{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T14:15:37Z","timestamp":1760710537543,"version":"3.37.3"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2021,3,25]],"date-time":"2021-03-25T00:00:00Z","timestamp":1616630400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,3,25]],"date-time":"2021-03-25T00:00:00Z","timestamp":1616630400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Circuits Syst Signal Process"],"published-print":{"date-parts":[[2021,10]]},"DOI":"10.1007\/s00034-021-01697-7","type":"journal-article","created":{"date-parts":[[2021,3,25]],"date-time":"2021-03-25T08:03:04Z","timestamp":1616659384000},"page":"4903-4923","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Combined i-Vector and Extreme Learning Machine Approach for Robust Speaker Identification and Evaluation with SITW 2016, NIST 2008, TIMIT Databases"],"prefix":"10.1007","volume":"40","author":[{"given":"Musab T. S.","family":"Al-Kaltakchi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3340-8489","authenticated-orcid":false,"given":"Mohammed A. M.","family":"Abdullah","sequence":"additional","affiliation":[]},{"given":"Wai L.","family":"Woo","sequence":"additional","affiliation":[]},{"given":"Satnam S.","family":"Dlay","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,25]]},"reference":[{"issue":"33","key":"1697_CR1","doi-asserted-by":"publisher","first-page":"24013","DOI":"10.1007\/s11042-019-08293-7","volume":"79","author":"S Abd El-Moneim","year":"2020","unstructured":"S. Abd El-Moneim, M. Nassar, M.I. Dessouky, N.A. Ismail, A.S. El-Fishawy, F.E. Abd El-Samie, Text-independent speaker recognition using lstm-rnn and speech enhancement. Multimedia Tools and Applications 79(33), 24013\u201324028 (2020)","journal-title":"Multimedia Tools and Applications"},{"key":"1697_CR2","doi-asserted-by":"crossref","unstructured":"M.A. Abdullah, F. Al-Dulaimi, W. Al-Nuaimy, A. Al-Ataby, Smart card with iris recognition for high security access environment. In: 2011 1st Middle East Conference on Biomedical Engineering, IEEE, pp 382\u2013385 (2011)","DOI":"10.1109\/MECBME.2011.5752146"},{"issue":"10","key":"1697_CR3","doi-asserted-by":"publisher","first-page":"2749","DOI":"10.1016\/j.patcog.2011.04.009","volume":"44","author":"PK Ajmera","year":"2011","unstructured":"P.K. Ajmera, D.V. Jadhav, R.S. Holambe, Text-independent speaker identification using Radon and discrete cosine transforms based features from speech spectrogram. Pattern Recognition 44(10), 2749\u20132759 (2011)","journal-title":"Pattern Recognition"},{"key":"1697_CR4","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1186\/s13634-017-0515-7","volume":"1","author":"MT Al-Kaltakchi","year":"2017","unstructured":"M.T. Al-Kaltakchi, W.L. Woo, S. Dlay, J.A. Chambers, Evaluation of a speaker identification system with and without fusion using three databases in the presence of noise and handset effects. EURASIP Journal on Advances in Signal Processing 1, 80 (2017a)","journal-title":"EURASIP Journal on Advances in Signal Processing"},{"key":"1697_CR5","doi-asserted-by":"crossref","unstructured":"M.T. Al-Kaltakchi, W.L. Woo, S.S. Dlay, J.A. Chambers, Comparison of i-vector and gmm-ubm approaches to speaker identification with timit and nist 2008 databases in challenging environments. In: 2017 25th European Signal Processing Conference (EUSIPCO), IEEE, pp 533\u2013537 (2017b)","DOI":"10.23919\/EUSIPCO.2017.8081264"},{"key":"1697_CR6","doi-asserted-by":"crossref","unstructured":"M.T. Al-Kaltakchi, W.L. Woo, S.S. Dlay, J.A. Chambers, Multi-dimensional i-vector closed set speaker identification based on an extreme learning machine with and without fusion technologies. In: 2017 Intelligent Systems Conference (IntelliSys), IEEE, pp 1141\u20131146 (2017c)","DOI":"10.1109\/IntelliSys.2017.8324273"},{"key":"1697_CR7","doi-asserted-by":"crossref","unstructured":"M.T. Al-Kaltakchi, W.L. Woo, S.S. Dlay, J.A. Chambers, Speaker identification evaluation based on the speech biometric and i-vector model using the timit and ntimit databases. In: 2017 5th International Workshop on Biometrics and Forensics (IWBF), IEEE, pp 1\u20136 (2017d)","DOI":"10.1109\/IWBF.2017.7935102"},{"key":"1697_CR8","doi-asserted-by":"publisher","unstructured":"M.T.S. Al-Kaltakchi, W.L. Woo, S.S. Dlay, J.A. Chambers, Study of fusion strategies and exploiting the combination of MFCC and PNCC features for robust biometric speaker identification. 4th IEEE International Conference on Biometrics and Forensics (IWBF) pp 1\u20136, (2016a) https:\/\/doi.org\/10.1109\/IWBF.2016.7449685","DOI":"10.1109\/IWBF.2016.7449685"},{"key":"1697_CR9","doi-asserted-by":"publisher","unstructured":"M.T.S. Al-Kaltakchi, W.L. Woo, S.S. Dlay, J.A. Chambers, Study of statistical robust closed set speaker identification with feature and score-based fusion. IEEE Statistical Signal Processing Workshop (SSP) pp 1\u20135, (2016b) https:\/\/doi.org\/10.1109\/SSP.2016.7551807","DOI":"10.1109\/SSP.2016.7551807"},{"key":"1697_CR10","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1016\/j.dsp.2017.08.002","volume":"70","author":"RRO Al-Nima","year":"2017","unstructured":"R.R.O. Al-Nima, M.A. Abdullah, M.T. Al-Kaltakchi, S.S. Dlay, W.L. Woo, J.A. Chambers, Finger texture biometric verification exploiting multi-scale sobel angles local binary pattern features and score-based fusion. Digital Signal Processing 70, 178\u2013189 (2017a)","journal-title":"Digital Signal Processing"},{"issue":"2","key":"1697_CR11","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1049\/iet-bmt.2016.0090","volume":"6","author":"RRO Al-Nima","year":"2017","unstructured":"R.R.O. Al-Nima, S.S. Dlay, S.A.M. Al-Sumaidaee, W.L. Woo, J.A. Chambers, Robust feature extraction and salvage schemes for finger texture based biometrics. IET Biometrics 6(2), 43\u201352 (2017b). https:\/\/doi.org\/10.1049\/iet-bmt.2016.0090","journal-title":"IET Biometrics"},{"issue":"1","key":"1697_CR12","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1049\/iet-bmt.2014.0011","volume":"4","author":"N Almaadeed","year":"2015","unstructured":"N. Almaadeed, A. Aggoun, A. Amira, Speaker identification using multimodal neural networks and wavelet analysis. IET Biometrics 4(1), 18\u201328 (2015). https:\/\/doi.org\/10.1049\/iet-bmt.2014.0011","journal-title":"IET Biometrics"},{"key":"1697_CR13","doi-asserted-by":"crossref","unstructured":"R.K. Bhukya, S.M. Prasanna, B.D. Sarma, Robust methods for text-dependent speaker verification. Circuits, Systems, and Signal Processing pp 1\u201336 (2019)","DOI":"10.1007\/s00034-019-01125-x"},{"issue":"2","key":"1697_CR14","doi-asserted-by":"publisher","first-page":"143","DOI":"10.18178\/ijmlc.2019.9.2.778","volume":"9","author":"S Bunrit","year":"2019","unstructured":"S. Bunrit, T. Inkian, N. Kerdprasop, K. Kerdprasop, Text-independent speaker identification using deep learning model of convolution neural network. Int. J. Mach. Learn. Comput. 9(2), 143\u2013148 (2019)","journal-title":"Int. J. Mach. Learn. Comput."},{"issue":"6","key":"1697_CR15","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MIS.2013.140","volume":"28","author":"E Cambria","year":"2013","unstructured":"E. Cambria, G.B. Huang, L.L.C. Kasun, H. Zhou, C.M. Vong, J. Lin, J. Yin, Z. Cai, Q. Liu, K. Li et al., Extreme learning machines [trends & controversies]. IEEE Intell. Syst. 28(6), 30\u201359 (2013)","journal-title":"IEEE Intell. Syst."},{"issue":"4","key":"1697_CR16","doi-asserted-by":"publisher","first-page":"788","DOI":"10.1109\/TASL.2010.2064307","volume":"19","author":"N Dehak","year":"2011","unstructured":"N. Dehak, P.J. Kenny, R. Dehak, P. Dumouchel, P. Ouellet, Front-end factor analysis for speaker verification. IEEE Trans. Audio Speech Lang. Process. 19(4), 788\u2013798 (2011)","journal-title":"IEEE Trans. Audio Speech Lang. Process."},{"issue":"4","key":"1697_CR17","doi-asserted-by":"publisher","first-page":"920","DOI":"10.1109\/TCYB.2016.2533424","volume":"47","author":"Z Huang","year":"2017","unstructured":"Z. Huang, Y. Yu, J. Gu, H. Liu, An efficient method for traffic sign recognition based on extreme learning machine. IEEE Trans. Cybern. 47(4), 920\u2013933 (2017)","journal-title":"IEEE Trans. Cybern."},{"issue":"7","key":"1697_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0158520","volume":"11","author":"MA Islam","year":"2016","unstructured":"M.A. Islam, W.A. Jassim, N.S. Cheok, M.S.A. Zilany, A robust speaker identification system using the responses from a model of the auditory periphery. PLoS ONE 11(7), 1\u201321 (2016)","journal-title":"PLoS ONE"},{"key":"1697_CR19","doi-asserted-by":"crossref","unstructured":"R. Karadaghi, H. Hertlein, A. Ariyaeeinia, Effectiveness in open-set speaker identification, in International Carnahan Conference on Security Technology (ICCST), pp 1\u20136 (2014)","DOI":"10.1109\/CCST.2014.6986991"},{"issue":"8","key":"1697_CR20","doi-asserted-by":"publisher","first-page":"3906","DOI":"10.1109\/TIP.2016.2570569","volume":"25","author":"LLC Kasun","year":"2016","unstructured":"L.L.C. Kasun, Y. Yang, G.B. Huang, Z. Zhang, Dimension reduction with extreme learning machine. IEEE Trans. Image Process. 25(8), 3906\u20133918 (2016)","journal-title":"IEEE Trans. Image Process."},{"key":"1697_CR21","unstructured":"P. Kenny, A small footprint I-vector extractor. Odyssey pp 1\u20136 (2012)"},{"key":"1697_CR22","unstructured":"K. Kumar, Q. Wu, Y. Wang, M. Savvides, Noise robust speaker identification using Bhattacharyya distance in adapted Gaussian models space, in 16th IEEE European Signal Processing Conference, pp 1\u20134 (2008)"},{"key":"1697_CR23","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1016\/j.proeng.2012.01.867","volume":"30","author":"RSS Kumari","year":"2012","unstructured":"R.S.S. Kumari, S.S. Nidhyananthan, G. A, Fused MEL feature sets based text-independent speaker identification using Gaussian mixture model. Proc. Eng. 30, 319\u2013326 (2012)","journal-title":"Proc. Eng."},{"key":"1697_CR24","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1016\/j.ins.2016.09.015","volume":"373","author":"JY Lai","year":"2016","unstructured":"J.Y. Lai, S.L. Wang, A.W.C. Liew, X.J. Shi, Visual speaker identification and authentication by joint spatiotemporal sparse coding and hierarchical pooling. Inf. Sci. 373, 219\u2013232 (2016)","journal-title":"Inf. Sci."},{"issue":"3\u20134","key":"1697_CR25","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/s00521-012-0946-x","volume":"22","author":"Y Lan","year":"2013","unstructured":"Y. Lan, Z. Hu, Y.C. Soh, G.B. Huang, An Extreme Learning Machine approach for speaker recognition. Neural Comput. Appl. 22(3\u20134), 417\u2013425 (2013)","journal-title":"Neural Comput. Appl."},{"issue":"4","key":"1697_CR26","doi-asserted-by":"publisher","first-page":"940","DOI":"10.1016\/j.csl.2014.02.004","volume":"28","author":"M Li","year":"2014","unstructured":"M. Li, S. Narayanan, Simplified supervised I-vector modeling with application to robust and efficient language identification and speaker verification. Comput. Speech Lang. 28(4), 940\u2013958 (2014)","journal-title":"Comput. Speech Lang."},{"key":"1697_CR27","unstructured":"T. Liu, K. Kang, S. Guan, I-vector based text-independent speaker identification, in 11th World Congress on Intelligent Control and Automation (WCICA), pp 5420\u20135425 (2014)"},{"issue":"5","key":"1697_CR28","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1049\/iet-bmt.2016.0085","volume":"6","author":"X Ma","year":"2017","unstructured":"X. Ma, X. Jing, H. Huang, Y. Cui, J. Mu, Palm vein recognition scheme based on an adaptive Gabor filter. IET Biomet. 6(5), 325\u2013333 (2017). https:\/\/doi.org\/10.1049\/iet-bmt.2016.0085","journal-title":"IET Biomet."},{"issue":"6","key":"1697_CR29","doi-asserted-by":"publisher","first-page":"2810","DOI":"10.1007\/s00034-018-0992-4","volume":"38","author":"M Mallikarjunan","year":"2019","unstructured":"M. Mallikarjunan, P.K. Radha, K. Bharath, R.K. Muthu, Text-independent speaker recognition in clean and noisy backgrounds using modified VQ-LBG algorithm. Circuits Syst. Signal Process. 38(6), 2810\u20132828 (2019)","journal-title":"Circuits Syst. Signal Process."},{"key":"1697_CR30","doi-asserted-by":"crossref","unstructured":"D. Matrouf, N. Scheffer, B.G. Fauve, J.F. Bonastre, A straightforward and efficient implementation of the factor analysis model for speaker verification. Interspeech, pp. 1242\u20131245 (2007)","DOI":"10.21437\/Interspeech.2007-156"},{"issue":"5","key":"1697_CR31","doi-asserted-by":"publisher","first-page":"1711","DOI":"10.1109\/TASL.2007.899278","volume":"15","author":"J Ming","year":"2007","unstructured":"J. Ming, T.J. Hazen, J.R. Glass, D. Reynolds, Robust speaker recognition in noisy conditions. IEEE Trans. Audio Speech Lang. Process. 15(5), 1711\u20131723 (2007)","journal-title":"IEEE Trans. Audio Speech Lang. Process."},{"key":"1697_CR32","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1016\/j.inffus.2018.11.018","volume":"49","author":"SKS Modak","year":"2019","unstructured":"S.K.S. Modak, V.K. Jha, Multibiometric fusion strategy and its applications: a review. Inf. Fusion 49, 174\u2013204 (2019)","journal-title":"Inf. Fusion"},{"issue":"4","key":"1697_CR33","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1049\/iet-bmt.2016.0115","volume":"6","author":"A Morales","year":"2017","unstructured":"A. Morales, D. Morocho, J. Fierrez, R. Vera-Rodriguez, Signature authentication based on human intervention: performance and complementarity with automatic systems. IET Biomet. 6(4), 307\u2013315 (2017). https:\/\/doi.org\/10.1049\/iet-bmt.2016.0115","journal-title":"IET Biomet."},{"key":"1697_CR34","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.procs.2017.09.075","volume":"115","author":"P Nayana","year":"2017","unstructured":"P. Nayana, D. Mathew, A. Thomas, Comparison of text independent speaker identification systems using GMM and i-vector methods. Proc. Comput. Sci. 115, 47\u201354 (2017)","journal-title":"Proc. Comput. Sci."},{"issue":"1","key":"1697_CR35","doi-asserted-by":"publisher","first-page":"178","DOI":"10.3844\/jcssp.2014.178.189","volume":"10","author":"SS Nidhyananthan","year":"2014","unstructured":"S.S. Nidhyananthan, R.S.S. Kumari, A framework for multilingual text-independent speaker identification system. J. Comput. Sci. 10(1), 178\u2013189 (2014)","journal-title":"J. Comput. Sci."},{"key":"1697_CR36","doi-asserted-by":"crossref","unstructured":"M. Pawar, R. Kokate, A robust wavelet based decomposition and multilayer neural network for speaker identification, in Innovations in Electronics and Communication Engineering. Springer, pp. 197\u2013209 (2019)","DOI":"10.1007\/978-981-13-3765-9_21"},{"issue":"3","key":"1697_CR37","doi-asserted-by":"publisher","first-page":"895","DOI":"10.1007\/s11277-018-6057-y","volume":"104","author":"S Prasad","year":"2019","unstructured":"S. Prasad, R. Prasad, Fusion multistyle training for speaker identification of disguised speech. Wirel. Pers. Commun. 104(3), 895\u2013905 (2019)","journal-title":"Wirel. Pers. Commun."},{"issue":"1","key":"1697_CR38","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/89.365379","volume":"3","author":"D Reynolds","year":"1995","unstructured":"D. Reynolds, R.C. Rose, Robust text-independent speaker identification using Gaussian mixture speaker models. IEEE Trans. Speech Audio Process. 3(1), 72\u201383 (1995)","journal-title":"IEEE Trans. Speech Audio Process."},{"issue":"4","key":"1697_CR39","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1049\/iet-bmt.2016.0127","volume":"6","author":"T Scheidat","year":"2017","unstructured":"T. Scheidat, M. Kalbitz, C. Vielhauer, Biometric authentication based on 2d\/3d sensing of forensic handwriting traces. IET Biomet. 6(4), 316\u2013324 (2017). https:\/\/doi.org\/10.1049\/iet-bmt.2016.0127","journal-title":"IET Biomet."},{"key":"1697_CR40","doi-asserted-by":"crossref","unstructured":"L. Schmidt, M. Sharifi, I. Lopez\u00a0Moreno, Large-scale speaker identification, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1650\u20131654 (2014)","DOI":"10.1109\/ICASSP.2014.6853878"},{"key":"1697_CR41","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1016\/j.inffus.2018.12.003","volume":"52","author":"M Singh","year":"2019","unstructured":"M. Singh, R. Singh, A. Ross, A comprehensive overview of biometric fusion. Inf. Fusion 52, 187\u2013205 (2019)","journal-title":"Inf. Fusion"},{"issue":"2","key":"1697_CR42","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1109\/MCAS.2011.941079","volume":"11","author":"R Togneri","year":"2011","unstructured":"R. Togneri, D. Pullella, An overview of speaker identification: accuracy and robustness issues. IEEE Circuits Syst. Mag. 11(2), 23\u201361 (2011)","journal-title":"IEEE Circuits Syst. Mag."},{"issue":"4","key":"1697_CR43","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1007\/s10772-015-9295-3","volume":"18","author":"P Verma","year":"2015","unstructured":"P. Verma, P.K. Das, i-vectors in speech processing applications: a survey. Int. J. Speech Technol. 18(4), 529\u2013546 (2015)","journal-title":"Int. J. Speech Technol."},{"issue":"9","key":"1697_CR44","doi-asserted-by":"publisher","first-page":"3393","DOI":"10.1007\/s00034-015-0206-2","volume":"35","author":"Y Xu","year":"2016","unstructured":"Y. Xu, I. McLoughlin, Y. Song, K. Wu, Improved i-vector representation for speaker diarization. Circuits Syst. Signal Process. 35(9), 3393\u20133404 (2016)","journal-title":"Circuits Syst. Signal Process."},{"key":"1697_CR45","doi-asserted-by":"crossref","unstructured":"G. Yasmin, S. Dhara, R. Mahindar, A.K. Das, Speaker identification from mixture of speech and non-speech audio signal. In: Soft Computing in Data Analytics, Springer, pp. 473\u2013482 (2019)","DOI":"10.1007\/978-981-13-0514-6_47"}],"container-title":["Circuits, Systems, and Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-021-01697-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00034-021-01697-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-021-01697-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,22]],"date-time":"2022-12-22T11:34:16Z","timestamp":1671708856000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00034-021-01697-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,25]]},"references-count":45,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2021,10]]}},"alternative-id":["1697"],"URL":"https:\/\/doi.org\/10.1007\/s00034-021-01697-7","relation":{},"ISSN":["0278-081X","1531-5878"],"issn-type":[{"type":"print","value":"0278-081X"},{"type":"electronic","value":"1531-5878"}],"subject":[],"published":{"date-parts":[[2021,3,25]]},"assertion":[{"value":"13 December 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 March 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 March 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 March 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}