{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T19:10:25Z","timestamp":1761419425199,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030562229"},{"type":"electronic","value":"9783030562236"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-56223-6_14","type":"book-chapter","created":{"date-parts":[[2020,9,6]],"date-time":"2020-09-06T15:03:24Z","timestamp":1599404604000},"page":"253-270","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Electric Network Frequency Based Audio Forensics Using Convolutional Neural Networks"],"prefix":"10.1007","author":[{"given":"Maoyu","family":"Mao","sequence":"first","affiliation":[]},{"given":"Zhongcheng","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Xiangui","family":"Kang","sequence":"additional","affiliation":[]},{"given":"Xiang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Liang","family":"Xiao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,6]]},"reference":[{"key":"14_CR1","unstructured":"M. Arnold, Audio watermarking: Features, applications and algorithms, Proceedings of the IEEE International Conference on Multimedia and Exposition \u2013 Latest Advances in the Fast-Changing World of Multimedia, vol. 2, pp. 1013\u20131016, 2000."},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"J. Chen, X. Kang, Y. Liu and Z. Wang, Median filtering forensics based on convolutional neural networks, IEEE Signal Processing Letters, vol. 22(11), pp. 1849\u20131853, 2015.","DOI":"10.1109\/LSP.2015.2438008"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"P. Esquef, J. Apolinario and L. Biscainho, Edit detection in speech recordings via instantaneous electric network frequency variations, IEEE Transactions on Information Forensics and Security, vol. 9(12), pp. 2314\u20132326, 2014.","DOI":"10.1109\/TIFS.2014.2363524"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"P. Esquef, J. Apolinario and L. Biscainho, Improved edit detection in speech via ENF patterns, Proceedings of the IEEE International Workshop on Information Forensics and Security, 2015.","DOI":"10.1109\/WIFS.2015.7368585"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"R. Garg, A. Varna, A. Hajj-Ahmad and M. Wu, \u201cSeeing\u201d ENF: Power-signature-based timestamps for digital multimedia via optical sensing and signal processing, IEEE Transactions on Information Forensics and Security, vol. 8(9), pp. 1417\u20131432, 2013.","DOI":"10.1109\/TIFS.2013.2272217"},{"key":"14_CR6","unstructured":"A. Hajj-Ahmad, R. Garg and M. Wu, Instantaneous frequency estimation and localization for ENF signals, Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2012."},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"A. Hajj-Ahmad, R. Garg and M. Wu, ENF-based region-of-recording identification for media signals, IEEE Transactions on Information Forensics and Security, vol. 10(6), pp. 1125\u20131136, 2015.","DOI":"10.1109\/TIFS.2015.2398367"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"G. Hua, G. Bi and V. Thing, On practical issues of electric network frequency based audio forensics, IEEE Access, vol. 5, pp. 20640\u201320651, 2017.","DOI":"10.1109\/ACCESS.2017.2647921"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"G. Hua, Y. Zhang, J. Goh and V. Thing, Audio authentication by exploring the absolute error map of ENF signals, IEEE Transactions on Information Forensics and Security, vol. 11(5), pp. 1003\u20131016, 2016.","DOI":"10.1109\/TIFS.2016.2516824"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"M. Imran, Z. Ali, S. Bakhsh and S. Akram, Blind detection of copy-move forgery in digital audio forensics, IEEE Access, vol. 5, pp. 12843\u201312855, 2017.","DOI":"10.1109\/ACCESS.2017.2717842"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"G. Karantaidis and C. Kotropoulos, Assessing spectral estimation methods for electric network frequency extraction, Proceedings of the Twenty-Second Pan-Hellenic Conference on Informatics, pp. 202\u2013207, 2018.","DOI":"10.1145\/3291533.3291538"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"X. Lin and X. Kang, Robust electric network frequency estimation with rank reduction and linear prediction, ACM Transactions on Multimedia Computing, Communications and Applications, vol. 14(4), article no. 84, 2018.","DOI":"10.1145\/3241058"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"X. Lin, J. Liu and X. Kang, Audio recapture detection with convolutional neural networks, IEEE Transactions on Multimedia, vol. 18(8), pp. 1480\u20131487, 2016.","DOI":"10.1109\/TMM.2016.2571999"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Y. Liu, Z. Yuan, P. Markham, R. Conners and Y. Liu, Application of power system frequency for digital audio authentication, IEEE Transactions on Power Delivery, vol. 27(4), pp. 1820\u20131828, 2012.","DOI":"10.1109\/TPWRD.2012.2198892"},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"A. Martin, G. Doddington, T. Kamm, M. Ordowski and M. Przybocki, The DET curve in assessments of detection task performance, Proceedings of the Fifth European Conference on Speech Communication and Technology, 1997.","DOI":"10.21437\/Eurospeech.1997-504"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"D. Nicolalde Rodriguez and J. Apolinario, Evaluating digital audio authenticity with spectral distances and ENF phase change, Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 1417\u20131420, 2009.","DOI":"10.1109\/ICASSP.2009.4959859"},{"key":"14_CR17","doi-asserted-by":"crossref","unstructured":"D. Nicolaide Rodriguez, J. Apolinario and L. Biscainho, Audio authenticity: Detecting ENF discontinuity with high precision phase analysis, IEEE Transactions on Information Forensics and Security, vol. 5(3), pp. 534\u2013543, 2010.","DOI":"10.1109\/TIFS.2010.2051270"},{"key":"14_CR18","doi-asserted-by":"crossref","unstructured":"X. Pan, X. Zhang and S. Lyu, Detecting splicing in digital audios using local noise level estimation, Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 1841\u20131844, 2012.","DOI":"10.1109\/ICASSP.2012.6288260"},{"key":"14_CR19","doi-asserted-by":"crossref","unstructured":"P. Reis, J. da Costa, R. Miranda and G. Del Galdo, ESPRIT-Hilbert-based audio tampering detection with SVM classifier for forensic analysis via electrical network frequency, IEEE Transactions on Information Forensics and Security, vol. 12(4), pp. 853\u2013864, 2016.","DOI":"10.1109\/TIFS.2016.2636095"},{"key":"14_CR20","doi-asserted-by":"crossref","unstructured":"H. Su, A. Hajj-Ahmad, M. Wu and D. Oard, Exploring the use of ENF for multimedia synchronization, Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 4613\u20134617, 2014.","DOI":"10.1109\/ICASSP.2014.6854476"},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"S. Vatansever, A. Dirik and N. Memon, Factors affecting ENF-based time-of-recording estimation for video, Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 2497\u20132501, 2019.","DOI":"10.1109\/ICASSP.2019.8682419"},{"key":"14_CR22","doi-asserted-by":"crossref","unstructured":"Z. Wang, J. Wang, C. Zeng, Q. Min, Y. Tian and M. Zuo, Digital audio tampering detection based on ENF consistency, Proceedings of the International Conference on Wavelet Analysis and Pattern Recognition, pp. 209\u2013214, 2018.","DOI":"10.1109\/ICWAPR.2018.8521378"},{"key":"14_CR23","unstructured":"Q. Zhao, D. Meng, Z. Xu, W. Zuo and L. Zhang, Robust principal component analysis with complex noise, Proceedings of the Thirty-First International Conference on Machine Learning, vol. II, pp. 55\u201363, 2014."}],"container-title":["IFIP Advances in Information and Communication Technology","Advances in Digital Forensics XVI"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-56223-6_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T00:04:47Z","timestamp":1725581087000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-56223-6_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030562229","9783030562236"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-56223-6_14","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"6 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DigitalForensics","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Digital Forensics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New Delhi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 January 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 January 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"digitalforensics2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ifip119.org\/Conferences\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}