A comprehensive survey on computer forensics: State-of-the-art, tools, techniques, challenges, and future directions

AR Javed, W Ahmed, M Alazab, Z Jalil, K Kifayat… - IEEE …, 2022 - ieeexplore.ieee.org
With the alarmingly increasing rate of cybercrimes worldwide, there is a dire need to combat
cybercrimes timely and effectively. Cyberattacks on computing machines leave certain …

Shallow and deep feature fusion for digital audio tampering detection

Z Wang, Y Yang, C Zeng, S Kong, S Feng… - EURASIP Journal on …, 2022 - Springer
Digital audio tampering detection can be used to verify the authenticity of digital audio.
However, most current methods use standard electronic network frequency (ENF) databases …

Digital audio tampering detection based on deep temporal–spatial features of electrical network frequency

C Zeng, S Kong, Z Wang, K Li, Y Zhao - Information, 2023 - mdpi.com
In recent years, digital audio tampering detection methods by extracting audio electrical
network frequency (ENF) features have been widely applied. However, most digital audio …

An end-to-end transfer learning framework of source recording device identification for audio sustainable security

Z Wang, J Zhan, G Zhang, D Ouyang, H Guo - Sustainability, 2023 - mdpi.com
Source recording device identification poses a significant challenge in the field of Audio
Sustainable Security (ASS). Most existing studies on end-to-end identification of digital …

Spatial and temporal learning representation for end-to-end recording device identification

C Zeng, D Zhu, Z Wang, M Wu, W Xiong… - EURASIP Journal on …, 2021 - Springer
Deep learning techniques have achieved specific results in recording device source
identification. The recording device source features include spatial information and certain …

Squeeze-and-excitation self-attention mechanism enhanced digital audio source recognition based on transfer learning

C Zeng, Y Zhao, Z Wang, K Li, X Wan, M Liu - Circuits, Systems, and …, 2024 - Springer
Recent advances in digital audio source recognition, particularly within judicial forensics
and intellectual property rights domains, have been significantly propelled by deep learning …

Source acquisition device identification from recorded audio based on spatiotemporal representation learning with multi-attention mechanisms

C Zeng, S Feng, D Zhu, Z Wang - Entropy, 2023 - mdpi.com
Source acquisition device identification from recorded audio aims to identify the source
recording device by analyzing the intrinsic characteristics of audio, which is a challenging …

Audio tampering forensics based on representation learning of enf phase sequence

C Zeng, Y Yang, Z Wang, S Kong… - International Journal of …, 2022 - igi-global.com
This paper proposes an audio tampering detection method based on the ENF phase and BI-
LSTM network from the perspective of temporal feature representation learning. First, the …

Discriminative component analysis enhanced feature fusion of electrical network frequency for digital audio tampering detection

C Zeng, S Kong, Z Wang, K Li, Y Zhao, X Wan… - Circuits, Systems, and …, 2024 - Springer
Research in the domain of digital audio tampering detection has advanced significantly with
the use of Electrical Network Frequency (ENF) analysis, presenting notable benefits for …

POLIPHONE: A Dataset for Smartphone Model Identification from Audio Recordings

D Salvi, DU Leonzio, A Giganti, C Eutizi… - arXiv preprint arXiv …, 2024 - arxiv.org
When dealing with multimedia data, source attribution is a key challenge from a forensic
perspective. This task aims to determine how a given content was captured, providing …