2017
DOI: 10.1109/access.2017.2717842
|View full text |Cite
|
Sign up to set email alerts
|

Blind Detection of Copy-Move Forgery in Digital Audio Forensics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
26
0
2

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 58 publications
(28 citation statements)
references
References 25 publications
0
26
0
2
Order By: Relevance
“…Barang bukti yang diajukan dipersidangan harus terjamin untuk mencegah gangguan bukti, khususnya barang bukti digital [5]. Demi memenuhi keuntungan beberapa orang dipengadilan rekaman percakapan dari barang bukti audio sering sekali dilakukan manipulasi atau pengeditan [6]. Dalam beberapa kasus, audio menjadi barang bukti yang sering menjadi perdebatan khususnya dalam mengukur dan mendeteksi keakuratan suara.…”
Section: Pendahuluanunclassified
“…Barang bukti yang diajukan dipersidangan harus terjamin untuk mencegah gangguan bukti, khususnya barang bukti digital [5]. Demi memenuhi keuntungan beberapa orang dipengadilan rekaman percakapan dari barang bukti audio sering sekali dilakukan manipulasi atau pengeditan [6]. Dalam beberapa kasus, audio menjadi barang bukti yang sering menjadi perdebatan khususnya dalam mengukur dan mendeteksi keakuratan suara.…”
Section: Pendahuluanunclassified
“…Meanwhile, research [24] used a noise measuring method using the difference in the loudness and proposed an algorithm which enables a robot to estimate the location of the target. The mobile robot was able to generate the coordinates of a sound source with its sensor and estimated the approximate bearing of the source by finding the direction while distinguishing four experimental areas distinguished by using a sound source tracking device.…”
Section: Comparison With Other Systemmentioning
confidence: 99%
“…This method exhibited 3-10% higher accuracy than the existing Threshold-based method. There were many instances of performing performance evaluations in a limited environment in the existing research [24][25][26][27][28] as it estimated the direction by using specialized equipment such as microphone array, etc. However, such a method has a problem when applying it to an actual household, so that another method which can be conveniently used at home with the common smartphones is often used.…”
Section: Comparison With Other Systemmentioning
confidence: 99%
“…Security related problems of wearable IoT devices have been investigated by comparing the production techniques of the manufacturers with respect to security and privacy [73]. An automatic authentication system for identifying and recognising the forgery is audio devices is performed in some devices [74,75].…”
Section: Related Workmentioning
confidence: 99%