{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T08:24:55Z","timestamp":1761812695713,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":45,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032081230","type":"print"},{"value":"9783032081247","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T00:00:00Z","timestamp":1761868800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T00:00:00Z","timestamp":1761868800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-08124-7_17","type":"book-chapter","created":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T08:22:55Z","timestamp":1761812575000},"page":"279-299","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Spoofing Camera Source Attribution via\u00a0PRNU Transfer Attacks on\u00a0Physical and\u00a0AI Generated Images"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2307-2651","authenticated-orcid":false,"given":"Shahriar Rahman","family":"Khan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5572-8504","authenticated-orcid":false,"given":"Tariqul","family":"Islam","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1374-0724","authenticated-orcid":false,"given":"Raiful","family":"Hasan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,31]]},"reference":[{"key":"17_CR1","unstructured":"A\u00a0V, M.: Lowpass, highpass, bandreject and bandpass filters in image processing (2021). https:\/\/blog.minhazav.dev\/lowpass-highpass-band-reject-and-band-pass-filter\/"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Akbari, Y., Almaadeed, N., Al-Maadeed, S., Khelifi, F., Bouridane, A.: PRNU-net: a deep learning approach for source camera model identification based on videos taken with smartphone. In: 2022 26th international conference on pattern recognition (ICPR), pp. 599\u2013605. IEEE (2022)","DOI":"10.1109\/ICPR56361.2022.9956272"},{"key":"17_CR3","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.diin.2016.10.002","volume":"19","author":"K Akshatha","year":"2016","unstructured":"Akshatha, K., Karunakar, A.K., Anitha, H., Raghavendra, U., Shetty, D.: Digital camera identification using PRNU: a feature based approach. Digit. Investig. 19, 69\u201377 (2016)","journal-title":"Digit. Investig."},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Altinisik, E., Tasdemir, K., Sencar, H.T.: Extracting PRNU noise from H.264 coded videos. In: 2018 26th European signal processing conference (EUSIPCO), pp. 1367\u20131371. IEEE (2018)","DOI":"10.23919\/EUSIPCO.2018.8553173"},{"issue":"8","key":"17_CR5","first-page":"2219","volume":"64","author":"LA Aranda","year":"2017","unstructured":"Aranda, L.A., Reviriego, P., Maestro, J.A.: Error detection technique for a median filter. IEEE Trans. Nucl. Sci. 64(8), 2219\u20132226 (2017)","journal-title":"IEEE Trans. Nucl. Sci."},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Banerjee, S., Mirjalili, V., Ross, A.: Spoofing PRNU patterns of iris sensors while preserving iris recognition. In: 2019 IEEE 5th International Conference on Identity, Security, and Behavior Analysis (ISBA), pp. 1\u201310. IEEE (2019)","DOI":"10.1109\/ISBA.2019.8778483"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Behare, M.S., Bhalchandra, A., Kumar, R.: Source camera identification using photo response noise uniformity. In: 2019 3rd International Conference on Electronics, Communication and Aerospace Technology (ICECA), pp. 731\u2013734. IEEE (2019)","DOI":"10.1109\/ICECA.2019.8822212"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Bhat, N.N., Bianchi, T.: Investigating inconsistencies in PRNU-based camera identification. In: 2022 IEEE International Conference on Image Processing (ICIP), pp. 851\u2013855. IEEE (2022)","DOI":"10.1109\/ICIP46576.2022.9897923"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Cabello, F., Le\u00f3n, J., Iano, Y., Arthur, R.: Implementation of a fixed-point 2D Gaussian filter for image processing based on FPGA. In: 2015 Signal Processing: Algorithms, Architectures, Arrangements, and Applications (SPA), pp. 28\u201333. IEEE (2015)","DOI":"10.1109\/SPA.2015.7365108"},{"issue":"1","key":"17_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13635-020-0101-7","volume":"2020","author":"D Cozzolino","year":"2020","unstructured":"Cozzolino, D., Marra, F., Gragnaniello, D., Poggi, G., Verdoliva, L.: Combining PRNU and noiseprint for robust and efficient device source identification. EURASIP J. Inf. Secur. 2020(1), 1\u201312 (2020). https:\/\/doi.org\/10.1186\/s13635-020-0101-7","journal-title":"EURASIP J. Inf. Secur."},{"key":"17_CR11","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1109\/TIFS.2019.2916364","volume":"15","author":"D Cozzolino","year":"2019","unstructured":"Cozzolino, D., Verdoliva, L.: Noiseprint: a CNN-based camera model fingerprint. IEEE Trans. Inf. Forensics Secur. 15, 144\u2013159 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"17_CR12","unstructured":"Deng, G., Cahill, L.: An adaptive Gaussian filter for noise reduction and edge detection. In: 1993 IEEE Conference Record Nuclear Science Symposium and Medical Imaging Conference, pp. 1615\u20131619. IEEE (1993)"},{"issue":"1","key":"17_CR13","doi-asserted-by":"publisher","first-page":"470","DOI":"10.1364\/OE.22.000470","volume":"22","author":"AE Dirik","year":"2014","unstructured":"Dirik, A.E., Karak\u00fc\u00e7\u00fck, A.: Forensic use of photo response non-uniformity of imaging sensors and a counter method. Opt. Express 22(1), 470\u2013482 (2014)","journal-title":"Opt. Express"},{"key":"17_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13640-018-0244-3","volume":"2018","author":"N Farhangi","year":"2018","unstructured":"Farhangi, N., Ghofrani, S.: Using BayesShrink, BiShrink, weighted BayesShrink, and weighted BiShrink in NSST and SWT for despeckling SAR images. EURASIP J. Image Video Process. 2018, 1\u201318 (2018)","journal-title":"EURASIP J. Image Video Process."},{"key":"17_CR15","unstructured":"Fontani, M.: How to use amped authenticate video PRNU to check whether a video and some images are from the same camera (2020). https:\/\/blog.ampedsoftware.com\/2020\/12\/22\/how-to-use-amped-authenticate-video-prnu"},{"key":"17_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"454","DOI":"10.1007\/978-3-642-04438-0_38","volume-title":"Digital Watermarking","author":"M Goljan","year":"2009","unstructured":"Goljan, M.: Digital camera identification from images \u2013 estimating false acceptance probability. In: Kim, H.-J., Katzenbeisser, S., Ho, A.T.S. (eds.) IWDW 2008. LNCS, vol. 5450, pp. 454\u2013468. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-04438-0_38"},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Goljan, M., Fridrich, J., Filler, T.: Large scale test of sensor fingerprint camera identification. In: Media Forensics and Security, vol.\u00a07254, pp. 170\u2013181. SPIE (2009)","DOI":"10.1117\/12.805701"},{"issue":"5","key":"17_CR18","first-page":"304","volume":"1","author":"G Gupta","year":"2011","unstructured":"Gupta, G., et al.: Algorithm for image processing using improved median filter and comparison of mean, median and improved median filter. Int. J. Soft Comput. Eng. (IJSCE) 1(5), 304\u2013311 (2011)","journal-title":"Int. J. Soft Comput. Eng. (IJSCE)"},{"key":"17_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/978-3-030-95398-0_7","volume-title":"Digital Forensics and Watermarking","author":"A Hsiao","year":"2022","unstructured":"Hsiao, A., Takenouchi, T., Kikuchi, H., Sakiyama, K., Miura, N.: More accurate and\u00a0robust PRNU-based source camera identification with\u00a03-step 3-class approach. In: Zhao, X., Piva, A., Comesa\u00f1a-Alfaro, P. (eds.) IWDW 2021. LNCS, vol. 13180, pp. 87\u2013101. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-95398-0_7"},{"key":"17_CR20","doi-asserted-by":"crossref","unstructured":"Ismael, A.A., Baykara, M.: Digital image denoising techniques based on multi-resolution wavelet domain with spatial filters: a review. Traitement Signal 38(3) (2021)","DOI":"10.18280\/ts.380311"},{"key":"17_CR21","doi-asserted-by":"publisher","first-page":"52455","DOI":"10.1109\/ACCESS.2021.3070478","volume":"9","author":"M Iuliani","year":"2021","unstructured":"Iuliani, M., Fontani, M., Piva, A.: A leak in PRNU based source identification-questioning fingerprint uniqueness. IEEE Access 9, 52455\u201352463 (2021)","journal-title":"IEEE Access"},{"issue":"8","key":"17_CR22","doi-asserted-by":"publisher","first-page":"699","DOI":"10.1016\/j.aeue.2014.02.003","volume":"68","author":"A Jaiswal","year":"2014","unstructured":"Jaiswal, A., Upadhyay, J., Somkuwar, A.: Image denoising and quality measurements by using filtering and wavelet based techniques. AEU-Int. J. Electron. Commun. 68(8), 699\u2013705 (2014)","journal-title":"AEU-Int. J. Electron. Commun."},{"key":"17_CR23","unstructured":"Jayaswal, V.: Performance metrics: confusion matrix, precision, recall, and F1 score (2020). https:\/\/archive.ph\/bkY1l"},{"issue":"2","key":"17_CR24","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1109\/TIFS.2011.2168214","volume":"7","author":"X Kang","year":"2011","unstructured":"Kang, X., Li, Y., Qu, Z., Huang, J.: Enhancing source camera identification performance with a camera reference phase sensor pattern noise. IEEE Trans. Inf. Forensics Secur. 7(2), 393\u2013402 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"17_CR25","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.diin.2019.06.001","volume":"30","author":"A Karak\u00fc\u00e7\u00fck","year":"2019","unstructured":"Karak\u00fc\u00e7\u00fck, A., Dirik, A.E.: PRNU based source camera attribution for image sets anonymized with patch-match algorithm. Digit. Investig. 30, 43\u201351 (2019)","journal-title":"Digit. Investig."},{"issue":"4","key":"17_CR26","doi-asserted-by":"publisher","first-page":"809","DOI":"10.1109\/TIFS.2016.2636089","volume":"12","author":"P Korus","year":"2016","unstructured":"Korus, P., Huang, J.: Multi-scale analysis strategies in PRNU-based tampering localization. IEEE Trans. Inf. Forensics Secur. 12(4), 809\u2013824 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"17_CR27","doi-asserted-by":"publisher","first-page":"172","DOI":"10.33430\/V29N3THIE-2022-0035","volume":"29","author":"SC Law","year":"2022","unstructured":"Law, S.C., Law, N.F.: Performance enhancement of PRNU-based source identification for smart video surveillance. HKIE Trans. Hong Kong Inst. Eng. 29(3), 172\u2013181 (2022)","journal-title":"HKIE Trans. Hong Kong Inst. Eng."},{"issue":"20","key":"17_CR28","doi-asserted-by":"publisher","first-page":"5199","DOI":"10.3390\/rs14205199","volume":"14","author":"C Li","year":"2022","unstructured":"Li, C., Li, Z., Liu, X., Li, S.: The influence of image degradation on hyperspectral image classification. Remote Sens. 14(20), 5199 (2022)","journal-title":"Remote Sens."},{"issue":"11","key":"17_CR29","doi-asserted-by":"publisher","first-page":"6583","DOI":"10.3390\/app13116583","volume":"13","author":"J Li","year":"2023","unstructured":"Li, J., et al.: A novel PCA-based method for PRNU distillation to the benefit of source camera identification. Appl. Sci. 13(11), 6583 (2023)","journal-title":"Appl. Sci."},{"key":"17_CR30","doi-asserted-by":"crossref","unstructured":"Lukas, J., Fridrich, J., Goljan, M.: Determining digital image origin using sensor imperfections. In: Image and Video Communications and Processing 2005, vol.\u00a05685, pp. 249\u2013260. SPIE (2005)","DOI":"10.1117\/12.587105"},{"issue":"2","key":"17_CR31","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1109\/TIFS.2006.873602","volume":"1","author":"J Lukas","year":"2006","unstructured":"Lukas, J., Fridrich, J., Goljan, M.: Digital camera identification from sensor pattern noise. IEEE Trans. Inf. Forensics Secur. 1(2), 205\u2013214 (2006)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"17_CR32","doi-asserted-by":"crossref","unstructured":"Manisha, Li, C.T., Kotegar, K.A.: Source camera identification with a robust device fingerprint: evolution from image-based to video-based approaches. Sensors 23(17), 7385 (2023)","DOI":"10.3390\/s23177385"},{"key":"17_CR33","doi-asserted-by":"crossref","unstructured":"Manisha, Li, C.T., Lin, X., Kotegar, K.A.: Beyond PRNU: learning robust device-specific fingerprint for source camera identification. Sensors 22(20), 7871 (2022)","DOI":"10.3390\/s22207871"},{"issue":"9","key":"17_CR34","doi-asserted-by":"publisher","first-page":"2197","DOI":"10.1109\/TIFS.2017.2701335","volume":"12","author":"F Marra","year":"2017","unstructured":"Marra, F., Poggi, G., Sansone, C., Verdoliva, L.: Blind PRNU-based image clustering for source identification. IEEE Trans. Inf. Forensics Secur. 12(9), 2197\u20132211 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"7","key":"17_CR35","doi-asserted-by":"publisher","first-page":"3462","DOI":"10.3390\/s23073462","volume":"23","author":"F Mart\u00edn-Rodr\u00edguez","year":"2023","unstructured":"Mart\u00edn-Rodr\u00edguez, F., Isasi-de Vicente, F., Fern\u00e1ndez-Barciela, M.: A stress test for robustness of photo response nonuniformity (camera sensor fingerprint) identification on smartphones. Sensors 23(7), 3462 (2023)","journal-title":"Sensors"},{"key":"17_CR36","doi-asserted-by":"crossref","unstructured":"Maser, B., S\u00f6llinger, D., Uhl, A.: PRNU-based detection of finger vein presentation attacks. In: 2019 7th International Workshop on Biometrics and Forensics (IWBF), pp.\u00a01\u20136. IEEE (2019)","DOI":"10.1109\/IWBF.2019.8739203"},{"issue":"1","key":"17_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11227-024-06579-8","volume":"81","author":"T Nayerifard","year":"2025","unstructured":"Nayerifard, T., Amintoosi, H., Ghaemi Bafghi, A.: A robust PRNU-based source camera attribution with convolutional neural networks. J. Supercomput. 81(1), 1\u201324 (2025)","journal-title":"J. Supercomput."},{"key":"17_CR38","doi-asserted-by":"crossref","unstructured":"Remya, R., Beevi, A.B.: Novel video camera authentication based on peak to correlation energy of clustered sensor pattern noise. In: 2015 IEEE International Conference on Engineering and Technology (ICETECH), pp.\u00a01\u20135. IEEE (2015)","DOI":"10.1109\/ICETECH.2015.7274998"},{"issue":"4","key":"17_CR39","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1109\/TBIOM.2019.2942395","volume":"1","author":"U Scherhag","year":"2019","unstructured":"Scherhag, U., Debiasi, L., Rathgeb, C., Busch, C., Uhl, A.: Detection of face morphing attacks based on PRNU analysis. IEEE Trans. Biometr. Behav. Identity Sci. 1(4), 302\u2013317 (2019)","journal-title":"IEEE Trans. Biometr. Behav. Identity Sci."},{"issue":"1","key":"17_CR40","doi-asserted-by":"publisher","first-page":"33","DOI":"10.26599\/FIE.2023.9270030","volume":"16","author":"S Singh","year":"2024","unstructured":"Singh, S., Sehgal, V.K.: Exploring biomedical video source identification: transitioning from fuzzy-based systems to machine learning models. Fuzzy Inf. Eng. 16(1), 33\u201348 (2024)","journal-title":"Fuzzy Inf. Eng."},{"key":"17_CR41","doi-asserted-by":"crossref","unstructured":"Uhl, A., H\u00f6ller, Y.: Iris-sensor authentication using camera PRNU fingerprints. In: 2012 5th IAPR International Conference on Biometrics (ICB), pp. 230\u2013237. IEEE (2012)","DOI":"10.1109\/ICB.2012.6199813"},{"issue":"11","key":"17_CR42","doi-asserted-by":"publisher","first-page":"4174","DOI":"10.1109\/TCSVT.2020.3047084","volume":"31","author":"B Wang","year":"2020","unstructured":"Wang, B., Zhao, M., Wang, W., Dai, X., Li, Y., Guo, Y.: Adversarial analysis for source camera identification. IEEE Trans. Circuits Syst. Video Technol. 31(11), 4174\u20134186 (2020)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"17_CR43","doi-asserted-by":"crossref","unstructured":"Westin, C.F., Knutsson, H., Kikinis, R., et\u00a0al.: Adaptive image filtering. Handb. Med. Imaging 19\u201331 (2000)","DOI":"10.1016\/B978-012077790-7\/50005-9"},{"issue":"5","key":"17_CR44","doi-asserted-by":"publisher","first-page":"6617","DOI":"10.1007\/s11042-020-09763-z","volume":"80","author":"WC Yang","year":"2021","unstructured":"Yang, W.C., Jiang, J., Chen, C.H.: A fast source camera identification and verification method based on PRNU analysis for use in video forensic investigations. Multimed. Tools Appl. 80(5), 6617\u20136638 (2021)","journal-title":"Multimed. Tools Appl."},{"issue":"4","key":"17_CR45","doi-asserted-by":"publisher","first-page":"838","DOI":"10.4304\/jcp.7.4.838-841","volume":"7","author":"R Zhu","year":"2012","unstructured":"Zhu, R., Wang, Y.: Application of improved median filter on image processing. J. Comput. 7(4), 838\u2013841 (2012)","journal-title":"J. Comput."}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-08124-7_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T08:23:04Z","timestamp":1761812584000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-08124-7_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,31]]},"ISBN":["9783032081230","9783032081247"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-08124-7_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,31]]},"assertion":[{"value":"31 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Seoul","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isw2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/isc25.skku.edu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}