{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T18:36:18Z","timestamp":1743100578597,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031565823"},{"type":"electronic","value":"9783031565830"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-56583-0_5","type":"book-chapter","created":{"date-parts":[[2024,4,2]],"date-time":"2024-04-02T05:02:23Z","timestamp":1712034143000},"page":"63-78","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A PUF Based Audio Fingerprint Based for\u00a0Device Authentication and\u00a0Tamper Location"],"prefix":"10.1007","author":[{"given":"Zhi","family":"Lu","sequence":"first","affiliation":[]},{"given":"Haochen","family":"Dou","sequence":"additional","affiliation":[]},{"given":"Songfeng","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Xueming","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Junjun","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Samir Mohammed","family":"Umran","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,3]]},"reference":[{"key":"5_CR1","doi-asserted-by":"publisher","unstructured":"Esquef, P.A.A., Apolin\u00e1rio, J.A., Biscainho, L.W.P.: Improved edit detection in speech via ENF patterns. In: 2015 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 1\u20136 (2015). https:\/\/doi.org\/10.1109\/WIFS.2015.7368585","DOI":"10.1109\/WIFS.2015.7368585"},{"issue":"12","key":"5_CR2","doi-asserted-by":"publisher","first-page":"2314","DOI":"10.1109\/TIFS.2014.2363524","volume":"9","author":"PAA Esquef","year":"2014","unstructured":"Esquef, P.A.A., Apolin\u00e1rio, J.A., Biscainho, L.W.P.: Edit detection in speech recordings via instantaneous electric network frequency variations. IEEE Trans. Inf. Forensics Secur. 9(12), 2314\u20132326 (2014). https:\/\/doi.org\/10.1109\/TIFS.2014.2363524","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"5_CR3","volume-title":"Cryptography and Network Security","author":"B Forouzan","year":"2007","unstructured":"Forouzan, B.: Cryptography and Network Security. McGraw-Hill, New York (2007)"},{"key":"5_CR4","doi-asserted-by":"publisher","unstructured":"Garlapati, B.M., Kakkirala, K.R.: Malicious audio source detection using audio watermarking. In: 2015 Asia Pacific Conference on Multimedia and Broadcasting, pp. 1\u20135 (2015). https:\/\/doi.org\/10.1109\/APMediaCast.2015.7210288","DOI":"10.1109\/APMediaCast.2015.7210288"},{"issue":"1","key":"5_CR5","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1109\/TDSC.2016.2536609","volume":"14","author":"C Herder","year":"2017","unstructured":"Herder, C., Ren, L., van Dijk, M., Yu, M.D., Devadas, S.: Trapdoor computational fuzzy extractors and stateless cryptographically-secure physical unclonable functions. IEEE Trans. Dependable Secure Comput. 14(1), 65\u201382 (2017). https:\/\/doi.org\/10.1109\/TDSC.2016.2536609","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"6","key":"5_CR6","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/TCAD.2020.3047976","volume":"40","author":"W Hu","year":"2021","unstructured":"Hu, W., Chang, C.H., Sengupta, A., Bhunia, S., Kastner, R., Li, H.: An overview of hardware security and trust: threats, countermeasures, and design tools. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 40(6), 1010\u20131038 (2021). https:\/\/doi.org\/10.1109\/TCAD.2020.3047976","journal-title":"IEEE Trans. Comput. Aided Des. Integr. Circuits Syst."},{"key":"5_CR7","doi-asserted-by":"publisher","unstructured":"Lin, X., Kang, X.: Supervised audio tampering detection using an autoregressive model. In: 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2142\u20132146 (2017). https:\/\/doi.org\/10.1109\/ICASSP.2017.7952535","DOI":"10.1109\/ICASSP.2017.7952535"},{"key":"5_CR8","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/s12559-010-9045-4","volume":"2","author":"Q Liu","year":"2010","unstructured":"Liu, Q., Sung, A.H., Qiao, M.: Detection of double MP3 compression. Cogn. Comput. 2, 291\u2013296 (2010). https:\/\/doi.org\/10.1007\/s12559-010-9045-4","journal-title":"Cogn. Comput."},{"key":"5_CR9","doi-asserted-by":"publisher","unstructured":"Maes, R.: Physically Unclonable Functions: Constructions, Properties and Applications. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-41395-7","DOI":"10.1007\/978-3-642-41395-7"},{"issue":"11","key":"5_CR10","doi-asserted-by":"publisher","first-page":"1827","DOI":"10.1109\/TIFS.2013.2280888","volume":"8","author":"H Malik","year":"2013","unstructured":"Malik, H.: Acoustic environment identification and its applications to audio forensics. IEEE Trans. Inf. Forensics Secur. 8(11), 1827\u20131837 (2013). https:\/\/doi.org\/10.1109\/TIFS.2013.2280888","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"5_CR11","doi-asserted-by":"publisher","first-page":"534","DOI":"10.1109\/TIFS.2010.2051270","volume":"5","author":"DP Nicolalde Rodriguez","year":"2010","unstructured":"Nicolalde Rodriguez, D.P., Apolinario, J.A., Biscainho, L.W.P.: Audio authenticity: detecting ENF discontinuity with high precision phase analysis. IEEE Trans. Inf. Forensics Secur. 5(3), 534\u2013543 (2010). https:\/\/doi.org\/10.1109\/TIFS.2010.2051270","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"5_CR12","doi-asserted-by":"publisher","unstructured":"Reis, P.M.G.I., Lustosa da Costa, J.P.C., Miranda, R.K., Del Galdo, G.: ESPRIT-Hilbert-based audio tampering detection with SVM classifier for forensic analysis via electrical network frequency. IEEE Trans. Inf. Forensics Secur. 12(4), 853\u2013864 (2017). https:\/\/doi.org\/10.1109\/TIFS.2016.2636095","DOI":"10.1109\/TIFS.2016.2636095"},{"key":"5_CR13","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/978-3-030-68734-2_4","volume-title":"Digital Forensics and Cyber Crime","author":"J Shi","year":"2021","unstructured":"Shi, J., Wang, G., Su, M., Liu, X.: Effective medical image copy-move forgery localization based on texture descriptor. In: Goel, S., Gladyshev, P., Johnson, D., Pourzandi, M., Majumdar, S. (eds.) ICDF2C 2020. LNICST, vol. 351, pp. 62\u201377. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-68734-2_4"},{"key":"5_CR14","doi-asserted-by":"publisher","unstructured":"Teerakanok, S., Uehara, T.: Digital media tampering detection techniques: an overview. In: 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC), vol. 2, pp. 170\u2013174 (2017). https:\/\/doi.org\/10.1109\/COMPSAC.2017.109","DOI":"10.1109\/COMPSAC.2017.109"},{"key":"5_CR15","unstructured":"Wang, A.L.: An industrial-strength audio search algorithm. In: Choudhury, S., Manus, S. (eds.) 4th Symposium Conference on Music Information Retrieval, ISMIR 2003, pp. 7\u201313. The International Society for Music Information Retrieval (2003). http:\/\/www.ismir.net. http:\/\/www.ee.columbia.edu\/~dpwe\/papers\/Wang03-shazam.pdf"},{"key":"5_CR16","doi-asserted-by":"publisher","unstructured":"Yang, R., Shi, Y.Q., Huang, J.: Detecting double compression of audio signal. In: Memon, N.D., Dittmann, J., Alattar, A.M., Delp, E.J., III. (eds.) Media Forensics and Security II, vol. 7541, pp. 200\u2013209. International Society for Optics and Photonics, SPIE (2010). https:\/\/doi.org\/10.1117\/12.838695","DOI":"10.1117\/12.838695"},{"key":"5_CR17","doi-asserted-by":"publisher","unstructured":"Zeng, J., et al.: Audio recorder forensic identification in 21 audio recorders. In: 2015 IEEE International Conference on Progress in Informatics and Computing (PIC), pp. 153\u2013157 (2015). https:\/\/doi.org\/10.1109\/PIC.2015.7489828","DOI":"10.1109\/PIC.2015.7489828"},{"issue":"7","key":"5_CR18","doi-asserted-by":"publisher","first-page":"1603","DOI":"10.1109\/TIFS.2016.2543205","volume":"11","author":"H Zhao","year":"2016","unstructured":"Zhao, H., Chen, Y., Wang, R., Malik, H.: Anti-forensics of environmental-signature-based audio splicing detection and its countermeasure via rich-features classification. IEEE Trans. Inf. Forensics Secur. 11(7), 1603\u20131617 (2016). https:\/\/doi.org\/10.1109\/TIFS.2016.2543205","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"5_CR19","doi-asserted-by":"publisher","first-page":"620","DOI":"10.1109\/TIFS.2019.2926777","volume":"15","author":"Y Zheng","year":"2020","unstructured":"Zheng, Y., Cao, Y., Chang, C.H.: A PUF-based data-device hash for tampered image detection and source camera identification. IEEE Trans. Inf. Forensics Secur. 15, 620\u2013634 (2020). https:\/\/doi.org\/10.1109\/TIFS.2019.2926777","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"9","key":"5_CR20","doi-asserted-by":"publisher","first-page":"5395","DOI":"10.1109\/TED.2022.3191628","volume":"69","author":"H Zuo","year":"2022","unstructured":"Zuo, H., Li, Q., Zheng, H., Yang, Y., Zhao, X.: An optically-reconfigurable PUF based on logarithmic photoreceptor of CMOS dynamic vision sensors. IEEE Trans. Electron Devices 69(9), 5395\u20135398 (2022). https:\/\/doi.org\/10.1109\/TED.2022.3191628","journal-title":"IEEE Trans. Electron Devices"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Digital Forensics and Cyber Crime"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-56583-0_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T10:04:19Z","timestamp":1724925859000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-56583-0_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031565823","9783031565830"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-56583-0_5","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"3 April 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICDF2C","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Digital Forensics and Cyber Crime","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icdf2c2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy +","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"105","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"41","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}