{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T06:13:06Z","timestamp":1747807986934},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2016,3,4]],"date-time":"2016-03-04T00:00:00Z","timestamp":1457049600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2017,3]]},"DOI":"10.1007\/s11042-016-3350-1","type":"journal-article","created":{"date-parts":[[2016,3,4]],"date-time":"2016-03-04T07:59:50Z","timestamp":1457078390000},"page":"7251-7281","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Multi-factor authentication model based on multipurpose speech watermarking and online speaker recognition"],"prefix":"10.1007","volume":"76","author":[{"given":"Mohammad Ali","family":"Nematollahi","sequence":"first","affiliation":[]},{"given":"Hamurabi","family":"Gamboa-Rosales","sequence":"additional","affiliation":[]},{"given":"Francisco J.","family":"Martinez-Ruiz","sequence":"additional","affiliation":[]},{"given":"Jose I.","family":"De la Rosa-Vargas","sequence":"additional","affiliation":[]},{"given":"S. A. R.","family":"Al-Haddad","sequence":"additional","affiliation":[]},{"given":"Mansour","family":"Esmaeilpour","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,4]]},"reference":[{"key":"3350_CR1","doi-asserted-by":"crossref","unstructured":"Akhaee MA, Kalantari NK, Marvasti F (2009) Robust multiplicative audio and speech watermarking using statistical modeling. In IEEE International Conference on Communications, ICC\u201909. 2009. IEEE","DOI":"10.1109\/ICC.2009.5199424"},{"issue":"8","key":"3350_CR2","doi-asserted-by":"crossref","first-page":"2487","DOI":"10.1016\/j.sigpro.2010.02.013","volume":"90","author":"MA Akhaee","year":"2010","unstructured":"Akhaee MA, Kalantari NK, Marvasti F (2010) Robust audio and speech watermarking using Gaussian and Laplacian modeling. Signal Process 90(8):2487\u20132497","journal-title":"Signal Process"},{"issue":"6","key":"3350_CR3","doi-asserted-by":"crossref","first-page":"764","DOI":"10.1016\/j.dsp.2011.01.013","volume":"21","author":"W Al-Nuaimy","year":"2011","unstructured":"Al-Nuaimy W et al (2011) An SVD audio watermarking approach using chaotic encrypted images. Digit Sig Process 21(6):764\u2013779","journal-title":"Digit Sig Process"},{"key":"3350_CR4","unstructured":"Baroughi AF, Craver S (2014) Additive attacks on speaker recognition. In IS&T\/SPIE Electronic imaging. International Society for Optics and Photonics"},{"issue":"2","key":"3350_CR5","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1016\/S0167-6393(99)00070-9","volume":"31","author":"L Besacier","year":"2000","unstructured":"Besacier L, Bonastre J-F, Fredouille C (2000) Localization and selection of speaker-specific information with statistical modeling. Speech Comm 31(2):89\u2013106","journal-title":"Speech Comm"},{"key":"3350_CR6","doi-asserted-by":"crossref","first-page":"430","DOI":"10.1155\/S1110865704310024","volume":"2004","author":"F Bimbot","year":"2004","unstructured":"Bimbot F et al (2004) A tutorial on text-independent speaker verification. EURASIP J Appl Sig Process 2004:430\u2013451","journal-title":"EURASIP J Appl Sig Process"},{"key":"3350_CR7","unstructured":"Bolten JB (2003) E-authentication guidance for federal agencies. Office of Management and Budget, http:\/\/www.whitehouse.gov\/omb\/memoranda\/fy04\/m04-04.pdf . 2003"},{"key":"3350_CR8","unstructured":"Brookes M (2006) VOICEBOX: a speech processing toolbox for MATLAB"},{"key":"3350_CR9","doi-asserted-by":"crossref","unstructured":"Chaturvedi A, Mishra D, Mukhopadhyay S (2013) Improved biometric-based three-factor remote user authentication scheme with key agreement using smart card. In Information systems security, Springer, p 63\u201377","DOI":"10.1007\/978-3-642-45204-8_5"},{"issue":"4","key":"3350_CR10","doi-asserted-by":"crossref","first-page":"788","DOI":"10.1109\/TASL.2010.2064307","volume":"19","author":"N Dehak","year":"2011","unstructured":"Dehak N et al (2011) Front-end factor analysis for speaker verification. Audio Speech Lang Process IEEE Trans 19(4):788\u2013798","journal-title":"Audio Speech Lang Process IEEE Trans"},{"issue":"12","key":"3350_CR11","doi-asserted-by":"crossref","first-page":"1608","DOI":"10.1016\/j.specom.2006.06.010","volume":"48","author":"M Faundez-Zanuy","year":"2006","unstructured":"Faundez-Zanuy M, Hagm\u00fcller M, Kubin G (2006) Speaker verification security improvement by means of speech watermarking. Speech Comm 48(12):1608\u20131619","journal-title":"Speech Comm"},{"issue":"11","key":"3350_CR12","doi-asserted-by":"crossref","first-page":"3027","DOI":"10.1016\/j.patcog.2007.02.016","volume":"40","author":"M Faundez-Zanuy","year":"2007","unstructured":"Faundez-Zanuy M, Hagm\u00fcller M, Kubin G (2007) Speaker identification security improvement by means of speech watermarking. Pattern Recogn 40(11):3027\u20133034","journal-title":"Pattern Recogn"},{"key":"3350_CR13","unstructured":"Garofolo JS, L.D. Consortium (1993) TIMIT: acoustic-phonetic continuous speech corpus, Linguistic Data Consortium"},{"issue":"3","key":"3350_CR14","doi-asserted-by":"crossref","first-page":"635","DOI":"10.1093\/biomet\/56.3.635","volume":"56","author":"DV Hinkley","year":"1969","unstructured":"Hinkley DV (1969) On the ratio of two correlated normal random variables. Biometrika 56(3):635\u2013639","journal-title":"Biometrika"},{"key":"3350_CR15","doi-asserted-by":"crossref","unstructured":"Huber R, St\u00f6gner H, Uhl A (2011) Two-factor biometric recognition with integrated tamper-protection watermarking. In Communications and multimedia security, Springer","DOI":"10.1007\/978-3-642-24712-5_6"},{"key":"3350_CR16","unstructured":"Hyon S (2012) An investigation of dependencies between frequency components and speaker characteristics based on phoneme mean F-ratio contribution. In Signal & Information Processing Association Annual Summit and Conference (APSIPA ASC), 2012. Asia-Pacific: IEEE"},{"key":"3350_CR17","unstructured":"Kenny P (2012) A small foot-print i-vector extractor. In Proc. Odyssey"},{"issue":"2","key":"3350_CR18","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1016\/S0969-4765(13)70036-5","volume":"2013","author":"M Khitrov","year":"2013","unstructured":"Khitrov M (2013) Talking passwords: voice biometrics for data access and security. Biom Technol Today 2013(2):9\u201311","journal-title":"Biom Technol Today"},{"issue":"1","key":"3350_CR19","doi-asserted-by":"crossref","first-page":"187","DOI":"10.3745\/JIPS.2011.7.1.187","volume":"7","author":"J-J Kim","year":"2011","unstructured":"Kim J-J, Hong S-P (2011) A method of risk assessment for multi-factor authentication. J Inf Process Syst (JIPS) 7(1):187\u2013198","journal-title":"J Inf Process Syst (JIPS)"},{"key":"3350_CR20","doi-asserted-by":"crossref","unstructured":"Kumar A, Lee HJ (2013) Multi-factor authentication process using more than one token with watermark security. In Future information communication technology and applications, Springer, p 579\u2013587","DOI":"10.1007\/978-94-007-6516-0_65"},{"issue":"1","key":"3350_CR21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2009.08.001","volume":"33","author":"C-T Li","year":"2010","unstructured":"Li C-T, Hwang M-S (2010) An efficient biometrics-based remote user authentication scheme using smart cards. J Netw Comput Appl 33(1):1\u20135","journal-title":"J Netw Comput Appl"},{"key":"3350_CR22","doi-asserted-by":"crossref","unstructured":"Li Q, Memon N, Sencar HT (2006) Security issues in watermarking applications-A deeper look. In Proceedings of the 4th ACM international workshop on Contents protection and security. ACM","DOI":"10.1145\/1178766.1178774"},{"issue":"4","key":"3350_CR23","doi-asserted-by":"crossref","first-page":"312","DOI":"10.1016\/j.specom.2007.10.005","volume":"50","author":"X Lu","year":"2008","unstructured":"Lu X, Dang J (2008) An investigation of dependencies between frequency components and speaker characteristics for text-independent speaker identification. Speech Comm 50(4):312\u2013322","journal-title":"Speech Comm"},{"key":"3350_CR24","unstructured":"Mallat S (2008) A wavelet tour of signal processing: the sparse way. Academic press"},{"key":"3350_CR25","doi-asserted-by":"crossref","unstructured":"McCool C et al (2012) Bi-modal person recognition on a mobile phone: using mobile phone data. In Multimedia and Expo Workshops (ICMEW), 2012 I.E. International Conference on, IEEE","DOI":"10.1109\/ICMEW.2012.116"},{"key":"3350_CR26","unstructured":"Mohamed S et al (2013) A method for speech watermarking in speaker verification"},{"issue":"1","key":"3350_CR27","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13636-015-0074-5","volume":"2015","author":"MA Nematollahi","year":"2015","unstructured":"Nematollahi MA, Akhaee MA, Al-Haddad SAR, Gamboa-Rosales H (2015) Semi-fragile digital speech watermarking for online speaker recognition. EURASIP J Audio Speech Music Process 2015(1):1\u201315","journal-title":"EURASIP J Audio Speech Music Process"},{"issue":"03","key":"3350_CR28","first-page":"1","volume":"12","author":"MA Nematollahi","year":"2015","unstructured":"Nematollahi MA, Al-Haddad S (2015) Distant speaker recognition: an overview. Int J Humanoid Robot 12(03):1\u201345","journal-title":"Int J Humanoid Robot"},{"key":"3350_CR29","doi-asserted-by":"crossref","unstructured":"Nematollahi MA, Gamboa-Rosales H, Akhaee MA, Al-Haddad SAR (2015) Robust digital speech watermarking for online speaker recognition. Mathematical Problems in Engineering, 2015","DOI":"10.1155\/2015\/372398"},{"issue":"12","key":"3350_CR30","doi-asserted-by":"crossref","first-page":"2021","DOI":"10.1109\/JPROC.2003.819611","volume":"91","author":"L O\u2019Gorman","year":"2003","unstructured":"O\u2019Gorman L (2003) Comparing passwords, tokens, and biometrics for user authentication. Proc IEEE 91(12):2021\u20132040","journal-title":"Proc IEEE"},{"issue":"2","key":"3350_CR31","doi-asserted-by":"crossref","first-page":"397","DOI":"10.1109\/TASL.2012.2215602","volume":"21","author":"MA Pathak","year":"2013","unstructured":"Pathak MA, Raj B (2013) Privacy-preserving speaker verification and identification using gaussian mixture models. Audio Speech Lang Process IEEE Trans 21(2):397\u2013406","journal-title":"Audio Speech Lang Process IEEE Trans"},{"issue":"1","key":"3350_CR32","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1016\/0167-6393(95)00009-D","volume":"17","author":"DA Reynolds","year":"1995","unstructured":"Reynolds DA (1995) Speaker identification and verification using Gaussian mixture speaker models. Speech Comm 17(1):91\u2013108","journal-title":"Speech Comm"},{"issue":"1","key":"3350_CR33","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1006\/dspr.1999.0361","volume":"10","author":"DA Reynolds","year":"2000","unstructured":"Reynolds DA, Quatieri TF, Dunn RB (2000) Speaker verification using adapted Gaussian mixture models. Digit Sig Process 10(1):19\u201341","journal-title":"Digit Sig Process"},{"issue":"1","key":"3350_CR34","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1016\/j.cose.2006.12.008","volume":"26","author":"C Roberts","year":"2007","unstructured":"Roberts C (2007) Biometric attack vectors and defences. Comput Secur 26(1):14\u201325","journal-title":"Comput Secur"},{"key":"3350_CR35","unstructured":"Seyed Omid Sadjadi MS, Heck L (2013) MSR Identity toolbox v1.0: A MATLAB toolbox for speaker recognition research, IEEE"},{"key":"3350_CR36","unstructured":"Simon J (2012) DataHash"},{"key":"3350_CR37","doi-asserted-by":"crossref","unstructured":"Woo RH, Park A, Hazen TJ (2006) The MIT mobile device speaker verification corpus: data collection and preliminary experiments. In Speaker and Language Recognition Workshop, IEEE Odyssey 2006: The. 2006. IEEE","DOI":"10.1109\/ODYSSEY.2006.248083"},{"key":"3350_CR38","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1016\/j.specom.2014.10.005","volume":"66","author":"Z Wu","year":"2015","unstructured":"Wu Z et al (2015) Spoofing and countermeasures for speaker verification: a survey. Speech Comm 66:130\u2013153","journal-title":"Speech Comm"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-016-3350-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3350-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3350-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3350-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T03:32:45Z","timestamp":1559359965000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-016-3350-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,4]]},"references-count":38,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2017,3]]}},"alternative-id":["3350"],"URL":"https:\/\/doi.org\/10.1007\/s11042-016-3350-1","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,3,4]]}}}