[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Recognition of Brand and Models of Cell-Phones From Recorded Speech Signals

Published: 01 April 2012 Publication History

Abstract

Speech signals convey various pieces of information such as the identity of its speaker, the language spoken, and the linguistic information about the text being spoken, etc. In this paper, we extract information about the cell phones from their speech records by using mel-frequency cepstrum coefficients and identify their brands and models. Closed-set identification rates of 92.56% and 96.42% have been obtained on a set of 14 different cell phones in the experiments using vector quantization and support vector machine classifiers, respectively.

Cited By

View all
  • (2024)Spatio-temporal representation learning enhanced source cell-phone recognition from speech recordingsJournal of Information Security and Applications10.1016/j.jisa.2023.10367280:COnline publication date: 17-Apr-2024
  • (2023)Audio Splicing Detection and Localization Based on Acquisition Device TracesIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.329341518(4157-4172)Online publication date: 1-Jan-2023
  • (2023)Effect of Format Conversion on Source Identification from Audio Recordings: A Study for Forensic PurposesSN Computer Science10.1007/s42979-023-02379-85:1Online publication date: 19-Nov-2023
  • Show More Cited By
  1. Recognition of Brand and Models of Cell-Phones From Recorded Speech Signals

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image IEEE Transactions on Information Forensics and Security
    IEEE Transactions on Information Forensics and Security  Volume 7, Issue 2
    April 2012
    493 pages

    Publisher

    IEEE Press

    Publication History

    Published: 01 April 2012

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 16 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Spatio-temporal representation learning enhanced source cell-phone recognition from speech recordingsJournal of Information Security and Applications10.1016/j.jisa.2023.10367280:COnline publication date: 17-Apr-2024
    • (2023)Audio Splicing Detection and Localization Based on Acquisition Device TracesIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.329341518(4157-4172)Online publication date: 1-Jan-2023
    • (2023)Effect of Format Conversion on Source Identification from Audio Recordings: A Study for Forensic PurposesSN Computer Science10.1007/s42979-023-02379-85:1Online publication date: 19-Nov-2023
    • (2021)Speaker-independent source cell-phone identification for re-compressed and noisy audio recordingsMultimedia Tools and Applications10.1007/s11042-020-10205-z80:15(23581-23603)Online publication date: 1-Jun-2021
    • (2020)An Antiforensic Method against AMR Compression DetectionSecurity and Communication Networks10.1155/2020/88499022020Online publication date: 1-Jan-2020
    • (2020)Identification of VoIP Speech With Multiple Domain Deep FeaturesIEEE Transactions on Information Forensics and Security10.1109/TIFS.2019.296063515(2253-2267)Online publication date: 1-Jan-2020
    • (2018)VPCID—A VoIP Phone Call Identification DatabaseDigital Forensics and Watermarking10.1007/978-3-030-11389-6_23(307-321)Online publication date: 22-Oct-2018
    • (2017)Mobile phone clustering from acquired speech recordings using deep Gaussian supervector and spectral clustering2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)10.1109/ICASSP.2017.7952534(2137-2141)Online publication date: 5-Mar-2017
    • (2017)A Survey of Techniques for the Identification of Mobile Phones Using the Physical Fingerprints of the Built-In ComponentsIEEE Communications Surveys & Tutorials10.1109/COMST.2017.269448719:3(1761-1789)Online publication date: 21-Aug-2017
    • (2015)A Method for Detecting Abnormal Program Behavior on Embedded DevicesIEEE Transactions on Information Forensics and Security10.1109/TIFS.2015.242267410:8(1692-1704)Online publication date: 1-Aug-2015
    • Show More Cited By

    View Options

    View options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media