Published: Jun 10, 2022
Converted to Gold OA:
DOI: 10.4018/IJDCF.302894
Volume 14
Chunyan Zeng, Yao Yang, Zhifeng Wang, Shuai Kong, Shixiong Feng
This paper proposes an audio tampering detection method based on the ENF phase and BI-LSTM network from the perspective of temporal feature representation learning. First, the ENF phase is obtained...
Show More
This paper proposes an audio tampering detection method based on the ENF phase and BI-LSTM network from the perspective of temporal feature representation learning. First, the ENF phase is obtained by discrete Fourier transform of ENF component in audio. Second, the ENF phase is divided into frames to obtain ENF phase sequence characterization, and each frame is represented as the change information of the ENF phase in a period. Then, the BI-LSTM neural network is used to train and output the state of each time step, and the difference information between real audio and tampered audio is obtained. Finally, these differences were fitted and dimensionally reduced by the fully connected network and classified by the Softmax classifier. Experimental results show that the performance of this method is better than the state-of-the-art approaches.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Zeng, Chunyan, et al. "Audio Tampering Forensics Based on Representation Learning of ENF Phase Sequence." IJDCF vol.14, no.1 2022: pp.1-19. http://doi.org/10.4018/IJDCF.302894
APA
Zeng, C., Yang, Y., Wang, Z., Kong, S., & Feng, S. (2022). Audio Tampering Forensics Based on Representation Learning of ENF Phase Sequence. International Journal of Digital Crime and Forensics (IJDCF), 14(1), 1-19. http://doi.org/10.4018/IJDCF.302894
Chicago
Zeng, Chunyan, et al. "Audio Tampering Forensics Based on Representation Learning of ENF Phase Sequence," International Journal of Digital Crime and Forensics (IJDCF) 14, no.1: 1-19. http://doi.org/10.4018/IJDCF.302894
Export Reference
Published: Oct 8, 2021
Converted to Gold OA:
DOI: 10.4018/IJDCF.286762
Volume 14
Louay Karadsheh, Haroun Alryalat, Ja'far Alqatawna, Samer Fawaz Alhawari, Mufleh Amin AL Jarrah
The objective of this paper is to examine a model to identify Social Engineer Attack Phases to improve the security countermeasures by Social-Engineer Involvement. A questionnaire was developed and...
Show More
The objective of this paper is to examine a model to identify Social Engineer Attack Phases to improve the security countermeasures by Social-Engineer Involvement. A questionnaire was developed and distributed to a sample of 243 respondents who were actively engaged in 3 Jordanian telecommunication companies. All hypotheses were tested using (PLS-SEM). The results of the study indicate that Social Engineer Attack Phases (Identification the potential target, Target Recognition, Decision approach, and Execution) have a partially mediate and significant impact on improving the security countermeasures by Social-Engineer Involvement. On the other hand, the Social Engineer Attack Phases (Information Aggregations, Analysis and Interpretation, Armament, and Influencing) have a fully mediate and significant impact on improving the security countermeasures by Social-Engineer Involvement. The findings of this study help to provide deep insight to help security professionals prepare better and implement the right and appropriate countermeasures, whether technical or soft measures.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Karadsheh, Louay, et al. "The Impact of Social Engineer Attack Phases on Improved Security Countermeasures: Social Engineer Involvement as Mediating Variable." IJDCF vol.14, no.1 2022: pp.1-26. http://doi.org/10.4018/IJDCF.286762
APA
Karadsheh, L., Alryalat, H., Alqatawna, J., Alhawari, S. F., & Jarrah, M. A. (2022). The Impact of Social Engineer Attack Phases on Improved Security Countermeasures: Social Engineer Involvement as Mediating Variable. International Journal of Digital Crime and Forensics (IJDCF), 14(1), 1-26. http://doi.org/10.4018/IJDCF.286762
Chicago
Karadsheh, Louay, et al. "The Impact of Social Engineer Attack Phases on Improved Security Countermeasures: Social Engineer Involvement as Mediating Variable," International Journal of Digital Crime and Forensics (IJDCF) 14, no.1: 1-26. http://doi.org/10.4018/IJDCF.286762
Export Reference
IGI Global Open Access Collection provides all of IGI Global’s open access content in one convenient location and user-friendly interface
that can easily searched or integrated into library discovery systems.
Browse IGI Global Open
Access Collection
All inquiries regarding IJDCF should be directed to the attention of:
Submission-Related InquiriesAll inquiries regarding IJDCF should be directed to the attention of:Feng Liu
Editors-in-Chief
International Journal of Digital Crime and Forensics
E-mails:
liufeng@iie.ac.cnAuthor Services Inquiries
For inquiries involving pre-submission concerns, please contact the Journal Development Division:
journaleditor@igi-global.comOpen Access Inquiries
For inquiries involving publishing costs, APCs, etc., please contact the Open Access Division:
openaccessadmin@igi-global.comProduction-Related Inquiries
For inquiries involving accepted manuscripts currently in production or post-production, please contact the Journal Production Division:
journalproofing@igi-global.comRights and Permissions Inquiries
For inquiries involving permissions, rights, and reuse, please contact the Intellectual Property & Contracts Division:
contracts@igi-global.comPublication-Related Inquiries
For inquiries involving journal publishing, please contact the Acquisitions Division:
acquisition@igi-global.comDiscoverability Inquiries
For inquiries involving sharing, promoting, and indexing of manuscripts, please contact the Citation Metrics & Indexing Division:
indexing@igi-global.com Editorial Office
701 E. Chocolate Ave.
Hershey, PA 17033, USA
717-533-8845 x100