{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T15:53:23Z","timestamp":1715615603185},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2023,11,1]],"date-time":"2023-11-01T00:00:00Z","timestamp":1698796800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,11,1]],"date-time":"2023-11-01T00:00:00Z","timestamp":1698796800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Speech Technol"],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1007\/s10772-023-10052-x","type":"journal-article","created":{"date-parts":[[2023,11,1]],"date-time":"2023-11-01T14:02:46Z","timestamp":1698847366000},"page":"833-850","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Fusion of speech and handwritten signatures biometrics for person identification"],"prefix":"10.1007","volume":"26","author":[{"given":"Ahmad A. M.","family":"Abushariah","sequence":"first","affiliation":[]},{"given":"Mohammad A. M.","family":"Abushariah","sequence":"additional","affiliation":[]},{"given":"Teddy Surya","family":"Gunawan","sequence":"additional","affiliation":[]},{"given":"J.","family":"Chebil","sequence":"additional","affiliation":[]},{"given":"Assal A. M.","family":"Alqudah","sequence":"additional","affiliation":[]},{"given":"Hua-Nong","family":"Ting","sequence":"additional","affiliation":[]},{"given":"Mumtaz Begum Peer","family":"Mustafa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,1]]},"reference":[{"key":"10052_CR1","doi-asserted-by":"crossref","unstructured":"Abushariah, A. A. M., Gunawan, T. S., Chebil, J., & Abushariah, M. A. M. (2012a). Automatic person identification system using handwritten signatures. In 2012 international conference on computer and communication engineering (ICCCE) (pp. 560\u2013565). IEEE.","DOI":"10.1109\/ICCCE.2012.6271249"},{"key":"10052_CR2","doi-asserted-by":"crossref","unstructured":"Abushariah, A. A. M., Gunawan, T. S., Chebil, J., & Abushariah, M. A. M. (2012b). Voice based automatic person identification system using vector quantization. In 2012 international conference on computer and communication engineering (ICCCE) (pp. 549\u2013554). IEEE.","DOI":"10.1109\/ICCCE.2012.6271247"},{"key":"10052_CR3","doi-asserted-by":"publisher","DOI":"10.19044\/esj.2016.v12n12p43","author":"MA Abushariah","year":"2016","unstructured":"Abushariah, M. A., & Alqudah, A. A. (2016). Automatic identity recognition using speech biometric. European Scientific Journal. https:\/\/doi.org\/10.19044\/esj.2016.v12n12p43","journal-title":"European Scientific Journal"},{"key":"10052_CR4","doi-asserted-by":"crossref","unstructured":"Anton, S., Artem, T., Andrey, P., & Igor, K. (2020). Modification of VGG neural network architecture for unimodal and multimodal biometrics. In 2020 IEEE east-west design & test symposium (EWDTS)\u00a0(pp. 1\u20134). IEEE.","DOI":"10.1109\/EWDTS50664.2020.9224924"},{"key":"10052_CR5","doi-asserted-by":"crossref","unstructured":"Barbantan, I., Vidrighin, C., & Borca, R. (2009). An offline system for handwritten signature recognition. In\u00a02009 IEEE5th international conference on intelligent computer communication and processing\u00a0(pp. 3\u201310). IEEE.","DOI":"10.1109\/ICCP.2009.5284793"},{"key":"10052_CR6","unstructured":"Bhotto, M. Z. A., & Amin, M. R. (2004). Bengali text dependent speaker identification using mel-frequency cepstrum coefficient and vector quantization. In 3rd international conference on electrical & computer engineering (pp. 569\u2013572). Dhaka, Bangladesh."},{"key":"10052_CR7","doi-asserted-by":"crossref","unstructured":"Biswas, S., Ahmad, S., & Molla, K. I. (2007). Speaker identification using cepstral based features and discrete hidden Markov model. In 2007 international conference on information and communication technology (pp. 303\u2013306). IEEE.","DOI":"10.1109\/ICICT.2007.375398"},{"key":"10052_CR8","doi-asserted-by":"crossref","unstructured":"Borra, S. R., Reddy, G. J., & Reddy, E. S. (2018). An efficient fingerprint identification using neural network and BAT algorithm.\u00a0International Journal of Electrical & Computer Engineering (2088\u20138708), 8(2).","DOI":"10.11591\/ijece.v8i2.pp1194-1213"},{"key":"10052_CR9","doi-asserted-by":"crossref","unstructured":"Chakroborty, S., Roy, A., Majumdar, S., & Saha, G. (2007). Capturing complementary information via reversed filter bank and parallel implementation with MFCC for improved text-independent speaker identification. In 2007 international conference on computing: Theory and applications (ICCTA'07) (pp. 463\u2013467). IEEE.","DOI":"10.1109\/ICCTA.2007.35"},{"key":"10052_CR10","unstructured":"Chaudhari, B. M., Barhate, A. A., & Bhole, A. A. (2009). Signature recognition using fuzzy min-max neural network. In 2009 international conference on control, automation, communication and energy conservation (pp. 1\u20137). IEEE."},{"key":"10052_CR11","doi-asserted-by":"crossref","unstructured":"Choudhary, S. K., & Naik, A. K. (2019). Multimodal biometric authentication with secured templates\u2014A review. In 2019 3rd international conference on trends in electronics and informatics (ICOEI) (pp. 1062\u20131069). IEEE.","DOI":"10.1109\/ICOEI.2019.8862563"},{"key":"10052_CR12","doi-asserted-by":"crossref","unstructured":"Das, M. T., & Dulger, L. C. (2007). Off-line signature verification with PSO-NN algorithm. In\u00a02007 22nd international symposium on computer and information sciences\u00a0(pp. 1\u20136). IEEE.","DOI":"10.1109\/ISCIS.2007.4456842"},{"key":"10052_CR13","doi-asserted-by":"crossref","unstructured":"Deshmukh, A., Pawar, S., & Joshi, M. (2013). Feature level fusion of face and fingerprint modalities using Gabor filter bank. In 2013 IEEE international conference on signal processing, computing and control (ISPCC) (pp. 1\u20135). IEEE.","DOI":"10.1109\/ISPCC.2013.6663404"},{"issue":"2","key":"10052_CR14","doi-asserted-by":"publisher","first-page":"744","DOI":"10.1016\/j.eswa.2012.08.007","volume":"40","author":"G Diraco","year":"2013","unstructured":"Diraco, G., Leone, A., & Siciliano, P. (2013). Human posture recognition with a time-of-flight 3D sensor for in-home applications. Expert Systems with Applications, 40(2), 744\u2013751.","journal-title":"Expert Systems with Applications"},{"key":"10052_CR15","unstructured":"Elias, M. S. (2009). Speaker recognition using enhance MFCC (Mel Frequency Cepstral Coofecient), Doctoral dissertation, Universiti Utara Malaysia."},{"key":"10052_CR16","doi-asserted-by":"crossref","unstructured":"Ghayoumi, M. (2015). A review of multimodal biometric systems: Fusion methods and their applications. In\u00a02015 IEEE\/ACIS 14th international conference on computer and information science (ICIS)\u00a0(pp. 131\u2013136). IEEE.","DOI":"10.1109\/ICIS.2015.7166582"},{"key":"10052_CR17","doi-asserted-by":"crossref","unstructured":"Goh, C., & Leon, K. (2009). Robust computer voice recognition using improved MFCC algorithm. In 2009 international conference on new trends in information and service science (pp. 835\u2013840). IEEE.","DOI":"10.1109\/NISS.2009.12"},{"key":"10052_CR18","doi-asserted-by":"crossref","unstructured":"Guesmi, H., Trichili, H., Alimi, A. M., & Solaiman, B. (2015). Novel biometric features fusion method based on possibility theory. In\u00a02015 IEEE 14th international conference on cognitive informatics & cognitive computing (ICCI* CC)\u00a0(pp. 418\u2013425). IEEE.","DOI":"10.1109\/ICCI-CC.2015.7259419"},{"key":"10052_CR19","doi-asserted-by":"crossref","unstructured":"Hossain, E., & Chetty, G. (2011). Multimodal face-gait fusion for biometric person authentication. In 2011 IFIP 9th international conference on embedded and ubiquitous computing (pp. 332\u2013337). IEEE.","DOI":"10.1109\/EUC.2011.52"},{"key":"10052_CR20","doi-asserted-by":"crossref","unstructured":"Htike, K. K., Khalifa, O. O., Ramli, H. A. M., & Abushariah, M. A. (2014). Human activity recognition for video surveillance using sequences of postures. In The 3rd international conference on e-technologies and networks for development (ICeND2014) (pp. 79\u201382). IEEE.","DOI":"10.1109\/ICeND.2014.6991357"},{"key":"10052_CR21","doi-asserted-by":"crossref","unstructured":"Huang, L., Yu, C., & Cao, X. (2018). Bimodal biometric person recognition by score fusion. In\u00a02018 5th international conference on information science and control engineering (ICISCE)\u00a0(pp. 1093\u20131097). IEEE.","DOI":"10.1109\/ICISCE.2018.00225"},{"issue":"8","key":"10052_CR22","doi-asserted-by":"publisher","first-page":"1389","DOI":"10.3844\/jcssp.2014.1389.1396","volume":"10","author":"IS Hussein","year":"2014","unstructured":"Hussein, I. S., & Nordin, M. J. (2014). Palmprint verification using invariant moments based on wavelet transform. Journal of Computer Science, 10(8), 1389.","journal-title":"Journal of Computer Science"},{"key":"10052_CR23","doi-asserted-by":"crossref","unstructured":"Ismail, I. A., Ramadan, M. A., El Danf, T., & Samak, A. H. (2008). Automatic signature recognition and verification using principal components analysis. In 2008 5th international conference on computer graphics, imaging and visualisation (pp. 356\u2013361). IEEE.","DOI":"10.1109\/CGIV.2008.8"},{"issue":"1","key":"10052_CR24","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/TCSVT.2003.818349","volume":"14","author":"AK Jain","year":"2004","unstructured":"Jain, A. K., Ross, A., & Prabhakar, S. (2004). An introduction to biometric recognition. IEEE Transactions on Circuits and Systems for Video Technology, 14(1), 4\u201320.","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"10052_CR25","doi-asserted-by":"crossref","unstructured":"Jusman, Y., Cheok, N. S., & Hasikin, K. (2020). Performances of proposed normalization algorithm for iris recognition. International Journal of Advances in Intelligent Informatics, 6(2).","DOI":"10.26555\/ijain.v6i2.397"},{"key":"10052_CR26","doi-asserted-by":"crossref","unstructured":"Kartik, P., Prasanna, S. M., & Prasad, R. V. (2008). Multimodal biometric person authentication system using speech and signature features. In TENCON 2008\u20132008 IEEE region 10 conference\u00a0(pp. 1\u20136). IEEE.","DOI":"10.1109\/TENCON.2008.4766712"},{"key":"10052_CR27","volume-title":"User authentication using on-line signature and speech","author":"S Krawczyk","year":"2005","unstructured":"Krawczyk, S. (2005). User authentication using on-line signature and speech. Michigan State University."},{"key":"10052_CR28","doi-asserted-by":"crossref","unstructured":"Krobba, A., Debyeche, M., & Amrouche, A. (2010). Evaluation of speaker identification system using GSMEFR speech data. In 5th international conference on design & technology of integrated systems in nanoscale era (pp. 1\u20135). IEEE.","DOI":"10.1109\/DTIS.2010.5487589"},{"key":"10052_CR29","doi-asserted-by":"publisher","first-page":"9","DOI":"10.4304\/jcp.3.8.9-22","volume":"3","author":"A McCabe","year":"2008","unstructured":"McCabe, A., Trevathan, J., & Read, W. (2008). Neural network-based handwritten signature verification. Journal of Computers, 3, 9\u201322.","journal-title":"Journal of Computers"},{"key":"10052_CR30","doi-asserted-by":"crossref","unstructured":"Odeh, S. M., & Khalil, M. (2011). Off-line signature verification and recognition: Neural network approach. In 2011 international symposium on innovations in intelligent systems and applications (pp. 34\u201338). IEEE.","DOI":"10.1109\/INISTA.2011.5946065"},{"key":"10052_CR31","doi-asserted-by":"crossref","unstructured":"Ong, M. G. K., Connie, T., Jin, A. T. B., & Ling, D. N. C. (2003). A single-sensor hand geometry and palmprint verification system. In Proceedings of the 2003 ACM SIGMM workshop on biometrics methods and applications (pp. 100\u2013106).","DOI":"10.1145\/982507.982526"},{"key":"10052_CR32","doi-asserted-by":"crossref","unstructured":"Patil, A. P., & Bhalke, D. G. (2016). Fusion of fingerprint, Palmprint and iris for person identification. In 2016 international conference on automatic control and dynamic optimization techniques (ICACDOT) (pp. 960\u2013963). IEEE.","DOI":"10.1109\/ICACDOT.2016.7877730"},{"key":"10052_CR33","doi-asserted-by":"crossref","unstructured":"Prasad, S. M., Govindan, V. K., & Sathidevi, P. S. (2009). Bimodal personal recognition using hand images. In\u00a0Proceedings of the international conference on advances in computing, communication and control\u00a0(pp. 403\u2013409).","DOI":"10.1145\/1523103.1523183"},{"key":"10052_CR34","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.184","volume":"5","author":"HK Rana","year":"2019","unstructured":"Rana, H. K., Azam, M. S., Akhtar, M. R., Quinn, J. M., & Moni, M. A. (2019). A fast iris recognition system through optimum feature extraction. PeerJ Computer Science, 5, e184.","journal-title":"PeerJ Computer Science"},{"key":"10052_CR35","doi-asserted-by":"crossref","unstructured":"Ranjan, R., Singh, S. K., Shukla, A., & Tiwari, R. (2010). Text-dependent multilingual speaker identification for Indian languages using artificial neural network. In 2010 3rd international conference on emerging trends in engineering and technology (pp. 632\u2013635). IEEE.","DOI":"10.1109\/ICETET.2010.23"},{"key":"10052_CR36","doi-asserted-by":"publisher","DOI":"10.1002\/9780470997949","volume-title":"Behavioral biometrics: A remote access approach","author":"K Revett","year":"2008","unstructured":"Revett, K. (2008). Behavioral biometrics: A remote access approach. Wiley."},{"issue":"1","key":"10052_CR37","doi-asserted-by":"publisher","first-page":"54","DOI":"10.4103\/0256-4602.93139","volume":"29","author":"SK Sahoo","year":"2012","unstructured":"Sahoo, S. K., Choubisa, T., & Prasanna, S. M. (2012). Multimodal biometric person authentication: A review. IETE Technical Review, 29(1), 54\u201375.","journal-title":"IETE Technical Review"},{"issue":"2","key":"10052_CR38","doi-asserted-by":"publisher","first-page":"155","DOI":"10.3844\/ajassp.2015.155.165","volume":"12","author":"Z Sufyanu","year":"2015","unstructured":"Sufyanu, Z., Mohamad, F. S., & Ben-Musa, A. S. (2015). A proposed integrated human recognition for security reassurance. American Journal of Applied Sciences, 12(2), 155.","journal-title":"American Journal of Applied Sciences"},{"key":"10052_CR39","doi-asserted-by":"crossref","unstructured":"Taouche, C., Batouche, M. C., Berkane, M., & Taleb-Ahmed, A. (2014). Multimodal biometric systems. In 2014 international conference on multimedia computing and systems (ICMCS) (pp. 301\u2013308). IEEE.","DOI":"10.1109\/ICMCS.2014.6911308"},{"key":"10052_CR40","doi-asserted-by":"crossref","unstructured":"Thepade, S. D., & Bhondave, R. K. (2015). Bimodal biometric identification with Palmprint and Iris traits using fractional coefficients of Walsh, Haar and Kekre transforms. In 2015 international conference on communication, information & computing technology (ICCICT) (pp. 1\u20134). IEEE.","DOI":"10.1109\/ICCICT.2015.7045729"},{"key":"10052_CR41","doi-asserted-by":"crossref","unstructured":"Vasuhi, S., Vaidehi, V., Babu, N. N., & Treesa, T. M. (2010). An efficient multi-modal biometric person authentication system using fuzzy logic. In\u00a0ICoAC 2010\u00a0(pp. 74\u201381). IEEE.","DOI":"10.1109\/ICOAC.2010.5725365"},{"key":"10052_CR42","doi-asserted-by":"crossref","unstructured":"Wang, L., Minami, K., Yamamoto, K., & Nakagawa, S. (2010). Speaker identification by combining MFCC and phase information in noisy environments. In\u00a02010 IEEE international conference on acoustics, speech and signal processing\u00a0(pp. 4502\u20134505). IEEE.","DOI":"10.1109\/ICASSP.2010.5495586"},{"key":"10052_CR43","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2020.103374","author":"F Weifei","year":"2020","unstructured":"Weifei, F. (2020). Intelligent recognition of motion posture based on FPGA and neural network. Microprocessors and Microsystems. https:\/\/doi.org\/10.1016\/j.micpro.2020.103374","journal-title":"Microprocessors and Microsystems"},{"key":"10052_CR44","unstructured":"Wen, J., Fang, B., Tang, Y., & Zhang, T. (2007). Offline signature verification: A new rotation invariant approach. In 2007 IEEE International conference on systems, man and cybernetics (pp. 3583\u20133587). IEEE."},{"issue":"18","key":"10052_CR45","doi-asserted-by":"publisher","first-page":"1201","DOI":"10.1080\/01691864.2020.1793812","volume":"34","author":"H Yamada","year":"2020","unstructured":"Yamada, H., Ahn, J., Mozos, O. M., Iwashita, Y., & Kurazume, R. (2020). Gait-based person identification using 3D LiDAR and long short-term memory deep networks. Advanced Robotics, 34(18), 1201\u20131211.","journal-title":"Advanced Robotics"},{"key":"10052_CR46","doi-asserted-by":"crossref","unstructured":"Yantorno, R. E., Smolenski, B. Y., Iyer, A. N., & Shah, J. K. (2004). Usable speech detection using a context dependent Gaussian mixture model classifier. In\u00a02004 IEEE international symposium on circuits and systems (IEEE Cat. No. 04CH37512) (Vol. 5, pp. V\u2013V). IEEE.","DOI":"10.1109\/ISCAS.2004.1329884"},{"key":"10052_CR47","unstructured":"Yee, C. S., & Ahmad, A. M. (2008). Malay language text-independent speaker verification using NN-MLP classifier with MFCC. In 2008 international conference on electronic design (pp. 1\u20135). IEEE."},{"key":"10052_CR48","doi-asserted-by":"crossref","unstructured":"Zulfiqar, A., Muhammad, A., & AM, M. E. (2009). A speaker identification system using MFCC features with VQ technique. In\u00a02009 3rd international symposium on intelligent information technology application\u00a0(Vol. 3, pp. 115\u2013118). IEEE.","DOI":"10.1109\/IITA.2009.420"}],"container-title":["International Journal of Speech Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10772-023-10052-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10772-023-10052-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10772-023-10052-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,11]],"date-time":"2024-01-11T10:11:46Z","timestamp":1704967906000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10772-023-10052-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,1]]},"references-count":48,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["10052"],"URL":"https:\/\/doi.org\/10.1007\/s10772-023-10052-x","relation":{},"ISSN":["1381-2416","1572-8110"],"issn-type":[{"value":"1381-2416","type":"print"},{"value":"1572-8110","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,11,1]]},"assertion":[{"value":"5 June 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 September 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 November 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}