skip to main content
research-article

Identifying Compression History of Wave Audio and Its Applications

Published:17 April 2014Publication History
Skip Abstract Section

Abstract

Audio signal is sometimes stored and/or processed in WAV (waveform) format without any knowledge of its previous compression operations. To perform some subsequent processing, such as digital audio forensics, audio enhancement and blind audio quality assessment, it is necessary to identify its compression history. In this article, we will investigate how to identify a decompressed wave audio that went through one of three popular compression schemes, including MP3, WMA (windows media audio) and AAC (advanced audio coding). By analyzing the corresponding frequency coefficients, including modified discrete cosine transform (MDCT) and Mel-frequency cepstral coefficients (MFCCs), of those original audio clips and their decompressed versions with different compression schemes and bit rates, we propose several statistics to identify the compression scheme as well as the corresponding bit rate previously used for a given WAV signal. The experimental results evaluated on 8,800 audio clips with various contents have shown the effectiveness of the proposed method. In addition, some potential applications of the proposed method are discussed.

References

  1. P. Bestagini, A. Allam, S. Milani, M. Tagliasacchi, and S. Tubaro. 2012. Video codec identification. In Proceedings of the International Conference on Acoustics, Speech and Signal Processing. 2257--2260.Google ScholarGoogle Scholar
  2. T. Bianchi, A. Rosa, and M. Fontani. 2013. Detection and classification of double compressed MP3 audio tracks. In Proceedings of the 1st ACM Workshop on Information Hiding and Multimedia Security. 159--164. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. C.-C. Chang and C.-J. Lin. 2011. LIBSVM: a library for support vector machines. ACM Trans. Intell. Syst. Technol. 2, 27:1--27:27. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. G. Chen, X. Kong, W. Zhong, and B. Wang. 2012. Detection of double mp3 compression based on fluctuation intensity of quantized MDCT coefficients. In Proceedings of the China Information Hiding and Multimedia Security Workshop. 164--167.Google ScholarGoogle Scholar
  5. Z. Fan and R. L. De Queiroz. 2003. Identification of bitmap compression history: JPEG detection and quantizer estimation. IEEE Trans. Image Process. 12, 2, 230--235. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Formatfactory. Formatfactory software - http://www.formatoz.com/.Google ScholarGoogle Scholar
  7. D. Fu, Y. Shi, and W. Su. 2007. A generalized benford's law for JPEG coefficients and its applications in image forensics. In Proceedings of SPIE on Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents. Vol. 6505.Google ScholarGoogle Scholar
  8. Goldwave. Goldwave software - http://www.goldwave.ca/.Google ScholarGoogle Scholar
  9. GTZAN. GTZAN Genre Collection - http://marsyas.info/download/data sets/.Google ScholarGoogle Scholar
  10. S. Hacker. 2000. MP3: The Definitive Guide. O'Reilly Media. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. S. Hiçsönmez, H. T. Sencar, and I. Avcibas. 2011. Audio codec identification through payload sampling. In Proceedings of the International Workshop on Information Forensics and Security. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. S. Hiçsönmez, E. Uzun, and H. T. Sencar. 2013. Methods for identifying traces of compression in audio. In Proceedings of the 1st International Conference on Communications, Signal Processing, and Their Applications. 1--6.Google ScholarGoogle Scholar
  13. F. Jenner and A. Kwasinski. 2012. Highly accurate non-intrusive speech forensics for codec identifications from observed decoded signals. In Proceedings of the International Conference on Acoustics, Speech and Signal Processing. Kyoto, 1737--1740.Google ScholarGoogle Scholar
  14. C. Kraetzer, A. Oermann, J. Dittmann, and A. Lang. 2007. Digital audio forensics: A first practical evaluation on microphone and environment classification. In Proceedings of the Workshop on Multimedia and security. 63--74. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Lame MP3 Encoder. http://sourceforge.net/projects/lame/.Google ScholarGoogle Scholar
  16. Q. Liu, A. Sung, and M. Qiao. 2010. Detection of double mp3 compression. Cognitive Comput. 2, 291--296.Google ScholarGoogle ScholarCross RefCross Ref
  17. J. Lukáš and J. Fridrich. 2003. Estimation of primary quantization matrix in double compressed JPEG images. In Proceedings of the Digital Forensic Research Workshop.Google ScholarGoogle Scholar
  18. D. Luo, W. Luo, R. Yang, and J. Huang. 2012. Compression history identification for digital audio signal. In Proceedings of the International Conference on Acoustics, Speech and Signal Processing. 1733--1736.Google ScholarGoogle Scholar
  19. W. Luo, J. Huang, and G. Qiu. 2010a. JPEG error analysis and its applications to digital image forensics. IEEE Trans. Inf. Forensics Secur. 5, 3, 480--491. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. W. Luo, Y. Wang, and J. Huang. 2010b. Detection of quantization artifacts and its applications to transform encoder identification. IEEE Trans. Inf. Forensics Secur. 5, 4, 810--815. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. H. Malik and H. Farid. 2010. Audio forensics from acoustic reverberation. In Proceedings of the International Conference on Acoustics Speech and Signal Processing. 1710--1713.Google ScholarGoogle Scholar
  22. MP3Standard. Information technology - coding of moving pictures and associated audio for digital storage media up to about 1.5 mbit/s.Google ScholarGoogle Scholar
  23. T. Painter and A. Spanias. 2000. Perceptual coding of digital audio. Proc. IEEE 88, 4, 451--515.Google ScholarGoogle ScholarCross RefCross Ref
  24. D. Pan. 1995. A tutorial on MPEG/Audio compression. IEEE Multimedia 2, 2, 60--74. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. J. P. Princen, A. W. Johnson, and A. B. Bradley. 1987. Subband/transform coding using filter bank designs based on time domain aliasing cancellation. In Proceedings of the Intenational Conference on Acoustics, Speech, and Signal Processing. 2161--2164.Google ScholarGoogle Scholar
  26. M. Qiao, A. Sung, and Q. Liu. 2010. Revealing real quality of double compressed MP3 audio. In Proceedings of the International Conference on Multimedia. 1011--1014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. D. Reynolds, T. Quatieri, and R. Dunn. 2000. Speaker verification using adapted gaussian mixture models. Digital Signal Process. 10, 1, 19--41. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. M. Tagliasacchi and S. Tubaro. 2010. Blind estimation of the QP parameter in H.264/AVC decoded video. In Proceedings of the International Workshop on Image Analysis for Multimedia Interactive Services. 1--4.Google ScholarGoogle Scholar
  29. Voicebox. http://www.ee.ic.ac.uk/hp/staff/dmb/voicebox/voicebox.html.Google ScholarGoogle Scholar
  30. R. Yang, Z. Qu, and J. Huang. 2008. Detecting digital audio forgeries by checking frame offsets. In Proceedings of the ACM Workshop on Multimedia and Security. 21--26. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. R. Yang, Y. Shi, and J. Huang. 2009. Defeating fake-quality MP3. In Proceedings of the ACM Workshop on Multimedia and Security. 117--124. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. R. Yang, Y. Shi, and J. Huang. 2010. Detecting double compression of audio signal. In Proceedings of SPIE vol. 7541, Media Forensics and Security II.Google ScholarGoogle Scholar

Index Terms

  1. Identifying Compression History of Wave Audio and Its Applications

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image ACM Transactions on Multimedia Computing, Communications, and Applications
            ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 10, Issue 3
            April 2014
            140 pages
            ISSN:1551-6857
            EISSN:1551-6865
            DOI:10.1145/2602979
            Issue’s Table of Contents

            Copyright © 2014 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 17 April 2014
            • Accepted: 1 January 2014
            • Revised: 1 July 2013
            • Received: 1 March 2013
            Published in tomm Volume 10, Issue 3

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Research
            • Refereed

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader