Skip to main content
Top
Published in: Cognitive Computation 4/2010

01-12-2010

Detection of Double MP3 Compression

Authors: Qingzhong Liu, Andrew H. Sung, Mengyu Qiao

Published in: Cognitive Computation | Issue 4/2010

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

MPEG-1 Audio Layer 3, more commonly referred to as MP3, is a popular audio format for consumer audio storage and a de facto standard of digital audio compression for the transfer and playback of music on digital audio players. MP3 audio forgery manipulations generally uncompress a MP3 file, tamper with the file in the temporal domain, and then compress the doctored audio file back into MP3 format. If the compression quality of doctored MP3 file is different from the quality of original MP3 file, the doctored MP3 file is said to have undergone double MP3 compression. Although double MP3 compression does not prove a malicious tampering, it is evidence of manipulation and thus may warrant further forensic analysis since, e.g., faked MP3 files can be generated by using double MP3 compression at a higher bit-rate for the second compression to claim a higher quality of the audio files. To detect double MP3 compression, in this paper, we extract the statistical features on the modified discrete cosine transform and apply a support vector machine to the extracted features for classification. Experimental results show that our designed method is highly effective for detecting faked MP3 files. Our study also indicates that the detection performance is closely related to the bit-rate of the first-time MP3 encoding and the bit-rate of the second-time MP3 encoding.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
3.
go back to reference ISO/IEC JTC1/SC29/WG11 MPEG, IS11172-3, Information technology—coding of moving pictures and associated audio for digital storage media at up to about 1.5 Mbit/s, Part 3: Audio, 1992. ISO/IEC JTC1/SC29/WG11 MPEG, IS11172-3, Information technology—coding of moving pictures and associated audio for digital storage media at up to about 1.5 Mbit/s, Part 3: Audio, 1992.
5.
go back to reference Bayram S, Sencar HT, Memon N. An efficient and robust method for detecting copy-move forgery. In: Proceedings of IEEE international conference on acoustics, speech, and signal processing, April 19–24, 2009. Bayram S, Sencar HT, Memon N. An efficient and robust method for detecting copy-move forgery. In: Proceedings of IEEE international conference on acoustics, speech, and signal processing, April 19–24, 2009.
6.
go back to reference Farid H. Image forgery detection, a survey. IEEE Signal Processing Magazine, March 16–25; 2009. Farid H. Image forgery detection, a survey. IEEE Signal Processing Magazine, March 16–25; 2009.
7.
go back to reference Fridrich J, Soukal D, Lukás J. Detection of copy move forgery in digital images. Proceedings of digital forensic research workshop, August; 2003. Fridrich J, Soukal D, Lukás J. Detection of copy move forgery in digital images. Proceedings of digital forensic research workshop, August; 2003.
8.
go back to reference Johnson MK, Farid H. Exposing digital forgeries by detecting inconsistencies in lighting. Proceedings of 7th ACM multimedia and security workshop, pp. 1–10; (2005). Johnson MK, Farid H. Exposing digital forgeries by detecting inconsistencies in lighting. Proceedings of 7th ACM multimedia and security workshop, pp. 1–10; (2005).
9.
go back to reference Johnson MK, Farid H. Exposing digital forgeries in complex lighting environments. IEEE Trans Inf Forensic Security 3(2):450–461; (2007). Johnson MK, Farid H. Exposing digital forgeries in complex lighting environments. IEEE Trans Inf Forensic Security 3(2):450–461; (2007).
10.
go back to reference Lin Z, He J, Tang X, Tang C-K. Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis. Pattern Recognit. 2009;42:2492–501.CrossRef Lin Z, He J, Tang X, Tang C-K. Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis. Pattern Recognit. 2009;42:2492–501.CrossRef
11.
go back to reference Liu Q, Sung AH, Xu J, Ribeiro B. Image complexity and feature extraction for steganalysis of LSB matching steganography. In: Proceedings of 18th international conference on pattern recognition, ICPR, No. (2), pp 267–270; (2006). Liu Q, Sung AH, Xu J, Ribeiro B. Image complexity and feature extraction for steganalysis of LSB matching steganography. In: Proceedings of 18th international conference on pattern recognition, ICPR, No. (2), pp 267–270; (2006).
12.
go back to reference Liu Q, Sung AH. Feature mining and nuero-fuzzy inference system for steganalysis of LSB matching steganography in grayscale images. In Proceedings of 20th international joint conference on artificial intelligence (IJCAI), pp 2808–2813; (2007). Liu Q, Sung AH. Feature mining and nuero-fuzzy inference system for steganalysis of LSB matching steganography in grayscale images. In Proceedings of 20th international joint conference on artificial intelligence (IJCAI), pp 2808–2813; (2007).
13.
go back to reference Liu Q, Sung AH, Ribeiro B, Wei M, Chen Z, Xu J. Image complexity and feature mining for steganalysis of least significant bit matching steganography. Inf Sci. 2008;178(1):21–36.CrossRef Liu Q, Sung AH, Ribeiro B, Wei M, Chen Z, Xu J. Image complexity and feature mining for steganalysis of least significant bit matching steganography. Inf Sci. 2008;178(1):21–36.CrossRef
14.
go back to reference Liu Q, Sung AH, Chen Z, Xu J. Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images. Pattern Recognit. 2008;41(1):56–66.CrossRef Liu Q, Sung AH, Chen Z, Xu J. Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images. Pattern Recognit. 2008;41(1):56–66.CrossRef
15.
go back to reference Liu Q, Sung AH, Qiao M. Improved detection and evaluation for JPEG steganalysis. In: Proceedings of 17th ACM multimedia conference, Beijing, Oct. 19–24, 2009, pp 873–876; (2009). Liu Q, Sung AH, Qiao M. Improved detection and evaluation for JPEG steganalysis. In: Proceedings of 17th ACM multimedia conference, Beijing, Oct. 19–24, 2009, pp 873–876; (2009).
16.
go back to reference Liu Q, Sung AH, Qiao M. Novel feature mining for audio steganlysis. In: Proceedings of 17th ACM multimedia conference, Beijing, Oct. 19–24, 2009, pp 95–104; (2009). Liu Q, Sung AH, Qiao M. Novel feature mining for audio steganlysis. In: Proceedings of 17th ACM multimedia conference, Beijing, Oct. 19–24, 2009, pp 95–104; (2009).
17.
go back to reference Liu Q, Sung AH, Qiao M. Temporal derivative based spectrum and mel-cepstrum audio steganalysis. IEEE Trans Inf Forensic Security. 2009;4(3):359–68.CrossRef Liu Q, Sung AH, Qiao M. Temporal derivative based spectrum and mel-cepstrum audio steganalysis. IEEE Trans Inf Forensic Security. 2009;4(3):359–68.CrossRef
18.
go back to reference Liu Q, Sung AH, Qiao M, Chen Z, Ribeiro B. An improved approach to steganalysis of JPEG images. Inf Sci. 2010;180(9):1643–55.CrossRef Liu Q, Sung AH, Qiao M, Chen Z, Ribeiro B. An improved approach to steganalysis of JPEG images. Inf Sci. 2010;180(9):1643–55.CrossRef
19.
go back to reference Lukas J, Fridrich J, Goljan M. Digital camera identification from sensor pattern noise. IEEE Trans Inf Forensic Security. 2006;1(2):205–14.CrossRef Lukas J, Fridrich J, Goljan M. Digital camera identification from sensor pattern noise. IEEE Trans Inf Forensic Security. 2006;1(2):205–14.CrossRef
20.
go back to reference Mahdian B, Saic S. Blind authentication using periodic properties of interpolation. IEEE Trans Inf Forensic Security. 2008;3(3):529–38.CrossRef Mahdian B, Saic S. Blind authentication using periodic properties of interpolation. IEEE Trans Inf Forensic Security. 2008;3(3):529–38.CrossRef
21.
go back to reference Popescu AC, Farid H. Exposing digital forgeries by detecting traces of re-sampling. IEEE Trans Signal Process. 2005;53(2):758–67.CrossRef Popescu AC, Farid H. Exposing digital forgeries by detecting traces of re-sampling. IEEE Trans Signal Process. 2005;53(2):758–67.CrossRef
22.
go back to reference Qiao M, Sung AH, Liu Q. Steganalysis of MP3 Stegos. Proceedings of 22nd international joint conference on neural network, pp 2566–2571; (2009). Qiao M, Sung AH, Liu Q. Steganalysis of MP3 Stegos. Proceedings of 22nd international joint conference on neural network, pp 2566–2571; (2009).
23.
go back to reference Vapnik VN. Statistical learning theory. New York: Wiley; 1998. Vapnik VN. Statistical learning theory. New York: Wiley; 1998.
24.
go back to reference Yang R, Qu Z, Huang J. Detecting digital audio forgeries by checking frame offsets. MM&Sec 2008: 21–26; (2008). Yang R, Qu Z, Huang J. Detecting digital audio forgeries by checking frame offsets. MM&Sec 2008: 21–26; (2008).
25.
go back to reference Yang R, Shi YQ, Huang J. Defeating fake-quality MP3. MM&Sec 2009: 117–124; (2009). Yang R, Shi YQ, Huang J. Defeating fake-quality MP3. MM&Sec 2009: 117–124; (2009).
Metadata
Title
Detection of Double MP3 Compression
Authors
Qingzhong Liu
Andrew H. Sung
Mengyu Qiao
Publication date
01-12-2010
Publisher
Springer-Verlag
Published in
Cognitive Computation / Issue 4/2010
Print ISSN: 1866-9956
Electronic ISSN: 1866-9964
DOI
https://doi.org/10.1007/s12559-010-9045-4

Other articles of this Issue 4/2010

Cognitive Computation 4/2010 Go to the issue

Premium Partner