参考文献/References:
[1] SWATI G,SEONGHO C,KUO C C J.Current developments and future trends in audio authentication[J].IEEE Multimedia,2012,19(1):50-59.
[2] LIU Yu-ming,YUAN Zhi-yong,MARKHAM P N,et al.Application of power system frequency for digital audio authentication[J].IEEE Transactions on Power Delivery,2012,27(4):1820-1828.
[3] MALIK H,FARID H.Audio forensics from acoustic reverberation[C]// IEEE International Conference on Acoustics, Speech, and Signal Processing.Dallas:IEEE Press,2010:1710-1713.
[4] IKRAM S,MALIK H.Digital audio forensics using background noise[C]//IEEE International Conference on Multimedia and Expo.Singapore:IEEE Press,2010:106-110.
[5] QIAN Shi,MA Xiao-hong.Detection of audio interpolation based on singular value decomposition[C]//Awareness Science and Technology.Dalian:[s.n.],2011:287-290.
[6] YANG Rui,QU Zhen-hua,HUANG Ji-wu.Exposing MP3 audio forgeries using frame offsets[J].ACM Transactions on Multimedia Computing, Communications, and Applications,2012,33(8):1-20.
[7] CHEN Jiao-rong,XIANG Shi-jun.Exposing digital audio forgeries in time domain by using singularity analysis with wavelets[C]//Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security.New York:[s.n.],2013:149-158.