Robust Anti-forensics on Audio Forensics System

被引:0
|
作者
Wang, Qingqing [1 ]
Ye, Dengpan [1 ]
机构
[1] Wuhan Univ, Sch Cyber Sci & Engn, Key Lab Aerosp Informat Secur & Trusted Comp, Minist Educ, Wuhan, Peoples R China
基金
中国国家自然科学基金;
关键词
audio anti-forensics; audio compression; robustness; adversarial example; HIDING TRACES;
D O I
10.1007/978-981-99-4761-4_50
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Audio forensics systems are effective evidence to prove whether audio is real or not. Recently, there have been studies on anti-forensics technology that can deceive audio forensics systems. However, the anti-forensics technology loses its effectiveness after being compressed. In this paper, we first study the influence of known and unknown compression on audio anti-forensics technology, and enhance the robustness of audio anti-forensics technology. In this paper, the compression algorithm and compression approximation algorithm are added to the iterative process of generating anti-forensics adversarial examples to generate anti-forensics adversarial examples that can resist compression, and solve the problem that audio anti-forensics adversarial examples cannot reduce the accuracy of audio forensics system under compression. Three compression algorithms, AAC-HE, AAC-LC and MP3, as well as a pre-trained compression approximation algorithm, were added to the iterative process of generating audio anti-forensics adversarial examples to generate audio anti-forensics adversarial examples, which were uploaded and downloaded through the actual network platform (Himalaya) and input into the audio forensics system. Experimental results show that the proposed method is effective in resisting compression.
引用
收藏
页码:589 / 599
页数:11
相关论文
共 50 条
  • [31] General Countermeasures of Anti-Forensics Categories
    Al-Mousa, Mohammad Rasmi
    Sweerky, Nael A.
    Samara, Ghassan
    Alghanim, Mohammed
    Hussein, Abla Suleiman Ismail
    Qadoumi, Braa
    PROCEEDINGS OF 2021 GLOBAL CONGRESS ON ELECTRICAL ENGINEERING (GC-ELECENG 2021), 2021, : 5 - 10
  • [32] Anti-forensics: Techniques, detection and countermeasures
    Garfinkel, Sirnson
    ICIW 2007: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2007, : 77 - 84
  • [33] A tour through the realm of anti-forensics
    Forte, Dario
    Power, Richard
    Computer Fraud and Security, 2007, 2007 (06): : 18 - 20
  • [34] A VARIATIONAL APPROACH TO JPEG ANTI-FORENSICS
    Fan, Wei
    Wang, Kai
    Cayre, Francois
    Xiong, Zhang
    2013 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2013, : 3058 - 3062
  • [35] Anti-forensics with a small army of exploits
    Hilley, S.
    DIGITAL INVESTIGATION, 2007, 4 (01) : 13 - 15
  • [36] Android Anti-forensics: Modifying CyanogenMod
    Karlsson, Karl-Johan
    Glisson, William Bradley
    2014 47TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2014, : 4828 - 4837
  • [37] COUNTERING ANTI-FORENSICS OF MEDIAN FILTERING
    Zeng, Hui
    Qin, Tengfei
    Kang, Xiangui
    Liu, Li
    2014 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2014,
  • [38] Analysis and Implementation of Anti-Forensics Techniques on ZFS
    Cifuentes, J.
    Cano, J. J.
    IEEE LATIN AMERICA TRANSACTIONS, 2012, 10 (03) : 1757 - 1766
  • [39] Anti-forensics of median filtering and contrast enhancement
    Sharma, Shishir
    Ravi, Hareesh
    Subramanyam, A., V
    Emmanuel, Sabu
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2020, 66
  • [40] Android anti-forensics through a local paradigm
    Distefano, Alessandro
    Me, Gianluigi
    Pace, Francesco
    DIGITAL INVESTIGATION, 2010, 7 : S83 - S94