Forensic techniques can be used to identify the source of a digital data. This is also known as forensic characterization, which means identifying the type of device, model, and other characteristics. Despite this, in recent years, the problem of multimedia source identification has extended its focus from identifying image/video sources toward audio sources. To determine the source of the audio several techniques have been developed. Those techniques work by identifying the acquisition device’s fingerprint as the detection features. However, the prior works have rarely considered audio evidence in a form of a recorded call. In filling that research gap, this thesis looks at intrinsic artifacts of both transmitting and receiving ends of a r...
The use of mobile phones or smartphones has become so widespread that most people rely on them for m...
Audio is one of the digital items that canreveal a happened case. However, audio evide...
The widespread use of smart devices gives rise to both security and privacy concerns. Fingerprinting...
With the widespread availability of cell-phone recording devices, source cell-phone identification h...
The ability to identify mobile phones through their built-in components has been demonstrated in the...
This paper discusses the application of speech signals that convey various pieces of information suc...
An increase in the accuracy of identification of Activities of Daily Living (ADL) is very important ...
The identification of electronic devices through their physical components and properties has many a...
In a recent study, we have introduced the problem of identifying cell-phones using recorded speech a...
Presently, lawyers, law enforcement agencies, and judges in courts use speech and other biometric fe...
A major application of Speaker Identification (SI) is suspect identification by voice. This thesis i...
Speech signals convey various pieces of information such as the identity of its speaker, the languag...
The use of mobile phones or smartphones has become so widespread that most people rely on them for m...
This work proposes a method for source device identification from speech recordings that applies neu...
Recorded speech signals convey information not only for the speakers' identity and the spoken langua...
The use of mobile phones or smartphones has become so widespread that most people rely on them for m...
Audio is one of the digital items that canreveal a happened case. However, audio evide...
The widespread use of smart devices gives rise to both security and privacy concerns. Fingerprinting...
With the widespread availability of cell-phone recording devices, source cell-phone identification h...
The ability to identify mobile phones through their built-in components has been demonstrated in the...
This paper discusses the application of speech signals that convey various pieces of information suc...
An increase in the accuracy of identification of Activities of Daily Living (ADL) is very important ...
The identification of electronic devices through their physical components and properties has many a...
In a recent study, we have introduced the problem of identifying cell-phones using recorded speech a...
Presently, lawyers, law enforcement agencies, and judges in courts use speech and other biometric fe...
A major application of Speaker Identification (SI) is suspect identification by voice. This thesis i...
Speech signals convey various pieces of information such as the identity of its speaker, the languag...
The use of mobile phones or smartphones has become so widespread that most people rely on them for m...
This work proposes a method for source device identification from speech recordings that applies neu...
Recorded speech signals convey information not only for the speakers' identity and the spoken langua...
The use of mobile phones or smartphones has become so widespread that most people rely on them for m...
Audio is one of the digital items that canreveal a happened case. However, audio evide...
The widespread use of smart devices gives rise to both security and privacy concerns. Fingerprinting...