{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T11:26:24Z","timestamp":1742988384170,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030578800"},{"type":"electronic","value":"9783030578817"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-57881-7_35","type":"book-chapter","created":{"date-parts":[[2020,8,31]],"date-time":"2020-08-31T14:04:16Z","timestamp":1598882656000},"page":"393-404","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Compression Detection of Audio Waveforms Based on Stacked Autoencoders"],"prefix":"10.1007","author":[{"given":"Da","family":"Luo","sequence":"first","affiliation":[]},{"given":"Wenqing","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Huaqiang","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Weiqi","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Zhenghui","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,1]]},"reference":[{"key":"35_CR1","doi-asserted-by":"publisher","unstructured":"Barni, M., Chen, Z., Tondi, B.: Adversary-aware, data-driven detection of double JPEG compression: how to make counter-forensics harder. In: IEEE International Workshop on Information Forensics and Security (2016). \nhttps:\/\/doi.org\/10.1109\/wifs.2016.7823902","DOI":"10.1109\/wifs.2016.7823902"},{"issue":"2","key":"35_CR2","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1109\/TIFS.2008.922456","volume":"3","author":"T Pevn\u00fd","year":"2008","unstructured":"Pevn\u00fd, T., Fridrich, J.: Detection of double-compression in JPEG images for applications in steganography. IEEE Trans. Inf. Forensics Secur. 3(2), 247\u2013258 (2008)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"8","key":"35_CR3","doi-asserted-by":"publisher","first-page":"1299","DOI":"10.1109\/TIFS.2014.2330312","volume":"9","author":"F Galvan","year":"2014","unstructured":"Galvan, F., Puglisi, G., Bruna, A., Battiato, S.: First quantization matrix estimation from double compressed JPEG images. IEEE Trans. Inf. Forensics Secur. 9(8), 1299\u20131310 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"35_CR4","doi-asserted-by":"crossref","unstructured":"Yang, R., Shi, Y., Huang, J.: Defeating fakequality MP3. In: Proceedings of ACM Workshop Multimedia Security, Princeton, NJ, USA, pp. 117C-124 (2009)","DOI":"10.1145\/1597817.1597838"},{"key":"35_CR5","unstructured":"Yang, R., Shi, Y., Huang, J.: Detecting double compression of audio signal. In: Procedings of SPIE Electronic Imaging. International Society for Optics and Photonics, 75410\u00a0K-75410\u00a0K-10 (2010)"},{"key":"35_CR6","doi-asserted-by":"crossref","unstructured":"Qiao, M., Sung, A., Liu, Q.: Revealing real quality of double compressed MP3 audio. In: Proceedings of the International Conference on Multimedia, pp. 1011\u20131014 (2010)","DOI":"10.1145\/1873951.1874137"},{"issue":"4","key":"35_CR7","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/s12559-010-9045-4","volume":"2","author":"Q Liu","year":"2010","unstructured":"Liu, Q., Sung, A., Qiao, M.: Detection of double MP3 compression. Cognit. Comput. 2(4), 291\u2013296 (2010)","journal-title":"Cognit. Comput."},{"key":"35_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/978-3-662-43886-2_19","volume-title":"Digital-Forensics and Watermarking","author":"P Ma","year":"2014","unstructured":"Ma, P., Wang, R., Yan, D., Jin, C.: A Huffman table index based approach to detect double MP3 compression. In: Shi, Y.Q., Kim, H.J., P\u00e9rez-Gonz\u00e1lez, F. (eds.) IWDW 2013. LNCS, vol. 8389, pp. 258\u2013271. Springer, Heidelberg (2014). \nhttps:\/\/doi.org\/10.1007\/978-3-662-43886-2_19"},{"key":"35_CR9","unstructured":"Bie\u00dfmann, P., et al.: Estimating MP3PRO encoder parameters from decoded audio. In: Proceedings of GI-Jahrestagung, 2841C\u20132852 (2013)"},{"issue":"2","key":"35_CR10","first-page":"662","volume":"12","author":"D Yan","year":"2018","unstructured":"Yan, D., Wang, R., Zhou, J., Jin, C., Yang, Z.: Compression history detection for MP3 audio. KSII Trans. Internet Inf. Syst. 12(2), 662\u2013675 (2018)","journal-title":"KSII Trans. Internet Inf. Syst."},{"key":"35_CR11","doi-asserted-by":"crossref","unstructured":"Jenner, F., Kwasinsk, A.: Highly accurate non-intrusive speech forensics for codec identifications from observed decoded signals. In: Proceedings of International Conference Acoustic, Speech and Signal Process, Kyoto, Japan, pp. 1737\u20131740 (2012)","DOI":"10.1109\/ICASSP.2012.6288234"},{"key":"35_CR12","doi-asserted-by":"publisher","unstructured":"Hi\u00e7s\u00f6nmez, S., Sencar, H., Avcibas, I.: Audio codec identification through payload sampling. In: Proceedings of Workshop Information Forensics Security (2011). \nhttps:\/\/doi.org\/10.1109\/wifs.2011.6123128","DOI":"10.1109\/wifs.2011.6123128"},{"key":"35_CR13","doi-asserted-by":"publisher","unstructured":"Hi\u00e7s\u00f6nmez, S., Uzun, E., Sencar, H.: Methods for identifying traces of compression in audio. In: Proceedings of 1st International Conference Communication, Signal Processing and Application, Sharjah, United Arab Emirates (2013). \nhttps:\/\/doi.org\/10.1109\/iccspa.2013.6487284","DOI":"10.1109\/iccspa.2013.6487284"},{"key":"35_CR14","doi-asserted-by":"crossref","unstructured":"Hennequin, R., Royo-Letelier, J., Moussallam, M.: Codec independent lossy audio compression detection. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 726\u2013730 (2017)","DOI":"10.1109\/ICASSP.2017.7952251"},{"key":"35_CR15","unstructured":"Luo, D., Luo, W., Yang, R., Huang, J.: Identifying compression history of wave audio and its applications. ACM Trans. Multimed. Comput. Commun. Appl. (TOMCCAP), 10(3), 30 (2014)"},{"issue":"7","key":"35_CR16","doi-asserted-by":"publisher","first-page":"161","DOI":"10.3390\/info9070161","volume":"9","author":"Q Huang","year":"2018","unstructured":"Huang, Q., Wang, R., Yan, D., Zhang, J.: AAC double compression audio detection algorithm based on the difference of scale factor. Information 9(7), 161 (2018)","journal-title":"Information"},{"key":"35_CR17","unstructured":"Shen, Y., Jia, J., Cai, L.: Detecting double compressed AMR-format audio recordings. In Proceedings of 10th Phonetics Conference of China (2012)"},{"key":"35_CR18","doi-asserted-by":"crossref","unstructured":"Luo, D., Yang, R., Huang, J.: Detecting double compressed AMR audio using deep learning. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2688\u20132692 (2014)","DOI":"10.1109\/ICASSP.2014.6854084"},{"issue":"2","key":"35_CR19","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1109\/TIFS.2016.2622012","volume":"12","author":"D Luo","year":"2017","unstructured":"Luo, D., Yang, R., Li, B., Huang, J.: Detection of double compressed AMR audio using stacked autoencoder. IEEE Trans. Inf. Forensics Secur. 12(2), 432\u2013444 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"35_CR20","unstructured":"G\u00e4rtner, D., Dittmar, C., Aichroth, P., Cuccovillo, L., Mann, S., Schuller, G.: Efficient cross-codec framing grid analysis for audio tampering detection. In: Proceedings of Audio Engineering Society Convention, p. 136 (2014)"},{"key":"35_CR21","unstructured":"G\u00e4rtner, D., Cuccovillo, L., Mann, S., Aichroth, P.: A multi-codec audio dataset for codec analysis and tampering detection. In: Proceedings of 54th Audio Engineering Society Conference on Audio Forensics (2014)"},{"key":"35_CR22","first-page":"2579","volume":"9","author":"L Maaten","year":"2008","unstructured":"Maaten, L., Hinton, G.: Visualizing data using t-SNE. J. Mach. Learn. Res. 9, 2579\u20132605 (2008)","journal-title":"J. Mach. Learn. Res."},{"issue":"1\u20133","key":"35_CR23","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1006\/dspr.1999.0361","volume":"10","author":"D Reynolds","year":"2000","unstructured":"Reynolds, D., Quatieri, T., Dunn, R.: Speaker verification using adapted gaussian mixture models. Digit. Signal Process. 10(1\u20133), 19\u201341 (2000)","journal-title":"Digit. Signal Process."},{"key":"35_CR24","unstructured":"Kingma, D.: Max welling: auto-encoding variational Bayes. \narXiv:1312.6114\n\n [stat.ML] (2013)"},{"issue":"1","key":"35_CR25","doi-asserted-by":"publisher","first-page":"49","DOI":"10.32604\/cmc.2018.02376","volume":"57","author":"X Kan","year":"2018","unstructured":"Kan, X., et al.: Snow cover mapping for mountainous areas by fusion of MODIS L1B and geographic data based on stacked denoising auto-encoders. Comput. Mater. Continua 57(1), 49\u201368 (2018)","journal-title":"Comput. Mater. Continua"},{"issue":"2","key":"35_CR26","doi-asserted-by":"publisher","first-page":"223","DOI":"10.32604\/cmc.2018.02490","volume":"57","author":"X Zhao","year":"2018","unstructured":"Zhao, X., Jiaxin, W., Zhang, Y., Shi, Y., Wang, L.: Fault diagnosis of motor in frequency domain signal by stacked de-noising auto-encoder. Comput. Mater. Continua 57(2), 223\u2013242 (2018)","journal-title":"Comput. Mater. Continua"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-57881-7_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,31]],"date-time":"2020-08-31T14:33:10Z","timestamp":1598884390000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-57881-7_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030578800","9783030578817"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-57881-7_35","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"1 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hohhot","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}