{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T21:04:21Z","timestamp":1726002261598},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030051709"},{"type":"electronic","value":"9783030051716"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-05171-6_15","type":"book-chapter","created":{"date-parts":[[2018,12,5]],"date-time":"2018-12-05T10:52:06Z","timestamp":1544007126000},"page":"291-303","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["A Deep Learning Based Digital Forensic Solution to Blind Source Identification of Facebook Images"],"prefix":"10.1007","author":[{"given":"Venkata Udaya","family":"Sameer","sequence":"first","affiliation":[]},{"given":"Ishaan","family":"Dali","sequence":"additional","affiliation":[]},{"given":"Ruchira","family":"Naskar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,5]]},"reference":[{"issue":"2","key":"15_CR1","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1109\/TIFS.2006.873602","volume":"1","author":"J Lukas","year":"2006","unstructured":"Lukas, J., Fridrich, J., Goljan, M.: Digital camera identification from sensor pattern noise. IEEE Trans. Inf. Forensics Secur. 1(2), 205\u2013214 (2006)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Kharrazi, M., Sencar, H.T., Memon, N.: Blind source camera identification. In: 2004 International Conference on Image Processing, ICIP 2004, vol. 1, pp. 709\u2013712. IEEE (2004)","DOI":"10.1109\/ICIP.2004.1418853"},{"issue":"1","key":"15_CR3","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/TIFS.2007.916285","volume":"3","author":"M Chen","year":"2008","unstructured":"Chen, M., Fridrich, J., Goljan, M., Luk\u00e1s, J.: Determining image origin and integrity using sensor noise. IEEE Trans. Inf. Forensics Secur. 3(1), 74\u201390 (2008)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Goljan, M., Fridrich, J., Filler, T.: Large scale test of sensor fingerprint camera identification. In: Media Forensics and Security, vol. 7254, p. 72540I. International Society for Optics and Photonics (2009)","DOI":"10.1117\/12.805701"},{"issue":"2","key":"15_CR5","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1109\/TIFS.2010.2046268","volume":"5","author":"C-T Li","year":"2010","unstructured":"Li, C.-T.: Source camera identification using enhanced sensor pattern noise. IEEE Trans. Inf. Forensics Secur. 5(2), 280\u2013287 (2010)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"15_CR6","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1109\/TIFS.2015.2478748","volume":"11","author":"X Lin","year":"2016","unstructured":"Lin, X., Li, C.-T.: Preprocessing reference sensor pattern noise via spectrum equalization. IEEE Trans. Inf. Forensics Secur. 11(1), 126\u2013140 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"15_CR7","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.diin.2017.07.005","volume":"22","author":"C Shi","year":"2017","unstructured":"Shi, C., Law, N.-F., Leung, F.H., Siu, W.-C.: A local variance based approach to alleviate the scene content interference for source camera identification. Digit. Invest. 22, 74\u201387 (2017)","journal-title":"Digit. Invest."},{"key":"15_CR8","unstructured":"Yang, P., Ni, R., Zhao, Y., Zhao, W.: Source camera identification based on content-adaptive fusion residual networks. Pattern Recogn. Lett. (2017)"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Marra, F., Poggi, G., Sansone, C., Verdoliva, L.: Correlation clustering for PRNU-based blind image source identification. In: IEEE International Workshop on Information Forensics and Security (WIFS), vol. 2016, pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/WIFS.2016.7823910"},{"issue":"9","key":"15_CR10","doi-asserted-by":"publisher","first-page":"2197","DOI":"10.1109\/TIFS.2017.2701335","volume":"12","author":"F Marra","year":"2017","unstructured":"Marra, F., Poggi, G., Sansone, C., Verdoliva, L.: Blind PRNU-based image clustering for source identification. IEEE Trans. Inf. Forensics Secur. 12(9), 2197\u20132211 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"4","key":"15_CR11","first-page":"793","volume":"12","author":"X Lin","year":"2017","unstructured":"Lin, X., Li, C.-T.: Large-scale image clustering based on camera fingerprints. IEEE Trans. Inf. Forensics Secur. 12(4), 793\u2013808 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"15_CR12","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1109\/TIFS.2008.926993","volume":"3","author":"O \u00c7eliktutan","year":"2008","unstructured":"\u00c7eliktutan, O., Sankur, B., et al.: Blind identification of source cell-phone model. IEEE Trans. Inf. Forensics Secur. 3(3), 553\u2013566 (2008)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2\u20134","key":"15_CR13","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1080\/15567281.2010.531500","volume":"3","author":"T Gloe","year":"2010","unstructured":"Gloe, T., B\u00f6hme, R.: The Dresden image database for benchmarking digital image forensics. J. Digit. Forensic Pract. 3(2\u20134), 150\u2013159 (2010)","journal-title":"J. Digit. Forensic Pract."},{"key":"15_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1007\/978-3-642-31971-6_3","volume-title":"Transactions on Data Hiding and Multimedia Security VIII","author":"T Gloe","year":"2012","unstructured":"Gloe, T.: Feature-based forensic camera model identification. In: Shi, Y.Q., Katzenbeisser, S. (eds.) Transactions on Data Hiding and Multimedia Security VIII. LNCS, vol. 7228, pp. 42\u201362. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-31971-6_3"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Xu, G., Shi, Y.Q.: Camera model identification using local binary patterns. In: 2012 IEEE International Conference on Multimedia and Expo (ICME), pp. 392\u2013397. IEEE (2012)","DOI":"10.1109\/ICME.2012.87"},{"key":"15_CR16","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.diin.2016.10.002","volume":"19","author":"K Akshatha","year":"2016","unstructured":"Akshatha, K., Karunakar, A., Anitha, H., Raghavendra, U., Shetty, D.: Digital camera identification using PRNU: a feature based approach. Digit. Invest. 19, 69\u201377 (2016)","journal-title":"Digit. Invest."},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"Tuama, A., Comby, F., Chaumont, M.: Camera model identification based machine learning approach with high order statistics features. In: 24th European Signal Processing Conference (EUSIPCO), pp. 1183\u20131187 . IEEE (2016)","DOI":"10.1109\/EUSIPCO.2016.7760435"},{"key":"15_CR18","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.neucom.2016.05.012","volume":"207","author":"B Xu","year":"2016","unstructured":"Xu, B., Wang, X., Zhou, X., Xi, J., Wang, S.: Source camera identification from image texture features. Neurocomputing 207, 131\u2013140 (2016)","journal-title":"Neurocomputing"},{"key":"15_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/978-3-319-23222-5_2","volume-title":"New Trends in Image Analysis and Processing \u2013 ICIAP 2015 Workshops","author":"F Marra","year":"2015","unstructured":"Marra, F., Poggi, G., Sansone, C., Verdoliva, L.: Evaluation of residual-based local features for camera model identification. In: Murino, V., Puppo, E., Sona, D., Cristani, M., Sansone, C. (eds.) ICIAP 2015. LNCS, vol. 9281, pp. 11\u201318. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-23222-5_2"},{"issue":"4","key":"15_CR20","doi-asserted-by":"publisher","first-page":"4765","DOI":"10.1007\/s11042-016-3663-0","volume":"76","author":"F Marra","year":"2017","unstructured":"Marra, F., Poggi, G., Sansone, C., Verdoliva, L.: A study of co-occurrence based local features for camera model identification. Multimed. Tools Appl. 76(4), 4765\u20134781 (2017)","journal-title":"Multimed. Tools Appl."},{"key":"15_CR21","doi-asserted-by":"crossref","unstructured":"Tuama, A., Comby, F., Chaumont, M.: Camera model identification with the use of deep convolutional neural networks. In: IEEE International Workshop on Information Forensics and Security, 6 p. (2016)","DOI":"10.1109\/WIFS.2016.7823908"},{"issue":"3","key":"15_CR22","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1109\/LSP.2016.2641006","volume":"24","author":"L Bondi","year":"2017","unstructured":"Bondi, L., Baroffio, L., G\u00fcera, D., Bestagini, P., Delp, E.J., Tubaro, S.: First steps toward camera model identification with convolutional neural networks. IEEE Sig. Process. Lett. 24(3), 259\u2013263 (2017)","journal-title":"IEEE Sig. Process. Lett."},{"key":"15_CR23","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05171-6_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T15:26:11Z","timestamp":1573053971000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-05171-6_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030051709","9783030051716"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05171-6_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICISS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Systems Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bangalore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iciss2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iciss.org.in","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"51","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"23","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"45% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}