Robust Anti-forensics on Audio Forensics System

被引:0
|
作者
Wang, Qingqing [1 ]
Ye, Dengpan [1 ]
机构
[1] Wuhan Univ, Sch Cyber Sci & Engn, Key Lab Aerosp Informat Secur & Trusted Comp, Minist Educ, Wuhan, Peoples R China
基金
中国国家自然科学基金;
关键词
audio anti-forensics; audio compression; robustness; adversarial example; HIDING TRACES;
D O I
10.1007/978-981-99-4761-4_50
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Audio forensics systems are effective evidence to prove whether audio is real or not. Recently, there have been studies on anti-forensics technology that can deceive audio forensics systems. However, the anti-forensics technology loses its effectiveness after being compressed. In this paper, we first study the influence of known and unknown compression on audio anti-forensics technology, and enhance the robustness of audio anti-forensics technology. In this paper, the compression algorithm and compression approximation algorithm are added to the iterative process of generating anti-forensics adversarial examples to generate anti-forensics adversarial examples that can resist compression, and solve the problem that audio anti-forensics adversarial examples cannot reduce the accuracy of audio forensics system under compression. Three compression algorithms, AAC-HE, AAC-LC and MP3, as well as a pre-trained compression approximation algorithm, were added to the iterative process of generating audio anti-forensics adversarial examples to generate audio anti-forensics adversarial examples, which were uploaded and downloaded through the actual network platform (Himalaya) and input into the audio forensics system. Experimental results show that the proposed method is effective in resisting compression.
引用
收藏
页码:589 / 599
页数:11
相关论文
共 50 条
  • [21] FORENSICS VS. ANTI-FORENSICS: A DECISION AND GAME THEORETIC FRAMEWORK
    Stamm, Matthew C.
    Lin, W. Sabrina
    Liu, K. J. Ray
    2012 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2012, : 1749 - 1752
  • [22] THE COST OF JPEG COMPRESSION ANTI-FORENSICS
    Valenzise, G.
    Tagliasacchi, M.
    Tubaro, S.
    2011 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, 2011, : 1884 - 1887
  • [23] COUNTERING ANTI-FORENSICS OF IMAGE RESAMPLING
    Peng, Anjie
    Zeng, Hui
    Lin, Xiaodan
    Kang, Xiangui
    2015 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP), 2015, : 3595 - 3599
  • [24] Anti-Forensics of Digital Image Compression
    Stamm, Matthew C.
    Liu, K. J. Ray
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) : 1050 - 1065
  • [25] Improved anti-forensics of JPEG compression
    Qian, Zhenxing
    Zhang, Xinpeng
    JOURNAL OF SYSTEMS AND SOFTWARE, 2014, 91 : 100 - 108
  • [26] Forensics and counter anti-forensics of video inter-frame forgery
    Xiangui Kang
    Jingxian Liu
    Hongmei Liu
    Z. Jane Wang
    Multimedia Tools and Applications, 2016, 75 : 13833 - 13853
  • [27] Forensics and counter anti-forensics of video inter-frame forgery
    Kang, Xiangui
    Liu, Jingxian
    Liu, Hongmei
    Wang, Z. Jane
    MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (21) : 13833 - 13853
  • [28] Modify the Quantization Table in the JPEG Header File for Forensics and Anti-forensics
    Wang, Hao
    Wang, Jinwei
    Luo, Xiangyang
    Yin, QiLin
    Ma, Bin
    Sun, Jinsheng
    DIGITAL FORENSICS AND WATERMARKING, IWDW 2021, 2022, 13180 : 72 - 86
  • [29] Simplified Anti-Forensics of JPEG Compression
    Qian, Zhenxing
    Qiao, Tong
    JOURNAL OF COMPUTERS, 2013, 8 (10) : 2483 - 2488
  • [30] Anti-Forensics Techniques: An Analytical Review
    Jain, Anu
    Chhabra, Gurpal Singh
    2014 SEVENTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3), 2014, : 412 - 418