{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T23:22:17Z","timestamp":1773012137591,"version":"3.50.1"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,6,25]],"date-time":"2023-06-25T00:00:00Z","timestamp":1687651200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,6,25]],"date-time":"2023-06-25T00:00:00Z","timestamp":1687651200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100004410","name":"T\u00fcrkiye Bilimsel ve Teknolojik Ara\u015ft\u0131rma Kurumu","doi-asserted-by":"publisher","award":["122E013"],"award-info":[{"award-number":["122E013"]}],"id":[{"id":"10.13039\/501100004410","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004410","name":"T\u00fcrkiye Bilimsel ve Teknolojik Ara\u015ft\u0131rma Kurumu","doi-asserted-by":"publisher","award":["122E013"],"award-info":[{"award-number":["122E013"]}],"id":[{"id":"10.13039\/501100004410","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004410","name":"T\u00fcrkiye Bilimsel ve Teknolojik Ara\u015ft\u0131rma Kurumu","doi-asserted-by":"publisher","award":["122E013"],"award-info":[{"award-number":["122E013"]}],"id":[{"id":"10.13039\/501100004410","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004410","name":"T\u00fcrkiye Bilimsel ve Teknolojik Ara\u015ft\u0131rma Kurumu","doi-asserted-by":"publisher","award":["122E013"],"award-info":[{"award-number":["122E013"]}],"id":[{"id":"10.13039\/501100004410","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004410","name":"T\u00fcrkiye Bilimsel ve Teknolojik Ara\u015ft\u0131rma Kurumu","doi-asserted-by":"publisher","award":["122E013"],"award-info":[{"award-number":["122E013"]}],"id":[{"id":"10.13039\/501100004410","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1007\/s11227-023-05504-9","type":"journal-article","created":{"date-parts":[[2023,6,25]],"date-time":"2023-06-25T16:01:30Z","timestamp":1687708890000},"page":"486-518","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Audio forgery detection and localization with super-resolution spectrogram and keypoint-based clustering approach"],"prefix":"10.1007","volume":"80","author":[{"given":"Beste","family":"Ustubioglu","sequence":"first","affiliation":[]},{"given":"Gul","family":"Tahaoglu","sequence":"additional","affiliation":[]},{"given":"Guzin","family":"Ulutas","sequence":"additional","affiliation":[]},{"given":"Arda","family":"Ustubioglu","sequence":"additional","affiliation":[]},{"given":"Muhammed","family":"Kilic","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,25]]},"reference":[{"issue":"7","key":"5504_CR1","first-page":"1281","volume":"34","author":"PF Alcantarilla","year":"2011","unstructured":"Alcantarilla PF, Solutions T (2011) Fast explicit diffusion for accelerated features in nonlinear scale spaces. IEEE Trans Patt Anal Mach Intell 34(7):1281\u20131298","journal-title":"IEEE Trans Patt Anal Mach Intell"},{"key":"5504_CR2","doi-asserted-by":"crossref","unstructured":"Agrawal M, Konolige K, Blas MR (2008) Censure: center surround extremas for realtime feature detection and matching. In: European Conference on Computer Vision. Springer, Berlin, pp 102\u2013115","DOI":"10.1007\/978-3-540-88693-8_8"},{"issue":"4","key":"5504_CR3","first-page":"9","volume":"6","author":"NT Anh","year":"2019","unstructured":"Anh NT, Hang HTT, Chen G (2019) One approach in the time domain in detecting copy-move of speech recordings with the similar magnitude. Int J Eng Appl Sci 6(4):9\u201311","journal-title":"Int J Eng Appl Sci"},{"issue":"2","key":"5504_CR4","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1145\/304181.304187","volume":"28","author":"M Ankerst","year":"1999","unstructured":"Ankerst M, Breunig MM, Kriegel HP, Sander J (1999) OPTICS: Ordering points to identify the clustering structure. ACM SIGMOD Rec 28(2):49\u201360","journal-title":"ACM SIGMOD Rec"},{"issue":"3","key":"5504_CR5","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1016\/j.cviu.2007.09.014","volume":"110","author":"H Bay","year":"2008","unstructured":"Bay H, Ess A, Tuytelaars T, Van Gool L (2008) Speeded-up robust features (SURF). Comput Vis Image Underst 110(3):346\u2013359","journal-title":"Comput Vis Image Underst"},{"key":"5504_CR6","doi-asserted-by":"crossref","unstructured":"Calonder M, Lepetit V, Strecha C, Fua P (2010) Brief: binary robust independent elementary features. In: European Conference on Computer Vision. Springer, Berlin, pp 778\u2013792","DOI":"10.1007\/978-3-642-15561-1_56"},{"key":"5504_CR7","unstructured":"Ester M, Kriegel HP, Sander J, Xu X (1996) A density-based algorithm for discovering clusters in large spatial databases with noise. In: KDD, vol 96, pp 226\u2013231"},{"issue":"6","key":"5504_CR8","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1145\/358669.358692","volume":"24","author":"MA Fischler","year":"1981","unstructured":"Fischler MA, Bolles RC (1981) Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography. Commun ACM 24(6):381\u2013395","journal-title":"Commun ACM"},{"key":"5504_CR9","doi-asserted-by":"crossref","unstructured":"Huang X, Liu Z, Lu W, Liu H, Xiang S (2020) Fast and effective copy-move detection of digital audio based on auto segment. In: Digital forensics and forensic investigations: breakthroughs in research and practice. IGI Global, pp 127\u2013142","DOI":"10.4018\/978-1-7998-3025-2.ch011"},{"key":"5504_CR10","doi-asserted-by":"publisher","first-page":"12843","DOI":"10.1109\/ACCESS.2017.2717842","volume":"5","author":"M Imran","year":"2017","unstructured":"Imran M, Ali Z, Bakhsh ST, Akram S (2017) Blind detection of copy-move forgery in digital audio forensics. IEEE Access 5:12843\u201312855","journal-title":"IEEE Access"},{"key":"5504_CR11","doi-asserted-by":"crossref","unstructured":"Kraetzer C, Oermann A, Dittmann J, Lang A (2007) Digital audio forensics: a first practical evaluation on microphone and environment classification. In: Proceedings of the 9th workshop on multimedia & security, pp 63\u201374","DOI":"10.1145\/1288869.1288879"},{"key":"5504_CR12","doi-asserted-by":"crossref","unstructured":"Kraetzer C, Qian K, Schott M, Dittmann J (2011) A context model for microphone forensics and its application in evaluations. In: Media watermarking, security, and forensics III, vol 7880. SPIE, pp 253\u2013267","DOI":"10.1117\/12.871929"},{"key":"5504_CR13","doi-asserted-by":"crossref","unstructured":"Liu Z, Lu W (2017) Fast copy-move detection of digital audio. In: 2017 IEEE Second International Conference on Data Science in Cyberspace (DSC). IEEE, pp 625\u2013629","DOI":"10.1109\/DSC.2017.11"},{"issue":"91\u2013110","key":"5504_CR14","first-page":"2","volume":"2","author":"G Lowe","year":"2004","unstructured":"Lowe G (2004) Sift-the scale invariant feature transform. Int J 2(91\u2013110):2","journal-title":"Int J"},{"key":"5504_CR15","doi-asserted-by":"crossref","unstructured":"Malik H, Farid H (2010) Audio forensics from acoustic reverberation. In: 2010 IEEE International Conference on Acoustics, Speech and Signal Processing. IEEE, pp 1710\u20131713","DOI":"10.1109\/ICASSP.2010.5495479"},{"issue":"2","key":"5504_CR16","doi-asserted-by":"publisher","first-page":"2244","DOI":"10.35940\/ijitee.B6678.129219","volume":"9","author":"K Mannepalli","year":"2019","unstructured":"Mannepalli K, Krishna P, Krishna K, Krishna K (2019) Copy and move detection in audio recordings using dynamic time warping algorithm. Int J Innov Technol Explor Eng 9(2):2244\u20132249","journal-title":"Int J Innov Technol Explor Eng"},{"key":"5504_CR17","doi-asserted-by":"crossref","unstructured":"Nam J, Mysore GJ, Ganseman J, Lee K, Abel JS (2010) A super-resolution spectrogram using coupled PLCA. In: Eleventh Annual Conference of the International Speech Communication Association","DOI":"10.21437\/Interspeech.2010-488"},{"key":"5504_CR18","volume-title":"Theory and applications of digital speech processing","author":"L Rabiner","year":"2010","unstructured":"Rabiner L, Schafer R (2010) Theory and applications of digital speech processing. Prentice Hall Press"},{"key":"5504_CR19","doi-asserted-by":"crossref","unstructured":"Ustubioglu B, K\u00fc\u00e7\u00fcku\u011furlu B, Ulutas G (2022) Robust copy-move detection in digital audio forensics based on pitch and modified discrete cosine transform. Multimed Tools Appl 1\u201337","DOI":"10.1007\/s11042-022-13035-3"},{"key":"5504_CR20","doi-asserted-by":"publisher","first-page":"118963","DOI":"10.1016\/j.eswa.2022.118963","volume":"213","author":"B Ustubioglu","year":"2023","unstructured":"Ustubioglu B, Tahaoglu G, Ulutas G (2023) Detection of audio copy-move-forgery with novel feature matching on Mel spectrogram. Expert Syst Appl 213:118963","journal-title":"Expert Syst Appl"},{"key":"5504_CR21","doi-asserted-by":"crossref","unstructured":"Ustubioglu A, Ustubioglu B, Ulutas G (2022) Mel spectrogram-based audio forgery detection using CNN. Signal Image Video Process 1\u20139","DOI":"10.21203\/rs.3.rs-1828771\/v1"},{"key":"5504_CR22","doi-asserted-by":"crossref","unstructured":"Wang F, Li C, Tian L (2017) An algorithm of detecting audio copy-move forgery based on DCT and SVD. In: 2017 IEEE 17th International Conference on Communication Technology (ICCT). IEEE, pp 1652\u20131657","DOI":"10.1109\/ICCT.2017.8359911"},{"issue":"4","key":"5504_CR23","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1007\/s12204-014-1515-5","volume":"19","author":"JN Xiao","year":"2014","unstructured":"Xiao JN, Jia YZ, Fu ED, Huang Z, Li Y, Shi SP (2014) Audio authenticity: duplicated audio segment detection in waveform audio file. J Shanghai Jiaotong Univ (Science) 19(4):392\u2013397","journal-title":"J Shanghai Jiaotong Univ (Science)"},{"key":"5504_CR24","first-page":"37","volume":"43","author":"Z Xie","year":"2018","unstructured":"Xie Z, Lu W, Liu X, Xue Y, Yeung Y (2018) Copy-move detection of digital audio based on multi-feature decision. J Inf Secur Appl 43:37\u201346","journal-title":"J Inf Secur Appl"},{"key":"5504_CR25","doi-asserted-by":"crossref","unstructured":"Yang R, Qu Z, Huang J (2008) Detecting digital audio forgeries by checking frame offsets. In: Proceedings of the 10th ACM workshop on multimedia and security, pp 21\u201326","DOI":"10.1145\/1411328.1411334"},{"key":"5504_CR26","doi-asserted-by":"crossref","unstructured":"Yan Q, Yang R, Huang J (2015) Copy-move detection of audio recording with pitch similarity. In: 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, pp 1782\u20131786","DOI":"10.1109\/ICASSP.2015.7178277"},{"issue":"9","key":"5504_CR27","doi-asserted-by":"publisher","first-page":"2331","DOI":"10.1109\/TIFS.2019.2895965","volume":"14","author":"Q Yan","year":"2019","unstructured":"Yan Q, Yang R, Huang J (2019) Robust copy\u2013move detection of speech recording using similarities of pitch and formant. IEEE Trans Inf Forensics Secur 14(9):2331\u20132341","journal-title":"IEEE Trans Inf Forensics Secur"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-023-05504-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-023-05504-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-023-05504-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,8]],"date-time":"2024-01-08T11:23:36Z","timestamp":1704713016000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-023-05504-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,25]]},"references-count":27,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["5504"],"URL":"https:\/\/doi.org\/10.1007\/s11227-023-05504-9","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,25]]},"assertion":[{"value":"14 June 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 June 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}