits unlimited use, distribution and reproduction in any medium so long as the original work is properly cited.
This article was retrieved from EAI Endorsed Transactions on Security and Safety.