{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T21:35:12Z","timestamp":1775511312408,"version":"3.50.1"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Speech Technol"],"published-print":{"date-parts":[[2023,9]]},"DOI":"10.1007\/s10772-023-10048-7","type":"journal-article","created":{"date-parts":[[2023,10,14]],"date-time":"2023-10-14T10:01:38Z","timestamp":1697277698000},"page":"789-799","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Using combined features to improve speaker verification in the face of limited reverberant data"],"prefix":"10.1007","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9275-6902","authenticated-orcid":false,"given":"Khamis A.","family":"Al-Karawi","sequence":"first","affiliation":[]},{"given":"Duraid Y.","family":"Mohammed","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,14]]},"reference":[{"key":"10048_CR1","doi-asserted-by":"crossref","unstructured":"Alenizi, A. S., & Al-Karawi, K. A. (2022). Cloud computing adoption-based digital open government services: Challenges and barriers. In Proceedings of 6th international congress on information and communication technology (pp. 149\u2013160).","DOI":"10.1007\/978-981-16-1781-2_15"},{"key":"10048_CR2","doi-asserted-by":"crossref","unstructured":"Alenizi, A. S., & Al-Karawi, K. A. (2023). Effective biometric technology used with big data. In Proceedings of 7th international congress on information and communication technology (pp. 239\u2013250).","DOI":"10.1007\/978-981-19-2394-4_22"},{"key":"10048_CR3","doi-asserted-by":"crossref","unstructured":"Alenizi, A. S., & Al-Karawi, K. A. (2023). Internet of Things (IoT) adoption: Challenges and barriers. In Proceedings of 7th international congress on information and communication technology (pp. 217\u2013229).","DOI":"10.1007\/978-981-19-2394-4_20"},{"key":"10048_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2174\/2210327909666181219143918","volume":"9","author":"KA Al-Karawi","year":"2019","unstructured":"Al-Karawi, K. A. (2019). Robustness speaker recognition based on feature space in clean and noisy condition. International Journal of Sensors, Wireless Communications and Control, 9, 1\u201310.","journal-title":"International Journal of Sensors, Wireless Communications and Control"},{"key":"10048_CR6","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/s10772-020-09780-1","volume":"24","author":"KA Al-Karawi","year":"2020","unstructured":"Al-Karawi, K. A. (2020). Mitigate the reverberation effect on the speaker verification performance using different methods. International Journal of Speech Technology, 24, 143\u2013153.","journal-title":"International Journal of Speech Technology"},{"key":"10048_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-15824-w","author":"KA Al-Karawi","year":"2023","unstructured":"Al-Karawi, K. A. (2023). Face mask effects on speaker verification performance in the presence of noise. Multimedia Tools and Applications. https:\/\/doi.org\/10.1007\/s11042-023-15824-w","journal-title":"Multimedia Tools and Applications"},{"key":"10048_CR4","doi-asserted-by":"crossref","unstructured":"Al-Karawi, K. A., & Li, F. (2017). Robust speaker verification in reverberant conditions using estimated acoustic parameters\u2014a maximum likelihood estimation and training on the fly approach. In 2017 Seventh international conference on innovative computing technology (INTECH) (pp. 52\u201357).","DOI":"10.1109\/INTECH.2017.8102427"},{"key":"10048_CR8","doi-asserted-by":"publisher","first-page":"36549","DOI":"10.1007\/s11042-021-11356-3","volume":"80","author":"KA Al-Karawi","year":"2021","unstructured":"Al-Karawi, K. A., & Ahmed, S. T. (2021). Model selection toward robustness speaker verification in reverberant conditions. Multimedia Tools and Applications, 80, 36549\u201336566.","journal-title":"Multimedia Tools and Applications"},{"key":"10048_CR9","doi-asserted-by":"publisher","first-page":"423","DOI":"10.7763\/IJIEE.2015.V5.571","volume":"5","author":"KA Al-Karawi","year":"2015","unstructured":"Al-Karawi, K. A., Al-Noori, A. H., Li, F. F., & Ritchings, T. (2015). Automatic speaker recognition system in adverse conditions\u2014implication of noise and reverberation on system performance. International Journal of Information and Electronics Engineering, 5, 423.","journal-title":"International Journal of Information and Electronics Engineering"},{"key":"10048_CR10","doi-asserted-by":"publisher","first-page":"1077","DOI":"10.1007\/s10772-019-09648-z","volume":"22","author":"KA Al-Karawi","year":"2019","unstructured":"Al-Karawi, K. A., & Mohammed, D. Y. (2019). Early reflection detection using autocorrelation to improve robustness of speaker verification in reverberant conditions. International Journal of Speech Technology, 22, 1077\u20131084.","journal-title":"International Journal of Speech Technology"},{"key":"10048_CR11","doi-asserted-by":"publisher","first-page":"22231","DOI":"10.1007\/s11042-021-10767-6","volume":"80","author":"KA Al-Karawi","year":"2021","unstructured":"Al-Karawi, K. A., & Mohammed, D. Y. (2021). Improving short utterance speaker verification by combining MFCC and Entrocy in Noisy conditions. Multimedia Tools and Applications, 80, 22231\u201322249.","journal-title":"Multimedia Tools and Applications"},{"key":"10048_CR12","unstructured":"CATT-Acoustic. (2010). v8.0c, Room acoustic modelling software. Retrieved October 18, 2010 from http:\/\/www.catt.se"},{"key":"10048_CR13","doi-asserted-by":"publisher","first-page":"873","DOI":"10.1049\/iet-spr.2016.0572","volume":"12","author":"R Chakroun","year":"2018","unstructured":"Chakroun, R., Frikha, M., & Belta\u00effa Zouari, L. (2018). New approach for short utterance speaker identification. IET Signal Processing, 12, 873\u2013880.","journal-title":"IET Signal Processing"},{"key":"10048_CR14","doi-asserted-by":"crossref","unstructured":"Chen, Y.-W., & Lin, C.-J. (2006). Combining SVMs with various feature selection strategies. In Feature extraction (pp. 315\u2013324). Springer.","DOI":"10.1007\/978-3-540-35488-8_13"},{"key":"10048_CR15","doi-asserted-by":"crossref","unstructured":"Dehak, N., Dehak, R., Kenny, P., Br\u00fcmmer, N., Ouellet, P., & Dumouchel, P. (2009). Support vector machines versus fast scoring in the low-dimensional total variability space for speaker verification. In 10th Annual conference of the international speech communication association.","DOI":"10.21437\/Interspeech.2009-385"},{"key":"10048_CR16","doi-asserted-by":"publisher","first-page":"788","DOI":"10.1109\/TASL.2010.2064307","volume":"19","author":"N Dehak","year":"2011","unstructured":"Dehak, N., Kenny, P., Dehak, R., Dumouchel, P., & Ouellet, P. (2011). Front-end factor analysis for speaker verification. IEEE Transactions on Audio, Speech, and Language Processing, 19, 788\u2013798.","journal-title":"IEEE Transactions on Audio, Speech, and Language Processing"},{"key":"10048_CR17","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1561\/2000000039","volume":"7","author":"L Deng","year":"2014","unstructured":"Deng, L., & Yu, D. (2014). Deep learning: Methods and applications. Foundations and Trends in Signal Processing, 7, 197\u2013387.","journal-title":"Foundations and Trends in Signal Processing"},{"key":"10048_CR18","doi-asserted-by":"crossref","unstructured":"Fatima, N., & Zheng, T. F. (2012). short utterance speaker recognition a research agenda. In 2012 International conference on systems and informatics (ICSAI) (pp. 1746\u20131750).","DOI":"10.1109\/ICSAI.2012.6223381"},{"key":"10048_CR19","doi-asserted-by":"crossref","unstructured":"Hautam\u00e4ki, V., Cheng, Y.-C., Rajan, P., & Lee, C.-H. (2013). Minimax i-vector extractor for short duration speaker verification. In INTERSPEECH (pp. 3708\u20133712).","DOI":"10.21437\/Interspeech.2013-696"},{"key":"10048_CR20","doi-asserted-by":"publisher","first-page":"181","DOI":"10.4103\/0256-4602.50702","volume":"26","author":"H Jayanna","year":"2009","unstructured":"Jayanna, H., & Prasanna, S. M. (2009). Analysis, feature extraction, modeling and testing techniques for speaker recognition. IETE Technical Review, 26, 181.","journal-title":"IETE Technical Review"},{"key":"10048_CR21","doi-asserted-by":"crossref","unstructured":"Kanagasundaram, A., Vogt, R., Dean, D. B., Sridharan, S., & Mason, M. W. (2011). I-vector based speaker recognition on short utterances. In Proceedings of the 12th annual conference of the international speech communication association (pp. 2341\u20132344).","DOI":"10.21437\/Interspeech.2011-58"},{"key":"10048_CR22","unstructured":"Kenny, P. (2010). Bayesian speaker verification with heavy-tailed priors. In Odyssey (p. 14)."},{"key":"10048_CR23","doi-asserted-by":"crossref","unstructured":"Kenny, P., Stafylakis, T., Ouellet, P., Gupta, V., & Alam, M. J. (2014). Deep neural networks for extracting Baum\u2013Welch statistics for speaker recognition. In Odyssey (pp. 293\u2013298).","DOI":"10.21437\/Odyssey.2014-44"},{"key":"10048_CR24","doi-asserted-by":"publisher","first-page":"1435","DOI":"10.1109\/TASL.2006.881693","volume":"15","author":"P Kenny","year":"2007","unstructured":"Kenny, P., Boulianne, G., Ouellet, P., & Dumouchel, P. (2007). Joint factor analysis versus eigenchannels in speaker recognition. IEEE Transactions on Audio, Speech, and Language Processing, 15, 1435\u20131447.","journal-title":"IEEE Transactions on Audio, Speech, and Language Processing"},{"key":"10048_CR25","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.specom.2009.08.009","volume":"52","author":"T Kinnunen","year":"2010","unstructured":"Kinnunen, T., & Li, H. (2010). An overview of text-independent speaker recognition: From features to supervectors. Speech Communication, 52, 12\u201340.","journal-title":"Speech Communication"},{"key":"10048_CR26","doi-asserted-by":"publisher","first-page":"1129","DOI":"10.1109\/TASLP.2016.2544660","volume":"24","author":"L Li","year":"2016","unstructured":"Li, L., Wang, D., Zhang, C., & Zheng, T. F. (2016). Improving short utterance speaker recognition by modeling speech unit classes. IEEE\/ACM Transactions on Audio, Speech, and Language Processing, 24, 1129\u20131139.","journal-title":"IEEE\/ACM Transactions on Audio, Speech, and Language Processing"},{"key":"10048_CR27","volume-title":"Barclays replaces passwords with voice authentication","year":"2016","unstructured":"Loshin, P. (Ed.). (2016). Barclays replaces passwords with voice authentication. Future US."},{"key":"10048_CR28","unstructured":"Mak, M.-W., Hsiao, R., & Mak, B. (2006). A comparison of various adaptation methods for speaker verification with limited enrollment data. In 2006 IEEE international conference on acoustics speech and signal processing proceedings (pp. I\u2013I)."},{"key":"10048_CR29","volume-title":"Overlapped speech and music segmentation using singular spectrum analysis and random forests","author":"DY Mohammed","year":"2017","unstructured":"Mohammed, D. Y. (2017). Overlapped speech and music segmentation using singular spectrum analysis and random forests. Salford University."},{"key":"10048_CR30","doi-asserted-by":"publisher","DOI":"10.11591\/eei.v10i4.2957","author":"DY Mohammed","year":"2021","unstructured":"Mohammed, D. Y., Al-Karawi, K., & Aljuboori, A. (2021). Robust speaker verification by combining MFCC and entrocy in noisy conditions. Bulletin of Electrical Engineering and Informatics. https:\/\/doi.org\/10.11591\/eei.v10i4.2957","journal-title":"Bulletin of Electrical Engineering and Informatics"},{"key":"10048_CR31","doi-asserted-by":"publisher","DOI":"10.11591\/ijai.v8.i2.pp181-189","author":"D Mohammed","year":"2019","unstructured":"Mohammed, D., Al-Karawi, K. A., Duncan, P., & Li, F. F. (2019). Overlapped music segmentation using a new effective feature and random forests. International Journal of Artificial Intelligence. https:\/\/doi.org\/10.11591\/ijai.v8.i2.pp181-189","journal-title":"International Journal of Artificial Intelligence"},{"key":"10048_CR32","first-page":"95","volume-title":"Mitigate the reverberant effects on speaker recognition via multi-training","author":"DY Mohammed","year":"2020","unstructured":"Mohammed, D. Y., Al-Karawi, K. A., Husien, I. M., & Ghulam, M. A. (2020). Mitigate the reverberant effects on speaker recognition via multi-training (pp. 95\u2013109). Springer."},{"key":"10048_CR33","doi-asserted-by":"publisher","first-page":"753","DOI":"10.1016\/j.specom.2010.04.007","volume":"52","author":"M Nosratighods","year":"2010","unstructured":"Nosratighods, M., Ambikairajah, E., Epps, J., & Carey, M. J. (2010). A segment selection technique for speaker verification. Speech Communication, 52, 753\u2013761.","journal-title":"Speech Communication"},{"key":"10048_CR34","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1049\/iet-bmt.2017.0065","volume":"7","author":"A Poddar","year":"2017","unstructured":"Poddar, A., Sahidullah, M., & Saha, G. (2017). Speaker verification with short utterances: A review of challenges, trends and opportunities. IET Biometrics, 7, 91\u2013101.","journal-title":"IET Biometrics"},{"key":"10048_CR35","doi-asserted-by":"crossref","unstructured":"Prince, S. J., & Elder, J. H. (2007). Probabilistic linear discriminant analysis for inferences about identity. In 2007 IEEE 11th international conference on computer vision (pp. 1\u20138).","DOI":"10.1109\/ICCV.2007.4409052"},{"key":"10048_CR36","unstructured":"Sadjadi, S. O., Slaney, M., & Heck, L. (2013). MSR Identity Toolbox v1.0: A MATLAB toolbox for speaker-recognition research. In Speech and Language Processing Technical Committee Newsletter."},{"key":"10048_CR37","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1121\/1.383103","volume":"66","author":"MR Schroeder","year":"1979","unstructured":"Schroeder, M. R. (1979). Integrated-impulse method measuring sound decay without using impulses. The Journal of the Acoustical Society of America, 66, 497\u2013500.","journal-title":"The Journal of the Acoustical Society of America"},{"key":"10048_CR38","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"CE Shannon","year":"1948","unstructured":"Shannon, C. E. (1948). A mathematical theory of communication. Bell System Technical Journal, 27, 379\u2013423.","journal-title":"Bell System Technical Journal"},{"key":"10048_CR39","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctvcm4gtc","volume-title":"Probability, Markov chains, queues, and simulation: The mathematical basis of performance modeling","author":"WJ Stewart","year":"2009","unstructured":"Stewart, W. J. (2009). Probability, Markov chains, queues, and simulation: The mathematical basis of performance modeling. Princeton University Press."},{"key":"10048_CR40","doi-asserted-by":"publisher","first-page":"1182","DOI":"10.1109\/TASL.2009.2031505","volume":"18","author":"R Vogt","year":"2009","unstructured":"Vogt, R., Sridharan, S., & Mason, M. (2009). Making confident speaker verification decisions with minimal speech. IEEE Transactions on Audio, Speech, and Language Processing, 18, 1182\u20131192.","journal-title":"IEEE Transactions on Audio, Speech, and Language Processing"},{"key":"10048_CR41","doi-asserted-by":"crossref","unstructured":"Zhao, X., Wang, Y., & Wang, D. (2014). Robust speaker identification in noisy and reverberant conditions. In International conference on acoustics, speech, and signal processing (ICASSP).","DOI":"10.1109\/ICASSP.2014.6854352"}],"container-title":["International Journal of Speech Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10772-023-10048-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10772-023-10048-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10772-023-10048-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,10]],"date-time":"2023-11-10T14:12:17Z","timestamp":1699625537000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10772-023-10048-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9]]},"references-count":41,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,9]]}},"alternative-id":["10048"],"URL":"https:\/\/doi.org\/10.1007\/s10772-023-10048-7","relation":{},"ISSN":["1381-2416","1572-8110"],"issn-type":[{"value":"1381-2416","type":"print"},{"value":"1572-8110","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9]]},"assertion":[{"value":"17 July 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 September 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 October 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}