{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:09:24Z","timestamp":1775912964440,"version":"3.50.1"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030113889","type":"print"},{"value":"9783030113896","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-11389-6_23","type":"book-chapter","created":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T16:51:03Z","timestamp":1548348663000},"page":"307-321","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["VPCID\u2014A VoIP Phone Call Identification Database"],"prefix":"10.1007","author":[{"given":"Yuankun","family":"Huang","sequence":"first","affiliation":[]},{"given":"Shunquan","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jiwu","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,24]]},"reference":[{"key":"23_CR1","unstructured":"Shahani, A.: Why phone fraud starts with a silent call (2015). https:\/\/www.npr.org\/sections\/alltechconsidered\/2015\/08\/24\/434313813\/why-phone-fraud-starts-with-a-silent-call"},{"key":"23_CR2","unstructured":"vd Groenendaal, H.: Why phone fraud starts with a silent call (2014). https:\/\/mybroadband.co.za\/news\/telecoms\/112935-voip-fraud-explained.html"},{"key":"23_CR3","unstructured":"McGlasson, L.: Vishing scam: four more states struck (2010). http:\/\/www.bankinfosecurity.com\/articles.php?art_id=2138"},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"Garofolo, J.S., Lamel, L.F., Fisher, W.M., Fiscus, J.G., Pallett, D.S.: Darpa timit acoustic-phonetic continous speech corpus CD-ROM. nist speech disc 1\u20131.1. NASA STI\/Recon technical report n 93 (1993)","DOI":"10.6028\/NIST.IR.4930"},{"key":"23_CR5","doi-asserted-by":"crossref","unstructured":"Jenner, F., Kwasinski, A.: Highly accurate non-intrusive speech forensics for codec identifications from observed decoded signals. In: 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1737\u20131740. IEEE (2012)","DOI":"10.1109\/ICASSP.2012.6288234"},{"issue":"2","key":"23_CR6","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1109\/TIFS.2016.2622012","volume":"12","author":"D Luo","year":"2017","unstructured":"Luo, D., Yang, R., Li, B., Huang, J.: Detection of double compressed AMR audio using stacked autoencoder. IEEE Trans. Inf. Forensics Secur. 12(2), 432\u2013444 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"23_CR7","unstructured":"Robinson, T., Fransen, J., Pye, D., Foote, J., Renals, S.: WSJCAMO: a British English speech corpus for large vocabulary continuous speech recognition. In: 1995 International Conference on Acoustics, Speech, and Signal Processing, ICASSP 1995, vol. 1, pp. 81\u201384. IEEE (1995)"},{"issue":"8","key":"23_CR8","doi-asserted-by":"publisher","first-page":"1480","DOI":"10.1109\/TMM.2016.2571999","volume":"18","author":"X Lin","year":"2016","unstructured":"Lin, X., Liu, J., Kang, X.: Audio recapture detection with convolutional neural networks. IEEE Trans. Multimedia 18(8), 1480\u20131487 (2016)","journal-title":"IEEE Trans. Multimedia"},{"issue":"7\u20138","key":"23_CR9","doi-asserted-by":"publisher","first-page":"588","DOI":"10.1016\/j.specom.2006.12.006","volume":"49","author":"Y Hu","year":"2007","unstructured":"Hu, Y., Loizou, P.C.: Subjective comparison and evaluation of speech enhancement algorithms. Speech Commun. 49(7\u20138), 588\u2013601 (2007)","journal-title":"Speech Commun."},{"key":"23_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/978-3-319-53465-7_6","volume-title":"Digital Forensics and Watermarking","author":"W Cao","year":"2017","unstructured":"Cao, W., Wang, H., Zhao, H., Qian, Q., Abdullahi, S.M.: Identification of electronic disguised voices in the noisy environment. In: Shi, Y.Q., Kim, H.J., Perez-Gonzalez, F., Liu, F. (eds.) IWDW 2016. LNCS, vol. 10082, pp. 75\u201387. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-53465-7_6"},{"issue":"2","key":"23_CR11","doi-asserted-by":"publisher","first-page":"625","DOI":"10.1109\/TIFS.2011.2178403","volume":"7","author":"C Hanilci","year":"2012","unstructured":"Hanilci, C., Ertas, F., Ertas, T., Eskidere, \u00d6.: Recognition of brand and models of cell-phones from recorded speech signals. IEEE Trans. Inf. Forensics Secur. 7(2), 625\u2013634 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Kotropoulos, C., Samaras, S.: Mobile phone identification using recorded speech signals. In: 2014 19th International Conference on Digital Signal Processing (DSP), pp. 586\u2013591. IEEE (2014)","DOI":"10.1109\/ICDSP.2014.6900732"},{"key":"23_CR13","doi-asserted-by":"crossref","unstructured":"Wu, Z., et al.: SAS: a speaker verification spoofing database containing diverse attacks. In: 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 4440\u20134444. IEEE (2015)","DOI":"10.1109\/ICASSP.2015.7178810"},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"Kinnunen, T., et al.: The ASVspoof 2017 challenge: assessing the limits of replay spoofing attack detection (2017)","DOI":"10.21437\/Interspeech.2017-1111"},{"issue":"9","key":"23_CR15","doi-asserted-by":"publisher","first-page":"2179","DOI":"10.1109\/TIFS.2018.2812185","volume":"13","author":"D Luo","year":"2018","unstructured":"Luo, D., Korus, P., Huang, J.: Band energy difference for source attribution in audio forensics. IEEE Trans. Inf. Forensics Secur. 13(9), 2179\u20132189 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"5","key":"23_CR16","doi-asserted-by":"publisher","first-page":"1720","DOI":"10.1016\/j.dsp.2013.04.005","volume":"23","author":"S Hicsonmez","year":"2013","unstructured":"Hicsonmez, S., Sencar, H.T., Avcibas, I.: Audio codec identification from coded and transcoded audios. Digital Signal Process. 23(5), 1720\u20131730 (2013)","journal-title":"Digital Signal Process."},{"key":"23_CR17","unstructured":"Scholz, K., Leutelt, L., Heute, U.: Speech-codec detection by spectral harmonic-plus-noise decomposition. In: Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers. vol. 2, pp. 2295\u20132299. IEEE (2004)"},{"issue":"4","key":"23_CR18","doi-asserted-by":"crossref","first-page":"575","DOI":"10.15388\/Informatica.2010.306","volume":"21","author":"R Sve\u010dko","year":"2010","unstructured":"Sve\u010dko, R., Kotnik, B., Chowdhury, A., Mezgec, Z.: GSM speech coder indirect identification algorithm. Informatica 21(4), 575\u2013596 (2010)","journal-title":"Informatica"},{"key":"23_CR19","doi-asserted-by":"crossref","unstructured":"Zhou, J.: Automatic speech codec identification with applications to tampering detection of speech recordings. Ph.D. thesis (2011)","DOI":"10.21437\/Interspeech.2011-648"},{"key":"23_CR20","doi-asserted-by":"crossref","unstructured":"Sharma, D., Naylor, P.A., Gaubitch, N.D., Brookes, M.: Non intrusive codec identification algorithm. In: 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 4477\u20134480. IEEE (2012)","DOI":"10.1109\/ICASSP.2012.6288914"},{"key":"23_CR21","doi-asserted-by":"crossref","unstructured":"Dr\u0103ghicescu, D., Pop, G., Burileanu, D., Burileanu, C.: GMM-based audio codec detection with application in forensics. In: 2015 38th International Conference on Telecommunications and Signal Processing (TSP), pp. 1\u20135. IEEE (2015)","DOI":"10.1109\/TSP.2015.7296421"},{"key":"23_CR22","doi-asserted-by":"crossref","unstructured":"Davis, S.B., Mermelstein, P.: Comparison of parametric representations for monosyllabic word recognition in continuously spoken sentences. In: Readings in speech recognition, pp. 65\u201374. Elsevier (1990)","DOI":"10.1016\/B978-0-08-051584-7.50010-3"},{"issue":"5","key":"23_CR23","doi-asserted-by":"publisher","first-page":"688","DOI":"10.1109\/LSP.2016.2549600","volume":"23","author":"D Luo","year":"2016","unstructured":"Luo, D., Sun, M., Huang, J.: Audio postprocessing detection based on amplitude cooccurrence vector feature. IEEE Signal Process. Lett. 23(5), 688\u2013692 (2016)","journal-title":"IEEE Signal Process. Lett."},{"key":"23_CR24","doi-asserted-by":"crossref","unstructured":"Dai, W., Dai, C., Qu, S., Li, J., Das, S.: Very deep convolutional neural networks for raw waveforms. In: 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 421\u2013425. IEEE (2017)","DOI":"10.1109\/ICASSP.2017.7952190"},{"key":"23_CR25","doi-asserted-by":"crossref","unstructured":"Kraetzer, C., Oermann, A., Dittmann, J., Lang, A.: Digital audio forensics: a first practical evaluation on microphone and environment classification. In: Proceedings of the 9th Workshop on Multimedia & Security, pp. 63\u201374. ACM (2007)","DOI":"10.1145\/1288869.1288879"},{"key":"23_CR26","unstructured":"Furui, S.: Speaker-independent isolated word recognition based on emphasized spectral dynamics. In: IEEE International Conference on Acoustics, Speech, and Signal Processing. ICASSP 1986, vol. 11, pp. 1991\u20131994. IEEE (1986)"},{"issue":"3","key":"23_CR27","first-page":"27","volume":"2","author":"CC Chang","year":"2011","unstructured":"Chang, C.C., Lin, C.J.: Libsvm: a library for support vector machines. ACM Trans. Intell. Syst. Technol. (TIST) 2(3), 27 (2011)","journal-title":"ACM Trans. Intell. Syst. Technol. (TIST)"}],"container-title":["Lecture Notes in Computer Science","Digital Forensics and Watermarking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-11389-6_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T14:55:01Z","timestamp":1709823301000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-11389-6_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030113889","9783030113896"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-11389-6_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"24 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IWDW","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Digital Watermarking","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jeju Island","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 October 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iwdw2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/iwdw2018.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}