{"id":"https://openalex.org/W2912458406","doi":"https://doi.org/10.1109/tifs.2019.2895965","title":"Robust Copy\u2013Move Detection of Speech Recording Using Similarities of Pitch and Formant","display_name":"Robust Copy\u2013Move Detection of Speech Recording Using Similarities of Pitch and Formant","publication_year":2019,"publication_date":"2019-01-29","ids":{"openalex":"https://openalex.org/W2912458406","doi":"https://doi.org/10.1109/tifs.2019.2895965","mag":"2912458406"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2019.2895965","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2019.2895965","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112549286","display_name":"Qi Yan","orcid":null},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qi Yan","raw_affiliation_strings":["School of Data and Computer Science, Sun Yat-sen University, Guangzhou, China","Sch. of Data & Comput. Sci., Sun Yat-sen Univ., Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Data and Computer Science, Sun Yat-sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]},{"raw_affiliation_string":"Sch. of Data & Comput. Sci., Sun Yat-sen Univ., Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101772424","display_name":"Rui Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Rui Yang","raw_affiliation_strings":["Guangdong Key Laboratory of Information Security Technology and Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing, School of Data and Computer Science, Sun Yat-sen University, Guangzhou, China","[Guangdong Key Laboratory of Information Security Technology and Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing, School of Data and Computer Science, Sun Yat-sen University, Guangzhou, China]"],"affiliations":[{"raw_affiliation_string":"Guangdong Key Laboratory of Information Security Technology and Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing, School of Data and Computer Science, Sun Yat-sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]},{"raw_affiliation_string":"[Guangdong Key Laboratory of Information Security Technology and Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing, School of Data and Computer Science, Sun Yat-sen University, Guangzhou, China]","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047964483","display_name":"Jiwu Huang","orcid":"https://orcid.org/0000-0002-7625-5689"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiwu Huang","raw_affiliation_strings":["National Engineering Laboratory for Big Data System Computing Technology, Shenzhen University, Shenzhen, China","Guangdong Key Laboratory of Intelligent Information Processing and Shenzhen Key Laboratory of Media Security, Shenzhen University, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"National Engineering Laboratory for Big Data System Computing Technology, Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961"]},{"raw_affiliation_string":"Guangdong Key Laboratory of Intelligent Information Processing and Shenzhen Key Laboratory of Media Security, Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5112549286"],"corresponding_institution_ids":["https://openalex.org/I157773358"],"apc_list":null,"apc_paid":null,"fwci":2.452,"has_fulltext":false,"cited_by_count":54,"citation_normalized_percentile":{"value":0.91369798,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":"14","issue":"9","first_page":"2331","last_page":"2341"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11309","display_name":"Music and Audio Processing","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11439","display_name":"Video Analysis and Summarization","score":0.9661999940872192,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8292335271835327},{"id":"https://openalex.org/keywords/formant","display_name":"Formant","score":0.8152894973754883},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.7631996870040894},{"id":"https://openalex.org/keywords/dynamic-time-warping","display_name":"Dynamic time warping","score":0.6255562901496887},{"id":"https://openalex.org/keywords/speech-processing","display_name":"Speech processing","score":0.6178134679794312},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5749683976173401},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5246536731719971},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.5068333745002747},{"id":"https://openalex.org/keywords/voice-activity-detection","display_name":"Voice activity detection","score":0.4926524758338928},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.4272618293762207},{"id":"https://openalex.org/keywords/background-noise","display_name":"Background noise","score":0.4266129434108734},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.4233306646347046},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.38362282514572144}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8292335271835327},{"id":"https://openalex.org/C158215666","wikidata":"https://www.wikidata.org/wiki/Q1414685","display_name":"Formant","level":3,"score":0.8152894973754883},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.7631996870040894},{"id":"https://openalex.org/C88516994","wikidata":"https://www.wikidata.org/wiki/Q1268863","display_name":"Dynamic time warping","level":2,"score":0.6255562901496887},{"id":"https://openalex.org/C61328038","wikidata":"https://www.wikidata.org/wiki/Q3358061","display_name":"Speech processing","level":2,"score":0.6178134679794312},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5749683976173401},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5246536731719971},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.5068333745002747},{"id":"https://openalex.org/C204201278","wikidata":"https://www.wikidata.org/wiki/Q1332614","display_name":"Voice activity detection","level":3,"score":0.4926524758338928},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.4272618293762207},{"id":"https://openalex.org/C100675267","wikidata":"https://www.wikidata.org/wiki/Q1371624","display_name":"Background noise","level":2,"score":0.4266129434108734},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.4233306646347046},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.38362282514572144},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C2779581591","wikidata":"https://www.wikidata.org/wiki/Q36244","display_name":"Vowel","level":2,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2019.2895965","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2019.2895965","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6200000047683716,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G4937944944","display_name":null,"funder_award_id":"61872244","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6288753258","display_name":null,"funder_award_id":"61702340","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":44,"referenced_works":["https://openalex.org/W112336115","https://openalex.org/W120119343","https://openalex.org/W1485656768","https://openalex.org/W1534596065","https://openalex.org/W1541019354","https://openalex.org/W1635512741","https://openalex.org/W1749306293","https://openalex.org/W1901513629","https://openalex.org/W1966130564","https://openalex.org/W1979346920","https://openalex.org/W1992058412","https://openalex.org/W2004478479","https://openalex.org/W2016419400","https://openalex.org/W2024490156","https://openalex.org/W2052950171","https://openalex.org/W2056177844","https://openalex.org/W2064012922","https://openalex.org/W2069610413","https://openalex.org/W2080607798","https://openalex.org/W2096429026","https://openalex.org/W2098885262","https://openalex.org/W2106498461","https://openalex.org/W2107203630","https://openalex.org/W2119952502","https://openalex.org/W2144994235","https://openalex.org/W2146675392","https://openalex.org/W2152621428","https://openalex.org/W2153361333","https://openalex.org/W2156841861","https://openalex.org/W2182866171","https://openalex.org/W2303197844","https://openalex.org/W2542457192","https://openalex.org/W2654195758","https://openalex.org/W2708787837","https://openalex.org/W2743666165","https://openalex.org/W2802024536","https://openalex.org/W2804328914","https://openalex.org/W2905791008","https://openalex.org/W4206319965","https://openalex.org/W6604906609","https://openalex.org/W6632082194","https://openalex.org/W6686122291","https://openalex.org/W6752350124","https://openalex.org/W6757538793"],"related_works":["https://openalex.org/W2546942002","https://openalex.org/W2886454286","https://openalex.org/W2181971908","https://openalex.org/W2169154261","https://openalex.org/W2390182490","https://openalex.org/W2485008119","https://openalex.org/W2186621033","https://openalex.org/W2563686518","https://openalex.org/W2160594679","https://openalex.org/W1998521395"],"abstract_inverted_index":{"Copy-move":[0],"forgery":[1,198],"on":[2,156],"very":[3,62,147],"short":[4,162],"speech":[5,37,55,77,81,85,106,136,159,166,196],"segments,":[6],"followed":[7],"by":[8],"post-processing":[9,67,180],"operations":[10,181],"to":[11,21,113],"eliminate":[12],"traces":[13],"of":[14,103,117,177,190],"the":[15,50,70,76,90,94,100,115,123,143,187,191],"forgery,":[16],"presents":[17],"a":[18,29,36,53,126,157,195],"great":[19],"challenge":[20],"forensic":[22],"detection.":[23],"In":[24,69],"this":[25],"paper,":[26],"we":[27,73,128],"propose":[28],"robust":[30,63,173],"method":[31,145,170,193],"for":[32],"detecting":[33,150],"and":[34,44,57,83,93,131,151,182],"locating":[35,152],"copy-move":[38,133,153,197],"forgery.":[39],"We":[40,87],"found":[41],"that":[42,142],"pitch":[43,91],"formant":[45,97],"can":[46,129],"be":[47],"used":[48,66,179],"as":[49,99,161,163,194],"features":[51,60],"representing":[52],"voiced":[54,80,105,165],"segment,":[56],"these":[58],"two":[59,96],"are":[61],"against":[64,174],"commonly":[65,178],"operations.":[68],"proposed":[71,144,169,192],"algorithm,":[72],"first":[74,95],"divide":[75],"recording":[78],"into":[79],"segments":[82],"unvoiced":[84],"segments.":[86],"then":[88],"extract":[89],"sequence":[92],"sequences":[98],"feature":[101,119],"set":[102],"each":[104,118],"segment.":[107,167],"Dynamic":[108],"time":[109],"warping":[110],"is":[111,146,171],"applied":[112],"compute":[114],"similarities":[116,124],"set.":[120],"By":[121],"comparing":[122],"with":[125],"threshold,":[127],"detect":[130],"locate":[132],"forgeries":[134],"in":[135,149,201],"recording.":[137],"The":[138,168],"extensive":[139],"experiments":[140],"show":[141],"effective":[148],"forgeries,":[154],"even":[155],"forged":[158],"segment":[160],"one":[164],"also":[172],"several":[175],"kinds":[176],"background":[183],"noise,":[184],"which":[185],"highlights":[186],"promising":[188],"potential":[189],"localization":[199],"tool":[200],"practical":[202],"forensics":[203],"applications.":[204]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":14},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":15},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":3}],"updated_date":"2026-04-11T08:14:18.477133","created_date":"2025-10-10T00:00:00"}
