{"id":3020,"date":"2024-05-22T10:19:35","date_gmt":"2024-05-22T08:19:35","guid":{"rendered":"https:\/\/www.cyberagentur.de\/projects\/audio-forensics-aufo\/"},"modified":"2026-04-28T11:07:20","modified_gmt":"2026-04-28T09:07:20","slug":"aufo","status":"publish","type":"project","link":"https:\/\/www.cyberagentur.de\/en\/programs\/aufo\/","title":{"rendered":"Audio Forensics (AuFo)"},"content":{"rendered":"  <ol class='ce-item-info property-list property-list--small'>\n    <li class='property'>\n    <span class='property__name'>Focus:<\/span>\n    <span class='property__value'>Secure Society<\/span>\n<\/li><li class='property'>\n    <span class='property__name'>Status:<\/span>\n    <span class='property__value'>Project phase<\/span>\n<\/li>\n  <\/ol>\n<h3 class=\"wp-block-heading has-text-align-left\">Background<\/h3>\n\n<p>In the analysis of audio data, the transcription of speech content and the identification of speakers have already been the subject of sufficient research activity. However, the evaluation of meta-information that can be extracted from acoustic signals in addition to spoken language is still a largely unexplored field. In particular, it is not yet known what information can be derived about the environment in which audio data was recorded. This is highly relevant in time-critical application scenarios, such as emergency calls and missing persons cases, or in relation to so-called &#8220;Heimlich recordings&#8221;. The latter are sound recordings that are made covertly and without the knowledge of other people. They can occur during kidnappings, for example.     <\/p>\n\n<h3 class=\"wp-block-heading has-text-align-left\">Aim<\/h3>\n\n<p>The &#8220;Audio Forensics&#8221; (AuFo) research program aims to analyze low-quality audio data with regard to the recording location. The aim is to investigate the extent to which partial room acoustic parameters allow a characterization of the recording environment, e.g. with regard to its size, geometry, nature and location (interior\/exterior), in order to ideally be able to make a regional delimitation. In addition to reconstructing the recording location, the aim is to investigate what information can be derived about the recording device, e.g. special characteristics of a smartphone microphone. Depending on the uniqueness of the data, information could also be obtained to uniquely identify, recognize or limit possible sound sources. Ideally, law enforcement authorities will be able to obtain precise location information in time-critical application scenarios, such as kidnapping or missing persons cases, and thus be able to take action. Even initial investigative leads offer considerable added value for law enforcement.     <\/p>\n\n<h3 class=\"wp-block-heading has-text-align-left\">Disruptive Risk Research<\/h3>\n\n<p>In our view, the intended research goal holds great potential for innovation. According to the current state of the art, it is unclear to what extent it is possible to reconstruct the recording location using low-quality audio data. It is also not yet possible to estimate whether the research results will be applicable in the context of criminal prosecution, as forensic methods are to be researched that can be used for legally secure evidence. This represents a major challenge. From a scientific and technical perspective, the program must therefore be considered high-risk research. For this reason, two contractors were selected for the first research phase after extensive examination and intensive rounds of negotiations.     <\/p>\n\n<ul class=\"wp-block-list\">\n<li>Project &#8216;Applied research for audio forensic investigations&#8217;<a href=\"https:\/\/www.marinom.de\/de\/forschungsprojekte\/audioforensik\" target=\"_blank\" rel=\"noreferrer noopener\">(AnFAng<\/a>) of marinom GmbH<\/li>\n\n\n\n<li>Project &#8216;Sound &amp; Audio Forensic Investigation and Research Activity&#8217; (SAFIRA) of Binaurics Audio GmbH<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Background In the analysis of audio data, the transcription of speech content and the identification of speakers have already been the subject of sufficient research activity. However, the evaluation of meta-information that can be extracted from acoustic signals in addition to spoken language is still a largely unexplored field. In particular, it is not yet [&hellip;]<\/p>\n","protected":false},"featured_media":2966,"template":"","class_list":["post-3020","project","type-project","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Audio Forensics (AuFo) - Cyberagentur<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberagentur.de\/en\/programs\/aufo\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Audio Forensics (AuFo) - Cyberagentur\" \/>\n<meta property=\"og:description\" content=\"Background In the analysis of audio data, the transcription of speech content and the identification of speakers have already been the subject of sufficient research activity. However, the evaluation of meta-information that can be extracted from acoustic signals in addition to spoken language is still a largely unexplored field. In particular, it is not yet [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberagentur.de\/en\/programs\/aufo\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyberagentur\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-28T09:07:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberagentur.de\/wp-content\/uploads\/2024\/08\/AuFo.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2304\" \/>\n\t<meta property=\"og:image:height\" content=\"1792\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/programs\\\/aufo\\\/\",\"url\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/programs\\\/aufo\\\/\",\"name\":\"Audio Forensics (AuFo) - Cyberagentur\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/programs\\\/aufo\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/programs\\\/aufo\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/AuFo.jpg\",\"datePublished\":\"2024-05-22T08:19:35+00:00\",\"dateModified\":\"2026-04-28T09:07:20+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/programs\\\/aufo\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/programs\\\/aufo\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/programs\\\/aufo\\\/#primaryimage\",\"url\":\"\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/AuFo.jpg\",\"contentUrl\":\"\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/AuFo.jpg\",\"width\":2304,\"height\":1792,\"caption\":\"AuFo\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/programs\\\/aufo\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Audio Forensics (AuFo)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/\",\"name\":\"Cyberagentur\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Audio Forensics (AuFo) - Cyberagentur","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberagentur.de\/en\/programs\/aufo\/","og_locale":"en_GB","og_type":"article","og_title":"Audio Forensics (AuFo) - Cyberagentur","og_description":"Background In the analysis of audio data, the transcription of speech content and the identification of speakers have already been the subject of sufficient research activity. However, the evaluation of meta-information that can be extracted from acoustic signals in addition to spoken language is still a largely unexplored field. In particular, it is not yet [&hellip;]","og_url":"https:\/\/www.cyberagentur.de\/en\/programs\/aufo\/","og_site_name":"Cyberagentur","article_modified_time":"2026-04-28T09:07:20+00:00","og_image":[{"width":2304,"height":1792,"url":"https:\/\/www.cyberagentur.de\/wp-content\/uploads\/2024\/08\/AuFo.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberagentur.de\/en\/programs\/aufo\/","url":"https:\/\/www.cyberagentur.de\/en\/programs\/aufo\/","name":"Audio Forensics (AuFo) - Cyberagentur","isPartOf":{"@id":"https:\/\/www.cyberagentur.de\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberagentur.de\/en\/programs\/aufo\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberagentur.de\/en\/programs\/aufo\/#primaryimage"},"thumbnailUrl":"\/wp-content\/uploads\/2024\/08\/AuFo.jpg","datePublished":"2024-05-22T08:19:35+00:00","dateModified":"2026-04-28T09:07:20+00:00","breadcrumb":{"@id":"https:\/\/www.cyberagentur.de\/en\/programs\/aufo\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberagentur.de\/en\/programs\/aufo\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.cyberagentur.de\/en\/programs\/aufo\/#primaryimage","url":"\/wp-content\/uploads\/2024\/08\/AuFo.jpg","contentUrl":"\/wp-content\/uploads\/2024\/08\/AuFo.jpg","width":2304,"height":1792,"caption":"AuFo"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberagentur.de\/en\/programs\/aufo\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberagentur.de\/en\/"},{"@type":"ListItem","position":2,"name":"Audio Forensics (AuFo)"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberagentur.de\/en\/#website","url":"https:\/\/www.cyberagentur.de\/en\/","name":"Cyberagentur","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberagentur.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/programme\/3020","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/programme"}],"about":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/types\/project"}],"version-history":[{"count":11,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/programme\/3020\/revisions"}],"predecessor-version":[{"id":7123,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/programme\/3020\/revisions\/7123"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/media\/2966"}],"wp:attachment":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/media?parent=3020"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}