{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T12:57:52Z","timestamp":1762001872497,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030299583"},{"type":"electronic","value":"9783030299590"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-29959-0_22","type":"book-chapter","created":{"date-parts":[[2019,9,14]],"date-time":"2019-09-14T23:04:10Z","timestamp":1568502250000},"page":"450-470","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["On the Security and Applicability of Fragile Camera Fingerprints"],"prefix":"10.1007","author":[{"given":"Erwin","family":"Quiring","sequence":"first","affiliation":[]},{"given":"Matthias","family":"Kirchner","sequence":"additional","affiliation":[]},{"given":"Konrad","family":"Rieck","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,15]]},"reference":[{"key":"22_CR1","doi-asserted-by":"crossref","unstructured":"Alaca, F., van Oorschot, P.C.: Device fingerprinting for augmenting web authentication: Classification and analysis of methods. In: Annual Conference on Computer Security Applications (ACSAC) (2016)","DOI":"10.1145\/2991079.2991091"},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"Ba, Z., Piao, S., Fu, X., Koutsonikolas, D., Mohaisen, A., Ren, K.: ABC: enabling smartphone authentication with built-in camera. In: Proceedings of Network and Distributed System Security Symposium (NDSS) (2018)","DOI":"10.14722\/ndss.2018.23099"},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Barni, M., P\u00e9rez-Gonz\u00e1lez, F.: Coping with the enemy: advances in adversary-aware signal processing. In: IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP) (2013)","DOI":"10.1109\/ICASSP.2013.6639361"},{"key":"22_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/978-3-642-03521-0_9","volume-title":"Computational Forensics","author":"R B\u00f6hme","year":"2009","unstructured":"B\u00f6hme, R., Freiling, F.C., Gloe, T., Kirchner, M.: Multimedia forensics is not computer forensics. In: Geradts, Z.J.M.H., Franke, K.Y., Veenman, C.J. (eds.) IWCF 2009. LNCS, vol. 5718, pp. 90\u2013103. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-03521-0_9"},{"key":"22_CR5","unstructured":"Bojinov, H., Michalevsky, Y., Nakibly, G., Boneh, D.: Mobile device identification via sensor fingerprinting. CoRR abs\/1408.1416 (2014)"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Dang-Nguyen, D.T., Pasquini, C., Conotter, V., Boato, G.: RAISE: a raw images dataset for digital image forensics. In: 6th ACM Multimedia Systems Conference (2015)","DOI":"10.1145\/2713168.2713194"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Entrieri, J., Kirchner, M.: Patch-based desynchronization of digital camera sensor fingerprints. In: IS&T Electronic Imaging: Media Watermarking, Security, and Forensics (2016)","DOI":"10.2352\/ISSN.2470-1173.2016.8.MWSF-087"},{"key":"22_CR8","series-title":"There is More to a Picture than Meets the Eye","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/978-1-4614-0757-7_6","volume-title":"Digital Image Forensics","author":"J Fridrich","year":"2013","unstructured":"Fridrich, J.: Sensor defects in digital image forensic. In: Sencar, H., Memon, N. (eds.) Digital Image Forensics. There is More to a Picture than Meets the Eye, pp. 179\u2013218. Springer, New York (2013). https:\/\/doi.org\/10.1007\/978-1-4614-0757-7_6"},{"issue":"2-4","key":"22_CR9","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1080\/15567281.2010.531500","volume":"3","author":"Thomas Gloe","year":"2010","unstructured":"Gloe, T., B\u00f6hme, R.: The Dresden Image Database for benchmarking digital image forensics. J. Digit. Forensic Pract. 3(2\u20134), 150\u2013159 (2010)","journal-title":"Journal of Digital Forensic Practice"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"Gloe, T., Kirchner, M., Winkler, A., B\u00f6hme, R.: Can we trust digital image forensics? In: 15th International Conference on Multimedia (2007)","DOI":"10.1145\/1291233.1291252"},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"Gloe, T., Pfennig, S., Kirchner, M.: Unexpected artefacts in PRNU-based camera identification: a \u2018Dresden Image Database\u2019 case-study. In: ACM Multimedia and Security Workshop (2012)","DOI":"10.1145\/2361407.2361426"},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Goljan, M., Fridrich, J.: Sensor-fingerprint based identification of images corrected for lens distortion. In: Memon, N., Alattar, A.M., Delp, E.J. (eds.) Media Watermarking, Security, and Forensics. Proceedings of SPIE, vol. 8303, p. 83030H (2012)","DOI":"10.1117\/12.909659"},{"issue":"1","key":"22_CR13","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1109\/TIFS.2010.2099220","volume":"6","author":"M Goljan","year":"2011","unstructured":"Goljan, M., Fridrich, J., Chen, M.: Defending against fingerprint-copy attack in sensor-based camera identification. IEEE Trans. Inf. Forensics Secur. (TIFS) 6(1), 227\u2013236 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur. (TIFS)"},{"key":"22_CR14","doi-asserted-by":"crossref","unstructured":"Goljan, M., Fridrich, J., Filler, T.: Large scale test of sensor fingerprint camera identification. In: Delp, E.J., Dittmann, J., Memon, N., Wong, P.W. (eds.) Media Forensics and Security. Proceedings of SPIE, vol. 7254, p. 72540I (2009)","DOI":"10.1117\/12.805701"},{"key":"22_CR15","unstructured":"Gretton, A., Fukumizu, K., Teo, C.H., Song, L., Sch\u00f6lkopf, B., Smola, A.J.: A kernel statistical test of independence. In: Advances in Neural Information Processing Systems (NIPS) (2008)"},{"key":"22_CR16","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1016\/j.diin.2015.01.017","volume":"12","author":"A Karak\u00fc\u00e7\u00fck","year":"2015","unstructured":"Karak\u00fc\u00e7\u00fck, A., Dirik, A.E.: Adaptive photo-response non-uniformity noise removal against image source attribution. Digit. Investig. 12, 66\u201376 (2015)","journal-title":"Digit. Investig."},{"key":"22_CR17","doi-asserted-by":"crossref","unstructured":"Kirchner, M., B\u00f6hme, R.: Synthesis of color filter array pattern in digital images. In: Delp, E.J., Dittmann, J., Memon, N., Wong, P.W. (eds.) Media Forensics and Security. Proceedings of SPIE, vol. 7254, p. 72540K (2009)","DOI":"10.1117\/12.805988"},{"key":"22_CR18","doi-asserted-by":"crossref","unstructured":"Li, S., Karrenbauer, A., Saupe, D., Kuo, C.C.J.: Recovering missing coefficients in DCT-transformed images. In: IEEE International Conference on Image Processing (ICIP) (2011)","DOI":"10.1109\/ICIP.2011.6115738"},{"issue":"2","key":"22_CR19","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1109\/TIFS.2006.873602","volume":"1","author":"J Luk\u00e1\u0161","year":"2006","unstructured":"Luk\u00e1\u0161, J., Fridrich, J., Goljan, M.: Digital camera identification from sensor pattern noise. IEEE Trans. Inf. Forensics Secur. (TIFS) 1(2), 205\u2013214 (2006)","journal-title":"IEEE Trans. Inf. Forensics Secur. (TIFS)"},{"key":"22_CR20","doi-asserted-by":"crossref","unstructured":"Marra, F., Roli, F., Cozzolino, D., Sansone, C., Verdoliva, L.: Attacking the triangle test in sensor-based camera identification. In: IEEE International Conference on Image Processing (ICIP) (2014)","DOI":"10.1109\/ICIP.2014.7026074"},{"key":"22_CR21","unstructured":"Mohanty, M., Zhang, M., Asghar, M.R., Russello, G.: e-PRNU: Encrypted domain PRNU-based camera attribution for preserving privacy. IEEE Trans. Dependable Secur. Comput. (TDSC) (2019)"},{"key":"22_CR22","doi-asserted-by":"crossref","unstructured":"Quiring, E., Arp, D., Rieck, K.: Forgotten siblings: unifying attacks on machine learning and digital watermarking. In: IEEE European Symposium on Security and Privacy (EuroS&P) (2018)","DOI":"10.1109\/EuroSP.2018.00041"},{"key":"22_CR23","doi-asserted-by":"crossref","unstructured":"Quiring, E., Kirchner, M.: Fragile sensor fingerprint camera identification. In: IEEE International Workshop on Information Forensics and Security (WIFS) (2015)","DOI":"10.1109\/WIFS.2015.7368580"},{"issue":"6","key":"22_CR24","doi-asserted-by":"publisher","first-page":"835","DOI":"10.1109\/TCOM.1983.1095893","volume":"31","author":"RC Reininger","year":"1983","unstructured":"Reininger, R.C., Gibson, J.D.: Distributions of the two-dimensional DCT coefficients for images. IEEE Trans. Commun. 31(6), 835\u2013839 (1983)","journal-title":"IEEE Trans. Commun."},{"issue":"3","key":"22_CR25","doi-asserted-by":"publisher","first-page":"1050","DOI":"10.1109\/TIFS.2011.2119314","volume":"6","author":"MC Stamm","year":"2011","unstructured":"Stamm, M.C., Liu, K.J.R.: Anti-forensics of digital image compression. IEEE Trans. Inf. Forensics Secur. (TIFS) 6(3), 1050\u20131065 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur. (TIFS)"},{"issue":"8","key":"22_CR26","doi-asserted-by":"publisher","first-page":"1941","DOI":"10.1109\/TIFS.2017.2697402","volume":"12","author":"D Valsesia","year":"2017","unstructured":"Valsesia, D., Coluccia, G., Bianchi, T., Magli, E.: User authentication via PRNU-based physical unclonable functions. IEEE Trans. Inf. Forensics Secur. (TIFS) 12(8), 1941\u20131956 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur. (TIFS)"},{"key":"22_CR27","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511754661","volume-title":"Quantization Noise","author":"B Widrow","year":"2008","unstructured":"Widrow, B., Koll\u00e1r, I.: Quantization Noise. Cambridge University Press, Cambridge (2008)"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2019"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-29959-0_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T00:05:57Z","timestamp":1726358757000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-29959-0_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030299583","9783030299590"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-29959-0_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"15 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/conf.laas.fr\/esorics\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"344","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"67","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3,2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}