{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T08:09:32Z","timestamp":1749802172898,"version":"3.41.0"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031893629","type":"print"},{"value":"9783031893636","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-89363-6_7","type":"book-chapter","created":{"date-parts":[[2025,5,24]],"date-time":"2025-05-24T07:47:11Z","timestamp":1748072831000},"page":"113-128","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["ENF Match with\u00a0Masking: A\u00a0New Method for\u00a0Searching with\u00a0Sparse Signal"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0565-7496","authenticated-orcid":false,"given":"Nicola","family":"Landro","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0000-2920-4910","authenticated-orcid":false,"given":"Lorenzo","family":"Schiavone","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2196-7232","authenticated-orcid":false,"given":"Anselmo Castelo","family":"Branco Ferreira","sequence":"additional","affiliation":[]},{"given":"Laurent","family":"Beslay","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,25]]},"reference":[{"key":"7_CR1","doi-asserted-by":"publisher","first-page":"110100","DOI":"10.1016\/j.forsciint.2019.110100","volume":"307","author":"D Bykhovsky","year":"2020","unstructured":"Bykhovsky, D.: Recording device identification by ENF harmonics power analysis. Forensic Sci. Int. 307, 110100 (2020)","journal-title":"Forensic Sci. Int."},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Chen, J., Lin, H., Han, X., Sun, L.: Benchmarking large language models in retrieval-augmented generation. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a038, pp. 17754\u201317762 (2024)","DOI":"10.1609\/aaai.v38i16.29728"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Cooper, A.J.: An automated approach to the electric network frequency (ENF) criterion: theory and practice. Int. J. Speech, Lang. Law 16(2) (2009)","DOI":"10.1558\/ijsll.v16i2.193"},{"key":"7_CR4","unstructured":"Cuturi, M., Blondel, M.: Soft-DTW: a differentiable loss function for time-series. In: International Conference on Machine Learning, pp. 894\u2013903. PMLR (2017)"},{"key":"7_CR5","unstructured":"Douze, M., et al.: The Faiss library. arXiv preprint: arXiv:2401.08281 (2024)"},{"key":"7_CR6","unstructured":"Fern\u00e1ndez-Mendui\u00f1a, S., P\u00e9rez-Gonz\u00e1lez, F.: ENF moving video database. Zenodo (2020)"},{"key":"7_CR7","doi-asserted-by":"publisher","first-page":"745","DOI":"10.1109\/LSP.2020.2988145","volume":"27","author":"S Fern\u00e1ndez-Mendui\u00f1a","year":"2020","unstructured":"Fern\u00e1ndez-Mendui\u00f1a, S., P\u00e9rez-Gonz\u00e1lez, F.: Temporal localization of non-static digital videos using the electrical network frequency. IEEE Signal Process. Lett. 27, 745\u2013749 (2020)","journal-title":"IEEE Signal Process. Lett."},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Ferrara, P., Sanchez, I.: A music spectrum combining approach for ENF-based video timestamping. In: 2021 IEEE International Workshop on Biometrics and Forensics (IWBF) (2021)","DOI":"10.1109\/IWBF50991.2021.9465094"},{"issue":"3","key":"7_CR9","doi-asserted-by":"publisher","first-page":"1021","DOI":"10.1111\/1556-4029.15003","volume":"67","author":"G Frijters","year":"2022","unstructured":"Frijters, G., Geradts, Z.J.: Use of electric network frequency presence in video material for time estimation. J. Forensic Sci. 67(3), 1021\u20131032 (2022)","journal-title":"J. Forensic Sci."},{"issue":"7","key":"7_CR10","doi-asserted-by":"publisher","first-page":"1173","DOI":"10.1109\/TIFS.2013.2265088","volume":"8","author":"L Fu","year":"2013","unstructured":"Fu, L., Markham, P.N., Conners, R.W., Liu, Y.: An improved discrete Fourier transform-based algorithm for electric network frequency extraction. IEEE Trans. Inf. Forensics Secur. 8(7), 1173\u20131181 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"7_CR11","unstructured":"Gaber, A., et al.: Electric network frequency (ENF) recognition (2016)"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Garg, R., Hajj-Ahmad, A., Wu, M.: Feasibility study on intra-grid location estimation using power ENF signals. arXiv preprint:arXiv:2105.00668 (2021)","DOI":"10.36227\/techrxiv.14516634"},{"issue":"7","key":"7_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.18637\/jss.v031.i07","volume":"31","author":"T Giorgino","year":"2009","unstructured":"Giorgino, T.: Computing and visualizing dynamic time warping alignments in r: The dtw package. J. Stat. Softw. 31(7), 1\u201324 (2009)","journal-title":"J. Stat. Softw."},{"issue":"13","key":"7_CR14","doi-asserted-by":"publisher","first-page":"5428","DOI":"10.3390\/app14135428","volume":"14","author":"M Gonzalez-Lee","year":"2024","unstructured":"Gonzalez-Lee, M., et al.: A new class of edge filter based on a cross-correlation-like equation derived from fractional calculus principles. Appl. Sci. 14(13), 5428 (2024)","journal-title":"Appl. Sci."},{"issue":"1","key":"7_CR15","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1558\/sll.2005.12.1.63","volume":"12","author":"C Grigoras","year":"2005","unstructured":"Grigoras, C.: Digital audio recording analysis-the electric network frequency criterion. Int. J. Speech Lang. Law 12(1), 63\u201376 (2005)","journal-title":"Int. J. Speech Lang. Law"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Grigoras, C.: Applications of enf criterion in forensic audio, video, computer and telecommunication analysis. Forensic Sci. Int. 167(2), 136\u2013145 (2007). selected Articles of the 4th European Academy of Forensic Science Conference (EAFS2006) June 13-16, 2006 Helsinki, Finland","DOI":"10.1016\/j.forsciint.2006.06.033"},{"issue":"9","key":"7_CR17","doi-asserted-by":"publisher","first-page":"885","DOI":"10.1109\/LSP.2013.2272523","volume":"20","author":"A Hajj-Ahmad","year":"2013","unstructured":"Hajj-Ahmad, A., Garg, R., Wu, M.: Spectrum combining for ENF signal estimation. IEEE Signal Process. Lett. 20(9), 885\u2013888 (2013)","journal-title":"IEEE Signal Process. Lett."},{"issue":"6","key":"7_CR18","doi-asserted-by":"publisher","first-page":"1125","DOI":"10.1109\/TIFS.2015.2398367","volume":"10","author":"A Hajj-Ahmad","year":"2015","unstructured":"Hajj-Ahmad, A., Garg, R., Wu, M.: ENF-based region-of-recording identification for media signals. IEEE Trans. Inf. Forensics Secur. 10(6), 1125\u20131136 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"7_CR19","doi-asserted-by":"publisher","first-page":"1724","DOI":"10.1109\/LSP.2022.3189306","volume":"29","author":"H Han","year":"2022","unstructured":"Han, H., Jeon, Y., Song, B.K., Yoon, J.W.: A phase-based approach for ENF signal extraction from rolling shutter videos. IEEE Signal Proc. Lett. 29, 1724\u20131728 (2022)","journal-title":"IEEE Signal Proc. Lett."},{"key":"7_CR20","first-page":"253","volume-title":"The International Workshop on Digital Forensics and Watermarking 2012","author":"Y Hu","year":"2013","unstructured":"Hu, Y., Li, C.T., Lv, Z., Liu, B.B.: Audio forgery detection based on max offsets for cross correlation between ENF and reference signal. In: Shi, Y.Q., Kim, H.J., P\u00e9rez-Gonz\u00e1lez, F. (eds.) The International Workshop on Digital Forensics and Watermarking 2012, pp. 253\u2013266. Springer, Berlin Heidelberg, Berlin, Heidelberg (2013)"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Hua, G.: Error analysis of forensic ENF matching. In: 2018 IEEE International Workshop on Information Forensics and Security (WIFS), pp.\u00a01\u20137. IEEE (2018)","DOI":"10.1109\/WIFS.2018.8630786"},{"key":"7_CR22","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1109\/TIFS.2020.3009579","volume":"16","author":"G Hua","year":"2021","unstructured":"Hua, G., Liao, H., Wang, Q., Zhang, H., Ye, D.: Detection of electric network frequency in audio recordings-from theory to practical detectors. IEEE Trans. Inf. Forensics Secur. 16, 236\u2013248 (2021)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"7_CR23","doi-asserted-by":"publisher","first-page":"3874","DOI":"10.1109\/TIFS.2021.3099697","volume":"16","author":"G Hua","year":"2021","unstructured":"Hua, G., Liao, H., Zhang, H., Ye, D., Ma, J.: Robust ENF estimation based on harmonic enhancement and maximum weight clique. IEEE Trans. Inf. Forensics Secur. 16, 3874\u20133887 (2021)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"7_CR24","doi-asserted-by":"crossref","unstructured":"Hua, G., Wang, Q., Ye, D., Zhang, H., Wang, G., Xia, S.: Factors affecting forensic electric network frequency matching - a comprehensive study. Digit. Commun. Netw. (2023)","DOI":"10.1016\/j.dcan.2023.01.009"},{"issue":"2","key":"7_CR25","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.forsciint.2004.11.015","volume":"155","author":"M Kajstura","year":"2005","unstructured":"Kajstura, M., Trawinska, A., Hebenstreit, J.: Application of the electrical network frequency (ENF) criterion: a case of a digital recording. Forensic Sci. Int. 155(2), 165\u2013171 (2005)","journal-title":"Forensic Sci. Int."},{"key":"7_CR26","doi-asserted-by":"crossref","unstructured":"Ngharamike, E., Ang, K.L.M., Seng, J.K.P., Wang, M.: ENF based digital multimedia forensics: survey, application, challenges and future work. IEEE Access (2023)","DOI":"10.1109\/ACCESS.2023.3312181"},{"issue":"4","key":"7_CR27","doi-asserted-by":"publisher","first-page":"1330","DOI":"10.1109\/TIFS.2012.2197391","volume":"7","author":"O Ojowu","year":"2012","unstructured":"Ojowu, O., Karlsson, J., Li, J., Liu, Y.: ENF extraction from digital recordings using adaptive techniques and frequency tracking. IEEE Trans. Inf. Forensics Secur. 7(4), 1330\u20131338 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"7_CR28","first-page":"32","volume":"1","author":"AM Priyatno","year":"2024","unstructured":"Priyatno, A.M., Prasetya, M., Cholidhazia, P., Sari, R.K.: Comparison of similarity methods on new student admission chatbots using retrieval-based concepts. J. Eng. Sci. Appl. 1, 32\u201340 (2024)","journal-title":"J. Eng. Sci. Appl."},{"key":"7_CR29","unstructured":"Sakoe, H.: Dynamic-programming approach to continuous speech recognition. In: 1971 Proceedings of the International Congress of Acoustics, Budapest (1971)"},{"issue":"1","key":"7_CR30","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1109\/TASSP.1978.1163055","volume":"26","author":"H Sakoe","year":"1978","unstructured":"Sakoe, H., Chiba, S.: Dynamic programming algorithm optimization for spoken word recognition. IEEE Trans. Acoust. Speech Signal Process. 26(1), 43\u201349 (1978)","journal-title":"IEEE Trans. Acoust. Speech Signal Process."},{"key":"7_CR31","unstructured":"Schumacher, D., LaBounty\u00a0Jr, F.: V3ctron| data retrieval & access system for flexible semantic search & retrieval of proprietary document collections using natural language queries (2023). Available at SSRN 4430463"},{"key":"7_CR32","doi-asserted-by":"crossref","unstructured":"Singh, R., Singh, S.: Text similarity measures in news articles by vector space model using NLP. J. Inst. Eng. (India): Ser. B 102, 329\u2013338 (2021)","DOI":"10.1007\/s40031-020-00501-5"},{"key":"7_CR33","doi-asserted-by":"crossref","unstructured":"Tzolopoulos, G., Korgialas, C., Kotropoulos, C.: On spectrogram analysis in a multiple classifier fusion framework for power grid classification using electric network frequency. arXiv preprint: arXiv:2403.18402 (2024)","DOI":"10.5220\/0012418400003654"},{"key":"7_CR34","doi-asserted-by":"crossref","unstructured":"Zhang, J., Posse, S., Tatsuoka, C.: Sliding window functional connectivity inference with nonstationary autocorrelations and cross-correlations. bioRxiv, pp. 2024\u201306 (2024)","DOI":"10.1101\/2024.06.18.599636"},{"issue":"1","key":"7_CR35","doi-asserted-by":"publisher","first-page":"11186","DOI":"10.1038\/s41598-024-60813-0","volume":"14","author":"H Zhao","year":"2024","unstructured":"Zhao, H., Ye, Y., Shen, X., Liu, L.: 1D-CNN-based audio tampering detection using ENF signals. Sci. Rep. 14(1), 11186 (2024)","journal-title":"Sci. Rep."},{"key":"7_CR36","unstructured":"Zhao, P., et al.: Retrieval-augmented generation for AI-generated content: a survey. arXiv preprint: arXiv:2402.19473 (2024)"},{"key":"7_CR37","doi-asserted-by":"crossref","unstructured":"Zheng, L., Zhang, Y., Lee, C.E., Thing, V.L.: Time-of-recording estimation for audio recordings. Digit. Invest. (2017)","DOI":"10.1016\/j.diin.2017.06.001"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Digital Forensics and Cyber Crime"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-89363-6_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,24]],"date-time":"2025-05-24T07:47:17Z","timestamp":1748072837000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-89363-6_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031893629","9783031893636"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-89363-6_7","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"value":"1867-8211","type":"print"},{"value":"1867-822X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"25 May 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICDF2C","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Digital Forensics and Cyber Crime","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dubrovnik","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Croatia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icdf2c2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icdf2c.eai-conferences.org\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}