{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T14:21:53Z","timestamp":1762352513083,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,3]]},"DOI":"10.1109\/icassp.2016.7472043","type":"proceedings-article","created":{"date-parts":[[2016,6,23]],"date-time":"2016-06-23T21:58:30Z","timestamp":1466719110000},"page":"2079-2083","source":"Crossref","is-referenced-by-count":14,"title":["Source cell phone matching from speech recordings by sparse representation and KISS metric"],"prefix":"10.1109","author":[{"given":"Ling","family":"Zou","sequence":"first","affiliation":[]},{"given":"Qianhua","family":"He","sequence":"additional","affiliation":[]},{"given":"Jichen","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Yanxiong","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Pattern Recognition and Machine Learning","year":"2006","author":"bishop","key":"ref30"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2010.5495407"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1121\/1.4783539"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.1997.596243"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2361407.2361422"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2012.6412628"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/IWBF.2013.6547326"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2013.0056"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSP.2014.6900732"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2178403"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ChinaSIP.2014.6889318"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"4311","DOI":"10.1109\/TSP.2006.881199","article-title":"K-SVD: An algorithm for designing overcomplete dictionaries for sparse representation","volume":"54","author":"aharon","year":"2006","journal-title":"Signal Processing IEEE Transactions on"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1597817.1597827"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2006.870086"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1288869.1288879"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1007\/978-3-642-04431-1_17","article-title":"Microphone classification using Fourier coefficients","volume":"5806","author":"buchholz","year":"2010","journal-title":"Lecture Notes in Comput Sci"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2013.2262292"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.1117\/12.871929","article-title":"A context model for microphone forensics and its application in evaluations","volume":"7880","author":"kraetzer","year":"2011","journal-title":"media Watermarking Securitv and Forensics III"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3906\/elk-1207-74"},{"key":"ref7","article-title":"Microphone identification using higher-order statistics","author":"malik","year":"2012","journal-title":"Proc AES 46th Conf Audio Forensics 2012"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2278843"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1121\/1.3385386"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2012.6288258"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2014.08.008"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2015.7178278"},{"key":"ref21","doi-asserted-by":"crossref","DOI":"10.1016\/j.dsp.2014.08.008","article-title":"Source cell-phone recognition from recorded speech using non-speech segments","volume":"35","author":"hanil\u00e7i","year":"2014","journal-title":"Digital Signal Processing"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2013.2255413"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2012.6247939"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1006\/dspr.1999.0361"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"242","DOI":"10.1109\/TCYB.2014.2323992","article-title":"Person reidentification by minimum classification error-based KISS metric learning","volume":"45","author":"tao","year":"2015","journal-title":"IEEE Trans Cybern"}],"event":{"name":"2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","start":{"date-parts":[[2016,3,20]]},"location":"Shanghai","end":{"date-parts":[[2016,3,25]]}},"container-title":["2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7465907\/7471614\/07472043.pdf?arnumber=7472043","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T13:00:31Z","timestamp":1498309231000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7472043\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/icassp.2016.7472043","relation":{},"subject":[],"published":{"date-parts":[[2016,3]]}}}