{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T14:47:16Z","timestamp":1760453236714},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,11,16]],"date-time":"2023-11-16T00:00:00Z","timestamp":1700092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,16]],"date-time":"2023-11-16T00:00:00Z","timestamp":1700092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,11,16]]},"DOI":"10.1109\/icecet58911.2023.10389204","type":"proceedings-article","created":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T18:28:53Z","timestamp":1705948133000},"page":"1-5","source":"Crossref","is-referenced-by-count":1,"title":["Identifying Duress Through Voice During Speaker Authentication"],"prefix":"10.1109","author":[{"given":"Ebenhaeser Janse","family":"van Rensburg","sequence":"first","affiliation":[{"name":"Nelson Mandela University,CRICS,Gqeberha,South Africa"}]},{"given":"Reinhardt A.","family":"Botha","sequence":"additional","affiliation":[{"name":"Nelson Mandela University,CRICS,Gqeberha,South Africa"}]},{"given":"Bertram","family":"Haskins","sequence":"additional","affiliation":[{"name":"Nelson Mandela University,CRICS,Gqeberha,South Africa"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313481"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134003"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.113114"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3934\/mbe.2021114"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/7213717"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8682488"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2011.2172422"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2019.12.001"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1177\/1745691620985415"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CICN49253.2020.9242635"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1523\/JNEUROSCI.1200-19.2019"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICoNSIP49665.2022.10007520"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0196391"},{"key":"ref14","first-page":"73","volume-title":"Text independent speaker recognition based on MFCC and machine learning","author":"Hizlisoy","year":"2021"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-07-2021-0097"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-66039-0_7"}],"event":{"name":"2023 International Conference on Electrical, Computer and Energy Technologies (ICECET)","start":{"date-parts":[[2023,11,16]]},"location":"Cape Town, South Africa","end":{"date-parts":[[2023,11,17]]}},"container-title":["2023 International Conference on Electrical, Computer and Energy Technologies (ICECET)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10389177\/10389181\/10389204.pdf?arnumber=10389204","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T02:02:59Z","timestamp":1706752979000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10389204\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,16]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/icecet58911.2023.10389204","relation":{},"subject":[],"published":{"date-parts":[[2023,11,16]]}}}