{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T16:50:11Z","timestamp":1765039811117,"version":"3.45.0"},"reference-count":30,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Consumer Electron."],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1109\/tce.2025.3593968","type":"journal-article","created":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T18:50:54Z","timestamp":1753901454000},"page":"8254-8263","source":"Crossref","is-referenced-by-count":1,"title":["Neural Forensic Analysis for Privacy and Integrity Protection in Biometric Authentication Systems"],"prefix":"10.1109","volume":"71","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5093-6507","authenticated-orcid":false,"given":"Sachin","family":"Gupta","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Maharaja Agrasen Institute of Technology, New Delhi, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1305-4959","authenticated-orcid":false,"given":"Abdelhamid","family":"Zaidi","sequence":"additional","affiliation":[{"name":"Department of mathematics, College of Science, Qassim University, Buraydah, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-3482-3931","authenticated-orcid":false,"given":"Rajiv","family":"Avacharmal","sequence":"additional","affiliation":[{"name":"University of Connecticut, Michigan, CT, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9877-5888","authenticated-orcid":false,"given":"A.","family":"Ezil Sam Leni","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Alliance School of Advance Computing, Alliance University, Bengaluru, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9921-476X","authenticated-orcid":false,"given":"Kdv","family":"Prasad","sequence":"additional","affiliation":[{"name":"Symbiosis Institute of Business Management, Hyderabad, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9334-1952","authenticated-orcid":false,"given":"Pavitar","family":"Parkash Singh","sequence":"additional","affiliation":[{"name":"Department of Management, Lovely Professional University, Phagwara, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5975-0696","authenticated-orcid":false,"given":"Fadl","family":"Dahan","sequence":"additional","affiliation":[{"name":"Department of Management Information Systems, College of Business Administration - Hawtat Bani Tamim, Prince Sattam bin Abdulaziz University, Al-Kharj, Saudi Arabia"}]},{"given":"Abror","family":"Abdullayev","sequence":"additional","affiliation":[{"name":"Department of Financial Analysis, Tashkent State University of Economics, Tashkent, Uzbekistan"}]},{"given":"Mohammad","family":"Rafeek Khan","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, College of Engineering and Computer Science, Jazan University, Jazan, Saudi Arabia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3562750"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3395417"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3409543"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3298697"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2025.3541534"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3277883"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3215280"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3304423"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICSAI.2018.8599493"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2021.3130975"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1121\/1.381173"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2018.8462027"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TASLPRO.2025.3539005"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.specom.2017.10.002","article-title":"Acoustical and perceptual study of voice disguise by age modification in speaker verification","volume":"95","author":"Gonz\u00e1lez Hautam\u00e4ki","year":"2017","journal-title":"Speech Commun."},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3276480"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2022.3183951"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2023.3273456"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3369604"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3535581"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2995788"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3035110"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2023.3308209"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2023.3236972"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2023.3325317"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/tce.2025.3549653"},{"issue":"2","key":"ref26","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1016\/j.forsciint.2007.05.019","article-title":"Voice disguise and automatic speaker recognition","volume":"175","author":"Zhang","year":"2008","journal-title":"Forensic Sci. Int."},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3023818"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3254880"},{"issue":"2","key":"ref29","doi-asserted-by":"crossref","first-page":"1053","DOI":"10.32604\/cmes.2022.021755","article-title":"Challenges and limitations in speech recognition technology: A critical review of speech signal processing algorithms, tools and systems","volume":"135","author":"Basak","year":"2022","journal-title":"Comput. Model. Eng. Sciences"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3434547"}],"container-title":["IEEE Transactions on Consumer Electronics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/30\/11241057\/11104937.pdf?arnumber=11104937","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T18:41:40Z","timestamp":1762972900000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11104937\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8]]},"references-count":30,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tce.2025.3593968","relation":{},"ISSN":["0098-3063","1558-4127"],"issn-type":[{"type":"print","value":"0098-3063"},{"type":"electronic","value":"1558-4127"}],"subject":[],"published":{"date-parts":[[2025,8]]}}}