Digital multimedia audio forensics: past, present and future

M Zakariah, MK Khan, H Malik - Multimedia tools and applications, 2018 - Springer
Digital audio forensics is used for a variety of applications ranging from authenticating audio
files to link an audio recording to the acquisition device (eg, microphone), and also linking to …

Deepsonar: Towards effective and robust detection of ai-synthesized fake voices

R Wang, F Juefei-Xu, Y Huang, Q Guo, X Xie… - Proceedings of the 28th …, 2020 - dl.acm.org
With the recent advances in voice synthesis, AI-synthesized fake voices are
indistinguishable to human ears and widely are applied to produce realistic and natural …

Digital audio forensics: microphone and environment classification using deep learning

MA Qamhan, H Altaheri, AH Meftah… - Ieee …, 2021 - ieeexplore.ieee.org
The recording device along with the acoustic environment plays a major role in digital audio
forensics. We propose an acoustic source identification system in this paper, which includes …

Shallow and deep feature fusion for digital audio tampering detection

Z Wang, Y Yang, C Zeng, S Kong, S Feng… - EURASIP Journal on …, 2022 - Springer
Digital audio tampering detection can be used to verify the authenticity of digital audio.
However, most current methods use standard electronic network frequency (ENF) databases …

Acoustic environment identification and its applications to audio forensics

H Malik - IEEE Transactions on Information Forensics and …, 2013 - ieeexplore.ieee.org
An audio recording is subject to a number of possible distortions and artifacts. Consider, for
example, artifacts due to acoustic reverberation and background noise. The acoustic …

Source acquisition device identification from recorded audio based on spatiotemporal representation learning with multi-attention mechanisms

C Zeng, S Feng, D Zhu, Z Wang - Entropy, 2023 - mdpi.com
Source acquisition device identification from recorded audio aims to identify the source
recording device by analyzing the intrinsic characteristics of audio, which is a challenging …

An end-to-end deep source recording device identification system for web media forensics

C Zeng, D Zhu, Z Wang, Z Wang, N Zhao… - International Journal of …, 2020 - emerald.com
Purpose Most source recording device identification models for Web media forensics are
based on a single feature to complete the identification task and often have the …

Sound event detection for human safety and security in noisy environments

M Neri, F Battisti, A Neri, M Carli - IEEE Access, 2022 - ieeexplore.ieee.org
The objective of a sound event detector is to recognize anomalies in an audio clip and return
their onset and offset. However, detecting sound events in noisy environments is a …

Mobile phone identification using recorded speech signals

C Kotropoulos, S Samaras - 2014 19th International …, 2014 - ieeexplore.ieee.org
In this paper, we elaborate on mobile phone identification from recorded speech signals.
The goal is to extract intrinsic traces related to the mobile phone used to record a speech …

Mobile phone clustering from speech recordings using deep representation and spectral clustering

Y Li, X Zhang, X Li, Y Zhang, J Yang… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Considerable attention has been paid to acquisition device recognition over the past decade
in the forensic community, especially in digital image forensics. In contrast, acquisition …