Skip to main content
Erschienen in: Cognitive Computation 4/2010

01.12.2010

Detection of Double MP3 Compression

verfasst von: Qingzhong Liu, Andrew H. Sung, Mengyu Qiao

Erschienen in: Cognitive Computation | Ausgabe 4/2010

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

MPEG-1 Audio Layer 3, more commonly referred to as MP3, is a popular audio format for consumer audio storage and a de facto standard of digital audio compression for the transfer and playback of music on digital audio players. MP3 audio forgery manipulations generally uncompress a MP3 file, tamper with the file in the temporal domain, and then compress the doctored audio file back into MP3 format. If the compression quality of doctored MP3 file is different from the quality of original MP3 file, the doctored MP3 file is said to have undergone double MP3 compression. Although double MP3 compression does not prove a malicious tampering, it is evidence of manipulation and thus may warrant further forensic analysis since, e.g., faked MP3 files can be generated by using double MP3 compression at a higher bit-rate for the second compression to claim a higher quality of the audio files. To detect double MP3 compression, in this paper, we extract the statistical features on the modified discrete cosine transform and apply a support vector machine to the extracted features for classification. Experimental results show that our designed method is highly effective for detecting faked MP3 files. Our study also indicates that the detection performance is closely related to the bit-rate of the first-time MP3 encoding and the bit-rate of the second-time MP3 encoding.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
3.
Zurück zum Zitat ISO/IEC JTC1/SC29/WG11 MPEG, IS11172-3, Information technology—coding of moving pictures and associated audio for digital storage media at up to about 1.5 Mbit/s, Part 3: Audio, 1992. ISO/IEC JTC1/SC29/WG11 MPEG, IS11172-3, Information technology—coding of moving pictures and associated audio for digital storage media at up to about 1.5 Mbit/s, Part 3: Audio, 1992.
5.
Zurück zum Zitat Bayram S, Sencar HT, Memon N. An efficient and robust method for detecting copy-move forgery. In: Proceedings of IEEE international conference on acoustics, speech, and signal processing, April 19–24, 2009. Bayram S, Sencar HT, Memon N. An efficient and robust method for detecting copy-move forgery. In: Proceedings of IEEE international conference on acoustics, speech, and signal processing, April 19–24, 2009.
6.
Zurück zum Zitat Farid H. Image forgery detection, a survey. IEEE Signal Processing Magazine, March 16–25; 2009. Farid H. Image forgery detection, a survey. IEEE Signal Processing Magazine, March 16–25; 2009.
7.
Zurück zum Zitat Fridrich J, Soukal D, Lukás J. Detection of copy move forgery in digital images. Proceedings of digital forensic research workshop, August; 2003. Fridrich J, Soukal D, Lukás J. Detection of copy move forgery in digital images. Proceedings of digital forensic research workshop, August; 2003.
8.
Zurück zum Zitat Johnson MK, Farid H. Exposing digital forgeries by detecting inconsistencies in lighting. Proceedings of 7th ACM multimedia and security workshop, pp. 1–10; (2005). Johnson MK, Farid H. Exposing digital forgeries by detecting inconsistencies in lighting. Proceedings of 7th ACM multimedia and security workshop, pp. 1–10; (2005).
9.
Zurück zum Zitat Johnson MK, Farid H. Exposing digital forgeries in complex lighting environments. IEEE Trans Inf Forensic Security 3(2):450–461; (2007). Johnson MK, Farid H. Exposing digital forgeries in complex lighting environments. IEEE Trans Inf Forensic Security 3(2):450–461; (2007).
10.
Zurück zum Zitat Lin Z, He J, Tang X, Tang C-K. Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis. Pattern Recognit. 2009;42:2492–501.CrossRef Lin Z, He J, Tang X, Tang C-K. Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis. Pattern Recognit. 2009;42:2492–501.CrossRef
11.
Zurück zum Zitat Liu Q, Sung AH, Xu J, Ribeiro B. Image complexity and feature extraction for steganalysis of LSB matching steganography. In: Proceedings of 18th international conference on pattern recognition, ICPR, No. (2), pp 267–270; (2006). Liu Q, Sung AH, Xu J, Ribeiro B. Image complexity and feature extraction for steganalysis of LSB matching steganography. In: Proceedings of 18th international conference on pattern recognition, ICPR, No. (2), pp 267–270; (2006).
12.
Zurück zum Zitat Liu Q, Sung AH. Feature mining and nuero-fuzzy inference system for steganalysis of LSB matching steganography in grayscale images. In Proceedings of 20th international joint conference on artificial intelligence (IJCAI), pp 2808–2813; (2007). Liu Q, Sung AH. Feature mining and nuero-fuzzy inference system for steganalysis of LSB matching steganography in grayscale images. In Proceedings of 20th international joint conference on artificial intelligence (IJCAI), pp 2808–2813; (2007).
13.
Zurück zum Zitat Liu Q, Sung AH, Ribeiro B, Wei M, Chen Z, Xu J. Image complexity and feature mining for steganalysis of least significant bit matching steganography. Inf Sci. 2008;178(1):21–36.CrossRef Liu Q, Sung AH, Ribeiro B, Wei M, Chen Z, Xu J. Image complexity and feature mining for steganalysis of least significant bit matching steganography. Inf Sci. 2008;178(1):21–36.CrossRef
14.
Zurück zum Zitat Liu Q, Sung AH, Chen Z, Xu J. Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images. Pattern Recognit. 2008;41(1):56–66.CrossRef Liu Q, Sung AH, Chen Z, Xu J. Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images. Pattern Recognit. 2008;41(1):56–66.CrossRef
15.
Zurück zum Zitat Liu Q, Sung AH, Qiao M. Improved detection and evaluation for JPEG steganalysis. In: Proceedings of 17th ACM multimedia conference, Beijing, Oct. 19–24, 2009, pp 873–876; (2009). Liu Q, Sung AH, Qiao M. Improved detection and evaluation for JPEG steganalysis. In: Proceedings of 17th ACM multimedia conference, Beijing, Oct. 19–24, 2009, pp 873–876; (2009).
16.
Zurück zum Zitat Liu Q, Sung AH, Qiao M. Novel feature mining for audio steganlysis. In: Proceedings of 17th ACM multimedia conference, Beijing, Oct. 19–24, 2009, pp 95–104; (2009). Liu Q, Sung AH, Qiao M. Novel feature mining for audio steganlysis. In: Proceedings of 17th ACM multimedia conference, Beijing, Oct. 19–24, 2009, pp 95–104; (2009).
17.
Zurück zum Zitat Liu Q, Sung AH, Qiao M. Temporal derivative based spectrum and mel-cepstrum audio steganalysis. IEEE Trans Inf Forensic Security. 2009;4(3):359–68.CrossRef Liu Q, Sung AH, Qiao M. Temporal derivative based spectrum and mel-cepstrum audio steganalysis. IEEE Trans Inf Forensic Security. 2009;4(3):359–68.CrossRef
18.
Zurück zum Zitat Liu Q, Sung AH, Qiao M, Chen Z, Ribeiro B. An improved approach to steganalysis of JPEG images. Inf Sci. 2010;180(9):1643–55.CrossRef Liu Q, Sung AH, Qiao M, Chen Z, Ribeiro B. An improved approach to steganalysis of JPEG images. Inf Sci. 2010;180(9):1643–55.CrossRef
19.
Zurück zum Zitat Lukas J, Fridrich J, Goljan M. Digital camera identification from sensor pattern noise. IEEE Trans Inf Forensic Security. 2006;1(2):205–14.CrossRef Lukas J, Fridrich J, Goljan M. Digital camera identification from sensor pattern noise. IEEE Trans Inf Forensic Security. 2006;1(2):205–14.CrossRef
20.
Zurück zum Zitat Mahdian B, Saic S. Blind authentication using periodic properties of interpolation. IEEE Trans Inf Forensic Security. 2008;3(3):529–38.CrossRef Mahdian B, Saic S. Blind authentication using periodic properties of interpolation. IEEE Trans Inf Forensic Security. 2008;3(3):529–38.CrossRef
21.
Zurück zum Zitat Popescu AC, Farid H. Exposing digital forgeries by detecting traces of re-sampling. IEEE Trans Signal Process. 2005;53(2):758–67.CrossRef Popescu AC, Farid H. Exposing digital forgeries by detecting traces of re-sampling. IEEE Trans Signal Process. 2005;53(2):758–67.CrossRef
22.
Zurück zum Zitat Qiao M, Sung AH, Liu Q. Steganalysis of MP3 Stegos. Proceedings of 22nd international joint conference on neural network, pp 2566–2571; (2009). Qiao M, Sung AH, Liu Q. Steganalysis of MP3 Stegos. Proceedings of 22nd international joint conference on neural network, pp 2566–2571; (2009).
23.
Zurück zum Zitat Vapnik VN. Statistical learning theory. New York: Wiley; 1998. Vapnik VN. Statistical learning theory. New York: Wiley; 1998.
24.
Zurück zum Zitat Yang R, Qu Z, Huang J. Detecting digital audio forgeries by checking frame offsets. MM&Sec 2008: 21–26; (2008). Yang R, Qu Z, Huang J. Detecting digital audio forgeries by checking frame offsets. MM&Sec 2008: 21–26; (2008).
25.
Zurück zum Zitat Yang R, Shi YQ, Huang J. Defeating fake-quality MP3. MM&Sec 2009: 117–124; (2009). Yang R, Shi YQ, Huang J. Defeating fake-quality MP3. MM&Sec 2009: 117–124; (2009).
Metadaten
Titel
Detection of Double MP3 Compression
verfasst von
Qingzhong Liu
Andrew H. Sung
Mengyu Qiao
Publikationsdatum
01.12.2010
Verlag
Springer-Verlag
Erschienen in
Cognitive Computation / Ausgabe 4/2010
Print ISSN: 1866-9956
Elektronische ISSN: 1866-9964
DOI
https://doi.org/10.1007/s12559-010-9045-4

Weitere Artikel der Ausgabe 4/2010

Cognitive Computation 4/2010 Zur Ausgabe

Premium Partner