ENF Analysis and Metadata Consistency

Authenticity II: Digital Methods

Two Pillars of Digital Authentication

  • ENF Analysis = physical truth anchor
    • Links the recording to real-world time, place, and grid conditions
  • Metadata Consistency = digital integrity check
    • Verifies the file’s lifecycle from creation to present

Part 1: ENF Analysis

What is ENF?

  • Electric Network Frequency: the supply frequency of the power grid
  • Nominally 50 Hz (Europe, Asia, Australia) or 60 Hz (North America)
  • Fluctuates randomly as operators balance supply and demand
  • Fluctuations are unique to a specific time and consistent across an entire grid

Why Does ENF Fluctuate?

How ENF Enters Audio Recordings

PathwayHow it works
Electromagnetic inductionMains hum induced into audio circuitry or cables
Acoustic couplingMicrophone picks up hum from transformers/motors
Direct connectionENF enters through wall outlet power supply

The ENF Extraction Pipeline

Step 1: Decimation

  • Audio recorded at high rates (e.g., 44.1 kHz) but ENF is low-frequency
  • Downsample to ~300–400 Hz to focus on the band of interest
  • Apply anti-aliasing FIR low-pass filter before decimation
  • Reduces computational load dramatically

Step 2: Bandpass Filter

  • Isolate the nominal frequency range (e.g., 49.5–50.5 Hz for a 50 Hz grid)
  • Sharp FIR bandpass filter removes everything outside this narrow band
  • What remains: the ENF signal plus any noise in that frequency range

Step 3: STFT Analysis

  • Divide signal into overlapping frames (typically 8–16 seconds)
  • Apply a window function (Hann or Blackman-Tukey) to each frame
  • Compute FFT for each frame to find the dominant frequency
  • Zero-padding (often 4×) improves frequency resolution

Resolution vs. Frame Length Tradeoff

  • Longer frames (16–32 sec): better frequency resolution, poor time resolution
  • Shorter frames (1–2 sec): capture sudden changes, but frequency “blurring”
  • This is the Heisenberg uncertainty principle applied to signal processing
  • Typical forensic choice: 8–16 second frames as a compromise

Step 4: Peak Detection and Interpolation

  • Find the highest-magnitude FFT bin in each frame — this is the ENF estimate
  • True frequency usually falls between bins
  • Quadratic interpolation (QIFFT) refines the peak to sub-bin precision
  • Concatenate all frame estimates → the ENF trace

ENF Trace Example

Beyond STFT: Parametric Methods

  • MUSIC: eigendecomposition of autocorrelation matrix; exhaustive spectral search
  • ESPRIT: uses rotational invariance; faster and more robust than MUSIC
  • Both offer higher resolution than STFT but assume a signal model
  • STFT remains the standard for most forensic work

ENF Harmonics

  • The fundamental (50/60 Hz) may be filtered out by communication systems (>300 Hz cutoff)
  • Harmonics at 100, 150, 200 Hz etc. can survive
  • Multi-Harmonic Combining (MHC): analyze multiple harmonics for better robustness
  • Some systems examine up to the 116th harmonic

ENF Reference Databases

DatabaseAccess
FNET/GridEyePublic
ENF-WHU DatasetOpen source
Power IT LabAcademic
MAST@UMD ENFAcademic

Authentication: Matching Against the Database

  • Extract ENF trace from the recording
  • Normalize both trace and reference to zero mean, unit variance
  • Slide the trace across the reference database sample by sample
  • Measure similarity with correlation coefficient or MMSE

When is a Match Statistically Significant?

  • Grids have daily cycles (morning surges repeat) creating self-similarity
  • A Monday morning pattern may randomly resemble another Monday
  • Recordings <10 minutes are highly susceptible to false positives
  • SNR is critical: low SNR causes rapid increase in matching errors

Timestamping: The Cracow Case

  • 2003 Poland: disputed recording of two businessmen
  • Device clock was off by nearly 200 days vs. witness testimony
  • ENF trace matched the time claimed by witnesses, not the device clock
  • ENF provided the objective physical evidence to resolve the dispute

Tampering Detection via ENF

  • Splicing creates discontinuities in the ENF trace
  • Phase jumps: sudden shifts in wave position (detectable at millisecond level)
  • Frequency jumps: sudden changes in the ENF value between frames
  • Natural grid fluctuations are slow and continuous; edits create abrupt breaks

Inserted Clip Example

ENF in Video

  • Artificial lights flicker in sync with the power grid
  • Flicker occurs at 2× grid frequency (100 Hz or 120 Hz) — both AC half-cycles produce light
  • Invisible to humans, but captured by camera sensors

ENF for Geolocation

  • Inter-grid: Which power grid was the recording made on?
    • US Eastern, US Western, European grids have independent frequency patterns
  • Intra-grid: Where within a specific grid?
    • Frequency varies slightly by location due to local load conditions

Localization Within a Power Grid

Limitations of ENF Analysis

  • Weak signal: ENF is often 40–60 dB below primary audio content
  • Short recordings (<10 min): self-similarity creates false positive risk
  • In-band interference: voices and music in the 50/60 Hz range corrupt the trace
  • Clock skew: device clocks drift, complicating alignment

ENF Anti-Forensics: The Threat

  • Attackers can use a notch filter to erase the original ENF signal
  • Then re-embed a forged donor signal from a different time/location
  • Forged signals can achieve correlation scores up to 0.96 — visually convincing

Detecting ENF Forgery

  • Forged signals leave traces in high-frequency spectral content
  • Subtle phase inconsistencies where the synthetic tone blends with the audio
  • Recapturing (playing and re-recording) embeds two overlapping ENF signals
  • Examiners use decorrelation algorithms and deep learning CNNs to detect these

Part 2: Metadata Consistency

What is Audio Metadata?

  • Internal metadata: embedded in the file container (headers, encoding info, device tags)
  • External metadata: maintained by the OS (file system timestamps)
  • Together they form a digital audit trail of the file’s lifecycle

Metadata Examination Workflow

  1. Acquire and hash: secure the original, create a bit-stream copy, generate MD5/SHA256
  2. Technical assessment: document format, codec, sample rate, bit depth, duration
  3. Global audit: use multiple tools to extract all metadata fields
  4. Exemplar creation: record test files on the same device model for comparison
  5. Local discontinuity check: examine waveform and spectrogram for anomalies

Hash Verification

  • MD5 or SHA256 hash computed immediately upon acquisition
  • Creates a unique digital fingerprint of the file’s exact contents
  • Any change — even a single bit — produces a completely different hash
  • Piecewise hashing: verify integrity of specific file segments independently

Hex Editor Analysis

File Headers and Container Formats

  • WAV: RIFF chunk structure; uncompressed PCM; manufacturer data in custom chunks
  • MP3: ID3 tags (v1 at end, v2 at beginning); frame-based structure
  • AAC: Common on smartphones (iPhone default); M4A container
  • WMA: Microsoft proprietary; ASF container with device-specific metadata

Manufacturer Signatures

  • Recording devices embed proprietary hex strings in file headers
  • Olympus: “OLY”, “mp3”, “702” (model number) at specific offsets
  • These signatures are like a device fingerprint
  • Editing software overwrites these signatures with its own tags

The Olympus Example

Encoding Parameters as Evidence

  • Sampling rate (44.1 kHz, 48 kHz, 8 kHz)
  • Bit depth (16-bit, 24-bit)
  • Codec (PCM, AAC, MP3, DSS)
  • Channels (mono, stereo)
  • Mismatches between claimed origin and encoding = evidence of re-encoding

Device Fingerprints: Smartphones vs. Recorders

  • Smartphones: GPS coordinates, AAC codec, mobile-specific metadata fields
  • Dedicated recorders: proprietary codecs (DSS), manufacturer hex strings, serial numbers
  • Computer recordings: lack physical environment markers, show desktop software signatures
  • Double compression artifacts appear when re-encoding a lossy format

ExifTool in Forensic Practice

  • Standard tool for extracting metadata from audio/video files
  • Key fields: Create Date, Modify Date, Make, GPS, Compressor Name
  • Can extract EXIF, IPTC, XMP, and format-specific metadata
  • Also used to test vulnerabilities — can metadata be injected or modified?

Timestamps and MACB

  • Modification: last time file content changed
  • Access: last time file was opened
  • Creation: when the file was first created on this volume
  • Entry modification (B): when the MFT record was updated
  • Stored in the NTFS Master File Table ($MFT)

Detecting Timestomping

  • Timestomping: manually changing a file’s creation or modification date
  • Attackers alter $MFT timestamps to match a false narrative
  • System journals ($LogFile, $UsnJrnl) record file operations independently
  • Comparing MFT timestamps against journal entries reveals the forgery

Software Fingerprints

  • Editing software overwrites manufacturer metadata with its own tags
  • Adobe Audition inserts XMP metadata identifying the software version
  • Audacity, Pro Tools, and other DAWs leave similar traces
  • The absence of expected manufacturer metadata is itself a red flag

Chain of Custody and Metadata

  • Metadata documents the file’s complete lifecycle
  • Hash at acquisition → hash at every handoff → hash at analysis
  • Any break in the chain or hash mismatch = compromised evidence
  • Embedded checksums in proprietary formats provide additional verification

Part 3: Putting It Together

ENF + Metadata: Complementary Evidence

  • ENF: links the file to the physical world (time, place, grid)
  • Metadata: verifies the digital lifecycle (device, software, timestamps)
  • When they agree → strong evidence of authenticity
  • When they disagree → strong evidence of tampering

Resolving Ambiguity

  • Short recordings: ENF alone may have multiple matches → metadata narrows the timeframe
  • Forged metadata: timestamps easily changed → ENF provides independent physical check
  • Clock skew: device clock drifted → use ENF as a time anchor to calculate the offset
  • Missing ENF: outdoor/battery recording → metadata may be the only evidence available

The DEMA System

  • Decentralized ENF-based Media Authentication for social media
  • Aggregates ENF data from edge nodes and cloud servers
  • Uses blockchain (Proof-of-ENF consensus) to prevent database poisoning
  • Cross-references EXIF GPS/timestamps against ENF databases

Case Integration Example

  • Recording claims to be from March 5, 2:15 PM, New York office
  • Metadata check: iPhone AAC, creation date March 5, GPS coordinates match office
  • ENF check: trace matches US Eastern grid reference at March 5, 2:12 PM
  • Clock skew: 3-minute offset consistent with typical iPhone clock drift
  • Conclusion: evidence supports authenticity

Summary

  • ENF analysis extracts power grid frequency to verify time, location, and integrity
  • Metadata consistency audits file headers, encoding, and timestamps for modification
  • Neither method is sufficient alone — use both as complementary pillars
  • The field faces an arms race between forensic tools and anti-forensic techniques