{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:44:06Z","timestamp":1740149046800,"version":"3.37.3"},"reference-count":11,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,9,2]],"date-time":"2020-09-02T00:00:00Z","timestamp":1599004800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1736215","61672302","61901237","LY20F020010","LY17F020010"],"award-info":[{"award-number":["U1736215","61672302","61901237","LY20F020010","LY17F020010"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1736215","61672302","61901237","LY20F020010","LY17F020010"],"award-info":[{"award-number":["U1736215","61672302","61901237","LY20F020010","LY17F020010"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1736215","61672302","61901237","LY20F020010","LY17F020010"],"award-info":[{"award-number":["U1736215","61672302","61901237","LY20F020010","LY17F020010"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004731","name":"Natural Science Foundation of Zhejiang Province","doi-asserted-by":"publisher","award":["U1736215","61672302","61901237","LY20F020010","LY17F020010"],"award-info":[{"award-number":["U1736215","61672302","61901237","LY20F020010","LY17F020010"]}],"id":[{"id":"10.13039\/501100004731","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004731","name":"Natural Science Foundation of Zhejiang Province","doi-asserted-by":"publisher","award":["U1736215","61672302","61901237","LY20F020010","LY17F020010"],"award-info":[{"award-number":["U1736215","61672302","61901237","LY20F020010","LY17F020010"]}],"id":[{"id":"10.13039\/501100004731","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004387","name":"Ningbo University","doi-asserted-by":"publisher","award":["U1736215","61672302","61901237","LY20F020010","LY17F020010"],"award-info":[{"award-number":["U1736215","61672302","61901237","LY20F020010","LY17F020010"]}],"id":[{"id":"10.13039\/501100004387","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2020,9,2]]},"abstract":"<jats:p>Adaptive multirate (AMR) compression audio has been exploited as an effective forensic evidence to justify audio authenticity. Little consideration has been given, however, to antiforensic techniques capable of fooling AMR compression forensic algorithms. In this paper, we present an antiforensic method based on generative adversarial network (GAN) to attack AMR compression detectors. The GAN framework is utilized to modify double AMR compressed audio to have the underlying statistics of single compressed one. Three state-of-the-art detectors of AMR compression are selected as the targets to be attacked. The experimental results demonstrate that the proposed method is capable of removing the forensically detectable artifacts of AMR compression under various ratios with an average successful attack rate about 94.75%, which means the modified audios generated by our well-trained generator can treat the forensic detector effectively. Moreover, we show that the perceptual quality of the generated AMR audio is well preserved.<\/jats:p>","DOI":"10.1155\/2020\/8849902","type":"journal-article","created":{"date-parts":[[2020,9,2]],"date-time":"2020-09-02T23:31:03Z","timestamp":1599089463000},"page":"1-8","source":"Crossref","is-referenced-by-count":1,"title":["An Antiforensic Method against AMR Compression Detection"],"prefix":"10.1155","volume":"2020","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5241-7276","authenticated-orcid":true,"given":"Diqun","family":"Yan","sequence":"first","affiliation":[{"name":"Faculty of Electrical Engineering and Computer Science, Ningbo University, Ningbo 315211, China"},{"name":"Guangdong Key Laboratory of Intelligent Information Processing and Shenzhen Key Laboratory of Media Security, Shenzhen University, Shenzhen 518060, China"}]},{"given":"Xiaowen","family":"Li","sequence":"additional","affiliation":[{"name":"Faculty of Electrical Engineering and Computer Science, Ningbo University, Ningbo 315211, China"}]},{"given":"Li","family":"Dong","sequence":"additional","affiliation":[{"name":"Faculty of Electrical Engineering and Computer Science, Ningbo University, Ningbo 315211, China"}]},{"given":"Rangding","family":"Wang","sequence":"additional","affiliation":[{"name":"Faculty of Electrical Engineering and Computer Science, Ningbo University, Ningbo 315211, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/tsa.2002.804299"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2020.200907"},{"issue":"2","key":"6","first-page":"432","volume":"12","year":"2016","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"7","first-page":"98","volume":"4","year":"2018","journal-title":"International Journal of Advance Research, Ideas and Innovations in Technology"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2011.2161761"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/lsp.2017.2782363"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2960097"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2178403"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2018.2812185"},{"volume":"107","year":"1988","key":"20"},{"first-page":"2672","volume-title":"Generative adversarial nets","year":"2014","key":"21"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8849902.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8849902.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8849902.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,2]],"date-time":"2020-09-02T23:31:06Z","timestamp":1599089466000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2020\/8849902\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,2]]},"references-count":11,"alternative-id":["8849902","8849902"],"URL":"https:\/\/doi.org\/10.1155\/2020\/8849902","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"type":"print","value":"1939-0114"},{"type":"electronic","value":"1939-0122"}],"subject":[],"published":{"date-parts":[[2020,9,2]]}}}