ArticlePDF Available

The Use of Forensic Musicology in Criminal Investigations

Authors:

Abstract

Forensic musicology is the scientific study of music in a legal context. It can be used to help identify the composer of a piece of music, to determine the ownership of a copyright, or to resolve disputes over the use of musical works. Forensic musicologists may also be called upon to give expert testimony in court cases involving questions of music. Forensic musicology is a relatively new field, and there are no formal educations or training requirements for becoming a forensic musicologist. However, most forensic musicologists have advanced degrees in music theory, musicology, or a related field, and many also have experience working as professional musicians. Forensic musicologists use their knowledge of musical composition, history, and performance to answer questions raised in legal cases. Forensic musicologists typically collaborate with attorneys, judges, and other legal professionals to provide expert testimony or analysis in court cases. In some cases, they may also be asked to testify in front of a grand jury or give depositions. Forensic mu�sicologists may also be consulted by law enforcement agencies to help identify unknown pieces of music or to authenticate record�ings. This review will focus on the application of forensic musicol�ogy in civil and criminal case
Review Arcle
The Use of Forensic Musicology in Criminal Investigations
Zaroon; Jumana Rashid; Anwaar Iikhar; Hamid Bashir;
Rukhsana Parveen*
CAMB, University of the Punjab, Lahore, Pakistan
*Corresponding author: Rukhsana Parveen
CAMB, University of the Punjab, Lahore, Pakistan.
Email: rukhsana.camb@pu.edu.pk
Received: May 23, 2023
Accepted: June 20, 2023
Published: June 27, 2023
Citation: Savitha MR and Thanuja B. Food Allergens and Aero Allergens Sensitisation.
Austin J Asthma Open
Access
. 2020; 2(1): 1004.
Austin J Asthma Open Access - Volume 2 Issue 1 - 2020
Submit your Manuscript | www.austinpublishinggroup.com
Savitha et al. © All rights are reserved
Ausn J Forensic Sci Criminol
Volume 10, Issue 1 (2023)
www.ausnpublishinggroup.com
Zaroon © All rights are reserved
Citaon: Zaroon, Rashid J, Iikhar A, Bashir H, Parveen R. The Use of Forensic Musicology
in Criminal Invesgaons. Ausn J Forensic Sci Criminol. 2023; 10(1): 1095.
Austin Journal of Forensic Science and Criminology
Open Access
Abstract
Forensic musicology is the scienc study of music in a legal
context. It can be used to help idenfy the composer of a piece
of music, to determine the ownership of a copyright, or to resolve
disputes over the use of musical works. Forensic musicologists may
also be called upon to give expert tesmony in court cases involving
quesons of music.
Forensic musicology is a relavely new eld, and there are no
formal educaons or training requirements for becoming a forensic
musicologist. However, most forensic musicologists have advanced
degrees in music theory, musicology, or a related eld, and many
also have experience working as professional musicians. Forensic
musicologists use their knowledge of musical composion, history,
and performance to answer quesons raised in legal cases.
Forensic musicologists typically collaborate with aorneys,
judges, and other legal professionals to provide expert tesmony
or analysis in court cases. In some cases, they may also be asked
to tesfy in front of a grand jury or give deposions. Forensic mu-
sicologists may also be consulted by law enforcement agencies to
help idenfy unknown pieces of music or to authencate record-
ings. This review will focus on the applicaon of forensic musicol-
ogy in civil and criminal cases.
Keywords: Forensic; Forensic musicology; Music; Legal
Introducon
Forensic musicology gained signicant popularity as a disci-
pline in the late years of the tweneth century [1]. There are
many potenal applicaons of forensic musicology used in dif-
ferent elds today. Many countries around the world are cur-
rently demonstrang a deep extent of ulizing voice analysis.
This trend is especially far more noceable in developed coun-
tries [2]. The signicance of voice recognion and analysis can-
not be undermined as they play a pivotal role in solving so many
criminal cases every year [3]. Criminology aside, forensic musi-
cology has played a crical part in infringement cases involving
the music industry [4].
Forensic musicologists have been called to courthouses over
many decades to check the similaries between two pieces of
music. These connoisseurs analyze the similaries between
the music pieces and give a verdict on whether the two music
pieces are similar or not. In cases with substanal evidence of
similarity or infringement, these forensic musicologists have to
tesfy in open court as well. This pracce came to be in use
fairly recently. The pracce before was nowhere near this pro-
fessional. Forensic musicologists create legal evidence that is
based on logic and reason. The evidence that these experts can
create holds a visual signicance. This might be one of the many
reasons why courts in dierent countries have started viewing
dierent music samples as violaons of copyright [5,6].
A term that is currently being used frequently in copyright
laws is ‘reverse engineering’. This term refers to the use of pre-
vious work done in the early years and presenng that work
or a form of it in the recent version. More ecient legal reg-
ulaons are being put into place regarding this how to cover
this aspect of copyright laws with forensic musicology. Forensic
musicology is a study that evolves every day. New techniques
are being tested and applied to increase the eecveness and
eciency of the system and the results that are produced as a
result of forensic musicology [7]. Since forensic musicology is
playing its role for almost two hundred years the disciples of
forensic musicology has only been recognized consistently since
the late 20th century. Recent emergence of it has contributed to
the dearth of academic study on its method, history and impor-
tant gures.
Importance of Forensic Musicology
The ongoing transion of the music business to digital re-
cording and distribuon has enhanced the experse that legal
professionals need from specialists. A wide range of legal con-
Submit your Manuscript | www.ausnpublishinggroup.com Ausn J Forensic Sci Criminol 10(1): id1095 (2023) - Page - 02
Austin Publishing Group
Zaroon
cerns, including the idencaon and authencaon of pub-
lished works and musical recordings, performance rights, and
legal rulings involving copyright infringement are supported by
expert tesmony for forensic musicology. Even though there
have been legal instances concerning music and performance
infringement since the 19th century, there is no established ap-
proach in the eld of forensic musicology that allows for an ob-
jecve forensic assessment [8].
To understand and realize the importance of forensic mu-
sicology, a basic understanding of the working of voices and
sound is mandatory. This understanding will further lead to
understanding the frequency, and pitch of the sound, and -
nally, geng to know the complex processes such as Automac
Speaker Recognion (ASR), forensic voice comparisons, and so
on. Vibraons in the atmosphere produce the sound that we
hear, and the frequency of a sound is a measure of how fast +or
slow it makes the air vibrate around it [1].
For two voices to belong to the same person, there should
be considerable similaries between the two. Otherwise, the
alternave is that the voices belong to dierent people if they
do not share similaries. Apart from the similaries, the voice
should be clearly and categorically disnct in nature. The com-
plexity of the human voice makes it extremely dicult to pin-
point one voice to one person based on similaries and disnc-
veness. The same person may sound dierent in a cold or any
other health issue that aects the voice [9].
Forensic musicology has been used to disnguish between
the dierent music types in countries such as Africa where
there is an amalgam of so many cultures with dierent tradi-
ons and music types. By use of forensic musicology, experts
have been able to clearly dene the boundaries and have been
able to disnguish between the many types of music in dier-
ent cultures of Africa. Forensic musicology therefore is helping
in the detecon of following areas in music [10].
Voice Recognion
Voices and faces both contain intricate smuli that provide
vital social informaon. Both play a role in the recognion and
dierenaon of certain individuals. These parallels raise the
possibility that speech recognion technology may have evolved
similarly to facial recognion technology in certain ways [11].
Voice Recognion is the ability of a machine how well it per-
ceives a spoken command by a person and how the machine
interprets this informaon. This technology has been ulized by
some of the biggest tech industries of today, such as Amazon,
Microso, and Apple. These companies have applied the tech-
nique of voice recognion and made custom soware for their
tech devices. For instance, Apple has made Siri, Amazon has Al-
exa and Microso has Cortana. Recent years have seen a signi-
cant convergence between the methods and techniques used
to develop man-machine interacon based on the word and
the data stascal modelling paradigm (such as HMM-based
acousc modelling, n-gram-based language modelling, and
concatenave speech synthesis). Of course, over the course of
nearly three decades, these techniques have actually improved
the quality and performance of the system, leading to this con-
vergence of modelling paradigms [12].
For a computer to recognize anything, the signal has to be
digital in nature. In that regard, the audio is inially converted
to a digital form by a process known as analog to digital con-
version. These conversions of speech paerns are stored in the
computer on the hard drive. Paern recognion is used by a
comparator to check these speech paerns [13].
The acousc characteriscs of voice also reveal a speaker's
identy in addion to their views and intents. The ability to
idenfy people from their sounds has been studied in lab set-
ngs. Voice recognion, however, includes two components:
(1) the ability to idenfy the voice of a known individual, and
(2) the ability to familiarize a voice, that is, to encode a voice
and retain some feature of it in long-term memory [14].
Automac Speaker Recognion is an applicaon of forensic
musicology with immense scope and signicance in not only
an invesgave approach but also the reporng of evidence.
When we take an example of a case that is normally encoun-
tered by law enforcement ocials on a roune basis, one such
where a vicm has received a call of a threatening nature [15].
In this scenario, a suspect list is made by comparing the voice
on the call with that of the criminals. This sample voice on the
call is called the trace [16]. Automated speaker-recognion sys-
tems have become a crucial tool for identy vericaon in many
e-commerce applicaons, as well as in everyday commercial en-
counters, forensics, and law enforcement [17]. By analyzing a
variety of acousc, prosodic, and grammacal aspects of speech
in a method known as structured listening, human profession-
als skilled in forensic speaker recognion may execute this task
even beer. Forensic speech sciensts and linguists have been
working on techniques for forensic speaker recognion for
many years in an eort to help eliminate any prejudice or previ-
ous noons about the reliability of an unknown audio sample
and a reference template from a suspected suspect [18].
Forensic voice comparisons come in handy in criminal cases
where physical evidence is absent or suciently minimal. In
case of a ransom call from a hostage situaon where there is
Figure 1: Analysis in music circulates around the following major
areas.
Figure 2: Comparison of the opening melodies of The Chions’
He’s So Fine (top) and George Harrison’s My Sweet Lord (boom)
[42].
Submit your Manuscript | www.ausnpublishinggroup.com Ausn J Forensic Sci Criminol 10(1): id1095 (2023) - Page - 03
Austin Publishing Group
no physical evidence such as DNA or ngerprints to go on, the
only lead available is the voice of the caller. By running this trace
with the database of voices present, there is the formaon of a
list of potenal suspects. Further analysis of this sample record-
ing can yield even a single enty where it is highly likely that the
caller and suspect are one and the same person [19].
Study of Tampered and Original Sounds
Before 1950s and even in some cases now sounds and voices
are analyzed by experts known as linguists. These professionals
are trained in linguiscs, which is the scienc study of speech
as well as language. This type of voice analysis is called linguisc
analysis. This eld has been upgraded and dierent linguisc
features are examined and compared in this study by the ex-
perts. The whole sample speech or trace is broken down into
chunks. These separate chunks are carefully listened to by lin-
guists. This part of the analysis is known as the auditory analysis
since it deals with specic sounds.
Copy-move, deleon, inseron, substuon, and splicing
are all methods of faking audio. As copy-move forgery entails
shiing a poron of the audio to another point inside the same
stream, its applicability are constrained in comparison to other
methods. On the other side, integrang recordings from various
speakers, devices, and surroundings may be involved in the de-
leon, inseron, replacement, and splicing of forged audio [20].
Dierent systems have been suggested to study the tampered
verses original sound such as one suggested system's main goal
is to resolve the following problems with high accuracy and a
high categorizaon rate:
1. Determine the dierence between authenc audio
and audio that has been altered by combining recordings made
using the same microphone in various sengs.
2. Environment categorizaon of authenc and fake au-
dio produced via splicing. Regardless of speaker or content (i.e.,
text), detect counterfeit audio.
3. Reliable authencaon using briey fabricated audio
[21].
Studying sound and making a comparison using these dif-
ferent developed soware and tools have helped courts to
study cases with legal and visual evidence [22]. This could help
a judge to see how songs look onto a paper that he could clearly
dierenate between original and tempered sounds [23].
Music as a Weapon
Acousc weapons have been developed since the end of
the past century as part of a non-lethal weapon invenon. Ac-
cording to theories put forward by many experts over the years,
the eect sound has on the body and its funcons have been
focused majorly. Sound and music have also been linked as a
means of eradicang the subjecvity of a person during interro-
gaon. Every arcle in the US press that has been linked to the
use of music to torture prisoners or detainees has culminated
in a reacon from the virtual side as well in the plaorm known
as the blogosphere [24]. The Joint Non-Lethal Weapons Task
Force's founding in 1997 in US is working for the Department
of Defense have been developing "acousc weapons," which
accounted for a third of the Task Force's budget from 1998 to
1999. Whereas theorists of the interrogaon chamber concen-
trate on the ability of sound and music to destroy subjecvity,
those of the baleeld place more emphasis on the physical
impacts of sound [25].
In the Yugoslavian wars that took place in the 1990s, music
was seen as a symbol of dierences in ethnicies. It was seen as
a means of violence. Experts have ruled that understanding mu-
sic and the reacon and address of the public to this could have
made sense of the ethnic conict that rose during the wars.
During the wars, music has been used as a weapon and means
of torture in prison. It was used to invoke feelings of fear and
anxiety in the prisoners by making it take the shape and form of
a cleansing ritual. That being said, some ethnic groups also took
strength from music and boosted their morale in the tough and
challenging mes of the wars [26]. In many ways, lower- and
middle-class opinions and frustraons with people, things, and
governments that exercise authority over the masses are fairly
accurately reected in popular music.
The second part of the 1960s saw groups headed by the
young that fundamentally contested preexisng forms of poli-
cal and cultural authority. This was when the desire for social
change and the challenge to authority reached its highest de-
gree of intensity. All this is reected in the music of that era
[27]. Popular music and social movements have a link that has
not goen as much aenon as its signicance merits. More
research is crically required since, in addion to frequently
lagging behind other disciplines in its aempts to comprehend
the nature and signicance of popular media, especially popu-
lar music and the dierent protest movements of 1960s [28].
Frequency-Based Tesng for Idencaon of Disnct Types
of Sound
There is a lot of informaon that can be gathered by the
voice of a person. This voice can tell the origin, the birthplace of
a person along with the area of the upbringing of that person.
Dierent areas and people have dierent languages, accents,
and dialects. Not surprisingly, the voice of a person is reveal-
ing about the heritage and culture as well. The dierences in
the shape and size of vocal cords along with the upbringing in
how to use them cause people's voices to dier from each other
[29].
Experts use spectrograms to analyze voices between people.
Spectrograms are visual images of speech sounds that are made
by specialized soware. This process of analysis by looking at
spectrograms is termed acousc analysis. By looking at two
spectrograms from dierent individuals saying the same word,
there will be many dierences seen in both, even though the
word both of them said was the same [30].
If the spectrogram appears brighter, it can be deduced that
there was more sound energy in terms of frequency at that par-
cular me. An increase in sound energy will cause increased
brightness to appear on the spectrogram. Spectrograms can
reveal dierences in how individuals from varying backgrounds
speak the same words of a language. One person saying a word
will not appear exactly as the spectrogram of another individ-
ual saying the same word. The human voice is far too complex,
much like ngerprint and DNA [31].
There are variaons in voice parameters and signals even in
individuals of the same culture, and ethnicity. Children such as
siblings share similar genec markers and the same environ-
mental parameters. Even in these condions with so many simi-
laries, they sll will not share the same cadence of voice [32].
Some features that are part of a roune linguisc analysis
include looking at the voice quality, pitch, and wording as well
as grammar usage, ming, and rhythm of the voice. The level of
Submit your Manuscript | www.ausnpublishinggroup.com Ausn J Forensic Sci Criminol 10(1): id1095 (2023) - Page - 04
Austin Publishing Group
uency is also a parameter that is used by experts during their
analysis. The vowels and consonant sounds made by a person
are also looked at by experts. The accent of the speaker is also
an important feature to look at.
Apart from the use of spectrograms, experts have other
techniques to analyze voice samples as well. Audio pieces of ev-
idence are not submied as such in court hearings. Experts use
two techniques to validate the authencity of the audio clip as
well as the message being delivered in it by two main categories
of forensic mulmedia. These include content authencaon to
conrm the contents of the sample. The other category used is
noise reducon to deliver the message loud and clear and with-
out any doubts about the perceived noons [33].
A court verdict holds tremendous value therefore, many
techniques are applied to deliver the best evidence in terms
of sound that is authenc in nature with minimal background
noise [34].
Analysis Criteria in Forensic Musicology
Publishers and arsts have tradionally turned to the legal
system to seek compensaon from someone they accuse of
prong from the the of one of their original works. A foren-
sic musicologist is typically called in to evaluate the pieces and
provide tesmony on their parallels and dierences. Because of
their capacity to transform unprocessed auditory data into ad-
missible evidence, forensic musicologists have evolved into the
knowledgeable listeners who decide how jurors of fact will tes-
fy both visually and aurally about the songs presented at trial.
While hearing the similaries between two songs is a signicant
component of forensic musicologists' experse, a signicant
poron of their job is visual in nature [35]. One of their main re-
sponsibilies is to take the songs' dierent components such as
speed, rhythm, harmony, etc. and reduce them to their melodic
"ngerprints." The musicologist must next convert the melodies
into visually comparable, 'eye observed' notes on a scale. The
forensic musicologist creates a "knowledge structure" through
which the songs may be understood, experienced, and debated
in addion to making them detectable [36]. Musicology analysis
as like other forensic cases is performed by the eld experts.
These experts have the high knowledge regarding music. Since
the music is so vast therefore the experse are limited to a cer-
tain direcon. Following are the major analysis performed by a
forensic expert to solve or narrow down a certain case in music
[37].
Composion Analysis
When there is a claim of plagiarism in copyright issues but
not involving recording media then composion analysis is per-
formed. Musical structure analysis is performed by the licens-
ing organizaon such as American society of Composers, Au-
thors and Publishers. The case ler has to prove on the basis of
the solid reasons that the defendant has access to a parcular
music and has similarity in rhythm, melody and structure of an
already exisng work. This analysis is usually referred to as com-
parave transcripon where melodies are arranged vercally to
each other with highlighng pitches, rhythms and underlying
chords [38].
To reach the clue whether a defendant has already access to
a parcular music research moves by tracing the lines of history
of radio playbacks, sales gure, or presence of a song in main-
stream media. Similarity determines whether a music is truly
copyrightable as unique, or something pervasive and obvious
in music generally. Similarity in musical work is dened on the
basis of those elements that can be notated and reproduced in
performance through sheet music [39].
Famous case of George Harrison’s “ My sweet lord” verses
Chion’s He is so ne” in 1976 is an example of it in which
Harrison was found guilty on the basis of composion structure,
despite the performance style was dierent. He was accused of
using two melodic mofs that were structured in a parcular
way [40,41].
The most basic type of analysis is a comparison transcripon,
in which the several melodies are vercally aligned above one
another and harmonious pitches, rhythms, and chords are high-
lighted. From the middle of the 1800s, this technique has been
used in American infringement acon. Comparave analysis is
frequently accompanied by repertoire research, in which the
musicologist looks into whether Song A's similar musical ele-
ments are unique to it or whether they have appeared in other
works before. Every bogus plagiarism claim may be refuted
using this expanded toolkit [43]. In USA, the copyright protec-
on started in 1831 when sheet music was the only means for
composion establishment in xed form. Composion analysis
requires approach to the notaon since it conates the under-
lying composion and its performance. Level of signicance is
analyzed in composion analysis based on the above discussed
parameters [44].
Recording Analysis
In cases which involve infringement based on recording in a
given context, the technique of recording analysis is performed.
This is employed as the most predominant analysis in forensic
musicology. Unlike composion analysis which shows similar-
ity through reducve approach this involves idencaon and
dierenaon on the basis melody, harmony and digital signals
in exact form in which they were recorded [45]. This approach
requires specic programs and soware which are more related
to audio domain of work. They are more to the domain of en-
gineering than to the music theory. Dierences in the melody
is the rst to be evaluated to verify the similarity between two
music works. The principles under which it works involves the
vocalizaon of both the melody and accompaniment, whether
vocal or instrumental [46]. Waveform signals or spectral analy-
sis is followed by means of soware to give very precise form
of reading based on similarity. These signals are developed by
the soware based on voice frequency. The relave signals for
frequency from both the exemplars are compared and similar-
ity can be detected very precisely [47].
The matching of waveforms, spectral analysis, or other tech-
niques can be used to establish instances of plagiarism that
are overt in recording analysis, such as a literal "sampling" of
a secon of a recording. This allows for a more accurate and
unbiased comparison than using musical notaon by the expert
[48]. The original source of the content ulized in a quesoned
work might be obscured or hidden to escape discovery using
specialist eding or signal processing. Digital eding can make
it possible to seamlessly repeat, remove, or rearrange content
from an original source to create a new "variant" that calls for
the expert to pinpoint how the original version "maps" to its
changed counterpart [2]. Such eding may be done to extract
extremely short but recognizable snippets for use as the sam-
ple materials of a later work or to adapt music to the plot of
a movie or television adversement. If access to the original
mul-track recording is accessible, complete vocal instrumental
Submit your Manuscript | www.ausnpublishinggroup.com Ausn J Forensic Sci Criminol 10(1): id1095 (2023) - Page - 05
Austin Publishing Group
"stems" can be erased and replaced by freshly recorded mate-
rial. Digital eding enables individual porons to be faded or
their mbre altered [49].
Melody in soware is a me ordered sequence of pitches
perceived by the listeners a s single enty. Dierent record-
ings of the same composion by the same arst oen include
unique form of melismac expression, which is improvised sing-
ing of a syllable at dierent note beside the basic and necessary
aspects of the melody [50].
In popular music this melismac technique is followed as im-
provisaon technique. This music does not convey what is be-
ing presented on the music sheet. Compared examples in music
analysis are much more subtle but the basic analysis of melodic
similarity can lead to the analysis conclusion [51].
Case study of recording-based analysis: Not an experimen-
tal case study, but an example of a very high-prole case that
can be found in 2012 when James Foley was murdered. James
Foley was a journalist who was kidnapped by ISIS and then, lat-
er murdered. The gruesome tragedy was also released to the
public via a video where a masked gure can be seen speaking.
Voice analyses by experts around the globe were done in an at-
tempt to idenfy the said murderer [52].
Dierent case studies have been done to improve the e-
cacy of the system and to further understand how the principles
in the eld work. A system with less dependence on the individ-
ual variables from the sample will prove to be ideal and without
fault. At present, there are many factors that dier from case
to case which might aect the objecvity of the expert leading
the case.
Timing Analysis
The beat level, also known as tactus, is the most important
metric level in a hierarchical metrical framework that organizes
musical me. Divergences from the isochronous beat level are
viewed as excepons or unique circumstances in the majority
of western music [53]. Contrarily, non-isochronous metric pat-
terns, also known as addive, aksak, or asymmetric meters, are
frequently found in the rhythms of tradional music from the
Balkans and the Middle East. Such metric systems are built on
asymmetries in the beat levels, which are composed of alternat-
ing long and short beat paerns [36].
Timing analysis being very precise can compare exemplars
at various points throughout the recordings. It works on the
principle that there is no dierence of the ming, and both the
exemplars are digitally recorded. The rhythmic paern and beat
are the basic aspects behind it which shows the ming evalua-
on between the two. Timing dierence can be used to com-
pare popular music recordings [8].
For the comparison of live classical music recordings that
were otherwise dierenated in terms of spaal, dynamic and
mbrel characteriscs DeFrancisco found that ming and unex-
pected incidents can be ulized for analysis. For example, inci-
dents in live music such as cough, breathing sound, unexpected
noises wrong notes etc. can be used for analysis in respect to
ming [54]. It has also been noted that uctuaons, precision
at parcular instant, stretches and compressions in tempo are
all used for ming analysis [55].
Digital eding can be used for tampering of waveform and
spectral analysis by deleng the parcular note signals, re-or-
dering or repeang a specic paern from the original source
to form a new variant. This make them to be undetected by re-
cording analysis. Time compression/ expansion and pitch shi-
ing are the popular types of signal processing techniques used
for such analysis. These are based on the technique known as
phase vocoding [56]. This involve the soware which edit the
pitch of the music without changing the ming, rhythms and
tempo or vice versa. This is employed somemes in making
mash-up recordings. These two processes are linked and some-
mes it requires independent manipulaon of both [57].
Producon Analysis
This analysis works by focusing the means of producon or
distribuon of the recording product aer it has le the studio.
This is a specialized analysis which focuses on the bootlegged
and pirated versions by means of computer forensic technique.
Examinaon of digital metadata can reveal the source and the
means of audio compression used in recording. For example,
to determine the originality of a work not only frequency and
ming is examined but audio compression, le size and meta-
data tags are also brought under consideraon. All variaons
from the product's inially issued version should be noted by
the expert [58].
Right management has become more complicated with the
development of digital media. Many digital audio players are
using digital right management system to limize the number
of devices on which the le can be played so aiming to control
the unlawful music distribuon. Audio watermarking is another
technique for copyright protecon. This involves the use of in-
audible signals that are embedded with the digital audio for-
mat. These signals cannot be copied and can be used to idenfy
the original source of recording despite copying [59]. A "fact"
witness who would merely tesfy that reputable computer
soware for watermark detecon showed the existence or ab-
sence of a watermark, as well as the contents of the watermark
detected by the program, might also be called in if tesmony
based on this sort of evidence is required [49,60].
Percentage Melodic Identy (PIM) Analysis
This method is based on automated alignment and identy
percentage. This method was developed in keeping the view
that complex operaons of similarity can be performed by the
non-sciensts. The automated sequence alignment and per-
cent identy is similar as used in molecular genecs to com-
pare DNA and protein sequences. It was rst used to music
to measure the cultural development of English and Japanese
folk song melodies in a way that could be usefully compared to
both of them and to the development of other genres of music
from around the world [61]. Yet, since the alteraon of copied
melodies is just a further stage in the creaon of music, musi-
cal copyright provides an appropriate applicaon for this tech-
nique. The PMI approach is universal and may be used with dif-
ferent genres of folk and art music from throughout the world
[62]. The PMI method and other melodic sequence alignment
algorithms, areas similar to Judge Learned Hand's comparave
method for determining musical similarity. the PMI approach
like hand starts by harmonizing two melodies wrien in sta
notaon to a single tonic, erasing rhythmic informaon by as-
signing all notes the same value 1, aligning and counng cor-
responding notes, and nally deleng rhythmic informaon.
Although alignments can sll be performed manually, either
from scratch or to correct errors in the automated alignment,
as is also done in molecular genecs, the PMI method can take
advantage of automated sequence alignment algorithms to
Submit your Manuscript | www.ausnpublishinggroup.com Ausn J Forensic Sci Criminol 10(1): id1095 (2023) - Page - 06
Austin Publishing Group
eliminate subjecvity in alignment [63]. This is an automated
aligning system of notes in melody. Once the melodies under
test have been aligned manually or automacally the idencal
notes are then divided by the average length of two melodies.
Result is mulplied by 100 to obtain the percentage similarity.
Ecacy rate of this method is nearly 80% and careful approach
is required to save the results from false posive [64].
PMI= 100 (ID/L1+L2/2)
The PMI method can also be used to establish whether a giv-
en PMI value is stascally signicant above and beyond what
might be predicted by two melodies with comparable scales and
similar stylisc characteriscs. In order to accomplish this, the
PMI value for a given pair of sequences is compared against the
distribuon of 100 random PMI values generated by randomly
rearranging one of the sequences, given the same sequence
lengths and composions. As a result, a signicant P value of
.05. Corresponds to an observed PMI value greater than 95% of
values that were randomly reshued [65].
Methodology of Forensic Musicology
Did there be any copying? should be the rst inquiry in any
music copyright issue and is also the rst queson in forensic
musicology and probably the most crucial. So how can we tell
whether there has been copying? There are extremely few in-
stances in copyright lawsuits when the defendant admits to
copying [66]. Yet, in most cases indeed, in nearly every music
copyright ligaon case in history defendants deny that the
subjecve similarity between the works is the product of plagia-
rism, instead contending that it is the consequence of Indepen-
dent Creavity (IC). then, how might we disnguish between
coincidence similaries and plagiarism using music analysis
[43].
Determining the Similarity Proxy
The Similarity Proxy is based on the noon that the more
similar two things are, the less likely it is that they could have
developed via Independent Creaon. Mathemacally, this
makes sense. The likelihood that a coin will fall on its tails aer
one toss is 0.5 (50%, or one in two). Yet, the likelihood of toss-
ing a coin three mes and geng heads, then tails, and then
heads again is 0.125 (12.5%, or one in eight). However, as music
is a me-based art form, there are many more opons open to
composers between any two successive musical occurrences.
The logical conclusion is that any extremely lengthy tune that
is precisely the same as any previously exisng extremely long
melody is probably proof of plagiarism, especially if the under-
lying harmony is the same. For each addional note in the me-
lodic chain, the possibility that any resemblance across lengthy
melodies may be aributed to Independent Creaon falls ex-
ponenally [67]. Therefore, the study of exponenal funcons
need not be restricted to a parcular linear eld, such as music
Even if such elements are not themselves coverable by copy-
right, any musical arrangement that uses the exact same pa-
rameters as an earlier work in terms of instrumentaon, musi-
cal form, musical key, or tempo, for example, provides stronger
and stronger circumstanal evidence of copying as more simi-
laries are added [39].
Any musical arrangement that uses exactly the same param-
eters as an earlier work in terms of instrumentaon, musical
form, musical key, or tempo, for example, provides stronger
and stronger circumstanal evidence of copying, even if such
elements are not themselves coverable by copyright [68]. The
Similarity Proxy's tenets are intuively understood by musicians
and may even be taken for granted by judges and lay listeners.
This is maybe the reason why a lot of composers get into the
urban legend that a certain minimum number of consecuve
pitches can be reproduced lawfully before the copyright police
show up at your door. Similarity proxy is primary strategy used
by musicologists, courts, and musicians to ght copying has al-
ways been proxy [69].
Excluding Commonplace Elements
Aer determining the degree of similarity, we must strip away
the aspects that are common. According to conversaons with
other forensic musicologists, people have all likely encountered
numerous approaches from hopeful potenal plains who are
convinced that a musical element of their Song A for instance, a
Table 1: The twenty music copyright infringement cases analyzed, ordered by increasing PMI (Percent Melodic Identy). “0”=No infringement,
“1”=Infringement. *P<.01. [42].
No. Case Complaining work Defending work Defending
1Suzane McKinley vs. Collin Raye “I Think About You” “I Think About You” 0
2Ferguson vs. N.B.C. “Jeannie Michele” “Theme ‘A Time To Love’” 0
3Grand Upright vs. Warner “Alone Again (Naturally)” “Alone Again” 1
4Jean et al. vs. Bug Music “Hand Clapping Song” “My Love Is Your Love” 0
5Three Boys Music vs. Michael Bolton “Love Is A Wonderful Thing” “Love Is A Wonderful Thing” 1
6Corill vs. Spears “What You See is What You Get” “What U See is What U Get” 0
7Baxter vs. MCA Joy” “Theme from ‘E.T.’” 0
8Intersong-USA vs. CBS “Es” “Hey” 0
9Ellis vs. Die “Lay Me Out By The Jukebox When I Die” “Prop Me Up Beside The Jukebox (If I Die)” 0
10 Granite Music vs. United Arsts “Tiny Bubbles” “Hiding The Wine” 0
11 Repp vs. Lloyd-Webber “Till You” “Phantom Song 0
12 McDonald vs. Mulmedia Entertainment “Proposed Theme Music ‘Sally Jesse Raphael
Show’” “Theme Music ‘Sally Jesse Raphael Show’” 0
13 Benson vs. Coca- Cola “ “Don’t Cha Know” I’d Like To Buy The World A Coke” 0
14 Swirsky vs. Carey “One of Those Love Songs” “Thank God I Found You” 1
15 Bright Tunes Music vs. Harrisongs Music “He’s So Fine” “My Sweet Lord” 1
16 Herald Square Music vs. Living Music “Day By Day” “Theme N.B.C.’s ‘Today Show’” 1
17 Selle vs. Gibb “Let It End” “How Deep Is Your Love” 0
18 Fantasy vs. Fogerty “Run Through The Jungle” “The Old Man Down The Road” 0
19 Louis Gaste vs. Morris Kaiserman “Pour Toi” “Feelings” 1
Submit your Manuscript | www.ausnpublishinggroup.com Ausn J Forensic Sci Criminol 10(1): id1095 (2023) - Page - 07
Austin Publishing Group
chord loop, a drum part, a lyric fragment, and especially a short
melodic fragment has been willfully copied by a later songwrit-
er in the popular hit Song B [43]. In many instances, the client's
viewpoint is fairly honest; they really believe as do many juries
that plagiarism is the only explanaon for the perceived similar-
ies between Song B and Song A. In the majority of these situ-
aons, the invesgaon shows the dissased client that the
idencal parts in issue are common to many works and that no
copyright is required to protect them. Because these iniaves
are frequently without value and because customers are sel-
dom sased by the idea that the analysis has allowed them to
avoid costly and pointless ligaon, several musicologists strive
to avoid taking on such projects [70].
Repertoire Research Prior Art and the IC Hypothesis
Although musicologists are skilled listeners with extensive
library knowledge, we cannot simply say that we think an ele-
ment is common or unique since to do so would be argumen-
tum (the Argument From Authority fallacy [44]). We must pres-
ent proof that the pernent comparable features do, in fact,
occur in other works, ideally but not necessarily works that pre-
date Song A, in order to convince others (such as clients, judges,
juries) that any similarity between Song A and Song B is acci-
dental. the Previous Art Proxy, which holds that the existence
of a musical feature in several works indicates that dierent
composers may have independently developed it. It works best
when applied to brief melodic segments, usually one to four
bars of music [43]. The history of music copyright ligaon in
the USA has been mostly characterized by challenges involving
such slender melodic similaries. Plain has observed that in
certain instances, a poron of their Song A's melody and a por-
on of the defendant's Song B's melody are comparable. These
parallels are nearly never perfect, and the melodic chains are
praccally never longer than four bars [47].
Interviews with a number of acve musicologists and an
examinaon of more than 50 musicologist reports ulized in
ligaon are included in Fishman & Garcia's discussion of the
evoluon of prior art ulizaon in music copyright ligaon. As
they note, "Usually, it was the defendant's expert who iden-
ed the universe of previous art at issue, it is suggested that the
employment of prior art research is a relavely new pracce,
parally movated by the dearth of forensic musicologists in
the area. Contrarily, plain's side experts oen avoided using
parcular previous art references unless they were refung the
other expert's arguments [71].
Limitaons of the Field
Though forensic musicology is emerging at a high rate in
modern era but like other elds it has certain limitaons based
on various aspects. This does not work like a CSI episode where
a single knob turning by an expert leads to a noise free wanted
audio. A number of dierent approaches are adopted and none
of them is a magic. All these approaches have some limitaons
too. Despite it’s occasionally high prole, forensic science has
recently come under intense scruny and deep thinking. One
notable report from the US Naonal Research Council in 2009
that cricized many forensic elds, including audio forensics,
for lacking scienc evaluaon of reliability and error rates is
one such report. Hence, it is crucial that the science behind
forensic invesgaons be founded on undeniably objecve in-
terpretaon rather than purely subjecve judgements, as has
occasionally been the case [72].
Lack of Experts and Contradicon in Analysis by Dierent
Experts
Expert tesmony determines many legal issues including the
authencaon and dierenaon of musical recordings, com-
posions, performance rights and legal determinaon regard-
ing copyright infringement cases. Music related cases date back
to 19th century but no proper legal methodology is in process to
be made. Expert opinion based on subjecve impression or re-
sulng from golden ear syndrome ae pseudoscienc and non-
objecve [73]. Since forensic musicology is an extraordinarily
complex eld and requires a lot of experience in the relevant
eld. A forensic musicologist must have vast knowledge regard-
ing music of every kind. Therefore, the eld has very limited
number of experts [74].
Contradicon arises between the analysis of the single case
by the two experts. Two experts of the same music eld have
dierent opinions on a single case. Since every expert has its
own basis and analysis experience. It oen appears that there is
contradicon between the experts in the analysis by the expert
technique and therefore the results are not accurate and leads
to failure of the case [75].
Signicant Level of Error in the Techniques Used for Analy-
sis
As DNA proling in forensics provides 100% match or no
match between a suspected sample and the reference sample
in a single run of experiment, but in forensic musicology there
is a signicance level of error between the done job. The tech-
niques followed like PMI do not provide the 100% results but
provide with a specic level of analysis. On the other hand,
certain case is not considered done aer a single analysis, an
expert has to perform a lot of analysis to verify the case and go
through the depth of the exemplars under test [76]. Automated
speaker recognion is a new eld and noise reducon through
recent research can improve its working quality. The tonal qual-
ity of the speaking person is aected by this which may migate
against the court agreeing that the person idened is actually
the one talking. The general principle of the court is that every
evidence submied to court should not be modied and it is
dicult to determine how far to take it when preparing sam-
ples or evidences [77]. Besides this many new computed tech-
niques have been developed for the analysis of music but all
have some limitaons which make their use limited in forensic
music analysis.
Acousc ngerprinng in audio forensics involves the inves-
gaon of background noise, acousc reecons, reverbera-
on, and unique characteriscs of the microphone and recod-
ing system that may be heard in the evidence recording [78]. It
is necessary to conduct more research to determine the extent
to which the acouscal environment, the characteriscs of the
recording microphone, and the digital audio-coding algorithms
can be inferred from the stored audio recording because many
common consumer recording devices include automac gain
control and perceptual audio coding/data compression algo-
rithms intended for speech signals [79].
Modern Recording Systems and Tempering Soware
With the modernity in audio recordings complexity is in-
creasing in forensic musicology analysis. Music tampering to
make pirate copies provide loss to the producon companies
and even music the is also carried out to make new music by
using the musical works of others [80]. Technology has inu-
Submit your Manuscript | www.ausnpublishinggroup.com Ausn J Forensic Sci Criminol 10(1): id1095 (2023) - Page - 08
Austin Publishing Group
enced the music in all the ways it is transmied, preserved,
heard, performed and composed [81]. Recording and broadcast
of music is all under its acon. In the popular and Western art
music genre of electroacousc, composers ulize technology to
alter the tones of acousc sounds, oen by integrang acousc
instruments with audio signal processing like reverb or harmo-
nizaon [82].
It rst appeared somewhere in the middle of the 20th cen-
tury, aer the use of electric sound creaon in composing tech-
niques. Sampling is the use and reuse of other music. All elec-
tronic soware uses these sampled pieces of music for creang
new music. Think about the mid-'70s song Ring Precis by Hal
Freedman. A recording of Wagner's full Ring cycle, which con-
tains over 18 hours of music, was randomly divided into three-
minute secons and played all at once by Freedman. Without
a doubt, the resulng sound is unlike anything you have ever
heard, but my interest in Freedman's composional process'
temporal implicaons is greater. In order to construct a new
work out of an old one, he superimposed eighteen hours into
three minutes [83]. Such tempering soware are present which
make it dicult for the experts to nd out the match through
digital forensics. Mashup is a more complex form of music type
where music is collected from not a single source but from mul-
ple sources. Mashups are a type of audio composion that
start with recordings of popular music. These eclecc songs ad-
here to the harmonic and rhythmic rules of popular music while
re-contextualizing musical and cultural preconcepons, doing
away with convenonal genre restricons, and breaking copy-
right regulaons. Mashup arsts use capable and user-friendly
music eding soware to combine songs from the mainstream
charts in very innovave ways, creang works that "...are at
once familiar yet somemes startlingly unusual". Combining
it creates a mashup. Mashup analysis is more complex in such
type of cases [84,85].
Poor Quality of the Sample Under Test
Like any eld, there exist limitaons in forensic musicology.
In the case of speaker recognion, some factors like trace qual-
ity, and the me of the sample speech funcon as variables. The
qualies that are desirable in an ideal system would be perfect
calibraon without dependence on the two factors menoned
above. That is the only way that can lead to the unbiased treat-
ment of every forensic case with standard calibraon [47]. Such
a system will increase the reliability of voice recognion in crim-
inal court hearings and without doubt, this will open the doors
to further applicaons of the system in other elds [86].
The inferior quality of the trace that the experts are required
to work with poses a challenge within itself. Similar sounding
consonant voices are not an easy task to disnguish, especially
with m and n if the band broadness provided by the phone call
data is twice. Trace quality is further reduced as a result of the
background noises [87].
Limited Implementaon of the Field
Since being a recent eld forensic musicology is being ap-
plied in developed countries with high eciency and a number
of cases have been resolved, but when it comes to the devel-
oping and underdeveloped countries there is no scope of such
eld. Even people of such states are not aware with the name
of such eld [88].
Another problem regarding this are the countries like India
and Pakistan where music is on the basis of Raga system. This
is the most complex type of classical music around the world
where your whole composion is based on a raag paern. Each
raga has a specic paern of notes which gives it a specic iden-
ty. This paern is followed while making a composion in that
raga. A single raga can be used by a number of musicians to
make dierent composions and therefore high range of simi-
larity is present in the dierent composions. In the same way
similarity also exists between ragas. As dierent ragas have been
originated from each other and they show similarity. Similar ra-
gas are grouped into same Thats which are major divisions of
ragas [89]. For example, there is quiet similarity when singing a
composion in raag Asaavri and Jaunpuri because both of them
follows similar paern and there is high similarity between the
composions of such ragas. So, it oen becomes dicult for the
experts to idenfy the raga and the type of composion. So, ap-
plicaon of forensic musicology in such areas is of no use [90].
Conclusion
Forensic musicology is a eld that has gained recent popular-
ity and is rapidly becoming the standard way to prove copyright
issues and music infringement cases in court. Analysis may vary,
and the approach of one forensic musicologist might dier from
another forensic musicologist. Some look for the similaries be-
tween the paerns while others look for the dierences.
The dierent applicaons of this eld have resulted in tre-
mendous success in criminal cases over the years. Forensic mu-
sicology has proved to be instrumental as a means of collecng
evidence in cases where physical evidence is nary. Many ransom
calls and kidnapping cases use these experts and their knowl-
edge to provide the inial leads to the invesgaons. Though
the eld has its advantages, it does have its limitaons and for
now, experts have to work within the connes of these limita-
ons but with advancing technology, this eld will also view and
experience remarkable improvements in its development.
References
1. Begault DR, Heise HD, Peler CA. Forensic musicology: an over-
view. In: Audio Engineering Society Conference: 54th Interna-
onal Conference: Audio Forensics. Audio Engineering Society;
2014.
2. Cason RJ, Müllensiefen DJIRoL. Computers, and Technology,
Singing from the same sheet: computaonal melodic similarity
measurement and copyright law. 2012; 26: 25-36.
3. De Prisco R, Esposito A, Leeri N, Malandrino D, Pirozzi D, et
al. Music plagiarism at a glance: metrics of similarity and visual-
izaons. In: 21st Internaonal Conference Informaon Visualisa-
on. IEEE Publicaons. 2017; 4.
4. CHIROL J. Automac detecon of musical plagiarism.
5. Park K, Baek S, Jeon J, Jeong YS. Music plagiarism detecon
based on Siamese. Cable News Network. 2022; 12-38.
6. He T, Liu W, Gong C, Yan J, Zhang Nl. Music plagiarism detecon
via biparte graph matching; 2021.
7. Mandasari MI, McLaren M, van Leeuwen DA. Evaluaon of i-vec-
tor speaker recognion systems for forensic applicaon; 2011.
8. Bellido JJS, L Studies. Forensic technologies in music copyright.
2016; 25: 441-59.
9. Morrison GS, Ochoa F, Thiruvaran T. Database selecon for fo-
rensic voice comparison. In: Odyssey The Speaker and Language
Recognion Workshop. 2012; 2012.
Submit your Manuscript | www.ausnpublishinggroup.com Ausn J Forensic Sci Criminol 10(1): id1095 (2023) - Page - 10
Austin Publishing Group
10. Hollien HF. Forensic voice idencaon. Academic Press; 2002.
11. Künzel, HJJASR. Idencaon and Vericaon, Current ap-
proaches to forensic speaker recognion; 1994.
12. Singh S, DEJIJoER Rajan, and Technology, Applicaon of dierent
lters in mel frequency cepstral coecients feature extracon
and fuzzy vector quanzaon approach in speaker recognion.
2013; 2: 419-25.
13. Motyliński M, MacDermo A, Iqbal F, Hussain M, Aleem S. Digi-
tal forensic acquision and analysis of discord applicaons. In:
internaonal conference on communicaons, compung, cy-
bersecurity, and informacs. Vol. ccci. IEEE Publicaons; 2020.
14. Mann VA, Diamond R, Carey S. Development of voice recogni-
on: parallels with face recognion. J Exp Child Psychol. 1979;
27: 153-65.
15. Neustein A, Pal HA. Forensic speaker recognion. Springer.
2012; 1.
16. Dobre RA, Elisei-Iliescu C, Paleologu C, Negrescu C, Stanomir D.
Robust audio forensic soware for recovering speech signals
drowned in loud music. In: 22nd Internaonal Symposium for
Design and Technology in Electronic Packaging (SIITME). IEEE
Publicaons. IEEE Publicaons; 2016.
17. Devlieger, DJJoPMS. Searching for similarity: conrmaon bias
in forensic analyses of popular music. 2022; 34: 91-111.
18. Hansen JHL, Hasan T. Speaker Recognion by Machines and
Humans: A tutorial review. IEEE Signal Process Mag. 2015; 32:
74-99.
19. Morrison GSJS. Forensic voice comparison and the paradigm
shi. Sci Jusce. 2009; 49: 298-308.
20. Yan Q, Yang R, Huang J. Copy-move detecon of audio recording
with pitch similarity. In: IEEE Internaonal Conference on Acous-
cs, Speech and Signal Processing (ICASSP). IEEE Publicaons.
2015; 2015.
21. Ali Z, Imran M, Alsulaiman M. An automac digital audio au-
thencaon/forensics system. IEEE Access. 2017; 5: 2994-3007.
22. Mopas M, Curran A. Translang the sound of music: forensic
musicology and visual evidence in music Infringement Cases.
Can J Law Soc / Rev Canadienne Droit Soc. 2016; 31: 25-46.
23. McLeod K, DiCola P. Creave license: the law and culture of digi-
tal sampling. Duke University Press; 2011.
24. Gully A, Harrison P, Hughes V, Rhodes R, Wormald J. How voice
analysis can help solve crimes. Front Young Minds. 2022; 10.
25. Cusick SG. Music as torture/Music as weapon. In: The auditory
culture reader. Routledge. 2020; 379-91.
26. Tenaille, F. Music is the weapon of the future: y years of Afri-
can popular music. Chicago Review Press; 2002.
27. Putnam MTJPM. Society, music as a weapon: reacons and re-
sponses to RAF terrorism in the music of Ton Steine Scherben
and their successors in post-9/11 music. 2009; 32: 595-606.
28. Brown, TSJGSR. Music as a weapon? Ton Steine Scherben” and
the Polics of Rock in Cold War Berlin. 2009: 1-22.
29. Hadjidimitriou SK, LJJIToBE Hadjileonadis. EEG-Based Recognit
Music Liking Using Time-Freq Anal. 2012; 59: 3498-510.
30. Hadjidimitriou SK, LJJIToAC. Hadjileonadis. EEG-based classi-
caon of music appraisal responses using me-frequency analy-
sis and familiarity rangs. 2013; 4: 161-72.
31. Baker CJPoP. Music as a weapon of ethnopolical violence and
conict: processes of ethnic separaon during and aer the
break-up of Yugoslavia. Paerns of Prejudice. 2013; 47: 409-29.
32. Scardina J. What is voice recognion (speaker recognion)?-
Denion from WhatIs. Com. 2020, Customer Experience. 2020.
33. Udoa SSJAJORIM, ARTS. Forensic musicology for African musi-
cology. 2021; 9: 227-33.
34. Moorthy V, Shaw BA, Evans JT. Evaluaon of tempering induced
changes in the hardness prole of case-carburised EN36 steel
using magnec Barkhausen noise analysis. NDT & E Internaon-
al. 2003; 36: 43-9.
35. Ericson RV, Baranek PM, Chan JB. Represenng order: crime,
law, and jusce in the news media. Milton Keynes: Open Uni-
versity Press; 1991.
36. Valverde MJPN. Law’s dream of a common knowledge. Princ-
eton University Press; 2003.
37. DeVlieger DL. Promong creavity: how the use of music analy-
sis aects value judgments in copyright ligaon. University of
Minnesota; 2020.
38. Begault DR, Heise HD, Peler CA. Analysis criteria for forensic
musicology. Proc Meet Acoust. 2013; 60005.
39. O’Connor SM, Benne J. Determining the composion. 2021.
40. Skirpan R. An Argument that Independent Creaon is as likely as
Subconscious Copying in Music Infringement Cases. 2013.
41. DeMain BJPS. You stole my song! From George Harrison to Mi-
chael Bolton, strange tales of copyright infringement. 2007; 99:
16-20.
42. Savage PE, et al. Quantave evaluaon of music copyright in-
fringement. In: Proceedings of the 8th internaonal workshop
on folk music analysis (FMA2018). Greece: Thessaloniki. 2018;
61-6.
43. Benne J, WE C. Work it out: methods in forensic musicology.
44. Grin JJLS music: a role for the principles of reverse engineer-
ing. 2010; 30: 653-73.
45. Grigoras C, CJIJoSL, Law t. Digital audio recording analysis–the
electric network frequency criterion. 2005; 12: 63-76.
46. Grosche P, Müller M. Tempogram toolbox: MATLAB implemen-
taons for tempo and pulse analysis of music recordings. In: Pro-
ceedings of the 12th internaonal conference on music informa-
on retrieval (ISMIR), Miami, USA; 2011.
47. Leo KM. Forensic musicology and the blurred lines of federal.
Lexington Books; 2020.
48. Duan Z, Essid S, Liem CCS, Richard G, Sharma G. Audiovisual
analysis of music performances: overview of an emerging eld.
IEEE Signal Process Mag. 2018; 36: 63-73.
49. Reddy Chichili VP, Kumar V, Sivaraman J. Linkers in the structural
biology of protein-protein interacons. Protein Sci. 2013; 22:
153-67.
50. Conklin DJML. Melodic analysis with segment classes. Mach
Learn. 2006; 65: 349-60.
51. Gómez E, Herrera P. Comparave analysis of music recordings
from western and non-western tradions by automac tonal
feature extracon. Empirical Musicology Review. 2008; 3: 140-
56.
Submit your Manuscript | www.ausnpublishinggroup.com Ausn J Forensic Sci Criminol 10(1): id1095 (2023) - Page - 11
Austin Publishing Group
52. Shane S, Hubbard BJNYT. ISIS displaying a de command of var-
ied media. 2014; 30.
53. Fracile NJSMASH. The aksak rhythm, a disncve feature of the
Balkan folklore. 2003; 44: 191-204.
54. Laroche J MedJIToS. Dolson, and A. processing, Improved phase
vocoder me-scale modicaon of audio. 1999; 7: 323-32.
55. Albert S, GGJAoMR. Bell, Timing and music. 2002; 27: 574-93.
56. Pierazzo E. Digital scholarly eding: theories, models and meth-
ods. Routledge; 2016.
57. Lin Y-D, Wu T, Chen Y, Lin Y, Chen W, et al. Real-me analysis of
beats in music for entertainment robots. AUSMT. 2012; 2: 319-
28.
58. Cross I. Music analysis and music percepon. Music Anal. 1998;
17: 3-20.
59. Moat D, Sandler MB. Approaches in intelligent music produc-
on. In: Arts. MDPI; 2019.
60. Renza D, Lemus CJEswa, Lemus C. Authencity vericaon of
audio signals based on fragile watermarking for audio forensics.
Expert Systems with Applicaons. 2018; 91: 211-22.
61. Savage PE, Atkinson QD. Automac tune family idencaon by
musical sequence alignment. In: Proceedings of the 16th ISMIR
conference; 2015.
62. Bella SD, Peretz I, Arono N. Time course of melody recognion:
A gang paradigm study. Percept Psychophys. 2003; 65: 1019-
28.
63. Cronin CJHL. I hear America Suing: music Infringement int he Era
of Electronic Sound. 2014; 66: 1187.
64. Yuan Y, et al. Perceptual and automated esmates of infringe-
ment in 40 music copyright cases; 2022.
65. Miyazaki Ki, AJP Rakowski. Recognion of notated melodies by
possessors and nonpossessors of absolute pitch. Percept Psy-
chophys. 2002; 64: 1337-45.
66. Rodriguez AJAaS. Towards a methodology for voice quality anal-
ysis and character coherence in dubbing. SSRN Journal.
67. Schwartz SJibCdG. Wicked’s musical themes; 2004.
68. Selfridge-Field EJCTL. Substanal musical similarity in sound and
notaon: perspecves from digital musicology. 2017; 16: 249.
69. Walton D. Informal logic: A pragmac approach. Cambridge Uni-
versity Press; 2008.
70. Lund JJVS, E LJ. An empirical examinaon of the lay listener test
in music composion copyright infringement. 2011; 11: 137.
71. Maher RCJAT. Lending an ear in the courtroom: forensic acous-
cs. 2015; 11: 22-9.
72. Krasilovsky MW, Schemel S, This business of music: The deni-
ve guide to the business and legal issues of the music industry.
Billboard Books; 2007.
73. Broucek V, Turner P. Computer incident invesgaons: e-forensic
insights on evidence acquision. In: EICAR Conference Best Pa-
per proceedings. Luxembourg, Grand Duchy and Luxembourg:
EICAR; 2004.
74. Guarnera LA, DC Murrie, MTJTIiPS. Boccaccini, Why do forensic
experts disagree? Sources of unreliability and bias in forensic
psychology evaluaons. Translaonal Issues in Psychological Sci-
ence. 2017; 3: 143-152.
75. Crawford T, Gibson L. Modern methods for musicology: pros-
pects, proposals, and realies. Routledge; 2016.
76. Rumsey FJJotAES. Audio forensics: not an episode from CSI.
2016; 64: 440-4.
77. Zhou Z, Diao W, Liu X, Zhang K. Acousc ngerprinng revisited:
generate stable device id stealthily with inaudible sound. In:
Proceedings of the 2014 ACM SIGSAC conference on computer
and communicaons security. 2014; 429-40.
78. Love SCJUJ, Circuit Split: de Minimis Sampling from Copyrighted
Recordings aer VMG Salsoul, LLC v. Ciccone. 2018; 22: 2018.
79. Maher RC. Audio forensic examinaon. IEEE Signal Process Mag.
2009; 26: 84-94.
80. Peitz M, PJIJoIO. Waelbroeck, Why the music industry may gain
from free downloading—the role of sampling. 2006; 24: 907-13.
81. Rodgers TJOS. On the process and aesthecs of sampling in elec-
tronic music producon. Org Sound. 2003; 8: 313-20.
82. Miller PD. Sound unbound: sampling digital music and culture.
Mit Press; 2008.
83. Braun SKJIJoCS. Forensic evidence of copyright infringement by
digital audio sampling analysis-idencaon–marking. Interna-
onal Journal of Cyber-Security and Digital Forensics. 2014; 3:
170-82.
84. MACCHIUSI I. ’CUT AND PASTE IMAGINATION’: MASHUPS, tech-
nology and the aesthecs of collage. TORONTO: YORK UNIVER-
SITY; 2010.
85. Niitsuma M, Tomita Y, Yan WQ, Bell D. Towards musicologist-
driven mining of handwrien scores. IEEE Intell Syst. 2018; 33:
24-34.
86. Roeck, DFFFFFR. Cause the Samplers Gonna Sample: should
Courts Allow de Minimis Copying of Sound Recordings, or
Should They Shake It o? 2022; 127: 205.
87. Verde S, Preo N, Milani S, Canazza S. Stay true to the sound of
history: philology, phylogenecs and informaon engineering in
musicology. 2018; 8: 226.
88. Sarkar R, Naskar SK, Saha SK. Raga idencaon from Hindu-
stani classical music signal using composional properes. Com-
put Visual Sci. 2019; 22: 15-26.
89. Kaimal V, SJIJoCS. Barde. introducon to idencaon of raga in
Carnac music and its corresponding Hindustani music. Inter-
naonal Journal of Computer Sciences and Engineering. 2018;
6: 955-8.
ResearchGate has not been able to resolve any citations for this publication.
Article
Full-text available
Music copyright infringement lawsuits implicate millions of dollars in damages and costs of litigation. There are, however, few objective measures by which to evaluate these claims. Recent music information retrieval research has proposed objective algorithms to automatically detect musical similarity, which might reduce subjectivity in music copyright infringement decisions, but there remains minimal relevant perceptual data despite its crucial role in copyright law. We collected perceptual data from 51 participants for 40 adjudicated copyright cases from 1915–2018 in 7 legal jurisdictions (USA, UK, Australia, New Zealand, Japan, People’s Republic of China, and Taiwan). Each case was represented by three different versions: either full audio, melody only (MIDI), or lyrics only (text). Due to the historical emphasis in legal opinions on melody as the key criterion for deciding infringement, we originally predicted that listening to melody-only versions would result in perceptual judgments that more closely matched actual past legal decisions. However, as in our preliminary study of 17 court decisions (Yuan et al., 2020), our results did not match these predictions. Participants listening to full audio outperformed not only the melody-only condition, but also automated algorithms designed to calculate musical similarity (with maximal accuracy of 83% vs. 75%, respectively). Meanwhile, lyrics-only conditions performed at chance levels. Analysis of outlier cases suggests that music, lyrics, and contextual factors can interact in complex ways difficult to capture using quantitative metrics. We propose directions for further investigation including using larger and more diverse samples of cases, enhanced methods, and adapting our perceptual experiment method to avoid relying on ground truth data only from court decisions (which may be subject to errors and selection bias). Our results contribute data and methods to inform practical debates relevant to music copyright law throughout the world, such as the question of whether, and the extent to which, judges and jurors should be allowed to hear published sound recordings of the disputed works in determining musical similarity. Our results ultimately suggest that while automated algorithms are unlikely to replace human judgments, they may help to supplement them.
Article
Full-text available
Music production technology has made few advancements over the past few decades. State-of-the-art approaches are based on traditional studio paradigms with new developments primarily focusing on digital modelling of analog equipment. Intelligent music production (IMP) is the approach of introducing some level of artificial intelligence into the space of music production, which has the ability to change the field considerably. There are a multitude of methods that intelligent systems can employ to analyse, interact with, and modify audio. Some systems interact and collaborate with human mix engineers, while others are purely black box autonomous systems, which are uninterpretable and challenging to work with. This article outlines a number of key decisions that need to be considered while producing an intelligent music production system, and identifies some of the assumptions and constraints of each of the various approaches. One of the key aspects to consider in any IMP system is how an individual will interact with the system, and to what extent they can consistently use any IMP tools. The other key aspects are how the target or goal of the system is created and defined, and the manner in which the system directly interacts with audio. The potential for IMP systems to produce new and interesting approaches for analysing and manipulating audio, both for the intended application and creative misappropriation, is considerable.
Book
Drawing on interdisciplinary research methods from musicological and legal scholarship, this book maps the historical terrain of forensic musicology. It examines the contributions of musical expert witnesses, their analytical techniques, and the issues they encounter assisting courts in clarifying the blurred lines of music copyright.
Article
The nature of music composition has changed dramatically in the digital era. While some composers may still be writing musical notes onto a stave, in the traditional image of a classical composer, most pop songwriters are now producers of digital artifacts, in which production techniques are compositional gestures. Creating music directly as an audio object is not easily compatible with a copyright system that still distinguishes a musical work from a sound recording. This chapter explores the implications of this disconnect between law and composition practice to argue that the scope of copyright’s “musical works” should encompass a holistic approach to today’s beats-based digital music production, while treating artificially isolated elements (such as melodic fragments) as de minimis for the purposes of infringement litigation.
Article
Plagiarism is not a new phenomenon. The exponential development of the music industry during the 20th century has made the stakes quite spectacular, particularly on the financial level, due to the counterfeiting of musical works. There is currently no commercial product on the market dedicated to the detection and analysis of musical plagiarism. This study examines thoroughly the state of research in this field as well as the outlooks and urges of the sector, and then identify the technological obstacles hindering the emergence of satisfactory solutions.
Article
In the physical sciences and engineering domains, music has traditionally been considered an acoustic phenomenon. From a perceptual viewpoint, music is naturally associated with hearing, i.e., the audio modality. Moreover, for a long time, the majority of music recordings were distributed through audio-only media, such as vinyl records, cassettes, compact discs, and mp3 files. As a consequence, existing automated music analysis approaches predominantly focus on audio signals that represent information from the acoustic rendering of music.