{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T08:54:06Z","timestamp":1767084846140,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,11]]},"DOI":"10.1109\/wifs.2015.7368585","type":"proceedings-article","created":{"date-parts":[[2016,1,4]],"date-time":"2016-01-04T21:34:47Z","timestamp":1451943287000},"page":"1-6","source":"Crossref","is-referenced-by-count":17,"title":["Improved edit detection in speech via ENF patterns"],"prefix":"10.1109","author":[{"given":"Paulo A. A.","family":"Esquef","sequence":"first","affiliation":[]},{"given":"Jose A.","family":"Apolinario","sequence":"additional","affiliation":[]},{"given":"Luiz W. P.","family":"Biscainho","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"1","article-title":"Phase and amplitude analysis of the ENF for digital audio authentication","author":"coetzee","year":"2012","journal-title":"Proceedings of the AES 46th International Conference Denver USA"},{"key":"ref11","first-page":"1","article-title":"Audio authenticity based on the discontinuity of ENF higher harmonics","author":"nicolalde-rodr\u00edguez","year":"2013","journal-title":"Proceedings of the 21st European Signal Processing Conference Marrakech Maroc"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2363524"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2012.6288260"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2600918.2600933"},{"journal-title":"Time Frequency Analysis Theory and Applications","year":"1994","author":"cohen","key":"ref15"},{"article-title":"Discrete-Time Signal Processing","year":"2009","author":"oppenheim","key":"ref16"},{"article-title":"Companion web-page of the paper","year":"2014","author":"esquef","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1121\/1.391621"},{"article-title":"Companion web-page of the paper","year":"2015","author":"esquef","key":"ref19"},{"key":"ref4","article-title":"Digital authenticity using the electric network frequency","author":"sanders","year":"2008","journal-title":"Proceedings of the AES 33rd International Conference Audio Forensic Theory and Practice Denver USA"},{"key":"ref3","article-title":"The electric network frequency (ENF) as an aid to authenticating forensic digital audio recordings - an automated approach","author":"cooper","year":"2008","journal-title":"Proceedings of the AES 33rd International Conference Audio Forensic Theory and Practice Denver USA"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.931080"},{"key":"ref5","first-page":"662","article-title":"Forensic authentication of digital audio recordings","volume":"57","author":"koenig","year":"2009","journal-title":"Journal of the Audio Engineering Society"},{"key":"ref8","first-page":"1417","article-title":"Evaluating digital audio authenticity with spectral distances and ENF phase change","author":"nicolalde-rodriguez","year":"2009","journal-title":"Proceedings of the IEEE International Conference on Acoustics Speech and Signal Processing Taipei Taiwan"},{"key":"ref7","first-page":"852","article-title":"Electric network frequency analysis for forensic audio","volume":"60","author":"rumsey","year":"2012","journal-title":"Journal of the Audio Engineering Society"},{"key":"ref2","article-title":"Further investigation into the ENF criterion for forensic authentication","author":"brixen","year":"2007","journal-title":"Presented at the 63rd Audio Engineering Society Convention"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2006.06.033"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2051270"}],"event":{"name":"2015 IEEE International Workshop on Information Forensics and Security (WIFS)","start":{"date-parts":[[2015,11,16]]},"location":"Roma, Italy","end":{"date-parts":[[2015,11,19]]}},"container-title":["2015 IEEE International Workshop on Information Forensics and Security (WIFS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7364553\/7368550\/07368585.pdf?arnumber=7368585","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,25]],"date-time":"2017-03-25T01:36:10Z","timestamp":1490405770000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7368585\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/wifs.2015.7368585","relation":{},"subject":[],"published":{"date-parts":[[2015,11]]}}}