{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T09:39:01Z","timestamp":1770457141796,"version":"3.49.0"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"31-32","license":[{"start":{"date-parts":[[2020,5,20]],"date-time":"2020-05-20T00:00:00Z","timestamp":1589932800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,5,20]],"date-time":"2020-05-20T00:00:00Z","timestamp":1589932800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1007\/s11042-019-08150-7","type":"journal-article","created":{"date-parts":[[2020,5,20]],"date-time":"2020-05-20T21:02:27Z","timestamp":1590008547000},"page":"22293-22324","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Efficient remote access system based on decoded and decompressed speech signals"],"prefix":"10.1007","volume":"79","author":[{"given":"Hala Shawky","family":"El-Kfafy","sequence":"first","affiliation":[]},{"given":"Mohamed","family":"Abd-Elnaby","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Rihan","sequence":"additional","affiliation":[]},{"given":"Mohamed Abd-Elsalam","family":"Nassar","sequence":"additional","affiliation":[]},{"given":"Adel S.","family":"El-Fishawy","sequence":"additional","affiliation":[]},{"given":"Moawad I.","family":"Dessouky","sequence":"additional","affiliation":[]},{"given":"El-Sayed M.","family":"El-Rabaie","sequence":"additional","affiliation":[]},{"given":"Fathi E.","family":"Abd El-Samie","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,5,20]]},"reference":[{"key":"8150_CR1","unstructured":"Adel H, Zahran O, Taha TE, Al-Nauimy W, El-Halafawy S, El-Rabaie ESM, Abd FE. ECG Signal Compression Using A Proposed Inverse"},{"key":"8150_CR2","doi-asserted-by":"crossref","unstructured":"Ahmed S (2011) Compressive Sensing for Speech Signals in Mobile Systems","DOI":"10.1109\/ACSSC.2011.6190203"},{"key":"8150_CR3","unstructured":"Andrews HC, Hunt BR (1977) Digital image restauration"},{"key":"8150_CR4","unstructured":"Bachu, R. G., Kopparthi, S., Adapa, B., & Barkana, B. D. (2008) Separation of voiced and unvoiced using zero crossing rate and energy of the speech signal. In: American Society for Engineering Education (ASEE) Zone Conference Proceedings (pp. 1\u20137)"},{"key":"8150_CR5","first-page":"4","volume":"24","author":"RG Baraniuk","year":"2007","unstructured":"Baraniuk RG (2007) Compressive sensing. IEEE Signal Process Mag 24:4","journal-title":"IEEE Signal Process Mag"},{"key":"8150_CR6","volume-title":"Linear predictive coding","author":"J Bradbury","year":"2000","unstructured":"Bradbury J (2000) Linear predictive coding. Mc G. Hill, New York"},{"issue":"12","key":"8150_CR7","first-page":"18","volume":"3","author":"S Desai","year":"2013","unstructured":"Desai S, Nakrani N (2013) Compressive sensing in speech processing: A survey based on sparsity and sensing matrix. International Journal of Emerging Technology and Advanced Engineering 3(12):18\u201323","journal-title":"International Journal of Emerging Technology and Advanced Engineering"},{"issue":"9","key":"8150_CR8","doi-asserted-by":"publisher","first-page":"097001","DOI":"10.1117\/1.2042947","volume":"44","author":"SE El-Khamy","year":"2005","unstructured":"El-Khamy SE, Hadhoud MM, Dessouky MI, Salam BM, El-Samie FEA (2005) Regularized super-resolution reconstruction of images using wavelet fusion. Opt Eng 44(9):097001","journal-title":"Opt Eng"},{"key":"8150_CR9","doi-asserted-by":"crossref","unstructured":"El-Samie FEA (2011) Information security for automatic speaker identification. In: Information Security for Automatic Speaker Identification (pp. 1\u2013122). Springer, New York","DOI":"10.1007\/978-1-4419-9698-5_1"},{"issue":"10","key":"8150_CR10","first-page":"35","volume":"136","author":"GD Ernest","year":"2016","unstructured":"Ernest GD, Timothy AA, Kpangkpari G (2016) The Use of Remote Access Tools by System Administrators Today and their Effectiveness: Case Study of Remote Desktop, Virtual Network Computing and Secure Android App. Int J Comput Appl 136(10):35\u201338","journal-title":"Int J Comput Appl"},{"issue":"3","key":"8150_CR11","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1109\/29.21708","volume":"37","author":"NP Galatsanos","year":"1989","unstructured":"Galatsanos NP, Chin RT (1989) Digital restoration of multichannel images. IEEE Trans Acoust Speech Signal Process 37(3):415\u2013421","journal-title":"IEEE Trans Acoust Speech Signal Process"},{"key":"8150_CR12","unstructured":"Hohage T (2002) Lecture notes on inverse problems"},{"issue":"2","key":"8150_CR13","first-page":"24","volume":"1","author":"M Honda","year":"2003","unstructured":"Honda M (2003) Human speech production mechanisms. NTT Technical Review 1(2):24\u201329","journal-title":"NTT Technical Review"},{"issue":"1","key":"8150_CR14","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1109\/TASL.2007.911054","volume":"16","author":"Y Hu","year":"2007","unstructured":"Hu Y, Loizou PC (2007) Evaluation of objective quality measures for speech enhancement. IEEE Trans Audio Speech Lang Process 16(1):229\u2013238","journal-title":"IEEE Trans Audio Speech Lang Process"},{"key":"8150_CR15","doi-asserted-by":"crossref","unstructured":"Ikram, M., Vallina-Rodriguez, N., Seneviratne, S., Kaafar, M. A., & Paxson, V. (2016). An analysis of the privacy and security risks of android vpn permission-enabled apps. In: Proceedings of the 2016 Internet Measurement Conference (pp. 349\u2013364). ACM.","DOI":"10.1145\/2987443.2987471"},{"key":"8150_CR16","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1016\/j.procs.2015.04.251","volume":"49","author":"SK Jagtap","year":"2015","unstructured":"Jagtap SK, Mulye MS, Uplane MD (2015) Speech coding techniques. Procedia Computer Science 49:253\u2013263","journal-title":"Procedia Computer Science"},{"issue":"3","key":"8150_CR17","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1515\/jiip-2019-5001","volume":"27","author":"SI Kabanikhin","year":"2019","unstructured":"Kabanikhin SI, Shishlenin MA (2019) Theory and numerical methods for solving inverse and ill-posed problems. Journal of Inverse and Ill-posed Problems 27(3):453\u2013456","journal-title":"Journal of Inverse and Ill-posed Problems"},{"key":"8150_CR18","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.image.2017.07.006","volume":"58","author":"X Liao","year":"2017","unstructured":"Liao X, Qin Z, Ding L (2017) Data embedding in digital images using critical functions. Signal Process Image Commun 58:146\u2013156","journal-title":"Signal Process Image Commun"},{"key":"8150_CR19","doi-asserted-by":"crossref","unstructured":"Liao X, Yu Y, Li B, Li Z, Qin Z (2019) A New Payload Partition Strategy in Color Image Steganography. IEEE Transactions on Circuits and Systems for Video Technology","DOI":"10.1109\/TCSVT.2019.2896270"},{"key":"8150_CR20","unstructured":"O'Cinneide A, Dorran D, Gainza M (2008) Linear Prediction: The Problem, its Solution and Application to Speech"},{"key":"8150_CR21","unstructured":"Peleg, N. (2009). Linear Prediction Coding. Update, 1."},{"key":"8150_CR22","first-page":"224","volume":"159","author":"H Sakoe","year":"1990","unstructured":"Sakoe H, Chiba S, Waibel A, Lee KF (1990) Dynamic programming algorithm optimization for spoken word recognition. Readings in Speech Recognition 159:224","journal-title":"Readings in Speech Recognition"},{"issue":"3","key":"8150_CR23","doi-asserted-by":"publisher","first-page":"1042","DOI":"10.1109\/30.713232","volume":"44","author":"JH Shin","year":"1998","unstructured":"Shin JH, Jung JH, Paik JK (1998) Regularized iterative image interpolation and its application to spatially scalable coding. IEEE Trans Consum Electron 44(3):1042\u20131047","journal-title":"IEEE Trans Consum Electron"},{"key":"8150_CR24","unstructured":"Singh N (2018) Rudimentary of Speaker Recognition. In: Proceedings of (DIAL-2018), National Conference Digital India-Altering Lives, Smart Governance Impact and Implementation Challenges, 8th Dec (pp. 5\u20139)"},{"key":"8150_CR25","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/j.bandc.2015.11.003","volume":"112","author":"MW Spratling","year":"2017","unstructured":"Spratling MW (2017) A review of predictive coding algorithms. Brain Cogn 112:92\u201397","journal-title":"Brain Cogn"},{"key":"8150_CR26","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511816338","volume-title":"Text-to-speech synthesis","author":"P Taylor","year":"2009","unstructured":"Taylor P (2009) Text-to-speech synthesis. Cambridge University Press, Cambridge"},{"key":"8150_CR27","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1016\/j.eswa.2017.08.015","volume":"90","author":"SS Tirumala","year":"2017","unstructured":"Tirumala SS, Shahamiri SR, Garhwal AS, Wang R (2017) Speaker identification features extraction methods: A systematic review. Expert Syst Appl 90:250\u2013271","journal-title":"Expert Syst Appl"},{"key":"8150_CR28","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.jcp.2018.12.010","volume":"380","author":"P Tsilifis","year":"2019","unstructured":"Tsilifis P, Huan X, Safta C, Sargsyan K, Lacaze G, Oefelein JC, Ghanem RG (2019) Compressive sensing adaptation for polynomial chaos expansions. J Comput Phys 380:29\u201347","journal-title":"J Comput Phys"},{"issue":"1","key":"8150_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2200\/S00086ED1V01Y200712SPR003","volume":"2","author":"PP Vaidyanathan","year":"2007","unstructured":"Vaidyanathan PP (2007) The theory of linear prediction. Synthesis lectures on signal processing 2(1):1\u2013184","journal-title":"Synthesis lectures on signal processing"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-08150-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-019-08150-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-08150-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,20]],"date-time":"2021-05-20T07:56:49Z","timestamp":1621497409000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-019-08150-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,20]]},"references-count":29,"journal-issue":{"issue":"31-32","published-print":{"date-parts":[[2020,8]]}},"alternative-id":["8150"],"URL":"https:\/\/doi.org\/10.1007\/s11042-019-08150-7","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,5,20]]},"assertion":[{"value":"10 December 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 August 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 September 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 May 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}