{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T20:13:17Z","timestamp":1743106397375,"version":"3.40.3"},"publisher-location":"Cham","reference-count":41,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031725586"},{"type":"electronic","value":"9783031725593"}],"license":[{"start":{"date-parts":[[2024,11,28]],"date-time":"2024-11-28T00:00:00Z","timestamp":1732752000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,28]],"date-time":"2024-11-28T00:00:00Z","timestamp":1732752000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-72559-3_19","type":"book-chapter","created":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T04:25:41Z","timestamp":1732681541000},"page":"278-291","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Research Agenda for\u00a0Speaker Authentication"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7049-1832","authenticated-orcid":false,"given":"Ebenhaeser Janse","family":"van Rensburg","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6176-3007","authenticated-orcid":false,"given":"Reinhardt A.","family":"Botha","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9762-7381","authenticated-orcid":false,"given":"Bertram","family":"Haskins","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,28]]},"reference":[{"doi-asserted-by":"publisher","unstructured":"Anwer, H., Anjum, S., Saqib, N.A.: Robust speaker recognition for E-commerce system. In: International Conference on Radar, Antenna, Microwave, Electronics and Telecommunications, pp. 92\u201397 (2015). https:\/\/doi.org\/10.1109\/ICRAMET.2015.7380781, nULL","key":"19_CR1","DOI":"10.1109\/ICRAMET.2015.7380781"},{"doi-asserted-by":"publisher","unstructured":"Araujo, T., Helberger, N., Kruikemeier, S., de\u00a0Vreese, C.H.: In AI we trust? perceptions about automated decision-making by artificial intelligence. AI and Society 35, 611\u2013623 (2020). https:\/\/doi.org\/10.1007\/s00146-019-00931-w","key":"19_CR2","DOI":"10.1007\/s00146-019-00931-w"},{"unstructured":"Arp, D., et al.: Dos and don\u2019ts of machine learning in computer security. In: Proceedings of USENIX Security Symposium (2022)","key":"19_CR3"},{"doi-asserted-by":"publisher","unstructured":"Bhugra, D., McKenzie, K.: Expressed emotion across cultures. Adv. Psychiatric Treatment 9, 342\u2013348 (2003). https:\/\/doi.org\/10.1192\/apt.9.5.342","key":"19_CR4","DOI":"10.1192\/apt.9.5.342"},{"doi-asserted-by":"publisher","unstructured":"Bibi, K., Naz, S., Rehman, A.: Biometric signature authentication using machine learning techniques: Current trends, challenges and opportunities. Multimedia Tools Appli. 79, 289\u2013340 (2020). https:\/\/doi.org\/10.1007\/s11042-019-08022-0","key":"19_CR5","DOI":"10.1007\/s11042-019-08022-0"},{"key":"19_CR6","first-page":"1","volume":"4","author":"A Bodepudi","year":"2020","unstructured":"Bodepudi, A., Reddy, M.: Spoofing attacks and mitigation strategies in biometrics-as-a-service systems. Eigenpub Rev. Sci. Technol. 4, 1\u201314 (2020)","journal-title":"Eigenpub Rev. Sci. Technol."},{"doi-asserted-by":"publisher","unstructured":"Ciarrochi, J., Scott, G., Deane, F.P., Heaven, P.C.: Relations between social and emotional competence and mental health: a construct validation study. Personality Individual Differences 35, 1947\u20131963 (12003). https:\/\/doi.org\/10.1016\/S0191-8869(03)00043-6","key":"19_CR7","DOI":"10.1016\/S0191-8869(03)00043-6"},{"doi-asserted-by":"publisher","unstructured":"Duan, S., Zhang, J., Roe, P., Towsey, M.: A survey of tagging techniques for music, speech and environmental sound. Artifi. Intell. Rev. 42, 637\u2013661 (2014) https:\/\/doi.org\/10.1007\/s10462-012-9362-y","key":"19_CR8","DOI":"10.1007\/s10462-012-9362-y"},{"key":"19_CR9","first-page":"6","volume":"1","author":"I Fatin","year":"2020","unstructured":"Fatin, I., Zulkifli, D.B., Fuad, N., Marwan, M.E.: An application of biometric security identification for automated teller machine. ACCESS Online J. IJACSSE-Inter. J. Adv. Comput. Syst. Softw. Eng. 1, 6\u201311 (2020)","journal-title":"ACCESS Online J. IJACSSE-Inter. J. Adv. Comput. Syst. Softw. Eng."},{"unstructured":"Galvez, D., et al.: The people\u2019s speech: A large-scale diverse english speech recognition dataset for commercial usage. arXiv preprint arXiv:2111.09344 (2021)","key":"19_CR10"},{"doi-asserted-by":"publisher","unstructured":"Hancock, J.T., Landrigan, C., Silver, C.: Expressing emotion in text-based communication, pp. 929\u2013932 (2007). https:\/\/doi.org\/10.1145\/1240624.1240764","key":"19_CR11","DOI":"10.1145\/1240624.1240764"},{"unstructured":"Hizlisoy, S., Arslan, R.S.: Text independent speaker recognition based on MFCC and machine learning. Selcuk Univ. J. Eng. Sci. 20, 73\u2013078 (2021). http:\/\/sujes.selcuk.edu.tr","key":"19_CR12"},{"doi-asserted-by":"publisher","unstructured":"Jiang, P., et al.: Securing liveness detection for voice authentication via Pop Noises. IEEE Trans. Dependable Sec. Comput. 20, 1702\u20131718 (2023). https:\/\/doi.org\/10.1109\/TDSC.2022.3163024","key":"19_CR13","DOI":"10.1109\/TDSC.2022.3163024"},{"doi-asserted-by":"publisher","unstructured":"J\u00fcrgens, R., Grass, A., Drolet, M., Fischer, J.: Effect of acting experience on emotion expression and recognition in voice: non-actors provide better stimuli than expected. J. Nonverbal Behav. 39, 195\u2013214 (2015). https:\/\/doi.org\/10.1007\/s10919-015-0209-5","key":"19_CR14","DOI":"10.1007\/s10919-015-0209-5"},{"doi-asserted-by":"publisher","unstructured":"Kaplan, R.M., Chambers, D.A., Glasgow, R.E.: Big data and large sample size: a cautionary note on the potential for bias (2014). https:\/\/doi.org\/10.1111\/cts.12178","key":"19_CR15","DOI":"10.1111\/cts.12178"},{"doi-asserted-by":"publisher","unstructured":"Khokher, R., Singh, R.C.: Footprint Identification: Review of an Emerging Biometric Trait. Macromolecular Symposia 397 (2021). https:\/\/doi.org\/10.1002\/masy.202000246","key":"19_CR16","DOI":"10.1002\/masy.202000246"},{"doi-asserted-by":"publisher","unstructured":"Lindebaum, D., Jordan, P.J.: Positive emotions, negative emotions, or utility of discrete emotions? J. Organizat. Behav. 33, 1027\u20131030 (2012). https:\/\/doi.org\/10.1002\/job.1819","key":"19_CR17","DOI":"10.1002\/job.1819"},{"key":"19_CR18","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.inffus.2016.05.003","volume":"33","author":"A Lumini","year":"2017","unstructured":"Lumini, A., Nanni, L.: Overview of the combination of biometric matchers. Inform. Fus. 33, 71\u201385 (2017). https:\/\/doi.org\/10.1016\/j.inffus.2016.05.003","journal-title":"Inform. Fus."},{"doi-asserted-by":"publisher","unstructured":"Mau, T.L., et al.: Professional actors demonstrate variability, not stereotypical expressions, when portraying emotional states in photographs. Nat. Commun. 12 (2021).https:\/\/doi.org\/10.1038\/s41467-021-25352-6","key":"19_CR19","DOI":"10.1038\/s41467-021-25352-6"},{"doi-asserted-by":"publisher","unstructured":"Moreno, J.D., Mart\u00ednez-Huertas, J., Olmos, R., Jorge-Botana, G., Botella, J.: Can personality traits be measured analyzing written language? a meta-analytic study on computational methods. Personal. Individual Differences 177 (2021). https:\/\/doi.org\/10.1016\/j.paid.2021.110818","key":"19_CR20","DOI":"10.1016\/j.paid.2021.110818"},{"doi-asserted-by":"publisher","unstructured":"Nam, H., Kim, S.H., Park, Y.H.: FilterAugment: an acoustic environmental data augmentation method, vol. 2022, pp. 4308\u20134312. Institute of Electrical and Electronics Engineers Inc. (May 2022) https:\/\/doi.org\/10.1109\/ICASSP43922.2022.9747680","key":"19_CR21","DOI":"10.1109\/ICASSP43922.2022.9747680"},{"doi-asserted-by":"publisher","unstructured":"Naveen, R., Reddy, C.J., Tanguturu, R., Kumar, M.A.: Speaker identification and verification using deep learning. Instit. Electr. Electr. En. Inc. (2022). https:\/\/doi.org\/10.1109\/ICoNSIP49665.2022.10007520","key":"19_CR22","DOI":"10.1109\/ICoNSIP49665.2022.10007520"},{"doi-asserted-by":"publisher","unstructured":"Pal, K., Patel, B.V.: Data Classification with k-fold Cross Validation and Holdout Accuracy Estimation Methods with 5 Different Machine Learning Techniques, pp. 83\u201387. Institute of Electrical and Electronics Engineers Inc. (Mar 2020). https:\/\/doi.org\/10.1109\/ICCMC48092.2020.ICCMC-00016","key":"19_CR23","DOI":"10.1109\/ICCMC48092.2020.ICCMC-00016"},{"doi-asserted-by":"crossref","unstructured":"Pandey, L., Arif, A.S.: Silent Speech and Emotion Recognition from Vocal Tract Shape Dynamics in Real-Time MRI, pp.\u00a01\u20138 (8 2021). http:\/\/arxiv.org\/abs\/2106.08706","key":"19_CR24","DOI":"10.1145\/3450618.3469176"},{"key":"19_CR25","doi-asserted-by":"publisher","first-page":"143296","DOI":"10.1109\/ACCESS.2023.3342107","volume":"11","author":"Y Patel","year":"2023","unstructured":"Patel, Y., et al.: Deepfake generation and detection: case study and challenges. IEEE Access 11, 143296\u2013143323 (2023). https:\/\/doi.org\/10.1109\/ACCESS.2023.3342107","journal-title":"IEEE Access"},{"doi-asserted-by":"publisher","unstructured":"Pranto, S.I., et al.: AIMS TALK: Intelligent Call Center Support in Bangla Language with Speaker Authentication. Institute of Electrical and Electronics Engineers Inc. (2021). https:\/\/doi.org\/10.1109\/ETCCE54784.2021.9689831","key":"19_CR26","DOI":"10.1109\/ETCCE54784.2021.9689831"},{"doi-asserted-by":"publisher","unstructured":"Ramezan, C.A., Warner, T.A., Maxwell, A.E., Price, B.S.: Effects of training set size on supervised machine-learning land-cover classification of large-area high-resolution remotely sensed data. Remote Sensing 13, 1\u201327 (2021). https:\/\/doi.org\/10.3390\/rs13030368","key":"19_CR27","DOI":"10.3390\/rs13030368"},{"doi-asserted-by":"publisher","unstructured":"Salehi, A.W., et al.: A Study of CNN and Transfer Learning in Medical Imaging: Advantages, Challenges, Future Scope ( Apr 2023).https:\/\/doi.org\/10.3390\/su15075930","key":"19_CR28","DOI":"10.3390\/su15075930"},{"doi-asserted-by":"publisher","unstructured":"Schirmer, A., Adolphs, R.: Emotion perception from face, voice, and touch: comparisons and convergence. Trends Cognitive Sci. 21, 216\u2013228 (2017). https:\/\/doi.org\/10.1016\/j.tics.2017.01.001, https:\/\/doi.org\/10.1016\/j.tics.2017.01.001","key":"19_CR29","DOI":"10.1016\/j.tics.2017.01.001 10.1016\/j.tics.2017.01.001"},{"doi-asserted-by":"publisher","unstructured":"Shrestha, Y.R., Ben-Menahem, S.M., von Krogh, G.: Organizational decision-making structures in the age of artificial intelligence. California Mana. Rev. 66\u201383 (2019). https:\/\/doi.org\/10.1177\/0008125619862257","key":"19_CR30","DOI":"10.1177\/0008125619862257"},{"doi-asserted-by":"publisher","unstructured":"Singh, M., Pati, D.: Countermeasures to Replay Attacks: A Review. IETE Technical Review (Institution of Electronics and Telecommunication Engineers, India) 37, 599\u2013614 (2020). https:\/\/doi.org\/10.1080\/02564602.2019.1684851","key":"19_CR31","DOI":"10.1080\/02564602.2019.1684851"},{"doi-asserted-by":"publisher","unstructured":"Story, B.H., et al.: An age-dependent vocal tract model for males and females based on anatomic measurements 3079 (2018). https:\/\/doi.org\/10.1121\/1.5038264","key":"19_CR32","DOI":"10.1121\/1.5038264"},{"doi-asserted-by":"publisher","unstructured":"Szijjarto, L., Bereczkei, T.: The machiavellians\u2019 \u201ccool syndrome\u201d: they experience intensive feelings but have difficulties in expressing their emotions. Current Psychol. 34, 363\u2013375 (2015).https:\/\/doi.org\/10.1007\/s12144-014-9262-1","key":"19_CR33","DOI":"10.1007\/s12144-014-9262-1"},{"doi-asserted-by":"publisher","unstructured":"Taylor, S., Dromey, C., Nissen, S.L., Tanner, K., Eggett, D., Corbin-Lewis, K.: Age-related changes in speech and voice: spectral and cepstral measures. J. Speech, Lang. Hearing Res. 63, 647\u2013660 (2020). https:\/\/doi.org\/10.1044\/2019_JSLHR-19-00028","key":"19_CR34","DOI":"10.1044\/2019_JSLHR-19-00028"},{"doi-asserted-by":"publisher","unstructured":"Turgeman, A., Zelazny, F.: Invisible challenges: the next step in behavioural biometrics?. Biometric Technol. Today 2017, 5\u20137 (2017). https:\/\/doi.org\/10.1016\/S0969-4765(17)30114-5","key":"19_CR35","DOI":"10.1016\/S0969-4765(17)30114-5"},{"doi-asserted-by":"publisher","unstructured":"Wang, Q., Wang, M., Yang, Y., Zhang, X.: Multi-modal emotion recognition using EEG and speech signals. Comput. Biol. Med. 149 (2022). https:\/\/doi.org\/10.1016\/j.compbiomed.2022.105907","key":"19_CR36","DOI":"10.1016\/j.compbiomed.2022.105907"},{"key":"19_CR37","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2023.2260818","author":"A Wells","year":"2023","unstructured":"Wells, A., Usman, A.B.: Privacy and biometrics for smart healthcare systems: attacks, and techniques. Information Security J. (2023). https:\/\/doi.org\/10.1080\/19393555.2023.2260818","journal-title":"Information Security J."},{"key":"19_CR38","doi-asserted-by":"publisher","first-page":"1572","DOI":"10.1109\/TIFS.2019.2944058","volume":"15","author":"L Wu","year":"2020","unstructured":"Wu, L., Yang, J., Zhou, M., Chen, Y., Wang, Q.: LVID: a multimodal biometrics authentication system on smartphones. IEEE Trans. Inf. Forensics Secur. 15, 1572\u20131585 (2020). https:\/\/doi.org\/10.1109\/TIFS.2019.2944058","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"doi-asserted-by":"publisher","unstructured":"Yang, W., Wang, S., Hu, J., Zheng, G., Valli, C.: Security and accuracy of fingerprint-based biometrics: a review. Symmetry 11 (2019).https:\/\/doi.org\/10.3390\/sym11020141","key":"19_CR39","DOI":"10.3390\/sym11020141"},{"doi-asserted-by":"publisher","unstructured":"Zloteanu, M., Krumhuber, E.G.: Expression Authenticity: The Role of Genuine and Deliberate Displays in Emotion Perception. Front. Psychol. 11 (1 2021) https:\/\/doi.org\/10.3389\/fpsyg.2020.611248","key":"19_CR40","DOI":"10.3389\/fpsyg.2020.611248"},{"doi-asserted-by":"publisher","unstructured":"\u00d6zayd\u0131n, S.: Examination of energy based voice activity detection algorithms for noisy speech signals. Euro. J. Sci. Technol., pp. 157\u2013163 (2019). https:\/\/doi.org\/10.31590\/ejosat.637741","key":"19_CR41","DOI":"10.31590\/ejosat.637741"}],"container-title":["IFIP Advances in Information and Communication Technology","Human Aspects of Information Security and Assurance"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-72559-3_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T05:07:10Z","timestamp":1732684030000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-72559-3_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,28]]},"ISBN":["9783031725586","9783031725593"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-72559-3_19","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2024,11,28]]},"assertion":[{"value":"28 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HAISA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Human Aspects of Information Security and Assurance","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sk\u00f6vde","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sweden","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 July 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 July 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"haisa2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.haisa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}