{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T05:57:08Z","timestamp":1726207028838},"reference-count":37,"publisher":"IGI Global","issue":"1","license":[{"start":{"date-parts":[[2022,6,10]],"date-time":"2022-06-10T00:00:00Z","timestamp":1654819200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/deed.en_US"},{"start":{"date-parts":[[2022,6,10]],"date-time":"2022-06-10T00:00:00Z","timestamp":1654819200000},"content-version":"am","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/deed.en_US"},{"start":{"date-parts":[[2022,6,10]],"date-time":"2022-06-10T00:00:00Z","timestamp":1654819200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/deed.en_US"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,10]]},"abstract":"

This paper proposes an audio tampering detection method based on the ENF phase and BI-LSTM network from the perspective of temporal feature representation learning. First, the ENF phase is obtained by discrete Fourier transform of ENF component in audio. Second, the ENF phase is divided into frames to obtain ENF phase sequence characterization, and each frame is represented as the change information of the ENF phase in a period. Then, the BI-LSTM neural network is used to train and output the state of each time step, and the difference information between real audio and tampered audio is obtained. Finally, these differences were fitted and dimensionally reduced by the fully connected network and classified by the Softmax classifier. Experimental results show that the performance of this method is better than the state-of-the-art approaches.<\/p>","DOI":"10.4018\/ijdcf.302894","type":"journal-article","created":{"date-parts":[[2022,5,5]],"date-time":"2022-05-05T01:50:47Z","timestamp":1651715447000},"page":"1-19","source":"Crossref","is-referenced-by-count":11,"title":["Audio Tampering Forensics Based on Representation Learning of ENF Phase Sequence"],"prefix":"10.4018","volume":"14","author":[{"given":"Chunyan","family":"Zeng","sequence":"first","affiliation":[{"name":"Hubei University of Technology, China"}]},{"given":"Yao","family":"Yang","sequence":"additional","affiliation":[{"name":"Hubei University of Technology, China"}]},{"given":"Zhifeng","family":"Wang","sequence":"additional","affiliation":[{"name":"Central China Normal University, China"}]},{"given":"Shuai","family":"Kong","sequence":"additional","affiliation":[{"name":"Hubei University of Technology, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-4855-063X","authenticated-orcid":true,"given":"Shixiong","family":"Feng","sequence":"additional","affiliation":[{"name":"Hubei University of Technology, China"}]}],"member":"2432","reference":[{"key":"IJDCF.302894-0","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS49906.2020.9360900"},{"key":"IJDCF.302894-1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-014-2406-3"},{"key":"IJDCF.302894-2","unstructured":"Chowdhury, D. (2019). Location forensics analysis using enf sequences extracted from power and audio recordings. https:\/\/arxiv.org\/abs\/1912.09428"},{"key":"IJDCF.302894-3","doi-asserted-by":"publisher","DOI":"10.1558\/ijsll.v16i2.193"},{"key":"IJDCF.302894-4","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2363524"},{"key":"IJDCF.302894-5","doi-asserted-by":"publisher","DOI":"10.1558\/sll.2005.12.1.63"},{"key":"IJDCF.302894-6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2837645"},{"key":"IJDCF.302894-7"},{"key":"IJDCF.302894-8","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2018.8630786"},{"key":"IJDCF.302894-9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2321228"},{"key":"IJDCF.302894-10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3099697"},{"key":"IJDCF.302894-11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2952264"},{"key":"IJDCF.302894-12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2516824"},{"key":"IJDCF.302894-13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2717842"},{"key":"IJDCF.302894-14","doi-asserted-by":"publisher","DOI":"10.1049\/sil2.12039"},{"key":"IJDCF.302894-15","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2016.07.015"},{"key":"IJDCF.302894-16","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2016.2571999"},{"key":"IJDCF.302894-17","doi-asserted-by":"publisher","DOI":"10.1109\/ICSAI.2018.8599318"},{"key":"IJDCF.302894-18","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-014-0007-7"},{"key":"IJDCF.302894-19","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2012.6288260"},{"key":"IJDCF.302894-20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3073786"},{"key":"IJDCF.302894-21","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2636095"},{"key":"IJDCF.302894-22","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2051270"},{"key":"IJDCF.302894-23","doi-asserted-by":"publisher","DOI":"10.1109\/ICAI52203.2021.9445259"},{"key":"IJDCF.302894-24","doi-asserted-by":"publisher","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData-Cybermatics50389.2020.00056"},{"key":"IJDCF.302894-25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-57811-4_38"},{"key":"IJDCF.302894-26","doi-asserted-by":"publisher","DOI":"10.1109\/ICWAPR.2018.8521378"},{"key":"IJDCF.302894-27","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2018.10.003"},{"key":"IJDCF.302894-28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2909919"},{"key":"IJDCF.302894-29","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2900935"},{"key":"IJDCF.302894-30","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2895965"},{"key":"IJDCF.302894-31","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2707060"},{"key":"IJDCF.302894-32","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-4277-2"},{"key":"IJDCF.302894-33","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLC.2018.8526953"},{"key":"IJDCF.302894-34","doi-asserted-by":"publisher","DOI":"10.1108\/IJWIS-06-2020-0038"},{"key":"IJDCF.302894-35","doi-asserted-by":"publisher","DOI":"10.1186\/s13634-021-00763-1"},{"key":"IJDCF.302894-36","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2017.06.001"}],"container-title":["International Journal of Digital Crime and Forensics"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=302894","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,16]],"date-time":"2023-01-16T22:50:49Z","timestamp":1673909449000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJDCF.302894"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2022,6,10]]},"references-count":37,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1]]}},"URL":"https:\/\/doi.org\/10.4018\/ijdcf.302894","relation":{},"ISSN":["1941-6210","1941-6229"],"issn-type":[{"value":"1941-6210","type":"print"},{"value":"1941-6229","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6,10]]}}}