{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,16]],"date-time":"2024-07-16T11:55:55Z","timestamp":1721130955049},"reference-count":36,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2017,2,1]],"date-time":"2017-02-01T00:00:00Z","timestamp":1485907200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61332012","61572329","61602318"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003453","name":"Natural Science Foundation of Guangdong Province","doi-asserted-by":"crossref","award":["2014A030313557"],"id":[{"id":"10.13039\/501100003453","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Shenzhen Research and Development Program","award":["GJHZ20140418191518323","JCYJ20160328144421330"]},{"name":"Beijing Key Laboratory of Advanced Information Science and Network Technology","award":["XDXX1602"]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2017,2]]},"DOI":"10.1109\/tifs.2016.2622012","type":"journal-article","created":{"date-parts":[[2016,10,26]],"date-time":"2016-10-26T18:11:48Z","timestamp":1477505508000},"page":"432-444","source":"Crossref","is-referenced-by-count":36,"title":["Detection of Double Compressed AMR Audio Using Stacked Autoencoder"],"prefix":"10.1109","volume":"12","author":[{"given":"Da","family":"Luo","sequence":"first","affiliation":[]},{"given":"Rui","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-7625-5689","authenticated-orcid":false,"given":"Jiwu","family":"Huang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","first-page":"2579","article-title":"Visualizing data using t-SNE","volume":"9","author":"van der maaten","year":"2008","journal-title":"J Mach Learn Res"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2014.6854084"},{"key":"ref31","first-page":"305","article-title":"i-vector modeling with deep belief networks for multi-session speaker recognition","author":"ghahabi","year":"2014","journal-title":"Proc Int Conf Acoust Speech Signal Process"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2014.6854363"},{"key":"ref36","article-title":"THCHS-30: A free Chinese speech corpus","author":"wang","year":"2015","journal-title":"Comput Sci"},{"key":"ref35","year":"2016","journal-title":"Multicodec Invdec Tampering Dataset"},{"key":"ref34","year":"2016","journal-title":"FormatFactory Software"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TENCONSpring.2014.6863082"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1006\/dspr.1999.0361"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2006.1659966"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1597817.1597838"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1873951.1874137"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s12559-010-9045-4"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2012.6288234"},{"key":"ref17","first-page":"1","article-title":"Audio codec identification through payload sampling","author":"hi\u00e7s\u00f6nmez","year":"2011","journal-title":"Proc IEEE Int Workshop on Inf Forensics and Security"},{"key":"ref18","first-page":"1","article-title":"Methods for identifying traces of compression in audio","author":"hi\u00e7s\u00f6nmez","year":"2013","journal-title":"Proc 1st Int Conf Commun Signal Process Appl"},{"key":"ref19","first-page":"2841","article-title":"Estimating MP3PRO encoder parameters from decoded audio","author":"bie\u00dfmann","year":"2013","journal-title":"Proc GI-Jahrestagung"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2015.7178797"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1411328.1411334"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2015.7178762"},{"key":"ref3","article-title":"Detecting digital forgeries using bispectral analysis","author":"farid","year":"1999"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638212"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2015.7178834"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2010.5495479"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04431-1_17"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1288869.1288879"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1558\/sll.2005.12.1.63"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSP.2014.6950045"},{"key":"ref1","year":"2016","journal-title":"AMR Codec"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2575978"},{"key":"ref22","article-title":"A multi-codec audio dataset for codec analysis and tampering detection","author":"g\u00e4rtner","year":"2014","journal-title":"Proc 54th Int Conf Audio Forensics Audio Eng Soc Conf"},{"key":"ref21","article-title":"Efficient cross-codec framing grid analysis for audio tampering detection","author":"g\u00e4rtner","year":"2014","journal-title":"Proc Audio Eng Soc Conv 136"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.tics.2007.09.004"},{"key":"ref23","first-page":"1","article-title":"Detecting double compressed AMR-format audio recordings","author":"shen","year":"2012","journal-title":"Proc 10th Phonetics Conf China (PCC)"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39593-2_1"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1561\/2200000006"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/7750660\/07707437.pdf?arnumber=7707437","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:21:07Z","timestamp":1642004467000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7707437\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,2]]},"references-count":36,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2016.2622012","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,2]]}}}