|
|
|
Nikolaos Vryzas, Anastasia Katsaounidou, Lazaros Vrysis, Rigas Kotsakis and Charalampos Dimoulas
Media authentication relies on the detection of inconsistencies that may indicate malicious editing in audio and video files. Traditionally, authentication processes are performed by forensics professionals using dedicated tools. There is rich research o...
ver más
|
|
|
|
|
|
|
Tianyun Liu, Diqun Yan, Rangding Wang, Nan Yan and Gang Chen
The number of channels is one of the important criteria in regard to digital audio quality. Generally, stereo audio with two channels can provide better perceptual quality than mono audio. To seek illegal commercial benefit, one might convert a mono audi...
ver más
|
|
|
|
|
|
|
Diego Renza, Jaime Andres Arango and Dora Maria Ballesteros
This paper addresses a problem in the field of audio forensics. With the aim of providing a solution that helps Chain of Custody (CoC) processes, we propose an integrity verification system that includes capture (mobile based), hash code calculation and ...
ver más
|
|
|
|