{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,12]],"date-time":"2024-06-12T05:12:07Z","timestamp":1718169127113},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,5,23]],"date-time":"2014-05-23T00:00:00Z","timestamp":1400803200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/2.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["EURASIP J. on Info. Security"],"published-print":{"date-parts":[[2014,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>In this work, by exploiting the traces left by double compression in the statistics of quantized modified discrete cosine transform coefficients, a single measure has been derived that allows to decide whether an MP3 file is singly or doubly compressed and, in the last case, to devise also the bit-rate of the first compression. Moreover, the proposed method as well as two state-of-the-art methods have been applied to analyze short temporal windows of the track, allowing the localization of possible tampered portions in the MP3 file under analysis. Experiments confirm the good performance of the proposed scheme and demonstrate that current detection methods are useful for tampering localization, thus offering a new tool for the forensic analysis of MP3 audio tracks.<\/jats:p>","DOI":"10.1186\/1687-417x-2014-10","type":"journal-article","created":{"date-parts":[[2014,5,23]],"date-time":"2014-05-23T09:04:48Z","timestamp":1400835888000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Detection and localization of double compression in MP3 audio tracks"],"prefix":"10.1186","volume":"2014","author":[{"given":"Tiziano","family":"Bianchi","sequence":"first","affiliation":[]},{"given":"Alessia De","family":"Rosa","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Fontani","sequence":"additional","affiliation":[]},{"given":"Giovanni","family":"Rocciolo","sequence":"additional","affiliation":[]},{"given":"Alessandro","family":"Piva","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,5,23]]},"reference":[{"key":"25_CR1","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1145\/1597817.1597838","volume-title":"Proceedings of the 11th ACM Workshop on Multimedia and Security. MM&Sec \u201809","author":"R Yang","year":"2009","unstructured":"Yang R, Shi YQ, Huang J: Defeating fake-quality MP3. In Proceedings of the 11th ACM Workshop on Multimedia and Security. MM&Sec \u201809. ACM, New York; 2009:117-124."},{"key":"25_CR2","volume-title":"SPIE Conference on Media Forensics and Security II","author":"R Yang","year":"2010","unstructured":"Yang R, Shi YQ, Huang J: Detecting double compression of audio signal. In SPIE Conference on Media Forensics and Security II. SPIE, Bellingham; 2010. doi:10.1117\/12.838695"},{"key":"25_CR3","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/s12559-010-9045-4","volume":"2","author":"Q Liu","year":"2010","unstructured":"Liu Q, Sung A, Qiao M: Detection of double MP3 compression. Cogn. Comput 2010, 2: 291-296. 10.1007\/s12559-010-9045-4","journal-title":"Cogn. Comput"},{"key":"25_CR4","doi-asserted-by":"publisher","first-page":"1011","DOI":"10.1145\/1873951.1874137","volume-title":"Proceedings of the International Conference on Multimedia. MM \u201810","author":"M Qiao","year":"2010","unstructured":"Qiao M, Sung AH, Liu Q: Revealing real quality of double compressed MP3 audio. In Proceedings of the International Conference on Multimedia. MM \u201810. ACM, New York; 2010:1011-1014. doi:10.1145\/1873951.1874137"},{"key":"25_CR5","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1145\/1411328.1411334","volume-title":"Proceedings of the 10th ACM Workshop on Multimedia and Security. MM&Sec \u201808","author":"R Yang","year":"2008","unstructured":"Yang R, Qu Z, Huang J: Detecting digital audio forgeries by checking frame offsets. In Proceedings of the 10th ACM Workshop on Multimedia and Security. MM&Sec \u201808. ACM, New York; 2008:21-26."},{"issue":"2S","key":"25_CR6","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1145\/2344436.2344441","volume":"8","author":"R Yang","year":"2012","unstructured":"Yang R, Qu Z, Huang J: Exposing MP3 audio forgeries using frame offsets. ACM Trans. Multimedia Comput. Commun. Appl 2012, 8(2S):35-13520. doi:10.1145\/2344436.2344441","journal-title":"ACM Trans. Multimedia Comput. Commun. Appl"},{"issue":"2","key":"25_CR7","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1007\/s00530-005-0195-2","volume":"11","author":"R B\u00f6hme","year":"2005","unstructured":"B\u00f6hme R, Westfeld A: Feature-based encoder classification of compressed audio streams. Multimedia Syst 2005, 11(2):108-120. doi:10.1007\/s00530-005-0195-2 10.1007\/s00530-005-0195-2","journal-title":"Multimedia Syst"},{"key":"25_CR8","volume-title":"Audio Engineering Society Convention 112","author":"S Moehrs","year":"2002","unstructured":"Moehrs S, Herre J, Geiger R: Analysing decompressed audio with the inverse decoder - towards an operative algorithm. Audio Engineering Society Convention 112 2002. http:\/\/www.aes.org\/e-lib\/browse.cfm?elib=11346"},{"key":"25_CR9","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1145\/1597817.1597828","volume-title":"Proceedings of the 11th ACM Workshop on Multimedia and Security. MM&Sec \u201809","author":"B D\u2019Alessandro","year":"2009","unstructured":"D\u2019Alessandro B, Shi YQ: Mp3 bit rate quality detection through frequency spectrum analysis. In Proceedings of the 11th ACM Workshop on Multimedia and Security. MM&Sec \u201809. ACM, New York; 2009:57-62."},{"key":"25_CR10","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1145\/2482513.2482523","volume-title":"Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security. IH&MMSec \u201813","author":"T Bianchi","year":"2013","unstructured":"Bianchi T, De Rosa A, Fontani M, Rocciolo G, Piva A: Detection and classification of double compressed MP3 audio tracks. In Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security. IH&MMSec \u201813. ACM, New York; 2013:159-164."},{"key":"25_CR11","volume-title":"Digital Forensic Research Workshop","author":"J Luk\u00e1\u0161","year":"2003","unstructured":"Luk\u00e1\u0161 J, Fridrich J: Estimation of primary quantization matrix in double compressed JPEG images. In Digital Forensic Research Workshop. DFRWS, Trumansburg; 2003."},{"key":"25_CR12","first-page":"310","volume-title":"Information Hiding. Lecture Notes in Computer Science","author":"J Fridrich","year":"2003","unstructured":"Fridrich J, Goljan M, Hogea D: Steganalysis of JPEG images: breaking the f5 algorithm. In Information Hiding. Lecture Notes in Computer Science. Springer; 2003:310-323."},{"key":"25_CR13","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511809071","volume-title":"Introduction to Information Retrieval","author":"CD Manning","year":"2008","unstructured":"Manning CD, Raghavan P, Sch\u00fctze H: Introduction to Information Retrieval. Cambridge University Press, Cambridge; 2008."},{"key":"25_CR14","volume-title":"Statistical Methods, vol. 276","author":"GW Snecdecor","year":"1991","unstructured":"Snecdecor GW, Cochran WG: Statistical Methods, vol. 276. Wiley, NJ; 1991."},{"key":"25_CR15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1111\/j.2517-6161.1977.tb01600.x","volume":"39","author":"AP Dempster","year":"1977","unstructured":"Dempster AP, Laird NM, Rubin DB: Maximum likelihood from incomplete data via the EM algorithm. J. Roy. Stat. Soc. B 1977, 39: 1-38.","journal-title":"J. Roy. Stat. Soc. B"},{"key":"25_CR16","unstructured":"KM (incompetech.com): Artifact, danse macabre, just nasty, airport lounge, chee zee beach"}],"container-title":["EURASIP Journal on Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-417X-2014-10.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/1687-417X-2014-10\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-417X-2014-10.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,26]],"date-time":"2024-05-26T22:08:34Z","timestamp":1716761314000},"score":1,"resource":{"primary":{"URL":"https:\/\/jis-eurasipjournals.springeropen.com\/articles\/10.1186\/1687-417X-2014-10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5,23]]},"references-count":16,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,12]]}},"alternative-id":["25"],"URL":"https:\/\/doi.org\/10.1186\/1687-417x-2014-10","relation":{},"ISSN":["1687-417X"],"issn-type":[{"value":"1687-417X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,5,23]]},"assertion":[{"value":"22 October 2013","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 April 2014","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 May 2014","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"10"}}