A Novel Audio Copy Move Forgery Detection Method With Classification of Graph-Based Representations


ÜSTÜBİOĞLU B., TAHAOĞLU G., Ustubioglu A., ULUTAŞ G., KILIÇ M.

IEEE ACCESS, cilt.13, ss.22029-22054, 2025 (SCI-Expanded) identifier identifier

  • Yayın Türü: Makale / Tam Makale
  • Cilt numarası: 13
  • Basım Tarihi: 2025
  • Doi Numarası: 10.1109/access.2025.3535840
  • Dergi Adı: IEEE ACCESS
  • Derginin Tarandığı İndeksler: Science Citation Index Expanded (SCI-EXPANDED), Scopus, Compendex, INSPEC, Directory of Open Access Journals
  • Sayfa Sayıları: ss.22029-22054
  • Karadeniz Teknik Üniversitesi Adresli: Evet

Özet

The rapid advancement of digital environments has led to an increase in multimedia forgery, particularly in the realm of audio, which leads to significant threats to the reliability of digital evidence. This paper presents a novel method to detect audio copy-move forgery, a type of manipulation where segments of an audio file are duplicated and moved to different locations within the same file. The proposed method consists of two main stages. In the first stage, the frequency range containing the forged segments is identified by extracting high-resolution spectrograms from the audio and matching keypoints within the spectrogram images to detect duplicated segments. The frequency range of the sub-spectrogram images with the highest match density is considered the location of the repeated segments. A swarm-based optimization approach is used to adaptively determine this dense region. The audio is then a bandpass filtered using the identified frequency range, and the second stage begins. In this stage, the filtered audio is represented as a graph using the proposed spiral pattern information extraction method. Graph coloring algorithms are applied to convert the graph into a visual representation, which is then input into a specially designed Convolutional Neural Network (CNN) model for classification. The trained model was evaluated using five different datasets, demonstrating that this approach generally outperforms existing methods in terms of detection accuracy. It provides a robust solution for verifying audio authenticity, even under various additional attack scenarios, and shows potential for generalization.