{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:28:41Z","timestamp":1740122921660,"version":"3.37.3"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"20","license":[{"start":{"date-parts":[[2018,10,1]],"date-time":"2018-10-01T00:00:00Z","timestamp":1538352000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1007\/s11042-018-6718-6","type":"journal-article","created":{"date-parts":[[2018,10,1]],"date-time":"2018-10-01T14:56:24Z","timestamp":1538405784000},"page":"29395-29411","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":37,"title":["Multimedia analysis for disguised voice and classification efficiency"],"prefix":"10.1007","volume":"78","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0790-119X","authenticated-orcid":false,"given":"Mahesh K.","family":"Singh","sequence":"first","affiliation":[]},{"given":"A. K.","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Narendra","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,1]]},"reference":[{"key":"6718_CR1","unstructured":"Audacity: free audio editor and recorder [online]\" in \n                    http:\/\/audacity.sourceforge.net"},{"issue":"3","key":"6718_CR2","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1109\/PROC.1981.11969","volume":"69","author":"RE Crochiere","year":"1981","unstructured":"Crochiere RE, Rabiner LR (1981) Interpolation and decimation of digital signals\u2014a tutorial review. Proc IE E 69(3):300\u2013331","journal-title":"Proc IE E"},{"issue":"3","key":"6718_CR3","first-page":"09","volume":"4","author":"R Entezari-Maleki","year":"2009","unstructured":"Entezari-Maleki R, Rezaei A, Minaei-Bidgoli B (2009) Comparison of classification methods based on the type of attributes and sample size. J Converg Inform Technol 4(3):09\u201317","journal-title":"J Converg Inform Technol"},{"key":"6718_CR4","unstructured":"Gonzalez-Rodriguez J, Ramos-Castro D, Garcia-Gomar M, Ortega-Garcia J (2004) On robust estimation of likelihood ratios: the ATVs-UPM system at 2003 NFI\/TNO forensic evaluation. In proc. IEEE Int Workshop Speaker Language Recognit: 1\u20138"},{"issue":"6","key":"6718_CR5","doi-asserted-by":"publisher","first-page":"1097","DOI":"10.1109\/TASL.2008.2001109","volume":"16","author":"M Grimaldi","year":"2008","unstructured":"Grimaldi M, Cummins F (2008) Speaker identification using instantaneous frequencies. IEEE Trans Audio Speech Lang Process 16(6):1097\u20131111","journal-title":"IEEE Trans Audio Speech Lang Process"},{"key":"6718_CR6","doi-asserted-by":"crossref","unstructured":"Haojun Wu, Yong Wang & Jiwu Huang (2013). Blind detection of electronic disguised voice. \n                    IEEE international conference on\n                    \n                   acoustics, speech and signal processing (ICASSP), 3016\u20133017","DOI":"10.1109\/ICASSP.2013.6638211"},{"key":"6718_CR7","unstructured":"Jingxu C, Hongchen Y, Zhanjiang S (2004) The speaker automatic identified system and its forensic application. Proc Int Symp Comput Inf (1) 96\u2013100"},{"key":"6718_CR8","doi-asserted-by":"crossref","unstructured":"Kajarekar SS, Ferrer L, Shriberg E, Sonmez K, Stolcke A, Venkataraman A (2005) SRI\u2019s 2004 NIST speaker recognition evaluation system. Proc IEEE ICASSP (1): 173\u2013176","DOI":"10.1109\/ICASSP.2005.1415078"},{"key":"6718_CR9","doi-asserted-by":"crossref","unstructured":"Kajarekar SS, Bratt H, Shriberg E, de Leon R (2006). A study of intentional voice modifications for evading automatic speaker recognition. Proc IEEE Int Workshop Speaker Lang Recognit: 1\u20136","DOI":"10.1109\/ODYSSEY.2006.248123"},{"key":"6718_CR10","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1016\/S0167-9236(02)00110-0","volume":"35","author":"MY Kiang","year":"2003","unstructured":"Kiang MY (2003) A comparative assessment of classification methods. Decision Supp Syst Elsevier 35:441\u2013454","journal-title":"Decision Supp Syst Elsevier"},{"key":"6718_CR11","unstructured":"K\u00fcnzel HJ, Gonzalez-Rodriguez J, Ortega-Garc\u00eda J (2004).Effect of voice disguise on the performance of a forensic automatic speaker recognition system. Proc IEEE Int Workshop Speaker Lang Recognit: 1\u20134"},{"key":"6718_CR12","doi-asserted-by":"publisher","unstructured":"Liao X, Qin Z, Ding L (2017) Data embedding in digital images using critical functions. Signal Process Image Commun. \n                    https:\/\/doi.org\/10.1016\/j.image.2017.07.006","DOI":"10.1016\/j.image.2017.07.006"},{"key":"6718_CR13","unstructured":"Rajeev Ranjan, Rajesh K. Dubey (2016) Isolated word recognition using HMM for Maithili dialect,\u201d IEEE. \n                    Int Conf Signal Process Commun:\n                    \n                   322\u2013328"},{"key":"6718_CR14","unstructured":"R. Rodman (1998) Speaker recognition of disguised voices: a program for research. Proc Consortium Speech Technol Conjunct Conf Speaker Recognition Man Mach Direct Forensic: 9\u201322"},{"issue":"8","key":"6718_CR15","doi-asserted-by":"publisher","first-page":"3222","DOI":"10.1007\/s00034-016-0434-0","volume":"36","author":"HR Seresht","year":"2017","unstructured":"Seresht HR, Ahadi SM, Seyedin S (2017) Spectro-temporal power spectrum features for noise robust ASR. Circ Syst Sign Process 36(8):3222\u20133242","journal-title":"Circ Syst Sign Process"},{"key":"6718_CR16","doi-asserted-by":"crossref","unstructured":"Tan T (2010) The effect of voice disguise on automatic speaker recognition. IEEE Int CISP (8): 3538\u20133541","DOI":"10.1109\/CISP.2010.5647131"},{"issue":"3","key":"6718_CR17","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1109\/TIFS.2014.2301912","volume":"9","author":"H Wu","year":"2014","unstructured":"Wu H, Wang Y, Huang J (2014) Identification of electronic disguised voices. IEEE Trans Inform Foren Sec 9(3):489\u2013500","journal-title":"IEEE Trans Inform Foren Sec"},{"issue":"2\u20133","key":"6718_CR18","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.forsciint.2007.05.019","volume":"175","author":"C Zhang","year":"2008","unstructured":"Zhang C, Tan T (2008) Voice disguise and automatic speaker recognition. Elsevier: Sci Direct: Foren Sci Int 175(2\u20133):118\u2013122","journal-title":"Elsevier: Sci Direct: Foren Sci Int"},{"issue":"2","key":"6718_CR19","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.forsciint.2007.05.019","volume":"175","author":"C Zhang","year":"2008","unstructured":"Zhang C, Tan T (2008) Voice disguise and automatic speaker recognition. Forensic Sci Int 175(2):118\u2013122","journal-title":"Forensic Sci Int"},{"issue":"5","key":"6718_CR20","doi-asserted-by":"publisher","first-page":"1645","DOI":"10.1109\/TASL.2007.899236","volume":"15","author":"X Zhu","year":"2007","unstructured":"Zhu X, Beauregard G, Wyse L (2007) Real-time signal estimation from modified short-time Fourier transforms magnitude spectra. IEEE Trans Audio Speech Lang Process 15(5):1645\u20131653","journal-title":"IEEE Trans Audio Speech Lang Process"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6718-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-018-6718-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6718-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,30]],"date-time":"2019-09-30T22:31:01Z","timestamp":1569882661000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-018-6718-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,1]]},"references-count":20,"journal-issue":{"issue":"20","published-print":{"date-parts":[[2019,10]]}},"alternative-id":["6718"],"URL":"https:\/\/doi.org\/10.1007\/s11042-018-6718-6","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2018,10,1]]},"assertion":[{"value":"4 June 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 August 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 September 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 October 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}