{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T14:56:05Z","timestamp":1769612165796,"version":"3.49.0"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2021,3,12]],"date-time":"2021-03-12T00:00:00Z","timestamp":1615507200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,3,12]],"date-time":"2021-03-12T00:00:00Z","timestamp":1615507200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Autom. Comput."],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.1007\/s11633-021-1283-2","type":"journal-article","created":{"date-parts":[[2021,3,12]],"date-time":"2021-03-12T04:35:53Z","timestamp":1615523753000},"page":"947-962","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Research on Voiceprint Recognition of Camouflage Voice Based on Deep Belief Network"],"prefix":"10.1007","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5497-7007","authenticated-orcid":false,"given":"Nan","family":"Jiang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9520-5081","authenticated-orcid":false,"given":"Ting","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,12]]},"reference":[{"key":"1283_CR1","doi-asserted-by":"publisher","first-page":"9","DOI":"10.19392\/j.cnki.l671-7341.201721007","volume":"21","author":"Y H Zheng","year":"2017","unstructured":"Y. H. Zheng. Development and application strategy of voiceprint recognition technology. Technology Wind, no. 21, pp. 9\u201310, 2017. DOI: https:\/\/doi.org\/10.19392\/j.cnki.l671-7341.201721007. (in Chinese)","journal-title":"Technology Wind"},{"issue":"1","key":"1283_CR2","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1007\/s11633-019-1176-9","volume":"17","author":"Z Lian","year":"2020","unstructured":"Z. Lian, Y. Li, J. H. Tao, J. Huang, M. Y. Niu. Expression analysis based on face regions in real-world conditions. International Journal of Automation and Computing, vol. 17, no. 1, pp. 96\u2013107, 2020. DOI: https:\/\/doi.org\/10.1007\/s11633-019-1176-9.","journal-title":"International Journal of Automation and Computing"},{"issue":"1","key":"1283_CR3","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.specom.2009.08.009","volume":"52","author":"T Kinnunen","year":"2010","unstructured":"T. Kinnunen, H. Z. Li. An overview of text-independent speaker recognition: From features to supervectors. Speech Communication, vol. 52, no. 1, pp. 12\u201340, 2010. DOI: https:\/\/doi.org\/10.1016\/j.specom.2009.08.009.","journal-title":"Speech Communication"},{"issue":"4","key":"1283_CR4","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1007\/s11633-019-1175-x","volume":"16","author":"J H Tao","year":"2019","unstructured":"J. H. Tao, J. Huang, Y. Li, Z. Lian, M. Y. Niu. Semi-supervised ladder networks for speech emotion recognition. International Journal of Automation and Computing, vol. 16, no. 4, pp. 437\u2013448, 2019. DOI: https:\/\/doi.org\/10.1007\/s11633-019-1175-x.","journal-title":"International Journal of Automation and Computing"},{"key":"1283_CR5","series-title":"Ph. D. dissertation","volume-title":"Acoustic Study of Disguised Voice","author":"C L Zhang","year":"2005","unstructured":"C. L. Zhang. Acoustic Study of Disguised Voice, Ph. D. dissertation, Nankai University, China, 2005. (in Chinese)"},{"key":"1283_CR6","series-title":"Ph. D. dissertation","volume-title":"Finding Difficult Speakers in Automatic Speaker Recognition","author":"L L Stoll","year":"2011","unstructured":"L. L. Stoll. Finding Difficult Speakers in Automatic Speaker Recognition, Ph. D. dissertation, University of California, USA, 2011."},{"issue":"5","key":"1283_CR7","doi-asserted-by":"publisher","first-page":"1458","DOI":"10.1121\/1.385778","volume":"69","author":"A R Reich","year":"1981","unstructured":"A. R. Reich. Detecting the presence of vocal disguise in the male voice. The Journal of the Acoustical Society of America, vol.69, no.5, pp. 1458\u20131461, 1981. DOI: https:\/\/doi.org\/10.1121\/1.385778.","journal-title":"The Journal of the Acoustical Society of America"},{"issue":"4","key":"1283_CR8","doi-asserted-by":"publisher","first-page":"975","DOI":"10.1121\/1.381592","volume":"62","author":"H Hollien","year":"1977","unstructured":"H. Hollien, W. Majewski. Speaker identification by long-term spectra under normal and distorted speech conditions. The Journal of the Acoustical Society of America, vol. 62, no. 4, pp. 975\u2013980, 1977. DOI: https:\/\/doi.org\/10.1121\/1.381592.","journal-title":"The Journal of the Acoustical Society of America"},{"key":"1283_CR9","doi-asserted-by":"publisher","first-page":"124","DOI":"10.14060\/j.issn.2095-7939.2018.02.024","volume":"2","author":"X H Shen","year":"2018","unstructured":"X. H. Shen, T. Jin, C. Z. Zhang, R. C. Wan. Feasibility analysis on identification of disguised falsetto. Journal of Criminal Investigation Police University of China, no. 2, pp. 124\u2013128, 2018. DOI: https:\/\/doi.org\/10.14060\/j.issn.2095-7939.2018.02.024. (in Chinese)","journal-title":"Journal of Criminal Investigation Police University of China"},{"key":"1283_CR10","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/978-3-319-01931-4_46","volume-title":"Proceedings of the 15th International Conference on Speech and Computer","author":"Y Matveev","year":"2013","unstructured":"Y. Matveev. The problem of voice template aging in speaker recognition systems. In Proceedings of the 15th International Conference on Speech and Computer, Springer, Pilsen, Czech Republic, pp. 169\u2013175, 2013. DOI: https:\/\/doi.org\/10.1007\/978-3-319-01931-4_46."},{"issue":"3","key":"1283_CR11","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1109\/TIFS.2014.2301912","volume":"9","author":"H J Wu","year":"2014","unstructured":"H. J. Wu, Y. Wang, J. W. Huang. Identification of electronic disguised voices. IEEE Transactions on Information Forensics and Security, vol. 9, no. 3, pp. 489\u2013500, 2014. DOI: https:\/\/doi.org\/10.1109\/TIFS.2014.2301912.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"1283_CR12","doi-asserted-by":"publisher","first-page":"4440","DOI":"10.1109\/ICASSP.2015.7178810","volume-title":"Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing","author":"Z Z Wu","year":"2015","unstructured":"Z. Z. Wu, A. Khodabakhsh, C. Demiroglu, J. Yamagishi, D. Saito, T. Toda, S. King. SAS: A speaker verification spoofing database containing diverse attacks. In Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing, IEEE, South Brisbane, Australia, pp. 4440\u20134444, 2015. DOI: https:\/\/doi.org\/10.1109\/ICASSP.2015.7178810."},{"key":"1283_CR13","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.dsp.2015.06.010","volume":"45","author":"Y Wang","year":"2015","unstructured":"Y. Wang, H. J. Wu, J. W. Huang. Verification of hidden speaker behind transformation disguised voices. Digital Signal Processing, vol.45, pp. 84\u201395, 2015. DOI: https:\/\/doi.org\/10.1016\/j.dsp.2015.06.010.","journal-title":"Digital Signal Processing"},{"key":"1283_CR14","doi-asserted-by":"publisher","first-page":"10","DOI":"10.3969\/j.issn.2095-2457.2016.13.005","volume":"13","author":"W Zhang","year":"2016","unstructured":"W. Zhang. Auditory recognition of disguised speech. Science & Technology Vision, no. 13, pp. 10\u201312, 2016. DOI: https:\/\/doi.org\/10.3969\/j.issn.2095-2457.2016.13.005. (in Chinese)","journal-title":"Science & Technology Vision"},{"issue":"1","key":"1283_CR15","first-page":"103","volume":"27","author":"Y P Li","year":"2017","unstructured":"Y. P. Li, L. Lin, D. Y. Tao. Research on identification of electronic disguised voice based on GMM statistical parameters. Computer Technology and Development, vol. 27, no. 1, pp. 103\u2013106, 2017. (in Chinese)","journal-title":"Computer Technology and Development"},{"issue":"1","key":"1283_CR16","doi-asserted-by":"publisher","first-page":"24","DOI":"10.3969\/j.issn.0255-8297.2019.01.003","volume":"37","author":"P Zhou","year":"2019","unstructured":"P. Zhou, H. Shen, K. P. Zheng. Speaker recognition based on combination of MFCC and GFCC feature parameters. Journal of Applied Sciences, vol. 37, no. 1, pp. 24\u201332, 2019. DOI: https:\/\/doi.org\/10.3969\/j.issn.0255-8297.2019.01.003. (in Chinese)","journal-title":"Journal of Applied Sciences"},{"key":"1283_CR17","series-title":"Master dissertation","volume-title":"The Research of Voiceprint Recognition Method Based on MFCC and GFCC Mixed Cepstrum","author":"K P Zheng","year":"2017","unstructured":"K. P. Zheng. The Research of Voiceprint Recognition Method Based on MFCC and GFCC Mixed Cepstrum, Master dissertation, Guilin University of Electronic Technology, China, 2017. (in Chinese)"},{"issue":"11","key":"1283_CR18","doi-asserted-by":"publisher","first-page":"114","DOI":"10.3778\/j.issn.1002-8331.2011.11.033","volume":"47","author":"J Cao","year":"2011","unstructured":"J. Cao, P. Pan. Research on GMM based speaker recognition technology. Computer Engineering and Applications, vol. 47, no. 11, pp. 114\u2013117, 2011. DOI: https:\/\/doi.org\/10.3778\/j.issn.1002-8331.2011.11.033. (in Chinese)","journal-title":"Computer Engineering and Applications"},{"issue":"1","key":"1283_CR19","doi-asserted-by":"publisher","first-page":"97","DOI":"10.3969\/j.issn.1002-0802.2015.01.020","volume":"48","author":"X Yu","year":"2015","unstructured":"X. Yu, S. He, Y. X. Peng, W. Zhou. Pattern matching of voiceprint recognition based on GMM. Communications Technology, vol.48, no. 1, pp. 97\u2013101, 2015. DOI: https:\/\/doi.org\/10.3969\/j.issn.1002-0802.2015.01.020. (in Chinese)","journal-title":"Communications Technology"},{"key":"1283_CR20","series-title":"Master dissertation","volume-title":"Research on Speaker Recognition Based on Deep Learning","author":"L Lv","year":"2016","unstructured":"L. Lv. Research on Speaker Recognition Based on Deep Learning, Master dissertation, Southeast University, China, 2016. (in Chinese)"},{"key":"1283_CR21","series-title":"Master dissertation","volume-title":"Design and Implementation of Speaker Recognition System Based on Deep Learning","author":"H Pan","year":"2016","unstructured":"H. Pan. Design and Implementation of Speaker Recognition System Based on Deep Learning, Master dissertation, Heilongjiang University, China, 2016. (in Chinese)"},{"issue":"1","key":"1283_CR22","doi-asserted-by":"publisher","first-page":"1929","DOI":"10.5555\/2627435.2670313","volume":"15","author":"N Srivastava","year":"2014","unstructured":"N. Srivastava, G. Hinton, A. Krizhevsky, A. Sutskever, R. Salakhutdinov. Dropout: A simple way to prevent neural networks from overfitting. The Journal of Machine Learning Research, vol. 15, no. 1, pp. 1929\u20131958, 2014. DOI: https:\/\/doi.org\/10.5555\/2627435.2670313.","journal-title":"The Journal of Machine Learning Research"},{"issue":"3","key":"1283_CR23","doi-asserted-by":"publisher","first-page":"312","DOI":"10.16300\/j.cnki.1000-3630.2019.03.013","volume":"38","author":"Y B Xing","year":"2019","unstructured":"Y. B. Xing, X. W. Zhang, C. Y. Zheng, T. Y. Cao. Establishment of bone-conducted speech database and mutual information analysis between bone and airconducted speeches. Technical Acoustics, vol. 38, no. 3, pp. 312\u2013316, 2019. DOI: https:\/\/doi.org\/10.16300\/j.cnki.1000-3630.2019.03.013. (in Chinese)","journal-title":"Technical Acoustics"},{"key":"1283_CR24","doi-asserted-by":"publisher","unstructured":"Y. Bengio, P. Lamblin, D. Popovici, H. Larochelle. Greedy layer-wise training of deep networks. In Proceedings of the 19th International Conference on Neural Information Processing Systems, Vancouver, Canada, pp. 153\u2013160, 2006. DOI: https:\/\/doi.org\/10.5555\/2976456.2976476.","DOI":"10.5555\/2976456.2976476"}],"container-title":["International Journal of Automation and Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11633-021-1283-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11633-021-1283-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11633-021-1283-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,25]],"date-time":"2021-11-25T01:08:00Z","timestamp":1637802480000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11633-021-1283-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,12]]},"references-count":24,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["1283"],"URL":"https:\/\/doi.org\/10.1007\/s11633-021-1283-2","relation":{},"ISSN":["1476-8186","1751-8520"],"issn-type":[{"value":"1476-8186","type":"print"},{"value":"1751-8520","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,12]]},"assertion":[{"value":"15 August 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 January 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 March 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}