{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:55:11Z","timestamp":1762005311088,"version":"3.37.3"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"15","license":[{"start":{"date-parts":[[2021,1,7]],"date-time":"2021-01-07T00:00:00Z","timestamp":1609977600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,7]],"date-time":"2021-01-07T00:00:00Z","timestamp":1609977600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001843","name":"Science and Engineering Research Board","doi-asserted-by":"publisher","award":["ECR\/2015\/000583"],"award-info":[{"award-number":["ECR\/2015\/000583"]}],"id":[{"id":"10.13039\/501100001843","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1007\/s11042-020-10205-z","type":"journal-article","created":{"date-parts":[[2021,1,7]],"date-time":"2021-01-07T12:03:36Z","timestamp":1610021016000},"page":"23581-23603","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Speaker-independent source cell-phone identification for re-compressed and noisy audio recordings"],"prefix":"10.1007","volume":"80","author":[{"given":"Vinay","family":"Verma","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7571-9130","authenticated-orcid":false,"given":"Nitin","family":"Khanna","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,7]]},"reference":[{"key":"10205_CR1","doi-asserted-by":"crossref","unstructured":"Aggarwal R, Singh S, Roul AK, Khanna N (2014) Cellphone identification using noise estimates from recorded audio. In: International conference on communications and signal processing (ICCSP). IEEE, pp 1218\u20131222","DOI":"10.1109\/ICCSP.2014.6950045"},{"key":"10205_CR2","doi-asserted-by":"publisher","first-page":"158685","DOI":"10.1109\/ACCESS.2019.2950859","volume":"7","author":"G Baldini","year":"2019","unstructured":"Baldini G, Amerini I (2019) Smartphones identification through the built-in microphones with convolutional neural network. IEEE Access 7:158685\u2013158696","journal-title":"IEEE Access"},{"key":"10205_CR3","doi-asserted-by":"crossref","unstructured":"Baldini G, Amerini I, Gentile C (2019) Microphone identification using. Convolutional Neural Networks. IEEE Sensors Letters","DOI":"10.1109\/LSENS.2019.2923590"},{"key":"10205_CR4","unstructured":"Bellard F, Niedermayer M, et al. (2019) FFmpeg. Available from: http:\/\/ffmpeg.org"},{"key":"10205_CR5","doi-asserted-by":"crossref","unstructured":"Buchholz R, Kraetzer C, Dittmann J (2009) Microphone classification using Fourier coefficients. In: International workshop on information hiding. Springer, pp 235\u2013246","DOI":"10.1007\/978-3-642-04431-1_17"},{"issue":"3","key":"10205_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1961189.1961199","volume":"2","author":"CC Chang","year":"2011","unstructured":"Chang CC, Lin CJ (2011) Libsvm: a library for support vector machines. ACM Transactions on Intelligent Systems and Technology (TIST) 2(3):1\u201327","journal-title":"ACM Transactions on Intelligent Systems and Technology (TIST)"},{"key":"10205_CR7","doi-asserted-by":"crossref","unstructured":"Cuccovillo L, Aichroth P (2016) Open-set microphone classification via blind channel analysis. In: IEEE international conference on acoustics, speech and signal processing (ICASSP). IEEE, pp 2074\u20132078","DOI":"10.1109\/ICASSP.2016.7472042"},{"key":"10205_CR8","doi-asserted-by":"crossref","unstructured":"Cuccovillo L, Mann S, Tagliasacchi M, Aichroth P (2013) Audio tampering detection via microphone classification. In: IEEE 15th international workshop on multimedia signal processing (MMSP). IEEE, pp 177\u2013182","DOI":"10.1109\/MMSP.2013.6659284"},{"issue":"3","key":"10205_CR9","doi-asserted-by":"publisher","first-page":"754","DOI":"10.3906\/elk-1207-74","volume":"22","author":"\u00d6 Eskidere","year":"2014","unstructured":"Eskidere \u00d6 (2014) Source microphone identification from speech recordings based on a Gaussian mixture model. Turkish Journal of Electrical Engineering & Computer Sciences 22(3):754\u2013767","journal-title":"Turkish Journal of Electrical Engineering & Computer Sciences"},{"issue":"3","key":"10205_CR10","doi-asserted-by":"publisher","first-page":"1942","DOI":"10.3906\/elk-1312-193","volume":"24","author":"\u00d6 Eskidere","year":"2016","unstructured":"Eskidere \u00d6 (2016) Identifying acquisition devices from recorded speech signals using wavelet-based features. Turkish Journal of Electrical Engineering & Computer Sciences 24(3):1942\u20131954","journal-title":"Turkish Journal of Electrical Engineering & Computer Sciences"},{"key":"10205_CR11","doi-asserted-by":"crossref","unstructured":"Garcia-Romero D, Espy-Wilson CY (2010) Automatic acquisition device identification from speech recordings. In: International conference on acoustics speech and signal processing (ICASSP). IEEE, pp 1806\u20131809","DOI":"10.1109\/ICASSP.2010.5495407"},{"key":"10205_CR12","doi-asserted-by":"crossref","unstructured":"Hanil\u00e7i C, Ertas F (2013) Optimizing acoustic features for source cell-phone recognition using speech signals. In: Proceedings of the first ACM workshop on information hiding and multimedia security. ACM, pp 141\u2013148","DOI":"10.1145\/2482513.2482520"},{"issue":"2","key":"10205_CR13","doi-asserted-by":"publisher","first-page":"625","DOI":"10.1109\/TIFS.2011.2178403","volume":"7","author":"C Hanil\u00e7i","year":"2012","unstructured":"Hanil\u00e7i C, Ertas F, Ertas T, Eskidere \u00d6 (2012) Recognition of brand and models of cell-phones from recorded speech signals. IEEE Trans Inform Forensics Secur 7(2):625\u2013634","journal-title":"IEEE Trans Inform Forensics Secur"},{"key":"10205_CR14","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.dsp.2014.08.008","volume":"35","author":"C Hanil\u00e7i","year":"2014","unstructured":"Hanil\u00e7i C, Kinnunen T (2014) Source cell-phone recognition from recorded speech using non-speech segments. Digital Signal Processing 35:75\u201385","journal-title":"Digital Signal Processing"},{"key":"10205_CR15","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, Sun J (2015) Delving deep into rectifiers: surpassing human-level performance on imagenet classification. In: Proceedings of the IEEE international conference on computer vision, pp 1026\u20131034","DOI":"10.1109\/ICCV.2015.123"},{"key":"10205_CR16","unstructured":"Ikram S, Malik H (2012) Microphone identification using higher-order statistics. In: Audio engineering society conference: 46th international conference: audio forensics. Audio Engineering Society"},{"key":"10205_CR17","unstructured":"Ioffe S, Szegedy C (2015) Batch normalization: accelerating deep network training by reducing internal covariate shift. arXiv:1502.03167"},{"issue":"11","key":"10205_CR18","doi-asserted-by":"publisher","first-page":"2875","DOI":"10.1109\/TIFS.2019.2911175","volume":"14","author":"Y Jiang","year":"2019","unstructured":"Jiang Y, Leung FH (2019) Source microphone recognition aided by a kernel-based projection method. IEEE Trans Inform Forensics Secur 14(11):2875\u20132886","journal-title":"IEEE Trans Inform Forensics Secur"},{"key":"10205_CR19","unstructured":"Kingma DP, Ba J (2014) Adam: a method for stochastic optimization. arXiv:1412.6980"},{"key":"10205_CR20","doi-asserted-by":"crossref","unstructured":"Kotropoulos C, Samaras S (2014) Mobile phone identification using recorded speech signals. In: 19th international conference on digital signal processing (DSP). IEEE, pp 586\u2013591","DOI":"10.1109\/ICDSP.2014.6900732"},{"key":"10205_CR21","doi-asserted-by":"crossref","unstructured":"Kraetzer C, Oermann A, Dittmann J, Lang A (2007) Digital audio forensics: a first practical evaluation on microphone and environment classification. In: Proceedings of the 9th workshop on multimedia & security. ACM, pp 63\u201374","DOI":"10.1145\/1288869.1288879"},{"key":"10205_CR22","doi-asserted-by":"crossref","unstructured":"Kraetzer C, Schott M, Dittmann J (2009) Unweighted fusion in microphone forensics using a decision tree and linear logistic regression models. In: Proceedings of the 11th ACM workshop on Multimedia and security, pp 49\u201356","DOI":"10.1145\/1597817.1597827"},{"key":"10205_CR23","doi-asserted-by":"crossref","unstructured":"Kurniawan F, Rahim M, Mohd S, Khalil MS, Khan MK (2016) Statistical based audio forensic on identical microphones. International Journal of Electrical & Computer Engineering (2088-8708) 6(5)","DOI":"10.11591\/ijece.v6i5.12022"},{"issue":"4","key":"10205_CR24","doi-asserted-by":"publisher","first-page":"965","DOI":"10.1109\/TIFS.2017.2774505","volume":"13","author":"Y Li","year":"2018","unstructured":"Li Y, Zhang X, Li X, Zhang Y, Yang J, He Q (2018) Mobile phone clustering from speech recordings using deep representation and spectral clustering. IEEE Trans Inform Forensics Secur 13(4):965\u2013977","journal-title":"IEEE Trans Inform Forensics Secur"},{"issue":"9","key":"10205_CR25","doi-asserted-by":"publisher","first-page":"2179","DOI":"10.1109\/TIFS.2018.2812185","volume":"13","author":"D Luo","year":"2018","unstructured":"Luo D, Korus P, Huang J (2018) Band energy difference for source attribution in audio forensics. IEEE Trans Inform Forensics Secur 13(9):2179\u20132189","journal-title":"IEEE Trans Inform Forensics Secur"},{"issue":"2","key":"10205_CR26","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1109\/TIFS.2016.2622012","volume":"12","author":"D Luo","year":"2016","unstructured":"Luo D, Yang R, Li B, Huang J (2016) Detection of double compressed AMR audio using stacked autoencoder. IEEE Trans Inform Forensics Secur 12 (2):432\u2013444","journal-title":"IEEE Trans Inform Forensics Secur"},{"issue":"Nov","key":"10205_CR27","first-page":"2579","volume":"9","author":"L van der Maaten","year":"2008","unstructured":"van der Maaten L, Hinton G (2008) Visualizing data using t-SNE. J Mach Learn Res 9(Nov):2579\u20132605","journal-title":"J Mach Learn Res"},{"key":"10205_CR28","unstructured":"O\u2019Dea S (2020) Number of smartphone users worldwide from 2016 to 2021. https:\/\/www.statista.com\/statistics\/330695\/number-of-smartphone-users-worldwide\/"},{"key":"10205_CR29","doi-asserted-by":"crossref","unstructured":"Panagakis Y, Kotropoulos C (2012) Automatic telephone handset identification by sparse representation of random spectral features. In: Proceedings of the on multimedia and security, pp 91\u201396","DOI":"10.1145\/2361407.2361422"},{"key":"10205_CR30","doi-asserted-by":"crossref","unstructured":"Panagakis Y, Kotropoulos C (2012) Telephone handset identification by feature selection and sparse representations. In: IEEE international workshop on information forensics and security (WIFS). IEEE, pp 73\u201378","DOI":"10.1109\/WIFS.2012.6412628"},{"key":"10205_CR31","doi-asserted-by":"crossref","unstructured":"Pandey V, Verma VK, Khanna N (2014) Cell-phone identification from audio recordings using PSD of speech-free regions. In: IEEE students\u2019 conference on electrical, electronics and computer science (SCEECS). IEEE, pp 1\u20136","DOI":"10.1109\/SCEECS.2014.6804434"},{"key":"10205_CR32","doi-asserted-by":"crossref","unstructured":"Poisel R, Tjoa S (2011) Forensics investigations of multimedia data: a review of the state-of-the-art. In: Sixth international conference on IT security incident management and IT forensics. IEEE, pp 48\u201361","DOI":"10.1109\/IMF.2011.14"},{"issue":"8","key":"10205_CR33","doi-asserted-by":"publisher","first-page":"205","DOI":"10.3390\/info9080205","volume":"9","author":"T Qin","year":"2018","unstructured":"Qin T, Wang R, Yan D, Lin L (2018) Source cell-phone identification in the presence of additive noise from CQT domain. Information 9(8):205","journal-title":"Information"},{"key":"10205_CR34","unstructured":"Rabiner L, Schafer R (1978) Digital processing of speech signals. Prentice-Hall signal processing series. Prentice-Hall"},{"key":"10205_CR35","unstructured":"Shen Y, Jia J, Cai L (2012) Detecting double compressed AMR-format audio recordings. In: Proc. of the 10th phonetics conference of China (PCC), pp 1\u20135"},{"key":"10205_CR36","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1109\/ACCESS.2013.2260814","volume":"1","author":"MC Stamm","year":"2013","unstructured":"Stamm MC, Wu M, Liu KR (2013) Information forensics: an overview of the first decade. IEEE Access 1:167\u2013200","journal-title":"IEEE Access"},{"key":"10205_CR37","first-page":"22","volume":"67","author":"V Verma","year":"2018","unstructured":"Verma V, Agarwal N, Khanna N (2018) Dct-domain deep convolutional neural networks for multiple JPEG compression classification. Signal Processing: Image Communication 67:22\u201333","journal-title":"Signal Processing: Image Communication"},{"key":"10205_CR38","unstructured":"Verma V, Khanna N (2019) CNN-based system for speaker independent cell-phone identification from recorded audio. In: Proceedings of the IEEE conference on computer vision and pattern recognition workshops, pp 53\u201361"},{"key":"10205_CR39","doi-asserted-by":"crossref","unstructured":"Verma V, Khaturia P, Khanna N (2018) Cell-phone identification from recompressed audio recordings. In: Twenty fourth national conference on communications (NCC). IEEE, pp 1\u20136","DOI":"10.1109\/NCC.2018.8600131"},{"key":"10205_CR40","doi-asserted-by":"crossref","unstructured":"Vu HQ, Liu S, Yang X, Li Z, Ren Y (2012) Identifying microphone from noisy recordings by using representative instance one class-classification approach. Journal of Networks","DOI":"10.4304\/jnw.7.6.908-917"},{"key":"10205_CR41","doi-asserted-by":"crossref","unstructured":"Wang Q, Zhang R (2016) Double JPEG compression forensics based on a convolutional neural network. EURASIP Journal on Information Security 2016:23","DOI":"10.1186\/s13635-016-0047-y"},{"key":"10205_CR42","unstructured":"Wojcicki K (2020) HTK MFCC MATLAB. https:\/\/in.mathworks.com\/matlabcentral\/fileexchange\/32849-htk-mfcc-matlab"},{"issue":"1","key":"10205_CR43","doi-asserted-by":"publisher","first-page":"1009","DOI":"10.1007\/s11042-016-4277-2","volume":"77","author":"M Zakariah","year":"2018","unstructured":"Zakariah M, Khan MK, Malik H (2018) Digital multimedia audio forensics: past, present and future. Multimed Tools Applic 77(1):1009\u20131040","journal-title":"Multimed Tools Applic"},{"key":"10205_CR44","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/j.dsp.2016.10.017","volume":"62","author":"L Zou","year":"2017","unstructured":"Zou L, He Q, Wu J (2017) Source cell phone verification from speech recordings using sparse representation. Digital Signal Processing 62:125\u2013136","journal-title":"Digital Signal Processing"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10205-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-10205-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10205-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,3]],"date-time":"2021-07-03T09:27:21Z","timestamp":1625304441000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-10205-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,7]]},"references-count":44,"journal-issue":{"issue":"15","published-print":{"date-parts":[[2021,6]]}},"alternative-id":["10205"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-10205-z","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2021,1,7]]},"assertion":[{"value":"6 March 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 August 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 November 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 January 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of interests"}}]}}