Advanced forensic method to authenticate audio files from Tizen-based Samsung Galaxy Watches

IF 2 4区 医学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS
Nam In Park , Ji Woo Lee , Seong Ho Lim , Oc-Yueb Jeon , Jin-Hwan Kim , Jun Seok Byun , Chanjun Chun , Jung-Hwan Lee
{"title":"Advanced forensic method to authenticate audio files from Tizen-based Samsung Galaxy Watches","authors":"Nam In Park ,&nbsp;Ji Woo Lee ,&nbsp;Seong Ho Lim ,&nbsp;Oc-Yueb Jeon ,&nbsp;Jin-Hwan Kim ,&nbsp;Jun Seok Byun ,&nbsp;Chanjun Chun ,&nbsp;Jung-Hwan Lee","doi":"10.1016/j.fsidi.2024.301697","DOIUrl":null,"url":null,"abstract":"<div><p>In this study, we propose a forensic-forgery detecting approach for audio files, an extension of previous research on the Android-based Samsung Galaxy Watch4 series, captured by the Voice Recorder application on Samsung Galaxy smartwatches with the Tizen operating system (OS). We collected 200 audio files from five different Galaxy Watch models equipped with the Tizen OS and paired them with smartphones using Bluetooth. We analyzed the specific features of the audio files captured by smartwatches, such as audio latency, audio tailing, timestamps, and file structure, and examined the specific features between audio files captured in the smartwatches and those manipulated by the recording application installed by default in the paired smartphones. Furthermore, audio files from smartwatches can be analyzed using the Smart Development Bridge (SDB) tool and it compares the timestamps from smartwatch audio files with those in the file system. The experiments revealed that the audio latency/tailing, attributes, and file structure of audio files captured by smartwatches differed from those of smartphones with the Tizen OS. Additionally, by examining the audio latency/tailing and attributes of the file structure, we detected if the audio files were manipulated, and track and classify where the audio files were manipulated. Finally, the audio files captured in the Samsung Galaxy Watches with the Tizen OS can be authenticated forensically by comparing the timestamps of the audio files in the smartwatch file system and those stored in the audio files. We believe our findings may be useful for audio-related digital forensics.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":null,"pages":null},"PeriodicalIF":2.0000,"publicationDate":"2024-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666281724000064/pdfft?md5=e1795316b3d740ff97ed68e1612ff0ed&pid=1-s2.0-S2666281724000064-main.pdf","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Forensic Science International-Digital Investigation","FirstCategoryId":"3","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2666281724000064","RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

In this study, we propose a forensic-forgery detecting approach for audio files, an extension of previous research on the Android-based Samsung Galaxy Watch4 series, captured by the Voice Recorder application on Samsung Galaxy smartwatches with the Tizen operating system (OS). We collected 200 audio files from five different Galaxy Watch models equipped with the Tizen OS and paired them with smartphones using Bluetooth. We analyzed the specific features of the audio files captured by smartwatches, such as audio latency, audio tailing, timestamps, and file structure, and examined the specific features between audio files captured in the smartwatches and those manipulated by the recording application installed by default in the paired smartphones. Furthermore, audio files from smartwatches can be analyzed using the Smart Development Bridge (SDB) tool and it compares the timestamps from smartwatch audio files with those in the file system. The experiments revealed that the audio latency/tailing, attributes, and file structure of audio files captured by smartwatches differed from those of smartphones with the Tizen OS. Additionally, by examining the audio latency/tailing and attributes of the file structure, we detected if the audio files were manipulated, and track and classify where the audio files were manipulated. Finally, the audio files captured in the Samsung Galaxy Watches with the Tizen OS can be authenticated forensically by comparing the timestamps of the audio files in the smartwatch file system and those stored in the audio files. We believe our findings may be useful for audio-related digital forensics.

验证基于 Tizen 的三星 Galaxy 手表音频文件的先进取证方法
在本研究中,我们针对音频文件提出了一种取证-伪造检测方法,这是对之前针对基于安卓系统的三星 Galaxy Watch4 系列所做研究的延伸,该系列由搭载 Tizen 操作系统(OS)的三星 Galaxy 智能手表上的语音录制器应用程序捕获。我们从配备 Tizen 操作系统的五款不同 Galaxy 手表上收集了 200 个音频文件,并通过蓝牙与智能手机配对。我们分析了智能手表捕获的音频文件的具体特征,如音频延迟、音频尾音、时间戳和文件结构,并研究了智能手表捕获的音频文件与配对智能手机中默认安装的录音应用程序所处理的音频文件之间的具体特征。此外,还可以使用智能开发桥(SDB)工具分析智能手表中的音频文件,并比较智能手表音频文件和文件系统中的时间戳。实验表明,智能手表捕获的音频文件的音频延迟/尾音、属性和文件结构与搭载 Tizen 操作系统的智能手机不同。此外,通过检查音频延迟/尾音和文件结构的属性,我们可以检测音频文件是否被篡改,并跟踪和分类音频文件被篡改的位置。最后,通过比较智能手表文件系统中音频文件的时间戳和音频文件中存储的时间戳,可以对采用 Tizen 操作系统的三星 Galaxy 手表中捕获的音频文件进行取证验证。我们相信,我们的发现可能对音频相关的数字取证有用。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
CiteScore
5.90
自引率
15.00%
发文量
87
审稿时长
76 days
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信