{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T07:50:23Z","timestamp":1764402623257},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,9,2]],"date-time":"2014-09-02T00:00:00Z","timestamp":1409616000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/2.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Secur Inform"],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1186\/s13388-014-0011-7","type":"journal-article","created":{"date-parts":[[2014,9,1]],"date-time":"2014-09-01T15:31:56Z","timestamp":1409585516000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Acoustic environment identification using unsupervised learning"],"prefix":"10.1186","volume":"3","author":[{"given":"Hafiz","family":"Malik","sequence":"first","affiliation":[]},{"given":"Hasan","family":"Mahmood","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,9,2]]},"reference":[{"key":"11_CR1","unstructured":"Cellphone popcorn viral videos (2008). Avaliable on: ., [\n                    http:\/\/www.wired.com\/underwire\/2008\/06\/cellphones-cant\/\n                    \n                  ] Cellphone popcorn viral videos (2008). Avaliable on: ."},{"key":"11_CR2","unstructured":"Iran \u2018Modifies\u2019 pictures of missile test (2008). Avaliable on: ., [\n                    http:\/\/www.switched.com\/2008\/07\/11\/iran-photoshops-pictures-of-missile-test\/\n                    \n                  ] Iran \u2018Modifies\u2019 pictures of missile test (2008). Avaliable on: ."},{"issue":"26","key":"11_CR3","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MSP.2008.931079","volume":"2","author":"H Farid","year":"2009","unstructured":"Farid H: A survey of image forgery detection. IEEE Signal Process. Mag 2009, 2(26):16\u201325. 10.1109\/MSP.2008.931079","journal-title":"IEEE Signal Process. Mag"},{"key":"11_CR4","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MMUL.2011.74","volume":"19","author":"S Gupta","year":"2012","unstructured":"Gupta S, Cho S, Kuo CC: Current developments and future trends in audio authentication. IEEE Multimedia 2012, 19: 50\u201359. 10.1109\/MMUL.2011.74","journal-title":"IEEE Multimedia"},{"key":"11_CR5","volume-title":"in European Network of Forensic Science Institutes","author":"C Grigoras","year":"2009","unstructured":"C Grigoras, A Cooper, M Michalek, in European Network of Forensic Science Institutes. Forensic speech and audio analysis working group - best practice guidelines for ENF analysis in forensic authentication of digital evidence, (2009). \n                    http:\/\/www.cs.dartmouth.edu\/~farid\/dfd\/index.php\/publications\/show\/103\n                    \n                  ]"},{"key":"11_CR6","series-title":"Evaluating digital audio authenticity with spectral distances and ENF phase change","doi-asserted-by":"publisher","first-page":"1417","DOI":"10.1109\/ICASSP.2009.4959859","volume-title":"IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP\u201909)","author":"D Nicolalde","year":"2009","unstructured":"D Nicolalde, J Apolinario, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP\u201909). Evaluating digital audio authenticity with spectral distances and ENF phase change (Taipei, Taiwan, 2009), pp. 1417\u20131420."},{"key":"11_CR7","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1016\/j.forsciint.2006.06.033","volume":"167","author":"C Grigoras","year":"2007","unstructured":"Grigoras C: Applications of ENF criterion in forensic audio, video, computer and telecommunication analysis. Forensic Sci Int 2007, 167: 136\u2013145. 10.1016\/j.forsciint.2006.06.033","journal-title":"Forensic Sci Int"},{"key":"11_CR8","first-page":"7273","volume-title":"Application of ENF analysis method in authentication of digital audio and video recordings","author":"C Grigoras","year":"2007","unstructured":"C Grigoras, in Proceedings of the 123rd Convention of the Audio Engineering Society,. Application of ENF analysis method in authentication of digital audio and video recordings (New York, NY, 2007), p. 7273."},{"key":"11_CR9","volume-title":"The Acoustics of Crime, The New Science of Forensic Phonetics","author":"H Hollien","year":"1990","unstructured":"Hollien H: The Acoustics of Crime, The New Science of Forensic Phonetics. Plenum Publishing Corporation, New York, NY, ISBN-13: 978\u20130306434679; 1990."},{"key":"11_CR10","volume-title":"Forensic Voice Identification","author":"H Hollien","year":"2001","unstructured":"Hollien H: Forensic Voice Identification. Academic Press, Philadelphia, PA, ISBN-13: 978\u20130123526212; 2001."},{"issue":"3","key":"11_CR11","doi-asserted-by":"publisher","first-page":"2044","DOI":"10.1121\/1.3385386","volume":"127","author":"D Garcia-Romero","year":"2010","unstructured":"Garcia-Romero D, Espy-Wilson C: Speech forensics: automatic acquisition device identification. J. Acoust. Soc. Am 2010, 127(3):2044\u20132044. 10.1121\/1.3385386","journal-title":"J. Acoust. Soc. Am"},{"key":"11_CR12","first-page":"1806","volume-title":"Automatic acquisition device identification from speech recordings","author":"D Garcia-Romero","year":"2010","unstructured":"D Garcia-Romero, C Espy-Wilson, in Proceedings of the IEEE Int. Conference on Acoustics, Speech, and Signal Processing (ICASSP\u201910). Automatic acquisition device identification from speech recordings (Dallas TX, 2010), pp. 1806\u20131809."},{"issue":"4","key":"11_CR13","doi-asserted-by":"publisher","first-page":"2530","DOI":"10.1121\/1.4783539","volume":"124","author":"D Garcia-Romero","year":"2009","unstructured":"Garcia-Romero D, Espy-Wilson C: Automatic acquisition device identification from speech recordings. J. Acoustic Soc. Am 2009, 124(4):2530\u20132530. 10.1121\/1.4783539","journal-title":"J. Acoustic Soc. Am"},{"key":"11_CR14","first-page":"49","volume-title":"Unweighted fusion in microphone forensics using a decision tree and linear logistic regression models","author":"MSchott Kraetzer","year":"2009","unstructured":"C Kraetzer, M Schott, J Dittmann, in Proceedings of the 11th ACM Multimedia and Security Workshop. Unweighted fusion in microphone forensics using a decision tree and linear logistic regression models (Princeton, NJ, 2009), pp. 49\u201356."},{"key":"11_CR15","first-page":"63","volume-title":"Digital audio forensics: a first practical evaluation on microphone and environment classification","author":"C Kraetzer","year":"2007","unstructured":"C Kraetzer, A Oermann, J Dittmann, A Lang, in Proceedings of the 9th workshop on Multimedia and Security. Digital audio forensics: a first practical evaluation on microphone and environment classification (Dallas TX, 2007), pp. 63\u201374."},{"key":"11_CR16","first-page":"57","volume-title":"Verifier-tuple for audio-forensic to determine speaker environment","author":"A Oermann","year":"2005","unstructured":"A Oermann, A Lang, J Dittmann, in Proceedings of the ACM Multimedia and Security Workshop 2005,. Verifier-tuple for audio-forensic to determine speaker environment (New York, NY, 2005), pp. 57\u201362."},{"key":"11_CR17","first-page":"235","volume-title":"Microphone classification using fourier coefficients","author":"R Buchholz","year":"2010","unstructured":"R Buchholz, C Kraetzer, J Dittmann, in proceedings of 11th International Workshop on Information Hiding, Lecture Notes in Computer Science, Springer Berlin\/Heidelberg Volume 5806\/2009,. Microphone classification using fourier coefficients (Darmstadt, Germany, 2010), pp. 235\u2013246."},{"key":"11_CR18","first-page":"373","volume-title":"Proceedings of the IEEE Statistical Signal Processing Workshop (SSP\u201912)","author":"H Zhao","year":"2012","unstructured":"Zhao H, Malik H: Audio forensics using acoustic environment traces. In Proceedings of the IEEE Statistical Signal Processing Workshop (SSP\u201912). MI, Ann Arbor; 2012:373\u2013376."},{"key":"11_CR19","first-page":"1710","volume-title":"Audio forensics from acoustic reverberation","author":"H Malik","year":"2010","unstructured":"H Malik, H Farid, in Proceedings of the IEEE Int. Conference on Acoustics, Speech, and Signal Processing (ICASSP\u201910). Audio forensics from acoustic reverberation (Dallas, TX, 2010), pp. 1710\u20131713."},{"key":"11_CR20","first-page":"106","volume-title":"Digital audio forensics using background noise","author":"S Ikram","year":"2010","unstructured":"S Ikram, H Malik, in Proceedings of IEEE Int. Conf. on Multimedia and Expo 2010. Digital audio forensics using background noise (Singapore, 2010), pp. 106\u2013110."},{"key":"11_CR21","first-page":"1833","volume-title":"Recording environment identification using acoustic reverberation","author":"H Malik","year":"2012","unstructured":"H Malik, H Zhao, in Proceedings of the IEEE Int. Conference on Acoustics, Speech, and Signal Processing (ICASSP\u201912). Recording environment identification using acoustic reverberation (Kyoto, Japan, 2012), pp. 1833\u20131836."},{"key":"11_CR22","first-page":"8254","volume-title":"Automatic recording environment identification using acoustic features","author":"U Chaudhary","year":"2010","unstructured":"U Chaudhary, H Malik, in Proceedings of Audio Engineering Society 129th Convention 2010. Automatic recording environment identification using acoustic features (San Francisco, CA, 2010), p. 8254."},{"key":"11_CR23","first-page":"5","volume-title":"Microphone identification using higher-order statistics","author":"H Malik","year":"2012","unstructured":"H Malik, J Miller, in Proceedings of AES 46th Conference on Audio Forensics 2012. Microphone identification using higher-order statistics (Denver, CO, 2012), pp. 5\u20132."},{"key":"11_CR24","series-title":"Tech. rep., AIM-1657","volume-title":"Detecting digital forgeries using bispectral analysis","author":"H Farid","year":"1999","unstructured":"H Farid, Detecting digital forgeries using bispectral analysis. Tech. rep., AIM-1657 (Massachusetts Institute of Technology, 1999)."},{"key":"11_CR25","first-page":"21","volume-title":"Detecting digital audio forgeries by checking frame offsets","author":"R Yang","year":"2008","unstructured":"R Yang, Z Qu, J Huang, in Proceedings of the 10th ACM Workshop on Multimedia and Security (MM & Sec)\u201908,. Detecting digital audio forgeries by checking frame offsets (Oxford, UK, 2008), pp. 21\u201326."},{"key":"11_CR26","first-page":"117","volume-title":"Defeating fake-quality, MP3","author":"R Yang","year":"2009","unstructured":"R Yang, Y Shi, J Huang, in Proceedings of the 11th ACM Workshop on Multimedia and Security (MM & Sec)\u201909,. Defeating fake-quality, MP3 (Princeton, NJ, 2009), pp. 117\u2013124."},{"key":"11_CR27","volume-title":"Detecting double compression of audio signal","author":"R Yang","year":"2010","unstructured":"R Yang, Y Shi, J Huang, in Proceedings of SPIE Media Forensics and Security II 2010, Volume 7541,. Detecting double compression of audio signal (San Jose, CA, 2010)."},{"key":"11_CR28","first-page":"1","volume-title":"Detecting butt-spliced edits in forensic digital audio recordings","author":"A Cooper","year":"2010","unstructured":"A Cooper, in Proceedings of Audio Engineering Society 39th Conf., Audio Forensics: Practices and Challenges,. Detecting butt-spliced edits in forensic digital audio recordings (Hillerod, Denmark, 2010), pp. 1\u20131."},{"key":"11_CR29","first-page":"1","volume-title":"Audio codec identification through payload sampling","author":"S Hicsonmez","year":"2011","unstructured":"S Hicsonmez, H Sencar, I Avcibas, in IEEE Int. Workshop on Information Forensics and Security, (WIFS\u201911),. Audio codec identification through payload sampling (Iguacu Falls, Brazil, 2011), pp. 1\u20136."},{"key":"11_CR30","first-page":"27","volume-title":"Statistical tools for multimedia forensics","author":"C Grigoras","year":"2010","unstructured":"C Grigoras, in Proceedings of Audio Engineering Society 39th Conf., Audio Forensics: Practices and Challenges. Statistical tools for multimedia forensics, (2010), pp. 27\u201332."},{"issue":"11","key":"11_CR31","doi-asserted-by":"publisher","first-page":"1746","DOI":"10.1109\/TIFS.2013.2278843","volume":"8","author":"H Zhao","year":"2013","unstructured":"Zhao H, Malik H: Audio recording location identification using acoustic environment signature. IEEE Trans. Inf. Forensics Secur 2013, 8(11):1746\u20131759. 10.1109\/TIFS.2013.2278843","journal-title":"IEEE Trans. Inf. Forensics Secur"},{"issue":"11","key":"11_CR32","doi-asserted-by":"publisher","first-page":"1746","DOI":"10.1109\/TIFS.2013.2278843","volume":"8","author":"H Zhao","year":"2013","unstructured":"Zhao H, Malik H: Acoustic environment identification and its applications to audio forensics. IEEE Trans. Inf. Forensics Secur 2013, 8(11):1746\u20131759. 10.1109\/TIFS.2013.2278843","journal-title":"IEEE Trans. Inf. Forensics Secur"},{"issue":"114","key":"11_CR33","doi-asserted-by":"publisher","first-page":"2877","DOI":"10.1121\/1.1616578","volume":"5","author":"R Ratnam","year":"2003","unstructured":"Ratnam R, Jones DL, Wheeler BC, O\u2019Brien WD Jr, Lansing CR, Feng AS: Blind estimation of reverberation time. J. Acoust. Soc. Am 2003, 5(114):2877\u20132892. 10.1121\/1.1616578","journal-title":"J. Acoust. Soc. Am"},{"key":"11_CR34","unstructured":"H Lollmann, P Vary, in Proceedings of International Workshop on Acoustic Echo and Noise Control. Estimation of the reverberation time in noisy environments (Seattle, WA, 2008). H Lollmann, P Vary, in Proceedings of International Workshop on Acoustic Echo and Noise Control. Estimation of the reverberation time in noisy environments (Seattle, WA, 2008)."},{"key":"11_CR35","volume-title":"HSCMA","author":"I Tashev","year":"2005","unstructured":"Tashev I, Allred D: Revereberation reduction for improved speech recognition. In HSCMA. Piscataway,, NJ; 2005."},{"key":"11_CR36","volume-title":"Room Acoustics, 3rd edition","author":"H Kuttruff","year":"1991","unstructured":"Kuttruff H: Room Acoustics, 3rd edition. Elsevier, New York; 1991."},{"issue":"6","key":"11_CR37","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1016\/j.specom.2008.01.003","volume":"50","author":"Y Lu","year":"2008","unstructured":"Lu Y, Loizou PC: A geometric approach to spectral subtraction. Speech Commun 2008, 50(6):453\u2013466. 10.1016\/j.specom.2008.01.003","journal-title":"Speech Commun"},{"issue":"37","key":"11_CR38","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1121\/1.1909343","volume":"3","author":"M Schroeder","year":"1965","unstructured":"Schroeder M: New method for measuring reverberation time. J. Acoust. Soc. Am 1965, 3(37):409\u2013412. 10.1121\/1.1909343","journal-title":"J. Acoust. Soc. Am"},{"key":"11_CR39","first-page":"226","volume-title":"Proceedings of Second International Conference on Knowledge Discovery and Data Mining (KDD-96),","author":"M Ester","year":"1996","unstructured":"Ester M, Kriegel HP, Sander J, Xu X: A density-based algorithm for discovering clusters in large spatial databases with noise. In Proceedings of Second International Conference on Knowledge Discovery and Data Mining (KDD-96),. AAAI Press, Portland, OR; 1996:226\u2013231."},{"key":"11_CR40","volume-title":"Introduction to Data Mining","author":"PN Tan","year":"2006","unstructured":"Tan PN, Steinback M, Kumar V: Introduction to Data Mining. Pearson Addison Wesley, Indianapolis, IN, ISBN-13: 978\u20130321321367; 2006."},{"key":"11_CR41","unstructured":"C Chang, C Lin, Libsvm: a library for support vector machines (2012). ., [\n                    http:\/\/www.csie.ntu.edu.tw\/cjin\/libsvm\n                    \n                  ] C Chang, C Lin, Libsvm: a library for support vector machines (2012). ."},{"issue":"11","key":"11_CR42","doi-asserted-by":"publisher","first-page":"1827","DOI":"10.1109\/TIFS.2013.2280888","volume":"8","author":"H Malik","year":"2013","unstructured":"Malik H: Audio recording location identification using acoustic environment signature. IEEE Trans. Inf. Forensics Secur 2013, 8(11):1827\u20131837. 10.1109\/TIFS.2013.2280888","journal-title":"IEEE Trans. Inf. Forensics Secur"}],"container-title":["Security Informatics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13388-014-0011-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13388-014-0011-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13388-014-0011-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13388-014-0011-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,26]],"date-time":"2019-03-26T22:41:57Z","timestamp":1553640117000},"score":1,"resource":{"primary":{"URL":"https:\/\/security-informatics.springeropen.com\/articles\/10.1186\/s13388-014-0011-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9,2]]},"references-count":42,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,12]]}},"alternative-id":["11"],"URL":"https:\/\/doi.org\/10.1186\/s13388-014-0011-7","relation":{},"ISSN":["2190-8532"],"issn-type":[{"value":"2190-8532","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,9,2]]},"assertion":[{"value":"2 April 2014","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 August 2014","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 September 2014","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"11"}}