Skip to main content
Log in

Detection of Double MP3 Compression

  • Published:
Cognitive Computation Aims and scope Submit manuscript

Abstract

MPEG-1 Audio Layer 3, more commonly referred to as MP3, is a popular audio format for consumer audio storage and a de facto standard of digital audio compression for the transfer and playback of music on digital audio players. MP3 audio forgery manipulations generally uncompress a MP3 file, tamper with the file in the temporal domain, and then compress the doctored audio file back into MP3 format. If the compression quality of doctored MP3 file is different from the quality of original MP3 file, the doctored MP3 file is said to have undergone double MP3 compression. Although double MP3 compression does not prove a malicious tampering, it is evidence of manipulation and thus may warrant further forensic analysis since, e.g., faked MP3 files can be generated by using double MP3 compression at a higher bit-rate for the second compression to claim a higher quality of the audio files. To detect double MP3 compression, in this paper, we extract the statistical features on the modified discrete cosine transform and apply a support vector machine to the extracted features for classification. Experimental results show that our designed method is highly effective for detecting faked MP3 files. Our study also indicates that the detection performance is closely related to the bit-rate of the first-time MP3 encoding and the bit-rate of the second-time MP3 encoding.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Understanding online music stores, http://reviews.cnet.com/online-music-store-guide/.

  2. IFPI DIGITAL MUSIC REPORT 2009, http://www.ifpi.org/content/library/DMR2009.pdf.

  3. ISO/IEC JTC1/SC29/WG11 MPEG, IS11172-3, Information technology—coding of moving pictures and associated audio for digital storage media at up to about 1.5 Mbit/s, Part 3: Audio, 1992.

  4. http://www.telos-systems.com/techtalk/hosted/Brandenburg_mp3_aac.pdf.

  5. Bayram S, Sencar HT, Memon N. An efficient and robust method for detecting copy-move forgery. In: Proceedings of IEEE international conference on acoustics, speech, and signal processing, April 19–24, 2009.

  6. Farid H. Image forgery detection, a survey. IEEE Signal Processing Magazine, March 16–25; 2009.

  7. Fridrich J, Soukal D, Lukás J. Detection of copy move forgery in digital images. Proceedings of digital forensic research workshop, August; 2003.

  8. Johnson MK, Farid H. Exposing digital forgeries by detecting inconsistencies in lighting. Proceedings of 7th ACM multimedia and security workshop, pp. 1–10; (2005).

  9. Johnson MK, Farid H. Exposing digital forgeries in complex lighting environments. IEEE Trans Inf Forensic Security 3(2):450–461; (2007).

    Google Scholar 

  10. Lin Z, He J, Tang X, Tang C-K. Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis. Pattern Recognit. 2009;42:2492–501.

    Article  Google Scholar 

  11. Liu Q, Sung AH, Xu J, Ribeiro B. Image complexity and feature extraction for steganalysis of LSB matching steganography. In: Proceedings of 18th international conference on pattern recognition, ICPR, No. (2), pp 267–270; (2006).

  12. Liu Q, Sung AH. Feature mining and nuero-fuzzy inference system for steganalysis of LSB matching steganography in grayscale images. In Proceedings of 20th international joint conference on artificial intelligence (IJCAI), pp 2808–2813; (2007).

  13. Liu Q, Sung AH, Ribeiro B, Wei M, Chen Z, Xu J. Image complexity and feature mining for steganalysis of least significant bit matching steganography. Inf Sci. 2008;178(1):21–36.

    Article  Google Scholar 

  14. Liu Q, Sung AH, Chen Z, Xu J. Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images. Pattern Recognit. 2008;41(1):56–66.

    Article  Google Scholar 

  15. Liu Q, Sung AH, Qiao M. Improved detection and evaluation for JPEG steganalysis. In: Proceedings of 17th ACM multimedia conference, Beijing, Oct. 19–24, 2009, pp 873–876; (2009).

  16. Liu Q, Sung AH, Qiao M. Novel feature mining for audio steganlysis. In: Proceedings of 17th ACM multimedia conference, Beijing, Oct. 19–24, 2009, pp 95–104; (2009).

  17. Liu Q, Sung AH, Qiao M. Temporal derivative based spectrum and mel-cepstrum audio steganalysis. IEEE Trans Inf Forensic Security. 2009;4(3):359–68.

    Article  Google Scholar 

  18. Liu Q, Sung AH, Qiao M, Chen Z, Ribeiro B. An improved approach to steganalysis of JPEG images. Inf Sci. 2010;180(9):1643–55.

    Article  Google Scholar 

  19. Lukas J, Fridrich J, Goljan M. Digital camera identification from sensor pattern noise. IEEE Trans Inf Forensic Security. 2006;1(2):205–14.

    Article  Google Scholar 

  20. Mahdian B, Saic S. Blind authentication using periodic properties of interpolation. IEEE Trans Inf Forensic Security. 2008;3(3):529–38.

    Article  Google Scholar 

  21. Popescu AC, Farid H. Exposing digital forgeries by detecting traces of re-sampling. IEEE Trans Signal Process. 2005;53(2):758–67.

    Article  Google Scholar 

  22. Qiao M, Sung AH, Liu Q. Steganalysis of MP3 Stegos. Proceedings of 22nd international joint conference on neural network, pp 2566–2571; (2009).

  23. Vapnik VN. Statistical learning theory. New York: Wiley; 1998.

    Google Scholar 

  24. Yang R, Qu Z, Huang J. Detecting digital audio forgeries by checking frame offsets. MM&Sec 2008: 21–26; (2008).

  25. Yang R, Shi YQ, Huang J. Defeating fake-quality MP3. MM&Sec 2009: 117–124; (2009).

Download references

Acknowledgments

The authors acknowledge the support for this research from the Institute for Complex Additive Systems Analysis (ICASA), a research division of New Mexico Tech. We are also grateful to the Editor and anonymous reviewers for their insightful comments and very helpful suggestions. Special thanks go to Elisa and Keegan of the Writing Center of the New Mexico Tech for their professional editing service.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Andrew H. Sung.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Liu, Q., Sung, A.H. & Qiao, M. Detection of Double MP3 Compression. Cogn Comput 2, 291–296 (2010). https://doi.org/10.1007/s12559-010-9045-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12559-010-9045-4

Keywords

Navigation