{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:52:18Z","timestamp":1740099138050,"version":"3.37.3"},"publisher-location":"Cham","reference-count":9,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030006914"},{"type":"electronic","value":"9783030006921"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00692-1_39","type":"book-chapter","created":{"date-parts":[[2018,9,13]],"date-time":"2018-09-13T08:59:31Z","timestamp":1536829171000},"page":"453-463","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Camera Sensor Traces Analysis in Image Forgery Detection Problem"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6446-8663","authenticated-orcid":false,"given":"Andrey","family":"Kuznetsov","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,14]]},"reference":[{"key":"39_CR1","doi-asserted-by":"publisher","first-page":"1013","DOI":"10.1016\/j.forsciint.2012.12.014","volume":"226","author":"C Choi","year":"2013","unstructured":"Choi, C., Lee, H.: Estimation of color modification in digital images by CFA pattern change. Forensic Sci. Int. 226, 1013\u20131015 (2013)","journal-title":"Forensic Sci. Int."},{"issue":"1","key":"39_CR2","doi-asserted-by":"publisher","first-page":"79","DOI":"10.18287\/2412-6179-2017-41-1-79-87","volume":"41","author":"N Evdokimova","year":"2017","unstructured":"Evdokimova, N., Kuznetsov, A.: Local patterns in the copy-move detection problem solution. Comput. Opt. 41(1), 79\u201387 (2017)","journal-title":"Comput. Opt."},{"issue":"2","key":"39_CR3","doi-asserted-by":"publisher","first-page":"10","DOI":"10.9790\/0661-162111013","volume":"16","author":"P.Sabeena Burvin","year":"2014","unstructured":"Burvin, P.S., Esther, J.M.: Analysis of digital image splicing detection. IOSR J. Comput. Eng. (IOSR-JCE) 16(2), 10\u201313 (2014)","journal-title":"IOSR Journal of Computer Engineering"},{"issue":"4","key":"39_CR4","first-page":"174","volume":"5","author":"KM Snigdha","year":"2015","unstructured":"Snigdha, K.M., Ajay, A.G.: Image forgery types and their detection. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 5(4), 174\u2013178 (2015)","journal-title":"Int. J. Adv. Res. Comput. Sci. Softw. Eng."},{"issue":"5","key":"39_CR5","doi-asserted-by":"publisher","first-page":"1566","DOI":"10.1109\/TIFS.2012.2202227","volume":"7","author":"P Ferrara","year":"2012","unstructured":"Ferrara, P., Bianchi, T., Rosa, A., Piva, A.: Image forgery localization via fine-grained analysis of CFA artifacts. IEEE Trans. Inf. Forensics Secur. 7(5), 1566\u20131577 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"10","key":"39_CR6","doi-asserted-by":"publisher","first-page":"3948","DOI":"10.1109\/TSP.2005.855406","volume":"53","author":"A Popescu","year":"2005","unstructured":"Popescu, A., Farid, H.: Exposing digital forgeries in color filter array interpolated images. IEEE Trans. Signal Process. 53(10), 3948\u20133959 (2005)","journal-title":"IEEE Trans. Signal Process."},{"key":"39_CR7","doi-asserted-by":"crossref","unstructured":"Gallagher, A., Chen, T.: Image authentication by detecting traces of demosaicing. In: IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, pp. 1\u20138 (2008)","DOI":"10.1109\/CVPRW.2008.4562984"},{"issue":"2","key":"39_CR8","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/s10044-013-0319-9","volume":"18","author":"L Li","year":"2015","unstructured":"Li, L., Hue, J., Wang, X., Tian, L.: A robust approach to detect digital forgeries by exploring correlation patterns. Pattern Anal. Appl. 18(2), 351\u2013365 (2015)","journal-title":"Pattern Anal. Appl."},{"key":"39_CR9","first-page":"63","volume":"3","author":"S Bayram","year":"2005","unstructured":"Bayram, S., Sencar, H., Memon, N., Avcibas, I.: Source camera identification based on CFA interpolation. IEEE Image Process. 3, 63\u201372 (2005)","journal-title":"IEEE Image Process."}],"container-title":["Lecture Notes in Computer Science","Computer Vision and Graphics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00692-1_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,24]],"date-time":"2019-10-24T01:12:21Z","timestamp":1571879541000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00692-1_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030006914","9783030006921"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00692-1_39","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICCVG","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computer Vision and Graphics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Warsaw","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccvg2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/iccvg.wzim.sggw.pl\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}