[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1073170.1073181acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
Article

Verifier-tuple for audio-forensic to determine speaker environment

Published: 01 August 2005 Publication History

Abstract

In this paper a new concept for audio classification and analysis is presented to determine the authenticity of the speaker's environment. The overall concept's characteristic is determined through an introduced Verifier-Tuple, which enables a detailed analysis of every kind of media. The purpose, the practise as well as the need of this Verifier-Tuple is anchored in forensics. As we are clarifying in this paper, the Verifier-Tuple can have an essential impact on investigations in accumulating evidence to proof a crime. Within the Verifier-Tuple four different stages are classified, which include distinct syntax and semantic features of information. We demonstrate its application to the medium audio and list concrete features for each stage. Our background is the determination of a speaker's certain equipped, overall environment. This can be for example a train station or an airport with low quality audio devices, or a class room or laboratory with high quality equipment. The Verifier-Tuple provides an indirect channel for a speaker verification. The proposed concept is scalable for other media such as text, image, video or 3d-complexes. As a result we will show the Verifier-Tuple's impact on a new classification of information, especially audio feature extraction and in particular, the verification of the authenticity of information.

References

[1]
Upendra V. Chaudhari, Homayoon S.M. Beigi, Stphane H. Maes and Jeffrey S. Sorensen, Multi-Environment Speaker Verification, AUTOID'99, New Jersey, 1999.
[2]
D. Moore and I. McCowan, Microphone Array Speech Recognition: Experiments on Overlapping Speech in Meetings, In: Proceedings of ICASSP, 2003.
[3]
A. Martin, M. Przybocki, Speaker Recognition in a Multi-Speaker Environment In: Proceedings of Eurospeech, 2001.
[4]
K.-K. Yiu, M.-W. Mak, S.-Y. Kung, Environment Adaptation for Robust Speaker Verification, EUROSP, 2003.
[5]
Y. Wang, Z. Liu and J. Huang, Multimedia content analysis using both audio and visual clues, In: IEEE Signal Processing Magazine, Vol. 17, No. 6, pp. 12--36, 2000.
[6]
T. Zhang and C.-C.J. Kuo, Hierarchical classifiaction of audio data for archieving and retrieving, In: 1999 IEEE International Conference on Acoustics, Speech and Signal Processing, Vol. 6, pp. 3001--3004, March 1999.
[7]
T. Zhang and C.-C.J. Kuo, Content-based audio classification and retrieval for audiovisual data parsing, The Kluwer International Series in Engineering and Computer Science, pp. 160, Dec. 2000.
[8]
J. Barker, M. Cooke, D. Ellis, Decoding speech in the presence of other sources, Speech Communication, to appear, 2004.
[9]
B.P. Clarkson and A. Pentland, Extracting Context From Environmental Audio, In: Proceedings of the 2nd international Symposium on Wearable Computers, Pennsylvania, Oct. 1998.
[10]
K. El-Maleh, A. Samouelian and P. Kabal, Frame level noise classification in mobile environments, In: Proceedings of the 1999 IEEE International Conference on Acoustics, Speech and Signal Processing, Vol. 1, pp. 237--240, 1999.
[11]
P. Gaunard, C.G. Mubikangiey, C. Couvreur and V. Fontaine, Automatic classification of environmental noise events by hidden Markov models, In: Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, Vol. 6, pp. 3609--3612, 1998.
[12]
G.J. Brown and M.P. Cooke, Computational Auditory Scene Analysis, Computer Speech and Language, Vol. 8, pp. 297--336, 1994.
[13]
DeLiang Wang, Computational Auditory Scene Analysis, In: ICASSP 2004 International Conference on Acoustic, Speech and Signal Processing, Montreal, Canada, May 2004.
[14]
D.F. Rosenthal and H.G. Okuno (editors), Computational Auditory Scene Analysis, Lawrence Erlbaum Associates, Mahwah, New Jersey, 1998.
[15]
A.S. Bregman, Auditory Scene Analysis: The Perceptual Organization of Sound, Cambridge, Massachusetts, MIT Press, 1990.
[16]
D.P.W. Ellis, Prediction-driven computational auditory scene analysis, Ph.D. Thesis, Massachusetts Institute of Technology (MIT), 1996.
[17]
G. Williams and D. Ellis, Speech/music discrimination based on posterior probability features, In: Eurospeech'99, Vol. 2, pp. 687--690, Budapest, Hungary, Sept. 1999.
[18]
G.J. Brown, Computer Identification of musical instruments using pattern recognition with cepstral coefficients as features, In: Journal Acoustic Society of America, Vol. 105, No. 3, pp. 1933--1941. 1999.
[19]
V. Peltonen, J. Tuomi, A. Klapuri, J. Huopaniemi and T. Sorsa, Computational Auditory Scene Recognition, In: ICASSP 2002 International Conference on Acoustic, Speech and Signal Processing, Orlando, Florida, May 2002.
[20]
David L. Donoho. De-noising by Soft-Thresholding, In: IEEE Transactions on Information Theory, vol. 41, no. 3, pp. 613--627, 1995
[21]
I. McCowan and H. Bourlard, Microphone Array Post-filter for Diffuse Noise Field, In: Proceedings of ICASSP 2002, vol. 1, pp. 905--908, Florida, 2002.
[22]
S. Doclo, M. Moonen, Multimicrophone Noise Reduction Using Recursive GSVD-Based Optimal Filtering with ANC Postprocessing Stage, In: IEEE Transactions on Speech and Audio Processing, vol. 13, no. 1, pp. 53--69, Jan. 2005.
[23]
J. Benesty, J. Chen, Y. Huang and S. Doclo, Study of the Wiener Filter for Noise Reduction, Chapter 2 in Speech Enhancement(Benesty J., Makino S., Chen J., eds.), pp. 9--42, Springer, 2005.
[24]
Svaizer, P., Matassoni, M., Omologo, M., Acoustic Source Location in a Three-dimensional Space using Cross-power Spectrum Phase, In: Proc. of ICASSP, Munich, Germany, April 1997.
[25]
S. Doclo, M. Moonen, Robust adaptive time delay estimation for speaker localisation in noisy and reverberant acoustic environments, In: EURASIP Journal on Applied Signal Processing, special issue on Signal Processing for Acoustic Communication Systems, vol. 2003, no. 11, pp. 1110--1124, Oct. 2003.
[26]
J.H. DiBiase, H.F. Silverman, and M.S. Brandstein, D. Ward (Eds.), Microphone Arrays, chapter Robust Localization in Reverberant Rooms, Springer, 2001.
[27]
D. Bechler and K. Kroschel, Reliability measurement of time difference of arrival estimations for multiple sound source localization, In: 17th Annual Meeting of the IAR, Grenoble, November 2002.
[28]
Bob Mungamuru and Parham Aarabi, Enhanced Sound Localization, In: IEEE Transactions on Systems, Man, and Cybernetics-Part B: Cybernetics, Vol. 34, No. 3, pp. 1526--1540, June 2004.
[29]
Sachin Kajarekar, Naren Malayath and Hynek Hermansky, Analysis of sources of variability in speech, In: Proc. of EUROSPEECH, Budapest, Hungary, 1999.
[30]
Lawrence R. Rabiner and Ronald W. Schafer, Digital processing of speech signals, Prentice-Hall Signal Proc. Series ed. by A.V.Oppenheim (Prentice Hall, Englewood Cliffs, NJ), 1978.
[31]
J. Lukas, J. Fridrich and M. Goljan, Determining Digital Image Origin Using Sensor Imperfections, In: SPIE International Symposium Electronic Imaging 2005, 16 - 20 January 2005.
[32]
H.R. Nielson and F. Nielson, Semantics with Applications: A Formal Introduction, revised edition, John Wiley&Sons, original 1992, 1999.
[33]
N. Chomsky, Syntactic Structures, Mouton and Co, Den Haag, 1957.
[34]
N. Chomsky, Aspects of the Theory of Syntax, MIT Press, Massachusetts Institute of Technology, Cambridge, MA, 1965.
[35]
S. Löbner, Semantik: eine Einfhrung, De Gruyter Studienbuch Berlin, 2003.
[36]
A. Lang, M. Holley, J. Dittmann, StirMark for Audio: Unterschiede zwischen Musik und Sprache: Von e-Learning bis e-Payment 2004. Das Internet als sicherer Marktplatz, LIT 2004, Akademische Verlagsgesellschaft Aka GmbH Berlin, Sep. 29th - Oct. 1st, Leipzig, Germany, 2004.

Cited By

View all
  1. Verifier-tuple for audio-forensic to determine speaker environment

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      MM&Sec '05: Proceedings of the 7th workshop on Multimedia and security
      August 2005
      164 pages
      ISBN:1595930329
      DOI:10.1145/1073170
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 01 August 2005

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. concept of content analysis
      2. forensic analysis of digital multimedia

      Qualifiers

      • Article

      Conference

      MM&Sec '05
      Sponsor:
      MM&Sec '05: Multimedia and Security Workshop 2005
      August 1 - 2, 2005
      NY, New York, USA

      Acceptance Rates

      Overall Acceptance Rate 128 of 318 submissions, 40%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)5
      • Downloads (Last 6 weeks)1
      Reflects downloads up to 13 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2015)Microphone ForensicsHandbook of Digital Forensics of Multimedia Data and Devices10.1002/9781118705773.ch11(411-441)Online publication date: 18-Dec-2015
      • (2014)Mobile phone identification using recorded speech signals2014 19th International Conference on Digital Signal Processing10.1109/ICDSP.2014.6900732(586-591)Online publication date: Aug-2014
      • (2014)Source phone identification using sketches of featuresIET Biometrics10.1049/iet-bmt.2013.00563:2(75-83)Online publication date: 1-Jun-2014
      • (2013)Telephone Handset Identification by Collaborative RepresentationsInternational Journal of Digital Crime and Forensics10.4018/ijdcf.20131001015:4(1-14)Online publication date: Oct-2013
      • (2013)Audio Recording Location Identification Using Acoustic Environment SignatureIEEE Transactions on Information Forensics and Security10.1109/TIFS.2013.22788438:11(1746-1759)Online publication date: 1-Nov-2013
      • (2013)Telephone handset identification using sparse representations of spectral feature sketches2013 International Workshop on Biometrics and Forensics (IWBF)10.1109/IWBF.2013.6547326(1-4)Online publication date: Apr-2013
      • (2012)Automatic telephone handset identification by sparse representation of random spectral featuresProceedings of the on Multimedia and security10.1145/2361407.2361422(91-96)Online publication date: 6-Sep-2012
      • (2012)Telephone handset identification by feature selection and sparse representations2012 IEEE International Workshop on Information Forensics and Security (WIFS)10.1109/WIFS.2012.6412628(73-78)Online publication date: Dec-2012
      • (2011)A Study on ENF Discontinuity Detection TechniquesProceedings of the 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing10.1109/IIHMSP.2011.44(9-12)Online publication date: 14-Oct-2011
      • (2010)Electrical Network Frequency as a Tool for Audio Concealment ProcessProceedings of the 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing10.1109/IIHMSP.2010.51(175-178)Online publication date: 15-Oct-2010
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media