24
© Fraunhofer “IS IT TRUE ?” AUDIO RECOGNITION AND TAMPERING DETECTION AS MEANS FOR AUTHENTICATING COMMUNICATIONS Karlheinz Brandenburg, Christian Dittmar Fraunhofer Institute for Digital Media Technology IDMT Technische Universität Ilmenau Virtual Goods, Koblenz, September 2013

“IS IT TRUE ?” AUDIO RECOGNITION AND TAMPERING DETECTION ... · audio recognition and tampering detection as means for authenticating communications ... sample „loreen - euphoria

  • Upload
    votuong

  • View
    222

  • Download
    1

Embed Size (px)

Citation preview

Page 1: “IS IT TRUE ?” AUDIO RECOGNITION AND TAMPERING DETECTION ... · audio recognition and tampering detection as means for authenticating communications ... sample „loreen - euphoria

© Fraunhofer

“IS IT TRUE ?” AUDIO RECOGNITION AND TAMPERING DETECTION AS MEANS FOR AUTHENTICATING COMMUNICATIONS

Karlheinz Brandenburg, Christian Dittmar

Fraunhofer Institute for Digital Media Technology IDMTTechnische Universität Ilmenau

Virtual Goods, Koblenz, September 2013

Page 2: “IS IT TRUE ?” AUDIO RECOGNITION AND TAMPERING DETECTION ... · audio recognition and tampering detection as means for authenticating communications ... sample „loreen - euphoria

© Fraunhofer

OVERVIEW

Current challenges

Security

Authentication

Technical means to proof tampering

Robust hashes (audio identification)

Recognize melodies

Identify editing of audio recordings

Conclusions

2

Page 3: “IS IT TRUE ?” AUDIO RECOGNITION AND TAMPERING DETECTION ... · audio recognition and tampering detection as means for authenticating communications ... sample „loreen - euphoria

© Fraunhofer

BACKGROUND

Digital audio everywhere

20 million tracks of music

Every phone conversation

Billions of devices record / play back audio of all kinds

But is it true ?

We all know that pictures can be modified

Audio has the same possibilities

Delete parts to change meaning

Re-use the artistic work of others

3

Page 4: “IS IT TRUE ?” AUDIO RECOGNITION AND TAMPERING DETECTION ... · audio recognition and tampering detection as means for authenticating communications ... sample „loreen - euphoria

© Fraunhofer

SOME SCENARIOS (SOME OF THEM HAVE PROBABLY NOT YET HAPPENED)

Plagiarism:

A short piece of music is re-used as is

A melody is used in a different context

Editing the original source

Some words are deleted from a sentence to change the meaning

An original source is used as a material to create a new sentence

Resynthesizing speech:

Analysis of speech specifics, then synthesis with new meaning

4

Page 5: “IS IT TRUE ?” AUDIO RECOGNITION AND TAMPERING DETECTION ... · audio recognition and tampering detection as means for authenticating communications ... sample „loreen - euphoria

© Fraunhofer

SECURITY / AUTHENTICATION

Use cryptography to secure the transmission

Not the topic of this talk

Use hash functions or similar to authenticate the source of the transmission

Probably the only solution against the most advanced attacks

Again not the topic of this talk, but:

Can we produce robust hash functions for audio ?

Yes, see the next slides

5

Page 6: “IS IT TRUE ?” AUDIO RECOGNITION AND TAMPERING DETECTION ... · audio recognition and tampering detection as means for authenticating communications ... sample „loreen - euphoria

© Fraunhofer

AUDIO IDENTIFICATION, AUDIO SIMILARITY: BASICS

Audio identification is used in Apps like Shazam, SoundHound

Technically mature field

Use of machine learning

Accuracies approach 100 % even in difficult conditions

Audio recognition

Much more difficult

We can recognize melodies etc.

Examples follow

6

Page 7: “IS IT TRUE ?” AUDIO RECOGNITION AND TAMPERING DETECTION ... · audio recognition and tampering detection as means for authenticating communications ... sample „loreen - euphoria

© Fraunhofer

AUDIO SIGNAL ANALYSIS: BASIC TASKS

Audio Similarity Search: Query-by-Example Common approach

Audio model given by distribution of low-level audio features

Distance between models indicates similarity

7

•Parametric•Distance•Measures

•Audio Signal •Features •Models •Rank Lists•Aggregation

Page 8: “IS IT TRUE ?” AUDIO RECOGNITION AND TAMPERING DETECTION ... · audio recognition and tampering detection as means for authenticating communications ... sample „loreen - euphoria

© Fraunhofer

AUDIO SIGNAL ANALYSIS: BASIC TASKS

Audio Pattern Recognition Machine Learning

8

Page 9: “IS IT TRUE ?” AUDIO RECOGNITION AND TAMPERING DETECTION ... · audio recognition and tampering detection as means for authenticating communications ... sample „loreen - euphoria

© Fraunhofer

AUDIO FEATURES

Low level

Signal derived, simple math

Sufficient for certain applications

Building blocks for more complex tasks

Mid level

May already have semantic meaning

Combined or derived from low level features

High level

Could be called “output parameters”

Can be understood by a human listener

9

Page 10: “IS IT TRUE ?” AUDIO RECOGNITION AND TAMPERING DETECTION ... · audio recognition and tampering detection as means for authenticating communications ... sample „loreen - euphoria

© Fraunhofer

AUDIO FEATURES: LOW-LEVEL FEATURE EXTRACTION

Principle of short-term analysis:

Q: Hop-size

K: Window-/Block-size

w: Window-function

x: Signal frame

In each analysis frame:

Time signal based LL features

Spectrum based LL features

Cepstrum based, others …

10

Page 11: “IS IT TRUE ?” AUDIO RECOGNITION AND TAMPERING DETECTION ... · audio recognition and tampering detection as means for authenticating communications ... sample „loreen - euphoria

© Fraunhofer

AUDIO FEATURES: LOW-LEVEL FEATURE EXTRACTION

Time signal based LL features:

ZCR (Zero Crossing Rate): number of sign changes of the audio waveform per time frame can be used to distinguish between low-pitched and high-pitched sounds, less suited for mixtures of multiple sounds

LPC (Linear Prediction Coefficients): compute filter coefficients, whose impulse response is as close to the spectral envelopes of the input signal as possible originally used for speech coding

11

Page 12: “IS IT TRUE ?” AUDIO RECOGNITION AND TAMPERING DETECTION ... · audio recognition and tampering detection as means for authenticating communications ... sample „loreen - euphoria

© Fraunhofer

AUDIO FEATURES: LOW-LEVEL FEATURE EXTRACTION

Spectrum-based features:

Spectrogram Duality between time and frequency resolution

Linear vs. Logarithmic frequency axis

12

Gabor Wavelet Spectrogram [dB]

Time [Sec]

Freq

uenc

y [H

z]

0.5 1 1.5 2

277

407

599

880

1293

1901

2794

4106

6035

8870

STFT Spectrogram [dB]

Time [Sec]

Freq

uenc

y [H

z]

0.5 1 1.5 2

1000

2000

3000

4000

5000

6000

7000

8000

9000

10000

11000

Page 13: “IS IT TRUE ?” AUDIO RECOGNITION AND TAMPERING DETECTION ... · audio recognition and tampering detection as means for authenticating communications ... sample „loreen - euphoria

© Fraunhofer

MUSIC PLAGIARISM ANALYSIS: MOTIVATION

Plagiarism is know since ancient times:

The word „plagiarius“ was used for somebody kidnapping poems.

In legal terms, different types of music plagiarism are discerned:

Unconscious plagiarism The Chiffons vs. George Harrison example

Parallel creation two authors create a work independently

Adaption editing extensive enough to create new work

Free usage original material must not be recognizable in derived one

13

Page 14: “IS IT TRUE ?” AUDIO RECOGNITION AND TAMPERING DETECTION ... · audio recognition and tampering detection as means for authenticating communications ... sample „loreen - euphoria

© Fraunhofer

MUSIC PLAGIARISM ANALYSIS: MOTIVATION

Music Plagiarism:

Melody sequences

Rhythm patterns Similarities on a semantic level

Chord sequences

Sampling Plagiarism:

Re-use of existing recordings into a new work

Timbre qualities Similarity on a signal level

There are web-communities that search & document such cases

(www.whosampled.com; www.the-breaks.com; www.secondhandsongs.com)

14

Page 15: “IS IT TRUE ?” AUDIO RECOGNITION AND TAMPERING DETECTION ... · audio recognition and tampering detection as means for authenticating communications ... sample „loreen - euphoria

© Fraunhofer

MUSIC PLAGIARISM ANALYSIS: MELODYPLAGIARISM

Allegations of music plagiarism against the German entry to theEuropean Song Contest

Frontpage in biggest German newspaper Bild-Zeitung on 17.02.2013

Based on expertise by phonetician from University Kiel

Public broadcaster NDR commisioned musicologist expertise byMatthias Pogoda result published 25.02.2013

Sample „Loreen - Euphoria“

Tempo 131 BPM, Key F#-Minor

Sample „Cascada - Glorious“

Tempo 128 BPM, Key G-Minor

15

Page 16: “IS IT TRUE ?” AUDIO RECOGNITION AND TAMPERING DETECTION ... · audio recognition and tampering detection as means for authenticating communications ... sample „loreen - euphoria

© Fraunhofer

MUSIC PLAGIARISM ANALYSIS: MELODYPLAGIARISM

Comparison of melodies: „Loreen – Euphoria“ vs. „Cascada – Glorious“

16

Page 17: “IS IT TRUE ?” AUDIO RECOGNITION AND TAMPERING DETECTION ... · audio recognition and tampering detection as means for authenticating communications ... sample „loreen - euphoria

© Fraunhofer

Constant-Q Spectrogram of original sample

Time in Frames

Freq

uenc

y in

Bin

s

200 400 600 800 1000 1200 1400 1600 1800

20

40

60

80

100

120

140

160

180

200

220

Constant-Q Spectrogram of suspected sampling plagiarism

Time in Frames

Freq

uenc

y in

Bin

s

500 1000 1500 2000 2500 3000

20

40

60

80

100

120

140

160

180

200

220

SAMPLING PLAGIARISM

Known data:

Original music excerpt

Suspected sampling plagiarism

Edit operations:

Cropping

Looping

Time-stretching

Pitch-shifting

Mixing of new instruments

17

Page 18: “IS IT TRUE ?” AUDIO RECOGNITION AND TAMPERING DETECTION ... · audio recognition and tampering detection as means for authenticating communications ... sample „loreen - euphoria

© Fraunhofer

SAMPLING PLAGIARISM: BRUTE FORCE APPROACH

Shift original alongsuspected plagiarism find best match

Distance measures: L1 distance, L2 distance, Correlation …

18

Page 19: “IS IT TRUE ?” AUDIO RECOGNITION AND TAMPERING DETECTION ... · audio recognition and tampering detection as means for authenticating communications ... sample „loreen - euphoria

© Fraunhofer

0 200 400 600 800 1000 1200 1400 1600 1800 20002

4

6

8

10x 106 Distance function over time

0 200 400 600 800 1000 1200 1400 1600 1800 2000-2

-1

0

1

2x 106

Time in Frames

L1 d

ista

nce

Distance function over time after global trend removal

SAMPLING PLAGIARISM: BRUTE FORCE APPROACH

Restrict search space by preliminary beat estimation

only test timestretchingfactors at reasonablemultiples of the beat

only compare frame byframe around beatpositions

19

Page 20: “IS IT TRUE ?” AUDIO RECOGNITION AND TAMPERING DETECTION ... · audio recognition and tampering detection as means for authenticating communications ... sample „loreen - euphoria

© Fraunhofer

DETECTING EDITING OR OTHER TAMPERING

Watermarking:

Insert inaudible signals into the music / speech

Tradeoff between

Bitrate

Robustness

Inaudibility of the watermark

Can survive some modification of the signal (even transmission from loudspeaker to microphone) or can be fragile on purpose

Often does not survive heavier modifications

Clearly a forensic tool, it is often not known that a watermark has been applied

20

Page 21: “IS IT TRUE ?” AUDIO RECOGNITION AND TAMPERING DETECTION ... · audio recognition and tampering detection as means for authenticating communications ... sample „loreen - euphoria

© Fraunhofer

DETECTING EDITING OR OTHER TAMPERING

Digital Signatures

Not part of the signal: may be deleted

Additional data necessary

Can implement a “bind identity to the content”

Can easily be stripped from the main data

Tampering detection without any additional signal:

Find discontinuities in the speech signal

E.g. in the phase of Electric Network Frequency (ENF) signals

21

Page 22: “IS IT TRUE ?” AUDIO RECOGNITION AND TAMPERING DETECTION ... · audio recognition and tampering detection as means for authenticating communications ... sample „loreen - euphoria

© Fraunhofer

PHASE ANALYSIS

Idea:

Modifications cause changes in the ENF phase

Using this changes to detect tamperings

Works without any reference data

Approach

Extraction phase from ENF

Detection discontinuities

Segmentation of recording

22

Page 23: “IS IT TRUE ?” AUDIO RECOGNITION AND TAMPERING DETECTION ... · audio recognition and tampering detection as means for authenticating communications ... sample „loreen - euphoria

© Fraunhofer

WANT TO LEARN MORE?

Visit WASP workshop this Friday 20.09.2013 (RoomF 413)

11:00 - 12:30 Session 2 / 4

Sebastian Mann: Combining ENF Phase Discontinuity Checking andTemporal Pattern Matching for Audio Tampering Detection

13:30 – 14:45 Session 3 / 4 (Posters)

Christian Dittmar: Estimating MP3PRO Encoder Parameters From Decoded Audio

23

Page 24: “IS IT TRUE ?” AUDIO RECOGNITION AND TAMPERING DETECTION ... · audio recognition and tampering detection as means for authenticating communications ... sample „loreen - euphoria

© Fraunhofer

CONCLUSIONS:

More and more people are concerned about privacy and security:

We need to do more about these topics

We do have technical means to help

In the audio world: There are several methods to help against unwanted tampering:

Identification of plagiarism

Identification of changes to a signal

Authentication is a topic which deserves more attention

24