Abstract

One of the key forensics topics has been the detection of speech forgeries, mostly using real evidence in court. The transmission of digital speech recording data over several media exposes the data to the risk of being attacked or tampered with. Several people misuse the audio by altering that using editing software, such as Adobe, Audition CC, etc., which results in speech forgeries. So, to overcome these scenarios speech forgery detection method is deployed. A speech forgery detection method for splicing is implemented in this paper. Firstly, voiced segments are identified in the speech signal and calculated Mel Frequency Cepstral Coefficients (MFCC). These coefficients are considered as features and are stored in the database for the registered speakers. Similarly, features are calculated for each voiced segment of test signals and compared those features with the database by using dynamic time warping. This proposed method is tested on 225 original speech signals that are recorded in two different environments using two different microphones. By combining original recordings of two distinct speakers, a forged dataset of 4900 spliced speech signals is developed to test the efficacy of the developed method. An accuracy of 99.39% was attained and is superior to other existing methods.

Keywords

Speech Splicing Detection, Voice Activity Detection (VAD), MFCC, Dynamic time warping (DTW),

Downloads

Download data is not yet available.

References

  1. V.L. Narla, G. Suresh, A.K. Sahu, M. Kollati, (2024) A Watermark Challenge: Synthetic Speech Detection. Multimedia Watermarking, Springer, Singapore. https://doi.org/10.1007/978-981-99-9803-6_5
  2. K.V. Satya, A.K. Gogoi, G. Sahu, (2011). Regressive linear prediction with doublet for speech signals. In 2011 IEEE International Conference on Control System, Computing and Engineering, IEEE, Malaysia. https://doi.org/10.1109/ICCSCE.2011.6190491
  3. G. Suresh, C.S. Rao, Copy move forgery detection through differential excitation component-based texture features. International Journal of Digital Crime and Forensics (IJDCF), 12(3), (2020) 27–44. https://doi.org/10.4018/IJDCF.2020070103
  4. S. Panda, M. Mishra, (2018) Passive techniques of digital image forgery detection: developments and challenges. In Advances in Electronics, Communication and Computing: ETAEERE-2016. Springer, Singapore. https://doi.org/10.1007/978-981-10-4765-7_29
  5. M. Imran, Z. Ali, S.T. Bakhsh, S. AkramBlind detection of copy-move forgery in digital audio forensics. IEEE Access, 5, (2017) 12843-12855. https://doi.org/10.1109/ACCESS.2017.2717842
  6. N.V. Lalitha, C. Srinivasa Rao, P.V.Y. JayaSree, Localization of copy-move forgery in speech signals through watermarking using DCT-QIM. Intl Journal of Electronics and Telecommunications, 65(3), (2019) 527–532. https://doi.org/10.24425/ijet.2019.129809
  7. V.L. Narla, S. Gulivindala, S.R. Chanamallu, D.P. Gangwar, BCH encoded robust and blind audio watermarking with tamper detection using hash. Multimedia Tools and Applications, 80(21–23), (2021) 32925–32945. https://doi.org/10.1007/s11042-021-11370-5
  8. Q. Yan, R. Yang, J. Huang, Robust copy-move detection of speech recording using similarities of pitch and formant. IEEE Transactions on Information Forensics and Security, 14(9), (2019) 2331–2341. https://doi.org/10.1109/TIFS.2019.2895965
  9. G. Suresh, V.L. Narla, D.P. Gangwar, A.K. Sahu, False-Positive-Free SVD Based Audio Watermarking with Integer Wavelet Transform. Circuits, Systems, and Signal Processing, 41(9), (2022) 5108–5133. https://doi.org/10.1007/s00034-022-02023-5
  10. F. Chen, H.J. He, H.X. Wang, (2008) A fragile watermarking scheme for audio detection and recovery. Congress on Image and Signal Processing, IEEE, China. https://doi.org/10.1109/CISP.2008.298
  11. Z. Liu, H. Wang, A novel speech content authentication algorithm based on Bessel–Fourier moments. Digital Signal Processing, 24, (2014) 197–208. https://doi.org/10.1016/j.dsp.2013.09.007
  12. S. Sarreshtedari, M.A. Akhaee, A. Abbasfar, a Watermarking Method for Digital Speech Self-Recovery. IEEE/ACM Transactions on Audio, Speech, and Language Processing, 23(11), (2015) 1917–1925. https://doi.org/10.1109/TASLP.2015.2456431
  13. S. Wang, R. Miyauchi, M. Unoki, Tampering Detection Scheme for Speech Signals using Formant Enhancement Based Watermarking. Journal of Information Hiding and Multimedia Signal Processing, 6(6), (2015) 1264–1283.
  14. J. Karnjana, K. Galajit, P. Aimmanee, C. Wutiwiwatchai, M. Unoki, Speech Watermarking Scheme Based on Singular-Spectrum Analysis for Tampering Detection and Identification. 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), IEEE, Malaysia. https://doi.org/10.1109/APSIPA.2017.8282027
  15. P.M.G.I. Reis, J.P.C.L. Da Costa, R.K. Miranda, G. Del Galdo, ESPRIT-Hilbert-Based Audio Tampering Detection with SVM Classifier for Forensic Analysis via Electrical Network Frequency. IEEE Transactions on Information Forensics and Security, 12(4), (2017) 853–864. https://doi.org/10.1109/TIFS.2016.2636095
  16. A. Kaur, M.K. Dutta, High Embedding Capacity and Robust Audio Watermarking for Secure Transmission Using Tamper Detection. ETRI Journal, 40(1), (2018) 133–145. https://doi.org/10.4218/etrij.2017-0092
  17. V.A. Nita, A. Ciobanu, Tic-Tac, (2018) Forgery Time Has Run-Up! Live Acoustic Watermarking for Integrity Check in Forensic Applications. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), IEEE, Canada. https://doi.org/10.1109/ICASSP.2018.8461538
  18. X. Chen, W. Yuan, S. Wang, C. Wang, L. Wang, Speech Watermarking for Tampering Detection Based on Modifications to LSFs. Mathematical Problems in Engineering Mathematical Problems in Engineering, 2019, (2019). https://doi.org/10.1155/2019/7285624
  19. C. Shi, X. Li, H. Wang, A novel integrity authentication algorithm based on perceptual speech hash and learned dictionaries. IEEE Access, 8, (2020) 22249–22265. https://doi.org/10.1109/ACCESS.2020.2970093
  20. J. Chen, S. Xiang, W. Liu, H. Huang, Exposing digital audio forgeries in time domain by using singularity analysis with wavelets. In First ACM workshop on Information hiding and multimedia security, (2013) 149–158. https://doi.org/10.1145/2482513.2482516
  21. J. Chen, S. Xiang, H. Huang, W. Liu, Detecting and locating digital audio forgeries based on singularity analysis with wavelet packet. Multimedia Tools and Applications, 75(4), (2016) 2303–2325. https://doi.org/10.1007/s11042-014-2406-3
  22. H. Zhao, Y. Chen, R. Wang, H. Malik, Audio splicing detection and localization using environmental signature. Multimedia Tools and Applications, 76(12), (2017) 13897–13927. https://doi.org/10.1007/s11042-016-3758-7
  23. H. Zhao, Y. Chen, R. Wang, H. Malik, Audio source authentication and splicing detection using acoustic environmental signature. ACM Information Hiding and Multimedia Security Workshop, 2014, (2014) 159–164. https://doi.org/10.1145/2600918.2600933
  24. S. K. Rouniyar, Y. Yingjuan, Y. Hu, Channel response based multi-feature audio splicing forgery detection and localization. in International Conference on EBusiness, Information Management and Computer Science, Hong Kong, (2018) 46–53. https://doi.org/10.1145/3210506.3210515
  25. A. Ciobanu, V.A. Nita, V. Popa, (2018) Forgery detection based on reverberation time estimation in multiple bands. in 2018 13th International Symposium on Electronics and Telecommunications, ISETC 2018 - Conference Proceedings, Romania. https://doi.org/10.1109/ISETC.2018.8583961
  26. X. Meng, C. Li, L. Tian, Detecting audio splicing forgery algorithm based on local noise level estimation. In 2018 5th international conference on systems and informatics (ICSAI) (2018), IEEE, China. https://doi.org/10.1109/ICSAI.2018.8599318
  27. D.P. Gangwar, A. Pathania, M. DFSS, Authentication of digital audio recording using file’s signature and metadata properties. International Journal of Engineering Applied Sciences and Technology, 5(3), (2020)162-165.
  28. B. Ustubioglu, G. Tahaoglu, G. Ulutas, Detection of audio copy-move-forgery with novel feature matching on Mel spectrogram. Expert Systems with Applications, 213, (2023) 118963. https://doi.org/10.1016/j.eswa.2022.118963
  29. Z. Su, M. Li, G. Zhang, Q. Wu, Y. Wang, Robust audio copy-move forgery detection on short forged slices using sliding window. Journal of Information Security and Applications, 75, (2023) 103507. https://doi.org/10.1016/j.jisa.2023.103507
  30. E. Chuangsuwanich, S. Cyphers, J. Glass, S. Teller, (2010) Spoken command of large mobile robots in outdoor environments. IEEE Spoken Language Technology Workshop, IEEE, USA. https://doi.org/10.1109/SLT.2010.5700869
  31. Y. K. Bharath, S. Veena, K. V. Nagalakshmi, M. Darshan, R. Nagapadma, (2016) Development of robust VAD schemes for Voice Operated Switch application in aircrafts: Comparison of real-time VAD schemes which are based on Linear Energy-based Detector, Fuzzy Logic and Artificial Neural Networks. In 2016 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT), IEEE, India. https://doi.org/10.1109/ICATCCT.2016.7911990
  32. D.S. Jat, A.S. Limbo, C. Singh, (2019) Voice activity detection-based home automation system for people with special needs. In Intelligent Speech Signal Processing, Academic Press.
  33. Z. Ali, M. Imran, M. Alsulaiman, An automatic digital audio authentication/forensics system. IEEE Access, 5, 2994-3007. https://doi.org/10.1109/ACCESS.2017.2672681
  34. M.K. Singh, Multimedia application for forensic automatic speaker recognition from disguised voices using MFCC feature extraction and classification techniques. Multimedia Tools and Applications, (2024) 77327–77345. https://doi.org/10.1007/s11042-024-18602-4
  35. A.K.H. Al-Ali, D. Dean, B. Senadji, V. Chandran, G.R. Naik, Enhanced forensic speaker verification using a combination of DWT and MFCC feature warping in the presence of noise and reverberation conditions. IEEE Access, 5, (2017) 15400-15413. https://doi.org/10.1109/ACCESS.2017.2728801