BY Neha Sharma | August 24, 2020
Audio forensics is concerned with the scientific representation, analysis and evaluation of audio recordings that are obtained from a civil or a criminal legal proceeding and can be presented as a physical evidence in a court of law or any other official venue. The audio evidence can be presented in the court as a physical evidence under section 65B, the section for the admissibility of electronic records.
Role of an audio forensic examiner
The authenticity of the audio evidence should be verified before presenting it in the court of law otherwise the evidence will not be admissible. The audio forensic examiner plays an important role in determining the authenticity of the audio recording. After analysis, the examiner can interpret whether the recording is original or it has been being tempered.
Why Audio Forensics?
Speech is the primary mode of communication which can be recorded and utilized for the detection of crime. The main objective of audio forensic analysis is:-
• To identify whether the recorded audio under question is tempered or not
• To enhance the quality of the speech in the audio
• To identify the speaker in the questioned audio
Types of Audio Forensic Investigations:
The primary step for the analysis of an audio recording is to establish the authenticity of the recording. The forensic examiner verifies if any alteration such as addition, substitution or deletion has been made to the recording.
The quality of the audio evidence is not always good. Many times it is really difficult to recognize the speech in the recording due to the background noise and to resolve this issue, to understand what is being said, the enhancement of the audio recording is done.
After authentication and enhancement, the evaluation of the audio recording is done in order to understand and interpret the relevance of the audio to the investigation. It includes recognition of the speech (speech recognition), recognition of the speaker (speaker identification), and interpretation of background noise that can indicate the environment in which the audio was recorded.
Techniques of Analysis
To authenticate the integrity of the digital evidence, different digital audio forensic techniques have been developed so that tempering with the audio evidence could be detected.
The audio verification techniques can be broadly classified into two types-
1. Container-based authentication
2. Content-based authentication
It includes the file structure and metadata of the audio file and its description.
Hash-based analysis: Hash value is a fixed numeric value and no two files can have same hash value. Change in hash value of the same file indicates that the file has been modified.
MAC time stamps: It includes the detection of the date and time of creation and modification of the file.
File format: The brief description of the file with relevant information is stored for future reference.
Header: Any modification can be detected using any hexadecimal reader and header information of the file reader. If the file is authentic, the file name should match the file name extension. Device information can be available depending on the device and brand. Time stamps should be noted to compare them with the time claimed by the recordist.
Hex data: Raw digital data of the file may carry useful information such as block addresses of audio, titles of external software (if present) and post-processing operations.
It includes actual bits and bytes of the audio file.
Electronic Network Frequency (ENF): It relies on the traces of ENF present in the audio. The abrupt changes in the power grid signal in the spectrogram visually identifies that the audio has been tempered.
Time frequency: The recording device also records other signals such as signatures which provides information regarding file ownership and the recording location.
Enhancement: Noise is deliberately added in the audio in such a way that it becomes a part of the recording and to reduce this unwanted noise that is present in the original audio and to enhance the quality of the speech in the audio without damaging the original information the audio enhancement is done.
Environment: Reflected signals, secondary sources and ambient noises in the evidentiary audio can be utilized to characterise the environment in which the audio was recorded. Background noise depends on the secondary source activities. The audio authentication and real-time crime identification can be done using Acoustic Environment Identification (AEI). Estimating reverberation and background noise can be used to calculate AEI.
Compression: The audio files are compressed and decompressed for malignant purposes. The file is compressed to recompress it at a higher bit to pass it as a high quality audio.
Maher, Robert C. “Overview of Audio Forensics.” Studies in Computational Intelligence Intelligent Multimedia Analysis for Security Applications, 2010, pp. 127–144.
Malik, Hafiz. “Acoustic Environment Identification and Its Applications to Audio Forensics.” IEEE Transactions on Information Forensics and Security, vol. 8, no. 11, 2013, pp. 1827–1837.
Zakariah, Mohammed, et al. “Digital Multimedia Audio Forensics: Past, Present and Future.” Multimedia Tools and Applications, vol. 77, no. 1, 2017, pp. 1009–1040.