{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T00:33:11Z","timestamp":1767141191420,"version":"build-2238731810"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,11,2]],"date-time":"2016-11-02T00:00:00Z","timestamp":1478044800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,11,2]],"date-time":"2016-11-02T00:00:00Z","timestamp":1478044800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Speech Technol"],"published-print":{"date-parts":[[2017,3]]},"DOI":"10.1007\/s10772-016-9387-8","type":"journal-article","created":{"date-parts":[[2016,11,2]],"date-time":"2016-11-02T05:44:39Z","timestamp":1478065479000},"page":"51-67","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Voice recognition package for ERTU\u2019s cloud"],"prefix":"10.1007","volume":"20","author":[{"given":"Salwa M.","family":"Serag Eldin","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,2]]},"reference":[{"key":"9387_CR1","doi-asserted-by":"publisher","first-page":"167","DOI":"10.2528\/PIERM08061206","volume":"4","author":"MA Abd El-Fattah","year":"2008","unstructured":"Abd El-Fattah, M. A., Dessouky, M. I., Diab, S. M., & Abd El-Samie, F. E. (2008). Speech enhancement using an adaptive wiener filtering approach. Progress in Electromagnetics Research M, \n                           4, 167\u2013184.","journal-title":"Progress in Electromagnetics Research M"},{"issue":"l","key":"9387_CR2","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/s10772-009-9056-2","volume":"12","author":"FE Abd El-samie","year":"2009","unstructured":"Abd El-samie, F. E. (2009). An efficient singular value decomposition algorithm for digital audio watermarking. International Journal of Speech Technology, \n                           12(l), 27\u201345.","journal-title":"International Journal of Speech Technology"},{"key":"9387_CR3","doi-asserted-by":"crossref","unstructured":"AI-Nuaimy, W., El-Bendary, M. A. M., Shafik, A., Shawki, F., Abou El-azm, A. E., E1-Fishawy, N. A., Elhalafawy, S. M., Diab, S. M., Sallam, B. M., & Abd El-Samie, F. E. (2011). An SVD audio watermarking approach using chaotic encrypted images. Digital Signal Processing, 21(6), 764\u2013779.","DOI":"10.1016\/j.dsp.2011.01.013"},{"key":"9387_CR4","volume-title":"Digital image restoration","author":"HC Anderws","year":"1977","unstructured":"Anderws, H. C., & Hunt, B. R. (1977). Digital image restoration. Englewood Cliffs, NJ: Prentice-Hall."},{"key":"9387_CR5","doi-asserted-by":"crossref","unstructured":"Boll, S. F. (1979). Suppression of acoustic noise in speech using spectral subtraction. In IEEE transactions on ASSP (Vo1. 27(2), pp. 113\u2013120).","DOI":"10.1109\/TASSP.1979.1163209"},{"issue":"9","key":"9387_CR6","doi-asserted-by":"publisher","first-page":"1437","DOI":"10.1109\/5.628714","volume":"85","author":"JP Campbell","year":"1997","unstructured":"Campbell, J. P. (1997). Speaker recognition: A tutorial. Proceedings of the IEEE, \n                           85(9), 1437\u20131462.","journal-title":"Proceedings of the IEEE"},{"issue":"10","key":"9387_CR7","doi-asserted-by":"publisher","first-page":"1428","DOI":"10.1109\/PROC.1977.10747","volume":"65","author":"DG Childers","year":"1977","unstructured":"Childers, D. G., & Skinner, D. P. (1977). The cepstrum: A guide to processing. Proceedings of IEEE, \n                           65(10), 1428\u20131443.","journal-title":"Proceedings of IEEE"},{"issue":"3","key":"9387_CR8","doi-asserted-by":"publisher","first-page":"033002","DOI":"10.1117\/1.3167847","volume":"18","author":"IF Elashry","year":"2009","unstructured":"Elashry, I. F., Farag Allah, O. S., Abbas, A. M., El-Rabaie, S., & Abd El-Samie, F. E. (2009). Homomorphic image encryption. Journal of Electronic Imaging, \n                           18(3), 033002.","journal-title":"Journal of Electronic Imaging"},{"key":"9387_CR9","doi-asserted-by":"crossref","unstructured":"El-Khamy, S. E., Hadhoud, M. M., Dessouky, M. I., Salatn, B. M., & Abd E1-Samie, F. E. (2004). Optimization of image interpolation as an inverse problem using the LMMSE algorithm. In Proceedings of the IEEE MELECON (pp. 247\u2013250). Croatia.","DOI":"10.1109\/MELCON.2004.1347057"},{"issue":"5","key":"9387_CR10","doi-asserted-by":"publisher","first-page":"925","DOI":"10.1109\/TMM.2006.879879","volume":"8","author":"S Erkuguk","year":"2006","unstructured":"Erkuguk, S., Krishnan, S., & Glu, M. Z. (2006). A robust audio watermark representation based on linear chirps. IEEE Transactions on Multimedia, \n                           8(5), 925\u2013936.","journal-title":"IEEE Transactions on Multimedia"},{"key":"9387_CR11","doi-asserted-by":"crossref","unstructured":"Evans, N. W. D., & Mason, J. S. D. (2006). An assessment on the fundamental limitations of spectral subtraction. In IEEE international conference on Acoustic, speech and signal processing (pp. 1\u20131).","DOI":"10.1109\/ICASSP.2006.1659978"},{"key":"9387_CR12","doi-asserted-by":"crossref","unstructured":"Jain, A. K. (1978). Fast inversion of banded toeplitz matrices by circular decomposition. In IEEE transaction on acoustics, speech and signal processing (Vol. ASSP-26, No. 2, pp. 121\u2013126).","DOI":"10.1109\/TASSP.1978.1163064"},{"key":"9387_CR13","doi-asserted-by":"crossref","unstructured":"Khairwa, A., Abhishek, K., Prakash, S., & Pratap T. (2012). A comprehensive study of various biometric identification techniques. In 2012 third international conference on computing communication & networking technologies (ICCCNT) (pp. 1\u20136). 26\u201328 July 2012.","DOI":"10.1109\/ICCCNT.2012.6396051"},{"issue":"8","key":"9387_CR14","doi-asserted-by":"publisher","first-page":"766","DOI":"10.1109\/TCSVT.2003.815955","volume":"13","author":"HS Kim","year":"2003","unstructured":"Kim, H. S., & Lee, H. K. (2003). Invariant image watermark using Zernike moments. IEEE Transactions on Circuits and Systems for Video Technology, \n                           13(8), 766\u2013775.","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"9387_CR15","doi-asserted-by":"crossref","unstructured":"Krishnamoorthy, P., & Mahadeva, S. R. (2006). Enhancement of noisy speech by spectral subtraction and residual modification. In Annual India conference (pp. 1\u20135).","DOI":"10.1109\/INDCON.2006.302772"},{"issue":"6","key":"9387_CR16","doi-asserted-by":"publisher","first-page":"822","DOI":"10.1109\/TIP.2005.847324","volume":"14","author":"ZM Lu","year":"2005","unstructured":"Lu, Z. M., Xu, D. G., & Sun, S. H. (2005). Multipurpose image watermarking algorithm based on multistage vector quantization. IEEE Transactions on Image Processing, \n                           14(6), 822\u2013831.","journal-title":"IEEE Transactions on Image Processing"},{"issue":"6","key":"9387_CR17","doi-asserted-by":"publisher","first-page":"971","DOI":"10.1109\/JPROC.2004.827361","volume":"92","author":"B Macq","year":"2004","unstructured":"Macq, B., Dittmann, J., & Delp, E. J. (2004). Benchmarking of image watermarking algorithms for digital rights management. Proceedings of the IEEE, \n                           92(6), 971\u2013984.","journal-title":"Proceedings of the IEEE"},{"key":"9387_CR18","doi-asserted-by":"crossref","unstructured":"Meng, J., Zhang, J., & Zhao, H. (2012). Overview of the speech recognition technology. In 2012 fourth international conference on computational and information sciences (pp. 199\u2013202). 17\u201319 August 2012.","DOI":"10.1109\/ICCIS.2012.202"},{"key":"9387_CR19","doi-asserted-by":"crossref","unstructured":"Naeem, E. A., AbdElnaby, M. M., & Hadhoud, M. M. (2009). Chaotic image encryption in transform domains. IEEE 2009 (pp. 71\u201376).","DOI":"10.1109\/ICCES.2009.5383309"},{"key":"9387_CR20","doi-asserted-by":"crossref","unstructured":"Sotelo, E. E. A., Nakamura, T., Nagai, T., & Hernandez, E. E. (2012). Who said that? The crossmodal matching identity for inferring unfamiliar faces from voices. In 2012 eighth international conference on signal image technology and internet based systems (pp. 97\u2013104). 25\u201329 November 2012.","DOI":"10.1109\/SITIS.2012.154"},{"key":"9387_CR21","doi-asserted-by":"crossref","unstructured":"Tsujino, K., Nakashima, Y., Iizuka, S., & Isoda, Y. (2013). Speech recognition and spoken language understanding for mobile personal assistants: A case study of \u201cShabette Concier\u201d\u2019. In 2013 IEEE 14th international conference on mobile data management (pp. 225\u2013228). 3\u20136 June 2013.","DOI":"10.1109\/MDM.2013.98"},{"issue":"8","key":"9387_CR22","doi-asserted-by":"publisher","first-page":"2270","DOI":"10.1109\/TASL.2007.906192","volume":"15","author":"X Wang","year":"2007","unstructured":"Wang, X., Qi, W., & Niu, P. (2007). A new adaptive digital audio watermarking based on support vector regression. IEEE Transactions on Audio, Speech and Language Processing, \n                           15(8), 2270\u20132277.","journal-title":"IEEE Transactions on Audio, Speech and Language Processing"}],"updated-by":[{"DOI":"10.1007\/s10772-020-09743-6","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2020,8,18]],"date-time":"2020-08-18T00:00:00Z","timestamp":1597708800000}}],"container-title":["International Journal of Speech Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10772-016-9387-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10772-016-9387-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10772-016-9387-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T06:39:51Z","timestamp":1606113591000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10772-016-9387-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,2]]},"references-count":22,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,3]]}},"alternative-id":["9387"],"URL":"https:\/\/doi.org\/10.1007\/s10772-016-9387-8","relation":{},"ISSN":["1381-2416","1572-8110"],"issn-type":[{"value":"1381-2416","type":"print"},{"value":"1572-8110","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,11,2]]},"assertion":[{"value":"5 May 2016","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 October 2016","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 November 2016","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 August 2020","order":4,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":5,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Mohammed A. Alsharqawy is co-author of above mentioned article, but was not listed in the author group of the original article.","order":6,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}}]}}