The topic of this thesis is the Electrical Network Frequency (ENF) Criterion as a method to determine both the time of recording and the location of an audio file when no or corrupted meta-data is available. This may be possible when the recording equipment is mains powered or when it is situated in electromagnetic field of the power grid. Then the voltage signal is unintentionally recorded as well and its frequency is uniquely changing over time and location. In this sence, the ENF is like a digital fingerprint. It is found that a time of recording can be estimated under reasonable circumstances and that a rough location estimation of the recording is possible. The ENF criterion is applied mostly in forensic research. The applicability is ...
Abstract Forensic applications exploit electric network frequency (ENF) as a fingerprint to determin...
be captured in multimedia signals recorded in areas of elec trical activity. This has led to the eme...
This paper describes the problem of tampering detection and discusses the main methods used for auth...
Authentication of recordings is an important task in forensic sciences. When processing audio or vid...
Forensic analysis based on Electric Network Frequency (ENF) fluctuations is an emerging technology f...
By analyzing the frequency of low-level power line energy (Electrical Network Frequency, ENF) that h...
The transmission frequency of power grids, i.e., electric network frequency (ENF), has become a comm...
By analyzing the frequency of low-level power line energy (Electrical Network Frequency, ENF) that h...
An Electric Network Frequency (ENF) signal is the 60 Hz component of an AC power signal that varies ...
Extracting the Electric Network Frequency (ENF) fluctuations from an audio recording and comparing i...
Electric Network Frequency (ENF) fluctuations based forensic anal-ysis is an emerging way for such m...
In the modern era, a vast quantities of digital information is available in the form of audio, image...
Electric Network Frequency (ENF) is embedded in multimedia recordings if the recordings are captured...
[[abstract]]We live in a digital era. Digital contents may be produced by digital equipments or by c...
The distribution-level electric network frequency (ENF) extracted from an electric power signal is a...
Abstract Forensic applications exploit electric network frequency (ENF) as a fingerprint to determin...
be captured in multimedia signals recorded in areas of elec trical activity. This has led to the eme...
This paper describes the problem of tampering detection and discusses the main methods used for auth...
Authentication of recordings is an important task in forensic sciences. When processing audio or vid...
Forensic analysis based on Electric Network Frequency (ENF) fluctuations is an emerging technology f...
By analyzing the frequency of low-level power line energy (Electrical Network Frequency, ENF) that h...
The transmission frequency of power grids, i.e., electric network frequency (ENF), has become a comm...
By analyzing the frequency of low-level power line energy (Electrical Network Frequency, ENF) that h...
An Electric Network Frequency (ENF) signal is the 60 Hz component of an AC power signal that varies ...
Extracting the Electric Network Frequency (ENF) fluctuations from an audio recording and comparing i...
Electric Network Frequency (ENF) fluctuations based forensic anal-ysis is an emerging way for such m...
In the modern era, a vast quantities of digital information is available in the form of audio, image...
Electric Network Frequency (ENF) is embedded in multimedia recordings if the recordings are captured...
[[abstract]]We live in a digital era. Digital contents may be produced by digital equipments or by c...
The distribution-level electric network frequency (ENF) extracted from an electric power signal is a...
Abstract Forensic applications exploit electric network frequency (ENF) as a fingerprint to determin...
be captured in multimedia signals recorded in areas of elec trical activity. This has led to the eme...
This paper describes the problem of tampering detection and discusses the main methods used for auth...