{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T08:50:10Z","timestamp":1767084610908},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"15","license":[{"start":{"date-parts":[[2017,11,15]],"date-time":"2017-11-15T00:00:00Z","timestamp":1510704000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Natural Science Foundation of Guizhou Province of China","award":["[2012]2132"],"award-info":[{"award-number":["[2012]2132"]}]},{"name":"Natural Science Foundation of Education Department of Guizhou Province of China","award":["(2015)367"],"award-info":[{"award-number":["(2015)367"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1007\/s11042-017-5369-3","type":"journal-article","created":{"date-parts":[[2017,11,15]],"date-time":"2017-11-15T07:18:09Z","timestamp":1510730289000},"page":"19399-19413","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Authenticity identification of speaker digital recording data based on quantum genetic algorithm"],"prefix":"10.1007","volume":"77","author":[{"given":"Chao","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Ping","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Liang","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,15]]},"reference":[{"issue":"4","key":"5369_CR1","first-page":"209","volume":"30","author":"Y Bao","year":"2011","unstructured":"Bao Y (2011) Electric network frequency estimation based on fractional fourier transform for audio authenticity. Tech Acoust 30(4):209\u2013211","journal-title":"Tech Acoust"},{"key":"5369_CR2","unstructured":"Brixen EB (2007) Further investigation into the ENF criterion for forensic authentication. 123rd audio engineering society convention"},{"issue":"2","key":"5369_CR3","first-page":"193","volume":"16","author":"AJ Cooper","year":"2010","unstructured":"Cooper AJ (2010) An automated approach to the electric network frequency (ENF) criterion-theory and practice. Forensic Linguistics 16(2):193\u2013218","journal-title":"Forensic Linguistics"},{"issue":"4","key":"5369_CR4","doi-asserted-by":"crossref","first-page":"996","DOI":"10.1109\/TSMCA.2012.2223670","volume":"43","author":"J Cui","year":"2013","unstructured":"Cui J, Liu Y, Xu Y et al (2013) Tracking generic human motion via fusion of low-and high-dimensional approaches. IEEE Trans Syst Man Cybern B 43(4):996\u20131002","journal-title":"IEEE Trans Syst Man Cybern B"},{"issue":"3","key":"5369_CR5","doi-asserted-by":"crossref","first-page":"534","DOI":"10.1109\/TIFS.2010.2051270","volume":"5","author":"R Daniel","year":"2010","unstructured":"Daniel R (2010) Audio authenticity. Detecting ENF discontinuity with high precision phase analysis. IEEE Trans Inf Forensics Secur 5(3):534\u2013543","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"c","key":"5369_CR6","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1016\/j.specom.2016.02.006","volume":"79","author":"F Deng","year":"2016","unstructured":"Deng F, Bao C (2016) Speech enhancement based on AR model parameters estimation. Speech Comm 79(c):30\u201346","journal-title":"Speech Comm"},{"key":"5369_CR7","unstructured":"Farid H (1999) Detecting digital forgeries using bispectral analysis. MIT AI memo AIM-1657, MIT"},{"issue":"5","key":"5369_CR8","first-page":"199","volume":"37","author":"A Feng","year":"2011","unstructured":"Feng A, Su H (2011) Improved quantum genetic algorithm and its application. Comput Eng 37(5):199\u2013201","journal-title":"Comput Eng"},{"key":"5369_CR9","volume-title":"Introduction to quantum mechanics","author":"DJ Griffiths","year":"2011","unstructured":"Griffiths DJ (2011) Introduction to quantum mechanics, 2nd edn. China Machine Press, Beijing","edition":"2nd edn."},{"issue":"1","key":"5369_CR10","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1558\/sll.2005.12.1.63","volume":"12","author":"C Grigoras","year":"2005","unstructured":"Grigoras C (2005) Digital audio recording analysis: the electric network frequency (ENF) criterion. International Journal of Speech Language and the Law 12(1):63\u201367","journal-title":"International Journal of Speech Language and the Law"},{"issue":"A","key":"5369_CR11","first-page":"56","volume":"11","author":"H Guo","year":"2010","unstructured":"Guo H (2010) Research on authenticity analysis of audio evidence. Telecommunications Science 11(A):56\u201360","journal-title":"Telecommunications Science"},{"key":"5369_CR12","unstructured":"Han KH, Kim JH (2000) Genetic quantum algorithm and its application to combinatorial optimization problem. In: Process of IEEE congress on evolutionary computation, pp 1354\u20131360"},{"issue":"18","key":"5369_CR13","first-page":"4215","volume":"11","author":"Z He","year":"2011","unstructured":"He Z, Pan P (2011) An improved method of MFCC parameter extraction in speaker recognition. Science Technology and Engineering 11(18):4215\u20134218","journal-title":"Science Technology and Engineering"},{"issue":"2-3","key":"5369_CR14","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1016\/j.forsciint.2004.11.015","volume":"155","author":"M Kajstura","year":"2006","unstructured":"Kajstura M, Trawinska A, Hebenstreit J (2006) Application of the electrical network frequency (ENF) criterion. a case of a digital recording. Forensic Sci Int 155(2-3):165\u2013171","journal-title":"Forensic Sci Int"},{"issue":"9","key":"5369_CR15","first-page":"662","volume":"57","author":"BE Koenig","year":"2009","unstructured":"Koenig BE, Lacey DS (2009) Forensic authentication of digital audio recordings. J Audio Eng Soc 57(9):662\u2013695","journal-title":"J Audio Eng Soc"},{"issue":"5","key":"5369_CR16","first-page":"598","volume":"44","author":"L Lai","year":"2015","unstructured":"Lai L, Jin F, Wu H (2015) Speech de-noising method using quantum stochastic filter. Inf Control 44(5):598\u2013603","journal-title":"Inf Control"},{"issue":"4","key":"5369_CR17","first-page":"89","volume":"27","author":"F Liu","year":"2014","unstructured":"Liu F, Chen Z (2014) Frequency estimation based on Rife algorithm and its implementation on FPGA. Industrial Control Computer 27(4):89\u201392","journal-title":"Industrial Control Computer"},{"key":"5369_CR18","doi-asserted-by":"crossref","unstructured":"Liu L, Cheng L, Liu Y et al (2016) Recognizing complex activities by a probabilistic interval-based model. In: Thirtieth AAAI conference on artificial intelligence, pp 1266\u20131272","DOI":"10.1609\/aaai.v30i1.10155"},{"issue":"6","key":"5369_CR19","first-page":"126","volume":"27","author":"Y Liu","year":"1999","unstructured":"Liu Y (1999) A fast and accurate single frequency estimator synthetic approach. Acta Electron Sin 27(6):126\u2013128","journal-title":"Acta Electron Sin"},{"key":"5369_CR20","doi-asserted-by":"crossref","unstructured":"Liu Y, Zhang X, Cui J et al (2010) Visual analysis of child-adult interactive behaviors in video sequences. In: International conference on virtual systems and multimedia, pp 26\u201333","DOI":"10.1109\/VSMM.2010.5665969"},{"key":"5369_CR21","unstructured":"Liu Y, Cui J, Zhao H et al (2012) Fusion of low-and high-dimensional approaches by trackers sampling for generic human motion tracking. In: International conference on pattern recognition, pp 898\u2013901"},{"issue":"6","key":"5369_CR22","first-page":"1434","volume":"34","author":"Y Liu","year":"2013","unstructured":"Liu Y, Yao C, Sun C et al (2013) Authentication of digital audio recording based on power system frequency. Chin J Sci Instrum 34(6):1434\u20131440","journal-title":"Chin J Sci Instrum"},{"key":"5369_CR23","unstructured":"Liu Y, Nie L, Han L et al (2015) Action2activity: recognizing complex activities from sensor data. In: Proceedings of the international joint conference on artificial intelligence. IJCAI, pp 1617\u20131623"},{"key":"5369_CR24","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1016\/j.neucom.2015.08.096","volume":"181","author":"Y Liu","year":"2016","unstructured":"Liu Y, Nie L, Liu L et al (2016) From action to activity: sensor-based activity recognition. Neurocomputing 181:108\u2013115","journal-title":"Neurocomputing"},{"key":"5369_CR25","doi-asserted-by":"crossref","unstructured":"Liu Y, Zhang L, Nie L et al (2016) Fortune teller: predicting your career path. In: Proceedings of the AAAI conference on artificial intelligence. AAAI, pp 201\u2013207","DOI":"10.1609\/aaai.v30i1.9969"},{"key":"5369_CR26","unstructured":"Liu Y, Zheng Y, Liang Y et al (2016) Urban water quality prediction based on multi-task multi-view learning. In: Proceedings of the international joint conference on artificial intelligence. IJCAI, pp 2576\u20132582"},{"key":"5369_CR27","doi-asserted-by":"crossref","unstructured":"Lu Y, Wei Y, Liu Y et al (2017) Towards unsupervised physical activity recognition using smartphone accelerometers. Multimed Tools Appl 76(8):10701\u201310719","DOI":"10.1007\/s11042-015-3188-y"},{"issue":"11","key":"5369_CR28","doi-asserted-by":"crossref","first-page":"2669","DOI":"10.1109\/78.542175","volume":"44","author":"X Ma","year":"1996","unstructured":"Ma X, Nikias LC (1996) Joint estimation of time delay and frequency delay in impulsive noise using fractional lower order statistics. IEEE Trans Signal Process 44(11):2669\u20132687","journal-title":"IEEE Trans Signal Process"},{"issue":"2","key":"5369_CR29","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1109\/MSP.2008.931080","volume":"26","author":"RC Maher","year":"2009","unstructured":"Maher RC (2009) Audio forensic examination: authenticity, enhancement, and interpretation. IEEE Signal Proc Mag 26(2):84\u201394","journal-title":"IEEE Signal Proc Mag"},{"key":"5369_CR30","unstructured":"Narayana A, Moore M (2002) Quantum-inspired genetic algorithms. In: IEEE international conference on evolutionary computation, pp 61\u201366"},{"key":"5369_CR31","volume-title":"Quantum computation and quantum information","author":"M Nielsen","year":"2003","unstructured":"Nielsen M, Chuang I (2003) Quantum computation and quantum information. Higher Education Press, Beijing"},{"issue":"35","key":"5369_CR32","first-page":"123","volume":"48","author":"P Pan","year":"2012","unstructured":"Pan P, He Z (2012) Method of speaker feature parameter extraction based on duffing stochastic resonance. Comput Eng Appl 48(35):123\u2013125","journal-title":"Comput Eng Appl"},{"issue":"5","key":"5369_CR33","first-page":"277","volume":"39","author":"P Pan","year":"2012","unstructured":"Pan P, Luo H, Li H (2012) Voice authenticity detection method on stochastic resonance. Comput Eng 39(5):277\u2013230","journal-title":"Comput Eng"},{"key":"5369_CR34","doi-asserted-by":"crossref","unstructured":"Preotiuc-Pietro D, Liu Y, Hopkins D et al (2017) Beyond binary labels: political ideology prediction of twitter users. In: Annual meeting of the association for computational linguistics, pp 729\u2013740","DOI":"10.18653\/v1\/P17-1068"},{"issue":"8","key":"5369_CR35","first-page":"242","volume":"39","author":"G Qian","year":"2012","unstructured":"Qian G, Huang D (2012) Quantum genetic algorithm based on angle coding of 3D. Computer Science 39(8):242\u2013245","journal-title":"Computer Science"},{"issue":"6","key":"5369_CR36","first-page":"11","volume":"4","author":"X Song","year":"2014","unstructured":"Song X, Wang S, Niu X (2014) Survey of problem in quantum image processing. Intelligent Computer and Applications 4(6):11\u201314","journal-title":"Intelligent Computer and Applications"},{"issue":"6","key":"5369_CR37","first-page":"197","volume":"12","author":"G Tian","year":"2016","unstructured":"Tian G, Pan P, Liu Q (2016) The authenticity of digital recording data identification based on quantum tunnelling effect. Computer Knowledge and Technology 12(6):197\u2013200","journal-title":"Computer Knowledge and Technology"},{"issue":"12","key":"5369_CR38","first-page":"74","volume":"32","author":"L Wang","year":"2009","unstructured":"Wang L, Zhu J (2009) Method for modifying mandarin speech based on TD-PSOLA. Electronic Measurement Technology 32(12):74\u201376","journal-title":"Electronic Measurement Technology"},{"issue":"5","key":"5369_CR39","first-page":"748","volume":"30","author":"Y Wang","year":"2007","unstructured":"Wang Y, Li Y (2007) A novel quantum genetic algorithm for TSP. Chinese Journal of Computer 30(5):748\u2013755","journal-title":"Chinese Journal of Computer"},{"issue":"2","key":"5369_CR40","first-page":"267","volume":"15","author":"Y Wang","year":"2015","unstructured":"Wang Y, Pan P, Tian G (2015) A method of speaker feature extraction based on quantum well group. Science Technology and Engineering 15(2):267\u2013272","journal-title":"Science Technology and Engineering"},{"issue":"5","key":"5369_CR41","first-page":"246","volume":"35","author":"Q Xie","year":"2009","unstructured":"Xie Q, Wei X, Luo K et al (2009) Packet loss concealment algorithm in voIP. Comput Eng 35(5):246\u2013248","journal-title":"Comput Eng"},{"issue":"11","key":"5369_CR42","first-page":"805","volume":"50","author":"C Yan","year":"2014","unstructured":"Yan C, Zhang Y, Dai F et al (2014) Efficient parallel framework for HEVC motion estimation on many-core Processors. Electronics 50(11):805\u2013806","journal-title":"Electronics"},{"issue":"5","key":"5369_CR43","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1049\/el.2013.3235","volume":"50","author":"C Yan","year":"2014","unstructured":"Yan C, Zhang Y, Dai F et al (2014) Parallel deblocking filter for HEVC on many-core processor. Electron Lett 50(5):367\u2013368","journal-title":"Electron Lett"},{"issue":"12","key":"5369_CR44","doi-asserted-by":"crossref","first-page":"2077","DOI":"10.1109\/TCSVT.2014.2335852","volume":"24","author":"C Yan","year":"2014","unstructured":"Yan C, Zhang Y, Xu J et al (2014) Efficient parallel HEVC intra prediction on many-core processor. IEEE Trans Circuits Syst Video Technol 24(12):2077\u20132089","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"5","key":"5369_CR45","doi-asserted-by":"crossref","first-page":"573","DOI":"10.1109\/LSP.2014.2310494","volume":"21","author":"C Yan","year":"2014","unstructured":"Yan C, Zhang Y, Xu J et al (2014) A highly parallel framework for HEVC coding unit partitioning tree decision on many-core processors. IEEE Signal Process Lett 21(5):573\u2013576","journal-title":"IEEE Signal Process Lett"},{"key":"5369_CR46","doi-asserted-by":"crossref","unstructured":"Yan C, Xie H, Liu S et al (2017) Effective uyghur language text detection in complex background images for traffic prompt identification. In: IEEE transactions on intelligent transportation systems","DOI":"10.1109\/TITS.2017.2749977"},{"key":"5369_CR47","doi-asserted-by":"crossref","unstructured":"Yan C, Xie H, Yang D et al (2017) Supervised hash coding with deep neural network for environment perception of intelligent vehicles. In: IEEE transactions on intelligent transportation systems","DOI":"10.1109\/TITS.2017.2749965"},{"key":"5369_CR48","doi-asserted-by":"crossref","unstructured":"Yang R, Qu Z, Huang J (2008) Detecting digital audio forgeries by checking frame offsets. In: Workshop on multimedia and security, pp 21\u201326","DOI":"10.1145\/1411328.1411334"},{"issue":"11","key":"5369_CR49","first-page":"2598","volume":"26","author":"Q Yao","year":"2006","unstructured":"Yao Q, Chai P, Xuan G et al (2006) Audio re-sampling detection in audio forensics based on EM algorithm. Journal of Computer Applications 26(11):2598\u20132601","journal-title":"Journal of Computer Applications"},{"issue":"5","key":"5369_CR50","first-page":"1189","volume":"30","author":"J Yu","year":"2009","unstructured":"Yu J, Zhang R (2009) Speaker recognition method using MFCC and LPCC features. Computer Engineering and Design 30(5):1189\u20131191","journal-title":"Computer Engineering and Design"},{"issue":"4","key":"5369_CR51","first-page":"234","volume":"39","author":"X Zhang","year":"2013","unstructured":"Zhang X, Sui G, Zheng R et al (2013) An improved quantum genetic algorithm of quantum revolving gate. Comput Eng 39(4):234\u2013238","journal-title":"Comput Eng"},{"issue":"6","key":"5369_CR52","first-page":"181","volume":"36","author":"Z Zhang","year":"2010","unstructured":"Zhang Z (2010) Novel improved quantum genetic algorithm. Comput Eng 36(6):181\u2013183","journal-title":"Comput Eng"},{"issue":"4","key":"5369_CR53","first-page":"368","volume":"25","author":"Z Zhou","year":"2005","unstructured":"Zhou Z, Huang Y, Zhang Y et al (2005) Recent advancement in research of quantum computation. Prog Phys 25(4):368\u2013385","journal-title":"Prog Phys"},{"key":"5369_CR54","volume-title":"Semi-conductor integrated circuits","author":"Z Zhu","year":"2009","unstructured":"Zhu Z, Zhang H, Zhu Y (2009) Semi-conductor integrated circuits, 2nd edn. Tsinghua University Press, Beijing","edition":"2nd edn."}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-017-5369-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-5369-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-5369-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,7]],"date-time":"2022-08-07T10:22:58Z","timestamp":1659867778000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-017-5369-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,15]]},"references-count":54,"journal-issue":{"issue":"15","published-print":{"date-parts":[[2018,8]]}},"alternative-id":["5369"],"URL":"https:\/\/doi.org\/10.1007\/s11042-017-5369-3","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,11,15]]}}}