{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:56:42Z","timestamp":1773615402600,"version":"3.50.1"},"reference-count":16,"publisher":"Allerton Press","issue":"1","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2019,1]]},"DOI":"10.3103\/s014641161901005x","type":"journal-article","created":{"date-parts":[[2019,4,16]],"date-time":"2019-04-16T15:41:50Z","timestamp":1555429310000},"page":"72-79","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Detection of HMM Synthesized Speech by Wavelet Logarithmic Spectrum"],"prefix":"10.3103","volume":"53","author":[{"family":"Diqun Yan","sequence":"first","affiliation":[]},{"given":"Li","family":"Xiang","sequence":"additional","affiliation":[]},{"given":"Zhifeng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Rangding","family":"Wang","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2019,4,16]]},"reference":[{"key":"7107_CR1","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.specom.2009.08.009","volume":"52","author":"T. Kinnunen","year":"2010","unstructured":"Kinnunen, T. and Li, H., An overview of text-independent speaker recognition: From features to supervectors, Speech Commun., 2010, vol. 52, no. 2, pp. 12\u201340.","journal-title":"Speech Commun."},{"key":"7107_CR2","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1016\/j.specom.2014.10.005","volume":"66","author":"Z. Wu","year":"2015","unstructured":"Wu, Z., Evans, N., Kinnunen, T., Yamagishi, J., Alegre, F., and Li, H., Spoofing and countermeasures for speaker verification: A survey, Speech Commun., 2015, vol. 66, pp. 130\u2013153.","journal-title":"Speech Commun."},{"key":"7107_CR3","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/TASL.2008.2006647","volume":"17","author":"J. Yamagishi","year":"2009","unstructured":"Yamagishi, J., Kobayashi, T., Nakano, Y., Ogata, K., and Isogai, J., Analysis of speaker adaptation algorithms for HMM-based speech synthesis and a constrained SMAPLR adaptation algorithm, IEEE Trans. Audio Speech Lang. Process., 2009, vol. 17, no. 1, pp. 66\u201383.","journal-title":"IEEE Trans. Audio Speech Lang. Process."},{"key":"7107_CR4","doi-asserted-by":"crossref","unstructured":"Evans, N., Kinnunen, T., and Yamagishi, J., Spoofing and countermeasures for automatic speaker verification, Proceedings of Annual Conference of the International Speech Communication Association, 2013, pp. 925\u2013929.","DOI":"10.21437\/Interspeech.2013-288"},{"key":"7107_CR5","unstructured":"Alegre, F., Vipperla, R., Evans, N., and Fauve, B., On the vulnerability of automatic speaker recognition to spoofing attacks with artificial signals, Proceedings of European Signal Processing Conference, 2012, pp. 36\u201340."},{"key":"7107_CR6","doi-asserted-by":"crossref","unstructured":"Satoh, T., Masuko, T., Kobayashi, T., and Tokuda, K., A robust speaker verification system against imposture using an HMM-based speech synthesis system, Proceedings of European Conference on Speech Communication and Technology, 2001, pp. 759\u2013762.","DOI":"10.21437\/Eurospeech.2001-239"},{"key":"7107_CR7","doi-asserted-by":"crossref","unstructured":"Chen, L.W., Guo, W.L., and Dai, R., Speaker verification against synthetic speech, Proceedings of 7th International Symposium on Chinese Spoken Language Processing, 2010, pp. 309\u2013312.","DOI":"10.1109\/ISCSLP.2010.5684887"},{"key":"7107_CR8","doi-asserted-by":"publisher","first-page":"2280","DOI":"10.1109\/TASL.2012.2201472","volume":"20","author":"P.L. De Leon","year":"2012","unstructured":"De Leon, P.L., Pucher, M., Yamagishi, J., Hernaez, I., and Saratxaga, I., Evaluation of speaker verification security and detection of HMM-based synthetic speech, IEEE Trans. Audio Speech Lang. Process., 2012, vol. 20, no. 8, pp. 2280\u20132290.","journal-title":"IEEE Trans. Audio Speech Lang. Process."},{"key":"7107_CR9","doi-asserted-by":"crossref","unstructured":"Wu, Z., Chng, E.S., and Li, H., Detecting converted speech and natural speech for anti-spoofing attack in speaker recognition, Proceedings of Annual Conference of the International Speech Communication Association, 2012, pp. 1700\u20131703.","DOI":"10.21437\/Interspeech.2012-465"},{"key":"7107_CR10","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1093\/ietfec\/E88-A.1.280","volume":"88","author":"A. Ogihara","year":"2005","unstructured":"Ogihara, A., Unno, H., and Shiozakai, A., Discrimination method of synthetic speech using pitch frequency against synthetic speech falsification, IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005, vol. 88, no.\u00a01, pp. 280\u2013286.","journal-title":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci."},{"key":"7107_CR11","doi-asserted-by":"crossref","unstructured":"De Leon, P.L., Stewart, B., and Yamagishi, J., Synthetic speech discrimination using pitch pattern statistics derived from image analysis, Proceedings of Annual Conference of the International Speech Communication Association, 2012, pp. 370\u2013373.","DOI":"10.21437\/Interspeech.2012-135"},{"key":"7107_CR12","doi-asserted-by":"publisher","first-page":"961","DOI":"10.1109\/18.57199","volume":"36","author":"I. Daubechies","year":"1990","unstructured":"Daubechies, I., The wavelet transform, time-frequency localization and signal analysis, IEEE Trans. Inf. Theory, 1990, vol. 36, no. 5, pp. 961\u20131005.","journal-title":"IEEE Trans. Inf. Theory"},{"key":"7107_CR13","doi-asserted-by":"publisher","first-page":"768","DOI":"10.1109\/TASLP.2016.2526653","volume":"24","author":"Z. Wu","year":"2016","unstructured":"Wu, Z., De Leon, P.L., Demiroglu, C., and Khodabakhsh, A., Anti-spoofing for text-independent speaker verification: An initial database, comparison of countermeasures, and human performance, IEEE Trans. Audio Speech Lang. Process., 2016, vol. 24, no. 4, pp. 768\u2013783.","journal-title":"IEEE Trans. Audio Speech Lang. Process."},{"key":"7107_CR14","doi-asserted-by":"crossref","unstructured":"Wu, Z., Khodabakhsh, A., Demiroglu, C., Yamagishi, J., Saito, D., Toda, T., and King, S., SAS: A speaker verification spoofing database containing diverse attacks, Proceedings of International Conference on Acoustics, Speech and Signal Proceeding, 2015, pp. 4440\u20134444.","DOI":"10.1109\/ICASSP.2015.7178810"},{"key":"7107_CR15","doi-asserted-by":"publisher","first-page":"1039","DOI":"10.1016\/j.specom.2009.04.004","volume":"51","author":"H. Zen","year":"2009","unstructured":"Zen, H., Tokuda, K., and Black, A.W., Statistical parametric speech synthesis, Speech Commun., 2009, vol. 51, no. 11, pp. 1039\u20131064.","journal-title":"Speech Commun."},{"key":"7107_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1961189.1961199","volume":"2","author":"C.C. Chang","year":"2011","unstructured":"Chang, C.C. and Lin, C.J., LIBSVM: A library for support vector machines, ACM Trans. Intell. Syst. Technol., 2011, vol. 2, no. 3, pp. 1\u201327.","journal-title":"ACM Trans. Intell. Syst. Technol."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S014641161901005X.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S014641161901005X","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S014641161901005X.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T21:59:25Z","timestamp":1773611965000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S014641161901005X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1]]},"references-count":16,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,1]]}},"alternative-id":["7107"],"URL":"https:\/\/doi.org\/10.3103\/s014641161901005x","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1]]},"assertion":[{"value":"27 February 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 May 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 May 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 April 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}