{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:27:32Z","timestamp":1740122852447,"version":"3.37.3"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"47-48","license":[{"start":{"date-parts":[[2019,12,14]],"date-time":"2019-12-14T00:00:00Z","timestamp":1576281600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,12,14]],"date-time":"2019-12-14T00:00:00Z","timestamp":1576281600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2020,12]]},"DOI":"10.1007\/s11042-019-08329-y","type":"journal-article","created":{"date-parts":[[2019,12,14]],"date-time":"2019-12-14T14:03:41Z","timestamp":1576332221000},"page":"35537-35552","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":33,"title":["Multimedia utilization of non-computerized disguised voice and acoustic similarity measurement"],"prefix":"10.1007","volume":"79","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0790-119X","authenticated-orcid":false,"given":"Mahesh K.","family":"Singh","sequence":"first","affiliation":[]},{"given":"A. K.","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Narendra","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,14]]},"reference":[{"key":"8329_CR1","doi-asserted-by":"crossref","unstructured":"Ahmad KS, Thosar AS, Nirmal JH, Pande VS (2015) A unique approach in text independent speaker recognition using MFCC feature sets and probabilistic neural network. In: 2015 Eighth International Conference on Advances in Pattern Recognition, 1\u20136.","DOI":"10.1109\/ICAPR.2015.7050669"},{"issue":"10\u201311","key":"8329_CR2","doi-asserted-by":"publisher","first-page":"2749","DOI":"10.1016\/j.patcog.2011.04.009","volume":"44","author":"PK Ajmera","year":"2011","unstructured":"Ajmera PK, Dattatray VJ, Ragunath SH (2011) Text-independent speaker identification using radon and discrete cosine transforms based features from speech spectrogram. J Pattern Recogn Elsevier 44(10\u201311):2749\u20132759","journal-title":"J Pattern Recogn Elsevier"},{"issue":"2","key":"8329_CR3","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1016\/j.specom.2012.08.007","volume":"55","author":"MJ Alam","year":"2013","unstructured":"Alam MJ, Tomi K, Patrick K, Pierre O, Douglas O (2013) Multitaper MFCC and PLP features for speaker verification using i-vectors. J Speech Commun Elsevier 55(2):237\u2013251","journal-title":"J Speech Commun Elsevier"},{"issue":"1","key":"8329_CR4","first-page":"18","volume":"4","author":"N Alma Deed","year":"2015","unstructured":"Alma Deed N, Amar A, Abbes A (2015) Speaker identification using multimodal neural networks and wavelet analysis. IET J Mag 4(1):18\u201328","journal-title":"IET J Mag"},{"key":"8329_CR5","unstructured":"Audacity: free audio editor and recorder (n.d.) [online] in http:\/\/audacity.sourceforge.net"},{"issue":"3","key":"8329_CR6","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1016\/S0167-6393(00)00078-9","volume":"35","author":"M Cooke","year":"2001","unstructured":"Cooke M, Ellis DP (2001) The auditory organization of speech and other sources in listeners and computational models. Speech Comm 35(3):141\u2013177","journal-title":"Speech Comm"},{"issue":"3","key":"8329_CR7","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1109\/PROC.1981.11969","volume":"69","author":"RE Crochiere","year":"1981","unstructured":"Crochiere RE, Rabiner LR (1981) Interpolation and decimation of digital signals- A tutorial review. Proc IEEE 69(3):300\u2013331","journal-title":"Proc IEEE"},{"key":"8329_CR8","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1016\/j.asoc.2014.11.016","volume":"27","author":"K Daqrouq","year":"2015","unstructured":"Daqrouq K, Tarek AT (2015) Speaker identification using vowels features through a combined method of formants, wavelets, and neural network classifiers. J Appl Soft Comput Elsevier 27:231\u2013239","journal-title":"J Appl Soft Comput Elsevier"},{"issue":"4","key":"8329_CR9","doi-asserted-by":"publisher","first-page":"788","DOI":"10.1109\/TASL.2010.2064307","volume":"19","author":"N Dehak","year":"2011","unstructured":"Dehak N, Kenny P, Dehak R, Dumouchel P, Ouellet P (2011) Front end factor analysis for speaker verification. IEEE Trans Audio Speech Lang Process 19(4):788\u2013798","journal-title":"IEEE Trans Audio Speech Lang Process"},{"issue":"6","key":"8329_CR10","doi-asserted-by":"publisher","first-page":"1097","DOI":"10.1109\/TASL.2008.2001109","volume":"16","author":"M Grimaldi","year":"2008","unstructured":"Grimaldi M, Cummins F (2008) Speaker identification using instantaneous frequencies. IEEE Trans Audio Speech Lang Process 16(6):1097\u20131111","journal-title":"IEEE Trans Audio Speech Lang Process"},{"issue":"3","key":"8329_CR11","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1109\/LSP.2012.2184284","volume":"19","author":"C Hanilci","year":"2012","unstructured":"Hanilci C, Tomi K, Figen E, Rahim S, Jouni P, Paavo A (2012) Regularized all-pole models for speaker verification under noisy environments. IEEE Signal Process Lett 19(3):163\u2013166","journal-title":"IEEE Signal Process Lett"},{"key":"8329_CR12","unstructured":"Haojun W, Yong W. Jiwu H (2013) Blind detection of electronic disguised voice. In: 2013 IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 3013\u20133017"},{"key":"8329_CR13","unstructured":"Jingxu C, Hongchen Y, Zhanjiang S (2004) The speaker automatic identified system and its forensic application. Proceedings of International Symposium Computing Information, 1:96\u2013100"},{"key":"8329_CR14","doi-asserted-by":"crossref","unstructured":"Kajarekar SS, Bratt H, Shriberg E, de Leon R (2006) A study of intentional voice modifications for evading automatic speaker recognition. Proceedings of IEEE International Workshop Speaker Language Recognition, June 2006, pp 1\u20136","DOI":"10.1109\/ODYSSEY.2006.248123"},{"issue":"5","key":"8329_CR15","doi-asserted-by":"publisher","first-page":"694","DOI":"10.1016\/j.apergo.2012.04.016","volume":"44","author":"C Kirchh\u00fcbel","year":"2013","unstructured":"Kirchh\u00fcbel C, Howard DM (2013) Detecting suspicious behaviour using speech, acoustic correlates of deceptive speech \u2013 an exploratory investigation. Appl Ergon 44(5):694\u2013702","journal-title":"Appl Ergon"},{"key":"8329_CR16","first-page":"2086","volume":"79","author":"BE Koenig","year":"2012","unstructured":"Koenig BE (2012) Spectrographic voice identification: a forensic survey. J Acoust Soc Am 79:2086\u20132090","journal-title":"J Acoust Soc Am"},{"issue":"1","key":"8329_CR17","first-page":"146","volume":"3","author":"HJ Kunzel","year":"2016","unstructured":"Kunzel HJ (2016) Identifying Dr. Schneider\u2019s voice: an adventure in forensic speaker identification. Forensic Linguist 3(1):146\u2013154","journal-title":"Forensic Linguist"},{"key":"8329_CR18","unstructured":"K\u00fcnzel HJ, Gonzalez-Rodriguez J, Ortega-Garc\u00eda J (2004) Effect of voice disguise on the performance of a forensic automatic speaker recognition system. In: Proceedings of IEEE International Workshop Speaker Language Recognition, June 2004, pp 1\u20134"},{"key":"8329_CR19","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/j.specom.2015.10.002","volume":"75","author":"A Leemann","year":"2015","unstructured":"Leemann A, Kolly MJ (2015) Speaker-invariant supra segmental temporal features in normal and disguised speech. Speech Comm 75:97\u2013110","journal-title":"Speech Comm"},{"issue":"4","key":"8329_CR20","doi-asserted-by":"publisher","first-page":"1085","DOI":"10.1109\/TASL.2011.2172422","volume":"20","author":"S Nakagawa","year":"2012","unstructured":"Nakagawa S, Wang L, Ohtsuka S (2012) Speaker identification and verification by combining MFCC and phase information. IEEE Trans Audio Speech Lang Process 20(4):1085\u20131095","journal-title":"IEEE Trans Audio Speech Lang Process"},{"key":"8329_CR21","doi-asserted-by":"crossref","unstructured":"Padilla M T, Quatieri T F, Reynolds D A (2006) Missing feature theory with soft spectral subtraction for speaker verification. In Ninth International Conference on Spoken Language Processing, 913\u2013916","DOI":"10.21437\/Interspeech.2006-169"},{"key":"8329_CR22","doi-asserted-by":"crossref","unstructured":"Ranjan R, Dubey RK (2016) Isolated word recognition using HMM for Maithili dialect. In: IEEE, International conference on signal processing and communication, pp 322\u2013328","DOI":"10.1109\/ICSPCom.2016.7980600"},{"issue":"1","key":"8329_CR23","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1006\/dspr.1999.0361","volume":"10","author":"DA Reynolds","year":"2000","unstructured":"Reynolds DA, Quatieri TF, Dunn RB (2000) Speaker verification using adapted Gaussian mixture models. Digital Signal Process 10(1):19\u201341","journal-title":"Digital Signal Process"},{"key":"8329_CR24","unstructured":"Rodman R (1998) Speaker recognition of disguised voices: a program for research. In: Proceedings of consortium speech Technol. Conjunct. Conf. Speaker Recognition. Man Mach, Direct. Forensic, pp 9\u201322, Appl., 1998"},{"key":"8329_CR25","doi-asserted-by":"publisher","first-page":"27","DOI":"10.5815\/ijigsp.2014.06.04","volume":"6","author":"TR Sahoo","year":"2014","unstructured":"Sahoo TR, Sabyasachi P (2014) Silence removal and endpoint detection of speech signal for text-independent speaker identification. Int J Image Graph Signal Process 6:27\u201335. https:\/\/doi.org\/10.5815\/ijigsp.2014.06.04","journal-title":"Int J Image Graph Signal Process"},{"issue":"10","key":"8329_CR26","doi-asserted-by":"publisher","first-page":"29","DOI":"10.5815\/ijigsp.2016.10.04","volume":"8","author":"R Saloni","year":"2016","unstructured":"Saloni R, Sharma K, Gupta AK (2016) Estimation and statistical analysis of physical task stress on human speech signal. Int J Image Graph Signal Process (IJIGSP) 8(10):29\u201334. https:\/\/doi.org\/10.5815\/ijigsp.2016.10.04","journal-title":"Int J Image Graph Signal Process (IJIGSP)"},{"issue":"8","key":"8329_CR27","doi-asserted-by":"publisher","first-page":"3222","DOI":"10.1007\/s00034-016-0434-0","volume":"36","author":"HR Seresht","year":"2017","unstructured":"Seresht HR, Ahadi SM, Seyedin S (2017) Spectro-temporal power spectrum features for noise robust ASR. Circuits Systems Signal Process 36(8):3222\u20133242","journal-title":"Circuits Systems Signal Process"},{"key":"8329_CR28","first-page":"319","volume":"30","author":"R Shantha","year":"2012","unstructured":"Shantha R, Kumari S, Selva NS, Anand G (2012) Fused mel-feature sets based text-independent speaker identification using GMM. Int Conf Commun Technol Syst Des J Procedia Eng Elsevier 30:319\u2013326","journal-title":"Int Conf Commun Technol Syst Des J Procedia Eng Elsevier"},{"issue":"14","key":"8329_CR29","first-page":"241","volume":"118","author":"MK Singh","year":"2018","unstructured":"Singh MK, Singh AK, Singh N (2018) Disguised voice with fast and slow speech and its acoustic analysis. Int J Pure Appl Math 118(14):241\u2013246","journal-title":"Int J Pure Appl Math"},{"issue":"2","key":"8329_CR30","doi-asserted-by":"publisher","first-page":"98","DOI":"10.14419\/ijet.v7i2.16.11502","volume":"7","author":"MK Singh","year":"2018","unstructured":"Singh MK, Singh AK, Singh N (2018) Acoustic comparison of electronics disguised voice using different semitones. Int J Eng Technol (UAE) 7(2):98. https:\/\/doi.org\/10.14419\/ijet.v7i2.16.11502","journal-title":"Int J Eng Technol (UAE)"},{"key":"8329_CR31","doi-asserted-by":"publisher","unstructured":"Singh MK, Singh AK, Singh N Multimedia analysis for disguised voice and classification efficiency. Multimedia Tools Appl Springer J. https:\/\/doi.org\/10.1007\/s11042-018-6718-6","DOI":"10.1007\/s11042-018-6718-6"},{"key":"8329_CR32","doi-asserted-by":"crossref","unstructured":"Soong FK, Rosenberg AE, Juang B-H, Rabiner LR. Report: a vector quantization approach to speaker recognition. AT Tech J 1987;66(2):14\u201326.","DOI":"10.1002\/j.1538-7305.1987.tb00198.x"},{"issue":"7","key":"8329_CR33","first-page":"213","volume":"93","author":"SS Waller","year":"2016","unstructured":"Waller SS, Eriksson M (2016) Vocal age disguise: the role of fundamental frequency and speech rate and its perceived effects. Front Psychol 93(7):213\u2013220","journal-title":"Front Psychol"},{"key":"8329_CR34","unstructured":"Wu H, Wang Y, Huang J (2013) Blind detection of electronically disguised voice. In: IEEE international conference on acoustics, speech and signal processing (ICASSP), pp 3016\u20133017 May 2013"},{"issue":"3","key":"8329_CR35","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1109\/TIFS.2014.2301912","volume":"9","author":"H Wu","year":"2014","unstructured":"Wu H, Wang Y, Huang J (March 2014) Identification of electronic disguised voices. IEEE Trans Inf Forensic Secur 9(3):489\u2013500","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"2\u20133","key":"8329_CR36","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.forsciint.2007.05.019","volume":"175","author":"C Zhang","year":"2008","unstructured":"Zhang C, Tan T (2008) Voice disguise and automatic speaker recognition. Elsevier Sci Direct. Forensic Sci Int 175(2\u20133):118\u2013122","journal-title":"Elsevier Sci Direct. Forensic Sci Int"},{"issue":"5","key":"8329_CR37","doi-asserted-by":"publisher","first-page":"1645","DOI":"10.1109\/TASL.2007.899236","volume":"15","author":"X Zhu","year":"2007","unstructured":"Zhu X, Beauregard G, Wyse L (2007) Real-time signal estimation from modified short-time Fourier transform magnitude spectra. IEEE Trans Audio Speech Lang Process 15(5):1645\u20131653","journal-title":"IEEE Trans Audio Speech Lang Process"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-08329-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-019-08329-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-08329-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,8]],"date-time":"2022-10-08T13:13:47Z","timestamp":1665234827000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-019-08329-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,14]]},"references-count":37,"journal-issue":{"issue":"47-48","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["8329"],"URL":"https:\/\/doi.org\/10.1007\/s11042-019-08329-y","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2019,12,14]]},"assertion":[{"value":"11 January 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 July 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 October 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 December 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}