{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T20:09:32Z","timestamp":1771704572825,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2015,10,21]],"date-time":"2015-10-21T00:00:00Z","timestamp":1445385600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J AUDIO SPEECH MUSIC PROC."],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1186\/s13636-015-0074-5","type":"journal-article","created":{"date-parts":[[2015,10,21]],"date-time":"2015-10-21T11:12:37Z","timestamp":1445425957000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Semi-fragile digital speech watermarking for online speaker recognition"],"prefix":"10.1186","volume":"2015","author":[{"given":"Mohammad Ali","family":"Nematollahi","sequence":"first","affiliation":[]},{"given":"Mohammad Ali","family":"Akhaee","sequence":"additional","affiliation":[]},{"given":"S. A. R.","family":"Al-Haddad","sequence":"additional","affiliation":[]},{"given":"Hamurabi","family":"Gamboa-Rosales","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,21]]},"reference":[{"issue":"03","key":"74_CR1","first-page":"1","volume":"12","author":"MA Nematollahi","year":"2015","unstructured":"MA Nematollahi, S Al-Haddad, Distant speaker recognition: an overview. Int. J. Humanoid Rob. 12(03), 1\u201345 (2015)","journal-title":"Int. J. Humanoid Rob."},{"key":"74_CR2","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1016\/j.specom.2014.10.005","volume":"66","author":"Z Wu","year":"2015","unstructured":"Z Wu et al., Spoofing and countermeasures for speaker verification: a survey. Speech Comm. 66, 130\u2013153 (2015)","journal-title":"Speech Comm."},{"issue":"11","key":"74_CR3","doi-asserted-by":"publisher","first-page":"3027","DOI":"10.1016\/j.patcog.2007.02.016","volume":"40","author":"M Faundez-Zanuy","year":"2007","unstructured":"M Faundez-Zanuy, M Hagm\u00fcller, G Kubin, Speaker identification security improvement by means of speech watermarking. Pattern Recognit. 40(11), 3027\u20133034 (2007)","journal-title":"Pattern Recognit."},{"issue":"12","key":"74_CR4","doi-asserted-by":"publisher","first-page":"1608","DOI":"10.1016\/j.specom.2006.06.010","volume":"48","author":"M Faundez-Zanuy","year":"2006","unstructured":"M Faundez-Zanuy, M Hagm\u00fcller, G Kubin, Speaker verification security improvement by means of speech watermarking. Speech Comm. 48(12), 1608\u20131619 (2006)","journal-title":"Speech Comm."},{"issue":"6","key":"74_CR5","doi-asserted-by":"publisher","first-page":"764","DOI":"10.1016\/j.dsp.2011.01.013","volume":"21","author":"W Al-Nuaimy","year":"2011","unstructured":"W Al-Nuaimy et al., An SVD audio watermarking approach using chaotic encrypted images. Digital Signal Process. 21(6), 764\u2013779 (2011)","journal-title":"Digital Signal Process."},{"key":"74_CR6","volume-title":"A Method for Speech Watermarking in Speaker Verification","author":"SARS AL-HADDAD","year":"2015","unstructured":"SARS AL-HADDAD, M Iqbal, AR RAMLI, MA NEMATOLLAHI, A Method for Speech Watermarking in Speaker Verification, 2015. Google Patents"},{"key":"74_CR7","doi-asserted-by":"publisher","first-page":"1001","DOI":"10.1155\/S1110865703304081","volume":"2003","author":"M Steinebach","year":"2003","unstructured":"M Steinebach, J Dittmann, Watermarking-based digital audio data authentication. EURASIP Journal on Applied signal processing 2003, 1001\u20131015 (2003)","journal-title":"EURASIP Journal on Applied signal processing"},{"issue":"4","key":"74_CR8","doi-asserted-by":"publisher","first-page":"1080","DOI":"10.1111\/j.1556-4029.2010.01395.x","volume":"55","author":"M Faundez\u2010Zanuy","year":"2010","unstructured":"M Faundez\u2010Zanuy, JJ Lucena\u2010Molina, M Hagm\u00fcller, Speech watermarking: an approach for the forensic analysis of digital telephonic recordings. J. Forensic Sci. 55(4), 1080\u20131087 (2010)","journal-title":"J. Forensic Sci."},{"issue":"8","key":"74_CR9","doi-asserted-by":"publisher","first-page":"1624","DOI":"10.1109\/TASL.2009.2021543","volume":"17","author":"K Hofbauer","year":"2009","unstructured":"K Hofbauer, G Kubin, WB Kleijn, Speech watermarking for analog flat-fading bandpass channels. IEEE Trans. Audio Speech Lang. Process. 17(8), 1624\u20131637 (2009)","journal-title":"IEEE Trans. Audio Speech Lang. Process."},{"key":"74_CR10","unstructured":"Baroughi, AF and Craver S (2014). Additive attacks on speaker recognition. in IS&T\/SPIE Electronic Imaging. International Society for Optics and Photonics."},{"key":"74_CR11","doi-asserted-by":"publisher","unstructured":"H\u00e4mmerle-Uhl J, Raab K, and Uhl A (2011). Watermarking as a means to enhance biometric systems: a critical survey. in Information Hiding. Springer.","DOI":"10.1007\/978-3-642-24178-9_17"},{"key":"74_CR12","doi-asserted-by":"publisher","unstructured":"X Lu, J Dang, An investigation of dependencies between frequency components and speaker characteristics for text-independent speaker identification. Speech Comm. 50(4), 312\u2013322 (2008)","DOI":"10.1016\/j.specom.2007.10.005"},{"key":"74_CR13","volume-title":"Signal & Information Processing Association Annual Summit and Conference (APSIPA ASC), 2012","author":"S Hyon","year":"2012","unstructured":"S Hyon, An investigation of dependencies between frequency components and speaker characteristics based on phoneme mean F-ratio contribution, in Signal & Information Processing Association Annual Summit and Conference (APSIPA ASC), 2012 (IEEE, Asia-Pacific, 2012)"},{"issue":"2","key":"74_CR14","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/S0167-6393(99)00070-9","volume":"31","author":"L Besacier","year":"2000","unstructured":"L Besacier, J-F Bonastre, C Fredouille, Localization and selection of speaker-specific information with statistical modeling. Speech Comm. 31(2), 89\u2013106 (2000)","journal-title":"Speech Comm."},{"issue":"4","key":"74_CR15","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1007\/s10772-013-9192-6","volume":"16","author":"MA Nematollahi","year":"2013","unstructured":"MA Nematollahi, S Al-Haddad, An overview of digital speech watermarking. Int. J. Speech Technol. 16(4), 471\u2013488 (2013)","journal-title":"Int. J. Speech Technol."},{"issue":"1","key":"74_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1687-4722-2012-25","volume":"2012","author":"F Djebbar","year":"2012","unstructured":"F Djebbar et al., Comparative study of digital audio steganography techniques. EURASIP Journal on Audio, Speech, and Music Processing 2012(1), 1\u201316 (2012)","journal-title":"EURASIP Journal on Audio, Speech, and Music Processing"},{"key":"74_CR17","volume-title":"INTERSPEECH","author":"K Hofbauer","year":"2006","unstructured":"K Hofbauer, G Kubin, High-rate data embedding in unvoiced speech, in INTERSPEECH, 2006"},{"key":"74_CR18","doi-asserted-by":"publisher","unstructured":"Hofbauer, K and Hering, H (2007). Noise robust speech watermarking with bit synchronisation for the aeronautical radio. in Information Hiding. Springer.","DOI":"10.1007\/978-3-540-77370-2_17"},{"issue":"1","key":"74_CR19","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1109\/TIM.2006.887409","volume":"56","author":"S Chen","year":"2007","unstructured":"S Chen, H Leung, H Ding, Telephony speech enhancement by data hiding. IEEE Trans. Instrum. Meas. on 56(1), 63\u201374 (2007)","journal-title":"IEEE Trans. Instrum. Meas. on"},{"key":"74_CR20","doi-asserted-by":"publisher","unstructured":"Coumou, DJ and Sharma, G (2006). Watermark synchronization for feature-based embedding: application to speech. in Conference on Multimedia and Expo, 2006 IEEE International. IEEE.","DOI":"10.1109\/ICME.2006.262634"},{"issue":"2","key":"74_CR21","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1109\/TIFS.2008.920728","volume":"3","author":"DJ Coumou","year":"2008","unstructured":"DJ Coumou, G Sharma, Insertion, deletion codes with feature-based embedding: a new paradigm for watermark synchronization with applications to speech watermarking. IEEE Trans. Inf. Forensics Secur. 3(2), 153\u2013165 (2008)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"12","key":"74_CR22","doi-asserted-by":"publisher","first-page":"2588","DOI":"10.1080\/00207160.2013.805752","volume":"90","author":"M-Q Fan","year":"2013","unstructured":"M-Q Fan et al., A semi-fragile watermarking scheme for authenticating audio signal based on dual-tree complex wavelet transform and discrete cosine transform. Int. J. Comput. Math. 90(12), 2588\u20132602 (2013)","journal-title":"Int. J. Comput. Math."},{"issue":"1","key":"74_CR23","first-page":"29","volume":"98","author":"W Shengbei","year":"2015","unstructured":"W Shengbei, M Unoki, Speech watermarking method based on formant tuning. IEICE TRANSACTIONS on Information and Systems 98(1), 29\u201337 (2015)","journal-title":"IEICE TRANSACTIONS on Information and Systems"},{"key":"74_CR24","volume-title":"Fifteenth Annual Conference of the International Speech Communication Association","author":"S Wang","year":"2014","unstructured":"S Wang, M Unoki, NS Kim, Formant enhancement based speech watermarking for tampering detection, in Fifteenth Annual Conference of the International Speech Communication Association, 2014"},{"issue":"2","key":"74_CR25","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1007\/s11042-011-0861-7","volume":"67","author":"B Yan","year":"2013","unstructured":"B Yan, Y-J Guo, Speech authentication by semi-fragile speech watermarking utilizing analysis by synthesis and spectral distortion optimization. Multimedia tools and applications 67(2), 383\u2013405 (2013)","journal-title":"Multimedia tools and applications"},{"key":"74_CR26","unstructured":"Zamani, M and Manaf, A.B.A. (2014). Genetic algorithm for fragile audio watermarking. Telecommunication Systems, p. 1\u201314."},{"key":"74_CR27","doi-asserted-by":"crossref","unstructured":"Nematollahi MA, Gamboa-Rosales H, Akhaee MA, Al-Haddad S.A.R (2015) Robust digital speech watermarking for online speaker recognition. Mathematical Problem in Engineering, Hindawi.","DOI":"10.1186\/s13636-015-0074-5"},{"key":"74_CR28","unstructured":"Mohammad Ali Nematollahi, S.A.R.A.-H., Shyamala Doraisamy, Speaker frame selection for digital speech watermarking. National Academy Science Letters.(In press)"},{"key":"74_CR29","unstructured":"Garofolo, JS and Consortium, LD (1993). TIMIT: acoustic-phonetic continuous speech corpus. Linguistic Data Consortium."},{"key":"74_CR30","unstructured":"Steinebach, M., et al. (2001). StirMark benchmark: audio watermarking attacks. in Information Technology: Coding and Computing, 2001. Proceedings. International Conference on. IEEE."},{"issue":"1","key":"74_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13636-014-0037-2","volume":"2014","author":"A Al-Haj","year":"2014","unstructured":"A Al-Haj, An imperceptible and robust audio watermarking algorithm. EURASIP Journal on Audio, Speech, and Music Processing 2014(1), 1\u201312 (2014)","journal-title":"EURASIP Journal on Audio, Speech, and Music Processing"},{"key":"74_CR32","volume-title":"P. 800: Methods for Subjective Determination of Transmission Quality","author":"I Rec","year":"1996","unstructured":"I Rec, P. 800: Methods for Subjective Determination of Transmission Quality (International Telecommunication Union, Geneva, 1996)"},{"issue":"4","key":"74_CR33","doi-asserted-by":"publisher","first-page":"788","DOI":"10.1109\/TASL.2010.2064307","volume":"19","author":"N Dehak","year":"2011","unstructured":"N Dehak et al., Front-end factor analysis for speaker verification. Audio, Speech, and Language Processing, IEEE Transactions on 19(4), 788\u2013798 (2011)","journal-title":"Audio, Speech, and Language Processing, IEEE Transactions on"},{"key":"74_CR34","volume-title":"Proc. Odyssey","author":"P Kenny","year":"2012","unstructured":"P Kenny, A small foot-print i-vector extractor, in Proc. Odyssey, 2012"},{"issue":"1","key":"74_CR35","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1006\/dspr.1999.0361","volume":"10","author":"DA Reynolds","year":"2000","unstructured":"DA Reynolds, TF Quatieri, RB Dunn, Speaker verification using adapted Gaussian mixture models. Digital Signal Process. 10(1), 19\u201341 (2000)","journal-title":"Digital Signal Process."},{"key":"74_CR36","doi-asserted-by":"publisher","unstructured":"Woo, RH, Park, A and Hazen, T.J (2006). The MIT mobile device speaker verification corpus: data collection and preliminary experiments. in Speaker and Language Recognition Workshop, 2006. IEEE Odyssey 2006: The. IEEE.","DOI":"10.1109\/ODYSSEY.2006.248083"},{"key":"74_CR37","doi-asserted-by":"publisher","unstructured":"McCool, C, et al. (2012). Bi-modal person recognition on a mobile phone: using mobile phone data. in Multimedia and Expo Workshops (ICMEW), 2012 IEEE International Conference on. IEEE.","DOI":"10.1109\/ICMEW.2012.116"},{"key":"74_CR38","doi-asserted-by":"publisher","unstructured":"Coria, L, Nasiopoulos, P and Ward, R (2009). A region-specific QIM-based watermarking scheme for digital images. in IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2009. BMSB'09. IEEE.","DOI":"10.1109\/ISBMSB.2009.5133840"}],"container-title":["EURASIP Journal on Audio, Speech, and Music Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13636-015-0074-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13636-015-0074-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13636-015-0074-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13636-015-0074-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,31]],"date-time":"2019-08-31T19:24:12Z","timestamp":1567279452000},"score":1,"resource":{"primary":{"URL":"https:\/\/asmp-eurasipjournals.springeropen.com\/articles\/10.1186\/s13636-015-0074-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,21]]},"references-count":38,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,12]]}},"alternative-id":["74"],"URL":"https:\/\/doi.org\/10.1186\/s13636-015-0074-5","relation":{},"ISSN":["1687-4722"],"issn-type":[{"value":"1687-4722","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,10,21]]},"article-number":"31"}}