{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T06:10:43Z","timestamp":1730268643212,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,7,26]],"date-time":"2024-07-26T00:00:00Z","timestamp":1721952000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,7,26]],"date-time":"2024-07-26T00:00:00Z","timestamp":1721952000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,7,26]]},"DOI":"10.1109\/iotaai62601.2024.10692607","type":"proceedings-article","created":{"date-parts":[[2024,10,2]],"date-time":"2024-10-02T18:15:36Z","timestamp":1727892936000},"page":"647-650","source":"Crossref","is-referenced-by-count":0,"title":["Research on methods for verifying speech authenticity"],"prefix":"10.1109","author":[{"given":"Shuang","family":"Zhang","sequence":"first","affiliation":[{"name":"Liaoning Police College,Department of Public Security Information,Dalian,China"}]}],"member":"263","reference":[{"key":"ref1","first-page":"56","article-title":"A systematic identification study on the authenticity (completeness) of speech data","volume":"132","author":"Hu","year":"2019","journal-title":"J. Journal of Yunnan Police Academy."},{"key":"ref2","first-page":"90","article-title":"An Empirical Study on the Application Status of Voceprint Identification Evidence in Court Trials in China","volume":"1","author":"Cao","year":"2020","journal-title":"J. Chinese Journal of Phonology."},{"key":"ref3","first-page":"41","article-title":"J The application of audio watermarking technology in verifying the authenticity of speech involved in cases","volume":"1","author":"Ma","year":"2024","journal-title":"Police Technology."},{"key":"ref4","first-page":"33","article-title":"Research on the Application of Voiceprint Recognition and Intention Understanding Technology in Telecom Fraud Detection","volume":"40","author":"Liu","year":"2020","journal-title":"J. Guangdong Communication Technology."},{"key":"ref5","first-page":"52","article-title":"Research on the authenticity testing of speech in video cases","volume":"5","author":"Liu","year":"2019","journal-title":"J. Police Technology."},{"key":"ref6","first-page":"92","article-title":"Practice of Authenticity Appraisal of Recording Materials Based on Audio Forensic Technology","volume":"18","author":"Song","year":"2022","journal-title":"J. Computer Knowledge and Technology"},{"key":"ref7","first-page":"10","volume-title":"Research on Copy Paste Tampering Detection and Localization Technology for Digital Audio","author":"Wu","year":"2021"},{"key":"ref8","first-page":"24","article-title":"Research on Deep Learning Speech Synthesis Technology","volume":"9","author":"Zhang","year":"2020","journal-title":"J. Computer Age."},{"key":"ref9","first-page":"153","article-title":"The application of voiceprint recognition and speech recognition technology in the field of public security","volume":"4","author":"Liu","year":"2021","journal-title":"J. Network Security Technology and Applications."},{"key":"ref10","first-page":"133","article-title":"Passive detection method for tampering with digital audio files","volume":"243","author":"Jiang","year":"2019","journal-title":"J. Technology Communication."}],"event":{"name":"2024 6th International Conference on Internet of Things, Automation and Artificial Intelligence (IoTAAI)","start":{"date-parts":[[2024,7,26]]},"location":"Guangzhou, China","end":{"date-parts":[[2024,7,28]]}},"container-title":["2024 6th International Conference on Internet of Things, Automation and Artificial Intelligence (IoTAAI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10691949\/10692319\/10692607.pdf?arnumber=10692607","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,3]],"date-time":"2024-10-03T05:46:23Z","timestamp":1727934383000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10692607\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,26]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/iotaai62601.2024.10692607","relation":{},"subject":[],"published":{"date-parts":[[2024,7,26]]}}}