{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T20:23:05Z","timestamp":1725999785690},"publisher-location":"Cham","reference-count":8,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030037475"},{"type":"electronic","value":"9783030037482"}],"license":[{"start":{"date-parts":[[2018,11,11]],"date-time":"2018-11-11T00:00:00Z","timestamp":1541894400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-03748-2_7","type":"book-chapter","created":{"date-parts":[[2018,11,10]],"date-time":"2018-11-10T09:45:22Z","timestamp":1541843122000},"page":"55-62","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["An Interrogation Speech Manipulation Detection Method Using Speech Fingerprinting and Watermarking"],"prefix":"10.1007","author":[{"given":"Shinnya","family":"Takahashi","sequence":"first","affiliation":[]},{"given":"Kazuhiro","family":"Kondo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,11]]},"reference":[{"key":"7_CR1","unstructured":"Kyodo News: Japanese police to tape all interrogations of suspects facing lay judge trials. The Japan Times online article, September 2016. \nhttp:\/\/www.japantimes.com\/news\/2016\/09\/16\/crime-legal\/japanese-police-tape-interrogations-suspect-facing-lay-judge-trials\/"},{"key":"7_CR2","unstructured":"Kukucka, J.: Lights, camera, justice: The value of recording police investigations. The Huffington Post online article, July 2014. \nhttp:\/\/www.huffingtonpost.com\/jeff-kukucka\/lights-camera-justice-the_b_5404579.html"},{"key":"7_CR3","first-page":"121","volume-title":"Advances in Intelligent Information Hiding and Multimedia Signal Processing","author":"Shinnya Takahashi","year":"2017","unstructured":"Takahashi, S., kondo, K.: Towards an interrogation speech manipulation detection method using speech fingerprinting and watermarking. In: Proceedings of IIHMSP, Matsue (2017)"},{"key":"7_CR4","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1121\/1.1995189","volume":"57","author":"F Itakura","year":"1975","unstructured":"Itakura, F.: Line spectrum representation of linear prediction coefficients of speechsignals. J. Acoust. Soc. Am. 57, 535 (1975)","journal-title":"J. Acoust. Soc. Am."},{"key":"7_CR5","unstructured":"Sugamura, N., Itakura, F.: Speech data compression by LSP analysis-synthesis technique. Trans. Inst. Electron., Inf. Commun. Eng. J64-A(8) (Aug 1981), in Japanese"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Boney, L., Tewkfik, A.H., Hamdy, K.N.: Digital watermarks for audio signals. In: Proceedings of the IEEE International Conference on Multimedia Computing and Systems. IEEE, Hiroshima (1996)","DOI":"10.1109\/MMCS.1996.535015"},{"key":"7_CR7","unstructured":"Habets, E: Room impulse response generator, September 2010. \nhttps:\/\/www.audiolabs-erlangen.de\/fau\/professor\/habets\/software\/rir-generator"},{"key":"7_CR8","unstructured":"NII Speech Resources Consortium: ASJ continuous speech corpus for research. \nhttp:\/\/research.nii.ac.jp\/src\/en\/ASJ-JIPDEC.html\n\n. Accessed 2 Mar 2016"}],"container-title":["Smart Innovation, Systems and Technologies","Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-03748-2_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,11,10]],"date-time":"2018-11-10T09:48:24Z","timestamp":1541843304000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-03748-2_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,11]]},"ISBN":["9783030037475","9783030037482"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-03748-2_7","relation":{},"ISSN":["2190-3018","2190-3026"],"issn-type":[{"type":"print","value":"2190-3018"},{"type":"electronic","value":"2190-3026"}],"subject":[],"published":{"date-parts":[[2018,11,11]]},"assertion":[{"value":"IIH-MSP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Information Hiding and Multimedia Signal Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sendai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iih2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iihmsp2018.github.io\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}