{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T11:28:43Z","timestamp":1762342123202,"version":"3.37.3"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2023,8,13]],"date-time":"2023-08-13T00:00:00Z","timestamp":1691884800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,8,13]],"date-time":"2023-08-13T00:00:00Z","timestamp":1691884800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100012707","name":"Foundation for Assistance to Small Innovative Enterprises in Science and Technology","doi-asserted-by":"publisher","award":["36\u0413\u0423\u041a\u043e\u0434\u0418\u0418\u042112-D7\/81484"],"award-info":[{"award-number":["36\u0413\u0423\u041a\u043e\u0434\u0418\u0418\u042112-D7\/81484"]}],"id":[{"id":"10.13039\/501100012707","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"DOI":"10.1007\/s11416-023-00491-0","type":"journal-article","created":{"date-parts":[[2023,8,13]],"date-time":"2023-08-13T17:01:10Z","timestamp":1691946070000},"page":"375-382","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Comparison of the effectiveness of cepstral coefficients for Russian speech synthesis detection"],"prefix":"10.1007","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7705-4320","authenticated-orcid":false,"given":"Dmitry","family":"Efanov","sequence":"first","affiliation":[]},{"given":"Pavel","family":"Aleksandrov","sequence":"additional","affiliation":[]},{"given":"Ilia","family":"Mironov","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,13]]},"reference":[{"key":"491_CR1","unstructured":"PyAra: Russian bona fide and spoofed speech. https:\/\/www.kaggle.com\/datasets\/alep079\/pyara"},{"issue":"5","key":"491_CR2","doi-asserted-by":"publisher","first-page":"155","DOI":"10.3390\/a15050155","volume":"15","author":"Z Almutairi","year":"2022","unstructured":"Almutairi, Z., Elgibreen, H.: A review of modern audio Deepfake detection methods: challenges and future directions. Algorithms 15(5), 155 (2022). https:\/\/doi.org\/10.3390\/a15050155","journal-title":"Algorithms"},{"key":"491_CR3","doi-asserted-by":"publisher","first-page":"032011","DOI":"10.1088\/1742-6596\/1378\/3\/032011","volume":"1378","author":"AA Akinrinmade","year":"2019","unstructured":"Akinrinmade, A.A., et al.: Creation of a Nigerian voice corpus for indigenous speaker recognition. J. Phys. Conf. Ser. 1378, 032011 (2019). https:\/\/doi.org\/10.1088\/1742-6596\/1378\/3\/032011","journal-title":"J. Phys. Conf. Ser."},{"key":"491_CR4","doi-asserted-by":"publisher","first-page":"101049","DOI":"10.1016\/j.imu.2022.101049","volume":"32","author":"M Aly","year":"2022","unstructured":"Aly, M., Alotaibi, N.S.: A novel deep learning model to detect COVID-19 based on wavelet features extracted from Mel-scale spectrogram of patients\u2019 cough and breathing sounds. Inform. Med. Unlocked 32, 101049 (2022). https:\/\/doi.org\/10.1016\/j.imu.2022.101049. (ISSN 2352-9148)","journal-title":"Inform. Med. Unlocked"},{"issue":"6","key":"491_CR5","doi-asserted-by":"publisher","first-page":"1143","DOI":"10.17586\/2226-1494-2022-22-6-1143-1149","volume":"22","author":"AYu Andrusenko","year":"2022","unstructured":"Andrusenko, AYu., Romanenko, A.N.: Improving out of vocabulary words recognition accuracy for an end-to-end Russian speech recognition system. Sci. Tech. J. Inf. Technol. Mech. Opt. 22(6), 1143\u20131149 (2022). https:\/\/doi.org\/10.17586\/2226-1494-2022-22-6-1143-1149","journal-title":"Sci. Tech. J. Inf. Technol. Mech. Opt."},{"key":"491_CR6","doi-asserted-by":"publisher","first-page":"162857","DOI":"10.1109\/ACCESS.2021.3133134","volume":"9","author":"T Arif","year":"2021","unstructured":"Arif, T., Javed, A., Alhameed, M., Jeribi, F., Tahir, A.: Voice spoofing countermeasure for logical access attacks detection. IEEE Access 9, 162857\u2013162868 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3133134","journal-title":"IEEE Access"},{"key":"491_CR7","doi-asserted-by":"publisher","unstructured":"Chettri, B., Sturm, B.L.: A deeper look at Gaussian mixture model based anti-spoofing systems. In: 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Calgary, AB, Canada, 2018, pp. 5159\u20135163. https:\/\/doi.org\/10.1109\/ICASSP.2018.8461467","DOI":"10.1109\/ICASSP.2018.8461467"},{"key":"491_CR8","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1186\/s12864-019-6413-7","volume":"21","author":"D Chicco","year":"2020","unstructured":"Chicco, D., Jurman, G.: The advantages of the Matthews correlation coefficient (MCC) over F1 score and accuracy in binary classification evaluation. BMC Genom. 21, 6 (2020). https:\/\/doi.org\/10.1186\/s12864-019-6413-7","journal-title":"BMC Genom."},{"key":"491_CR9","doi-asserted-by":"publisher","unstructured":"Cuccovillo, L., et al.: Open challenges in synthetic speech detection. In: 2022 IEEE International Workshop on Information Forensics and Security (WIFS), Shanghai, China, 2022, pp. 1\u20136. https:\/\/doi.org\/10.1109\/WIFS55849.2022.9975433","DOI":"10.1109\/WIFS55849.2022.9975433"},{"issue":"9","key":"491_CR10","doi-asserted-by":"publisher","first-page":"7300","DOI":"10.1016\/j.jksuci.2022.02.024","volume":"34","author":"H Dawood","year":"2022","unstructured":"Dawood, H., Saleem, S., Hassan, F., Javed, A.: A robust voice spoofing detection system using novel CLS-LBP features and LSTM. J. King Saud Univ. Comput. Inf. Sci. 34(9), 7300\u20137312 (2022). https:\/\/doi.org\/10.1016\/j.jksuci.2022.02.024. (ISSN 1319-1578)","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"key":"491_CR11","doi-asserted-by":"publisher","unstructured":"Delgado, H., Evans, N., Kinnunen, T., Lee, K.A., Liu, X., Nautsch, A., Patino, J., Sahidullah, M., Todisco, M., Wang, X., Yamagishi, J.: ASVspoof 2021 Challenge\u2014Speech Deepfake Database (1.0). Zenodo (2021). https:\/\/doi.org\/10.5281\/zenodo.4835108","DOI":"10.5281\/zenodo.4835108"},{"key":"491_CR12","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1016\/j.procs.2022.11.086","volume":"213","author":"D Efanov","year":"2022","unstructured":"Efanov, D., Aleksandrov, P., Karapetyants, N.: The BiLSTM-based synthesized speech recognition. Procedia Comput. Sci. 213, 415\u2013421 (2022). https:\/\/doi.org\/10.1016\/j.procs.2022.11.086. (ISSN 1877-0509)","journal-title":"Procedia Comput. Sci."},{"key":"491_CR13","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.specom.2016.10.002","volume":"85","author":"C Hanil\u00e7i","year":"2016","unstructured":"Hanil\u00e7i, C., Kinnunen, T., Sahidullah, M., Sizov, A.: Spoofing detection goes noisy: an analysis of synthetic speech detection in the presence of additive noise. Speech Commun. 85, 83\u201397 (2016). https:\/\/doi.org\/10.1016\/j.specom.2016.10.002. (ISSN 0167-6393)","journal-title":"Speech Commun."},{"key":"491_CR14","doi-asserted-by":"publisher","first-page":"2195","DOI":"10.1109\/TASLP.2020.3009494","volume":"28","author":"T Kinnunen","year":"2020","unstructured":"Kinnunen, T., et al.: Tandem assessment of spoofing countermeasures and automatic speaker verification: fundamentals. IEEE\/ACM Trans. Audio Speech Lang. Process. 28, 2195\u20132210 (2020). https:\/\/doi.org\/10.1109\/TASLP.2020.3009494","journal-title":"IEEE\/ACM Trans. Audio Speech Lang. Process."},{"issue":"4","key":"491_CR15","doi-asserted-by":"publisher","first-page":"545","DOI":"10.17586\/2226-1494-2021-21-4-545-552","volume":"21","author":"RA Murtazin","year":"2021","unstructured":"Murtazin, R.A., Kuznetsov, A.Y.: The speech synthesis detection algorithm based on cepstral coefficients and convolutional neural network. Sci. Tech. J. Inf. Technol. Mech. Opt. 21(4), 545\u2013552 (2021). https:\/\/doi.org\/10.17586\/2226-1494-2021-21-4-545-552","journal-title":"Sci. Tech. J. Inf. Technol. Mech. Opt."},{"issue":"4","key":"491_CR16","doi-asserted-by":"publisher","first-page":"2020","DOI":"10.3390\/su14042420","volume":"14","author":"A Osipov","year":"2022","unstructured":"Osipov, A., Pleshakova, E., Gataullin, S., Korchagin, S., Ivanov, M., Finogeev, A., Yadav, V.: Deep learning method for recognition and classification of images from video recorders in difficult weather conditions. Sustainability 14(4), 2020 (2022). https:\/\/doi.org\/10.3390\/su14042420","journal-title":"Sustainability"},{"key":"491_CR17","doi-asserted-by":"publisher","unstructured":"Phapatanaburi, K., Buayai, P., Kupimai, M., Yodrot, T.: Linear prediction residual-based constant-Q cepstral coefficients for replay attack detection. In: 2020 8th International Electrical Engineering Congress (iEECON), Chiang Mai, Thailand, 2020, pp. 1\u20134. https:\/\/doi.org\/10.1109\/iEECON48109.2020.229465","DOI":"10.1109\/iEECON48109.2020.229465"},{"issue":"32","key":"491_CR18","first-page":"83","volume":"6","author":"ES Pleshakova","year":"2022","unstructured":"Pleshakova, E.S., Gataullin, S.T., Osipov, A.V., Filimonov, A.V.: Countering telephone fraud using neural network technologies. Cybersecur. Issues 6(32), 83\u201392 (2022)","journal-title":"Cybersecur. Issues"},{"issue":"1","key":"491_CR19","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.csl.2015.04.002","volume":"34","author":"I Rebai","year":"2015","unstructured":"Rebai, I., BenAyed, Y.: Text-to-speech synthesis system with Arabic diacritic recognition system. Comput. Speech Lang. 34(1), 43\u201360 (2015). https:\/\/doi.org\/10.1016\/j.csl.2015.04.002. (ISSN 0885-2308)","journal-title":"Comput. Speech Lang."},{"key":"491_CR20","doi-asserted-by":"publisher","unstructured":"Shen, J., et al.: Natural TTS synthesis by conditioning wavenet on MEL spectrogram predictions. In: 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Calgary, AB, Canada, 2018, pp. 4779\u20134783. https:\/\/doi.org\/10.1109\/ICASSP.2018.8461368","DOI":"10.1109\/ICASSP.2018.8461368"},{"key":"491_CR21","doi-asserted-by":"publisher","unstructured":"Sul\u00edr, M., Juh\u00e1r, J.: Speaker adaptation for Slovak statistical parametric speech synthesis based on hidden Markov models, 2015. In: 25th International Conference Radioelektronika (RADIOELEKTRONIKA), Pardubice, Czech Republic, 2015, pp. 137\u2013140. https:\/\/doi.org\/10.1109\/RADIOELEK.2015.7128977","DOI":"10.1109\/RADIOELEK.2015.7128977"},{"key":"491_CR22","doi-asserted-by":"publisher","first-page":"516","DOI":"10.1016\/j.csl.2017.01.001","volume":"45","author":"M Todisco","year":"2017","unstructured":"Todisco, M., Delgado, H., Evans, N.: Constant Q cepstral coefficients: a spoofing countermeasure for automatic speaker verification. Comput. Speech Lang. 45, 516\u2013535 (2017). https:\/\/doi.org\/10.1016\/j.csl.2017.01.001. (ISSN 0885-2308)","journal-title":"Comput. Speech Lang."},{"key":"491_CR23","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1016\/j.specom.2014.10.005","volume":"66","author":"Z Wu","year":"2015","unstructured":"Wu, Z., Evans, N., Kinnunen, T., Yamagishi, J., Alegre, F., Li, H.: Spoofing and countermeasures for speaker verification: a survey. Speech Commun. 66, 130\u2013153 (2015). https:\/\/doi.org\/10.1016\/j.specom.2014.10.005. (ISSN 0167-6393)","journal-title":"Speech Commun."},{"key":"491_CR24","doi-asserted-by":"publisher","unstructured":"Yamagishi, J., Wang, X., Todisco, M., Sahidullah, M., Patino, J., Nautsch, A., Liu, X., Lee, K.A., Kinnunen, T., Evans, N., Delgado, H.: ASVspoof 2021: accelerating progress in spoofed and deepfake speech detection. In: Proceedings of 2021 Edition of the Automatic Speaker Verification and Spoofing Countermeasures Challenge, pp. 47\u201354 (2021). https:\/\/doi.org\/10.21437\/ASVSPOOF.2021-8","DOI":"10.21437\/ASVSPOOF.2021-8"},{"key":"491_CR25","doi-asserted-by":"publisher","unstructured":"Yang, J., Das, R.K., Li, H.: Extended constant-Q cepstral coefficients for detection of spoofing attacks. In: 2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), Honolulu, HI, USA, pp. 1024\u20131029 (2018). https:\/\/doi.org\/10.23919\/APSIPA.2018.8659537","DOI":"10.23919\/APSIPA.2018.8659537"},{"key":"491_CR26","doi-asserted-by":"publisher","unstructured":"Zhou, X., Garcia-Romero, D., Duraiswami, R., Espy-Wilson, C., Shamma, S.: Linear versus MEL frequency cepstral coefficients for speaker recognition. In: 2011 IEEE Workshop on Automatic Speech Recognition & Understanding, Waikoloa, HI, USA, pp. 559\u2013564 (2011). https:\/\/doi.org\/10.1109\/ASRU.2011.6163888","DOI":"10.1109\/ASRU.2011.6163888"}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-023-00491-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11416-023-00491-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-023-00491-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,9]],"date-time":"2025-01-09T10:09:15Z","timestamp":1736417355000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11416-023-00491-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,13]]},"references-count":26,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2024,9]]}},"alternative-id":["491"],"URL":"https:\/\/doi.org\/10.1007\/s11416-023-00491-0","relation":{},"ISSN":["2263-8733"],"issn-type":[{"type":"electronic","value":"2263-8733"}],"subject":[],"published":{"date-parts":[[2023,8,13]]},"assertion":[{"value":"2 February 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 July 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 August 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}