{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T21:35:12Z","timestamp":1775511312395,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Speech Technol"],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1007\/s10772-023-10074-5","type":"journal-article","created":{"date-parts":[[2023,12,22]],"date-time":"2023-12-22T13:02:07Z","timestamp":1703250127000},"page":"1079-1089","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Real-time adaptive training for forensic speaker verification in reverberation conditions"],"prefix":"10.1007","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9275-6902","authenticated-orcid":false,"given":"Khamis A.","family":"Al-karawi","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,22]]},"reference":[{"key":"10074_CR15","unstructured":"Al-Karawi, K. (2018). Robust speaker recognition in reverberant condition-toward greater biometric security. University of Salford."},{"key":"10074_CR6","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/s10772-020-09780-1","volume":"24","author":"KA Al-Karawi","year":"2021","unstructured":"Al-Karawi, K. A. (2021). Mitigate the reverberation effect on the speaker verification performance using different methods. International Journal of Speech Technology, 24, 143\u2013153.","journal-title":"International Journal of Speech Technology"},{"key":"10074_CR7","first-page":"1","volume":"4","author":"KA Al-Karawi","year":"2023","unstructured":"Al-Karawi, K. A. (2023). Face mask effects on speaker verification performance in the presence of noise. Multimedia Tools and Applications, 4, 1\u201314.","journal-title":"Multimedia Tools and Applications"},{"key":"10074_CR5","doi-asserted-by":"crossref","unstructured":"Al-Karawi, K. A, & Ahmed, S. T. (2021). Model selection toward robustness speaker verification in reverberant conditions. Multimedia Tools and Applications, 80(30), 36549\u201336566.","DOI":"10.1007\/s11042-021-11356-3"},{"key":"10074_CR8","first-page":"52","volume":"2017","author":"KA Al-Karawi","year":"2017","unstructured":"Al-Karawi, K. A., & Li, F. (2017). Robust speaker verification in reverberant conditions using estimated acoustic parameters: A maximum likelihood estimation and training on the fly approach. Seventh International Conference on Innovative Computing Technology (INTECH 2017), , 52\u201357.","journal-title":"Seventh International Conference on Innovative Computing Technology (INTECH)"},{"key":"10074_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10772-019-09648-z","volume":"22","author":"KA Al-Karawi","year":"2019","unstructured":"Al-Karawi, K. A., & Mohammed, D. Y. (2019). Early reflection detection using autocorrelation to improve robustness of speaker verification in reverberant conditions. International Journal of Speech Technology, 22, 1\u20138.","journal-title":"International Journal of Speech Technology"},{"key":"10074_CR10","doi-asserted-by":"publisher","first-page":"22231","DOI":"10.1007\/s11042-021-10767-6","volume":"80","author":"KA Al-Karawi","year":"2021","unstructured":"Al-Karawi, K. A., & Mohammed, D. Y. (2021). Improving short utterance speaker verification by combining MFCC and Entrocy in Noisy conditions. Multimedia Tools and Applications, 80, 22231\u201322249.","journal-title":"Multimedia Tools and Applications"},{"key":"10074_CR11","first-page":"1","volume":"2","author":"KA Al-Karawi","year":"2023","unstructured":"Al-Karawi, K. A., & Mohammed, D. Y. (2023). Using combined features to improve speaker verification in the face of limited reverberant data. International Journal of Speech Technology, 2, 1\u201311.","journal-title":"International Journal of Speech Technology"},{"key":"10074_CR1","doi-asserted-by":"crossref","unstructured":"Alenizi, A. S., & Al-karawi, K. A. (2022). Cloud computing adoption-based digital open government services: Challenges and barriers. In Proceedings of Sixth International Congress on Information and Communication Technology (ICICT), pp. 149\u2013160.","DOI":"10.1007\/978-981-16-1781-2_15"},{"key":"10074_CR2","doi-asserted-by":"crossref","unstructured":"Alenizi, A. S., & Al-Karawi, K. A. (2023a). Internet of things (IoT) Adoption: Challenges and barriers. In Proceedings of Seventh International Congress on Information and Communication Technology (ICICT), pp. 217\u2013229.","DOI":"10.1007\/978-981-19-2394-4_20"},{"key":"10074_CR3","doi-asserted-by":"crossref","unstructured":"Alenizi, A. S., & Al-Karawi, K. A. (2023b). Effective biometric technology used with big data. In Proceedings of Seventh International Congress on Information and Communication Technology, (ICICT) pp. 239\u2013250.","DOI":"10.1007\/978-981-19-2394-4_22"},{"key":"10074_CR4","doi-asserted-by":"crossref","unstructured":"Algabri, M., Mathkour, H., Bencherif, M. A., Alsulaiman, M., & Mekhtiche, M. A. (2017). Automatic speaker recognition for mobile forensic applications. Mobile Information Systems, Vol. 2017.","DOI":"10.1155\/2017\/6986391"},{"key":"10074_CR12","doi-asserted-by":"crossref","unstructured":"Al-Noori, A. H., Al-Karawi, K. A., & Li, F. F. (2015) Improving robustness of speaker recognition in noisy and reverberant conditions via training. In European Intelligence and Security Informatics Conference (EISIC 2015), pp. 180.","DOI":"10.1109\/EISIC.2015.20"},{"key":"10074_CR13","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1109\/MSP.2008.931100","volume":"26","author":"JP Campbell","year":"2009","unstructured":"Campbell, J. P., Shen, W., Campbell, W. M., Schwartz, R., Bonastre, J.-F., & Matrouf, D. (2009). Forensic speaker recognition. IEEE Signal Processing Magazine, 26, 95\u2013103.","journal-title":"IEEE Signal Processing Magazine"},{"key":"10074_CR16","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1109\/89.260357","volume":"2","author":"O Ghitza","year":"1994","unstructured":"Ghitza, O. (1994). Auditory models and human performance in tasks related to speech coding and speech recognition. Speech and Audio Processing IEEE Transactions, 2, 115\u2013132.","journal-title":"Speech and Audio Processing IEEE Transactions"},{"key":"10074_CR17","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/MSP.2015.2462851","volume":"32","author":"JH Hansen","year":"2015","unstructured":"Hansen, J. H., & Hasan, T. (2015). Speaker recognition by machines and humans: A tutorial review. IEEE Signal Processing Magazine, 32, 74\u201399.","journal-title":"IEEE Signal Processing Magazine"},{"key":"10074_CR18","volume-title":"Forensic voice identification","author":"HF Hollien","year":"2002","unstructured":"Hollien, H. F. (2002). Forensic voice identification. Academic Press."},{"key":"10074_CR19","first-page":"2211","volume":"6","author":"F Kurniawan","year":"2016","unstructured":"Kurniawan, F., Rahim, M. S. M., Khalil, M. S., & Khan, M. K. (2016). Statistical-based audio forensic on identical microphones. International Journal of Electrical and Computer Engineering, 6, 2211.","journal-title":"International Journal of Electrical and Computer Engineering"},{"key":"10074_CR20","volume-title":"Room acoustics","author":"H Kuttruff","year":"2000","unstructured":"Kuttruff, H. (2000). Room acoustics (4th ed.). Spon Press.","edition":"4"},{"key":"10074_CR21","unstructured":"Lehmann, E. A. Image-source method: Matlab code. Available: http:\/\/www.eric-lehmann.com\/."},{"key":"10074_CR22","unstructured":"L\u00f6llmann, H. W., & Vary, P. (2008). Estimation of the reverberation time in noisy environments. In Proceedings of International Workshop on Acoustic Echo and Noise Control (IWAENC)."},{"key":"10074_CR23","unstructured":"L\u00f6llmann, H., Yilmaz, E., Jeub, M., & Vary, P. (2010). An improved algorithm for blind reverberation time estimation. In Proceedings of International Workshop on Acoustic Echo and noise control (IWAENC), pp. 1\u20134."},{"key":"10074_CR24","doi-asserted-by":"publisher","first-page":"1711","DOI":"10.1109\/TASL.2007.899278","volume":"15","author":"J Ming","year":"2007","unstructured":"Ming, J., Hazen, T. J., Glass, J. R., & Reynolds, D. A. (2007). Robust speaker recognition in noisy conditions. Audio Speech and Language Processing IEEE Transactions, 15, 1711\u20131723.","journal-title":"Audio Speech and Language Processing IEEE Transactions"},{"key":"10074_CR26","doi-asserted-by":"publisher","first-page":"2310","DOI":"10.11591\/eei.v10i4.2957","volume":"10","author":"DY Mohammed","year":"2021","unstructured":"Mohammed, D. Y., Al-Karawi, K., & Aljuboori, A. (2021). Robust speaker verification by combining MFCC and entrocy in noisy conditions. Bulletin of Electrical Engineering and Informatics, 10, 2310\u20132319.","journal-title":"Bulletin of Electrical Engineering and Informatics"},{"key":"10074_CR14","doi-asserted-by":"crossref","unstructured":"Mohammed, D. Y., Al-Karawi, K. A., Husien, I. M., & Ghulam, M. A. (2020). Mitigate the reverberant effects on speaker recognition via multi-training. in Applied Computing to Support Industry: Innovation and Technology: First International Conference, ACRIT 2019, Ramadi, Iraq, September 15\u201316, 2019, revised selected Papers 1, 2020, pp. 95\u2013109.","DOI":"10.1007\/978-3-030-38752-5_8"},{"key":"10074_CR27","unstructured":"Morrison, G., Zhang, C., Enzinger, E., Ochoa, F., Bleach, D. & Johnson, M. et al. (2015). Forensic database of voice recordings of 500+ Australian English speakers."},{"key":"10074_CR28","unstructured":"Papoulis, A., & Pillai, S. U. (eds) (2008). Probability, random variables and stochastic processes. McGraw Hill."},{"key":"10074_CR29","doi-asserted-by":"crossref","unstructured":"Qi, J., Wang, D., Xu, J. & Tejedor, J. (2013) Bottleneck features based on gammatone frequency cepstral coefficients. In Interspeech'13","DOI":"10.21437\/Interspeech.2013-435"},{"key":"10074_CR30","doi-asserted-by":"publisher","first-page":"2877","DOI":"10.1121\/1.1616578","volume":"114","author":"R Ratnam","year":"2003","unstructured":"Ratnam, R., Jones, D. L., Wheeler, B. C., O\u2019Brien, W. D., Jr., Lansing, C. R., & Feng, A. S. (2003). Blind estimation of reverberation time. The Journal of the Acoustical Society of America, 114, 2877\u20132892.","journal-title":"The Journal of the Acoustical Society of America"},{"key":"10074_CR31","first-page":"6","volume":"5","author":"SO Sadjadi","year":"2013","unstructured":"Sadjadi, S. O., Slaney, M., & Heck, L. (2013). MSR identity toolbox-a Matlab toolbox for speaker recognition research. Microsoft Research Conversational Systems Research Center (CSRC), 5, 6.","journal-title":"Microsoft Research Conversational Systems Research Center (CSRC)"},{"issue":"4","key":"10074_CR32","first-page":"1","volume":"1","author":"SO Sadjadi","year":"2013","unstructured":"Sadjadi, S. O., Slaney, M., & Heck, L. (2013). MSR identity toolbox v1 0: A MATLAB toolbox for speaker-recognition research. Speech and Language Processing Technical Committee Newsletter, 1(4), 1\u201332.","journal-title":"Speech and Language Processing Technical Committee Newsletter"},{"key":"10074_CR33","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1121\/1.383103","volume":"66","author":"MR Schroeder","year":"1979","unstructured":"Schroeder, M. R. (1979). Integrated-impulse method measuring sound decay without using impulses. The Journal of the Acoustical Society of America, 66, 497\u2013500.","journal-title":"The Journal of the Acoustical Society of America"},{"issue":"5","key":"10074_CR34","first-page":"89","volume":"8","author":"S Singh","year":"2018","unstructured":"Singh, S. (2018). Forensic and automatic speaker recognition system. International Journal of Electrical & Computer Engineering, 8(5), 89.","journal-title":"International Journal of Electrical & Computer Engineering"},{"key":"10074_CR35","first-page":"984","volume":"6","author":"K Waghmare","year":"2022","unstructured":"Waghmare, K., & Gawali, B. (2022). Speaker recognition for forensic application: A review. Journal of Positive School Psychology, 6, 984\u2013992.","journal-title":"Journal of Positive School Psychology"},{"key":"10074_CR36","first-page":"165","volume":"17","author":"JH Wigmore","year":"1926","unstructured":"Wigmore, J. H. (1926). New mode of identifying criminals. American Institute of Criminal Law and Criminology, 17, 165.","journal-title":"American Institute of Criminal Law and Criminology"},{"key":"10074_CR37","unstructured":"Young, S., Kershaw, D., Odell, I., Ollason, D., Valtchev, V. & Woodland, P. (2000) The HTK Book (for HTK Version 3.0). Microsoft Corporation."},{"key":"10074_CR38","volume-title":"Forensic science: from fibers to fingerprints","author":"L Yount","year":"2007","unstructured":"Yount, L. (2007). Forensic science: From fibers to fingerprints. Infobase Publishing."},{"key":"10074_CR39","unstructured":"Zhang, Y., Chambers, J. A., Li, F. F., Kendrick, P., & Cox, T. J. (2006). Blind estimation of reverberation time in occupied rooms. In 2006 14th European Signal Processing Conference, pp. 1\u20135."}],"container-title":["International Journal of Speech Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10772-023-10074-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10772-023-10074-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10772-023-10074-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,11]],"date-time":"2024-01-11T10:15:41Z","timestamp":1704968141000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10772-023-10074-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12]]},"references-count":38,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["10074"],"URL":"https:\/\/doi.org\/10.1007\/s10772-023-10074-5","relation":{},"ISSN":["1381-2416","1572-8110"],"issn-type":[{"value":"1381-2416","type":"print"},{"value":"1572-8110","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12]]},"assertion":[{"value":"13 September 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 November 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 December 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Non-financial interests that are directly or indirectly related to the work submitted for publication.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interest"}},{"value":"The manuscript not be submitted to more than one journal for simultaneous consideration, and the submitted work is original and not have been published elsewhere in any form or language (partially or in full),","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}