Skip to main content

A Huffman Table Index Based Approach to Detect Double MP3 Compression

  • Conference paper
  • First Online:
Digital-Forensics and Watermarking (IWDW 2013)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8389))

Included in the following conference series:

  • 1618 Accesses

Abstract

MP3 is the most widely used audio format nowadays in our daily life, while MP3 audio often be forged by an audio forger for their own benefits in some significant events, which will cause double MP3 compression. In this paper, the statistical frequency and the transition probability in Markov model are counted based on Huffman code table index, and a support vector machine is applied for classification to detect double MP3 compression. Experimental results demonstrate that the proposed method has low complexity and high accuracy, also the blank with the same bitrate in double MP3 compression detection is made up.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Gupta, S., Cho, S., Jay Kuo, C.C.: Current developments and future trends in audio authentication. IEEE Multimedia 19(1), 50–59 (2012)

    Article  Google Scholar 

  2. Yang, R., Shi, Y.Q., Huang, J.: Detecting double compression of audio signal. Media Forensics and Security II, San Jose, California, USA, pp. 7541:1–10 (2010)

    Google Scholar 

  3. Yang, R., Shi, Y.Q., Huang, J.: Defeating fake-quality MP3. In: Proceedings of the 11th ACM Workshop on Multimedia and Security, pp. 117–124 (2009)

    Google Scholar 

  4. Liu, Q., Sung, A.H., Qiao, M.: Detection of double MP3 compression. Cogn. Comput. 2(4), 291–296 (2010)

    Article  Google Scholar 

  5. Qiao, M., Sung, A.H., Liu, Q.: Revealing real quality of double compressed MP3 audio. In: ACM Multimedia, pp. 1011–1014 (2010)

    Google Scholar 

  6. D’Alessandro, B., Shi, Y.Q.: MP3 bit rate quality detection through frequency spectrum analysis. In: Proceedings of the 11th ACM Workshop on Multimedia and Security, pp. 57–61 (2009)

    Google Scholar 

  7. Zhu, J., Wang, R., Li, J., Yan, D.: The filterbank in MP3 and AAC encoders: a comparative analysis. In: 2011 International Conference on Electronics, Communications and Control, pp. 1110–1113 (2011)

    Google Scholar 

  8. Fu, X., Chen, J., Sheng Xv.: The improvements on the quantify Module in MP3 encoding, voice technology, pp. 52–55 (2004)

    Google Scholar 

  9. Gao, Z., Wei, G.: The core technology of the broadband MP3 audio compression. Electroacoust. Technol. 9, 9–13 (2000)

    Google Scholar 

  10. Tan, J., Wang, R.: The analysis of VLC-coded efficiency based on MPEG-I layer III audio. In: International Conference on Cyberworlds, pp. 136–141, September 2008

    Google Scholar 

  11. Vercellesi, G., Vitali, A., Zerbini, M.: MP3 audio quality for single and multiple encoding. In: IEEE International Conference on Multimedia and Expo, ICME 2007, Beijing, China, 2–5 July 2007, pp. 1279–1282 (2007)

    Google Scholar 

  12. Shi, Y.Q., Chen, C.-H., Chen, W.: A markov process based approach to effective attacking JPEG steganography. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 249–264. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  13. Chen, C., Shi, Y.Q.: JPEG image steganalysis utilizing both intrablock and interblock correlations. In: Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS), pp. 3029–3032 (2008)

    Google Scholar 

  14. Chen, C., Shi, Y.Q., Su, W.: A machine learning based scheme for double JPEG compression detection. In: 19th International Conference on Pattern Recognition (ICPR), 8–11 December 2008, pp. 1–4 (2008)

    Google Scholar 

  15. Qiao, M., Sung, A.H., Liu, Q.: Steganalysis of MP3Stego. In: International Joint Conference on Neural Networks(IJCNN), pp. 2566–2571 (2009)

    Google Scholar 

  16. LAME 3.99.5: MP3 encoder. http://lame.sourceforge.net/

Download references

Acknowledgement

This work is supported by the National Science Foundation of China (61170137), Doctoral Fund of Ministry of Education of China (20103305110002), Zhejiang Province Key Teaching Material Construction project (ZJB2009074), Scientific Research Fund of Zhejiang Provincial Education Department (Y201119434), Zhejiang Scientific and Technical Key Innovation Team of New Generation Mobile Internet Client Software (2010R50009), Open Fund of Zhejiang Provincial Top Key Discipline of Information and Communication Engineering (XKXL1310).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rangding Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ma, P., Wang, R., Yan, D., Jin, C. (2014). A Huffman Table Index Based Approach to Detect Double MP3 Compression. In: Shi, Y., Kim, HJ., Pérez-González, F. (eds) Digital-Forensics and Watermarking. IWDW 2013. Lecture Notes in Computer Science(), vol 8389. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-43886-2_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-43886-2_19

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-43885-5

  • Online ISBN: 978-3-662-43886-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics