{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T01:40:08Z","timestamp":1748828408058,"version":"3.41.0"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319319599"},{"type":"electronic","value":"9783319319605"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-31960-5_2","type":"book-chapter","created":{"date-parts":[[2016,3,30]],"date-time":"2016-03-30T08:15:28Z","timestamp":1459325728000},"page":"18-27","source":"Crossref","is-referenced-by-count":4,"title":["Camera Source Identification with Limited Labeled Training Set"],"prefix":"10.1007","author":[{"given":"Yue","family":"Tan","sequence":"first","affiliation":[]},{"given":"Bo","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Ming","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yanqing","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Xiangwei","family":"Kong","sequence":"additional","affiliation":[]},{"given":"Yunqing","family":"Shi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,31]]},"reference":[{"key":"2_CR1","first-page":"205","volume":"12","author":"J Fridrich","year":"2006","unstructured":"Fridrich, J., Luk\u00e1\u0161, J., Goljan, M.: Digital camera identifica-tion from sensor pattern noise. IEEE Trans. Inf. Forensics Secur. 12, 205\u2013214 (2006)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"doi-asserted-by":"crossref","unstructured":"Yu, B., Hu, Y., Jian, C.: Source camera identification using large components of sensor pattern noise. In: Proceedings of International Conference on Computer Science and its Applications, pp. 1\u20135 (2009)","key":"2_CR2","DOI":"10.1109\/CSA.2009.5404203"},{"doi-asserted-by":"crossref","unstructured":"Hu, Y., Li, C.-T., Jian, C.: Building fingerprints with infor-mation from three color bands for source camera identification. In: Proceedings of ACM Workshop on Multimedia in Forensics, Security and Intelligence, New York, pp. 111\u2013116 (2010)","key":"2_CR3","DOI":"10.1145\/1877972.1878001"},{"issue":"2","key":"2_CR4","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1109\/TIFS.2010.2046268","volume":"5","author":"C-T Li","year":"2010","unstructured":"Li, C.-T.: Source camera identification using enhanced sensor pattern noise. IEEE Trans. Inf. Forensics Secur. 5(2), 280\u2013287 (2010)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"doi-asserted-by":"crossref","unstructured":"Hu, Y., Jian, C., Li, C.-T.: Using improved imaging sensor pattern noise for source camera identification. In: Proceedings of IEEE International Conference on Multimedia & Expo (ICME), Singapore, pp. 1481\u20131486 (2010)","key":"2_CR5","DOI":"10.1109\/ICME.2010.5582952"},{"issue":"2","key":"2_CR6","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1109\/TIFS.2011.2168214","volume":"7","author":"X Kang","year":"2012","unstructured":"Kang, X., Li, Y., Qu, Z.: Enhanced source camera identifi-cation performance with a camera reference phase sensor pattern noise. IEEE Trans. Inf. Forensics Secur. 7(2), 393\u2013402 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2_CR7","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/978-1-4614-0757-7_6","volume-title":"Digital Image Forensics","author":"J Fridrich","year":"2013","unstructured":"Fridrich, J.: Sensor defects in digital image forensic. In: Sencar, H.T., Memon, N. (eds.) Digital Image Forensics, pp. 179\u2013218. Springer, New York (2013)"},{"issue":"1","key":"2_CR8","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1109\/TIFS.2006.890307","volume":"2","author":"A Swaminathan","year":"2007","unstructured":"Swaminathan, A., Wu, M., Liu, K.J.R.: Nonintrusive com-ponent forensics of visual sensors using output images. IEEE Trans. Inf. Forensics Secur. 2(1), 91\u2013105 (2007)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"2_CR9","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1109\/TIFS.2008.926993","volume":"3","author":"O Celiktutan","year":"2008","unstructured":"Celiktutan, O., Sankur, B., Avcibas, I.: Blind identification of source cell-phone model. IEEE Trans. Inf. Forensics Secur. 3(3), 553\u2013566 (2008)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"doi-asserted-by":"crossref","unstructured":"Xu, G., Shi, Y.Q.: Camera model identification using local binary patterns. In: Proceedings of IEEE International Conference on Multimedia & Expo (ICME), Melbourne, Australia, pp. 392\u2013397 (2012)","key":"2_CR10","DOI":"10.1109\/ICME.2012.87"},{"issue":"7","key":"2_CR11","doi-asserted-by":"publisher","first-page":"971","DOI":"10.1109\/TPAMI.2002.1017623","volume":"24","author":"T Ojala","year":"2002","unstructured":"Ojala, T., Pietikainen, M., Maenpaa, T.: Multiresolution gray-scale and rotation invariant texture classification with local binary patterns. IEEE Trans. Pattern Anal. Mach. Intell. 24(7), 971\u2013987 (2002)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"2_CR12","volume-title":"Cognition and Categorization, Mul-timedia Systems","author":"E Roach","year":"1978","unstructured":"Roach, E., Lloyd, B.B.: Cognition and Categorization, Mul-timedia Systems. Hillsdale, New Jersey (1978)"},{"key":"2_CR13","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/2076.001.0001","volume-title":"Conceptual Spaces: The Geometry of Thought","author":"P G\u00e4rdenfors","year":"2000","unstructured":"G\u00e4rdenfors, P.: Conceptual Spaces: The Geometry of Thought. England, London (2000)"},{"doi-asserted-by":"crossref","unstructured":"Dai, D., Gool, L.V.: Ensemble projection for semi-surpervised image classification. In: Proceedings of IEEE International Conference on Computer Vision (ICCV), Sydney, Australia, pp. 2072\u20132079 (2013)","key":"2_CR14","DOI":"10.1109\/ICCV.2013.259"},{"doi-asserted-by":"crossref","unstructured":"Gloe, T., Bohme, R.: The \u2019Dresden Image Database\u2019 for benchmarking digital image forensics. In: Proceedings of ACM Symposium on Applied Computing, Sierre, Switzerland, vol. 3(2\u20134) (2010)","key":"2_CR15","DOI":"10.1080\/15567281.2010.531500"},{"issue":"3","key":"2_CR16","first-page":"27:1","volume":"2","author":"CC Chang","year":"2011","unstructured":"Chang, C.C., Lin, C.J.: LIBSVM: a library for support vector machine. ACM Trans. Intell. Syst. Technol. N.Y. 2(3), 27:1\u201327:27 (2011). Software, [Online]. Avaliable: http:\/\/www.cise.edu.tw\/\u00a0cjlin\/libsvm","journal-title":"ACM Trans. Intell. Syst. Technol. N.Y."}],"container-title":["Lecture Notes in Computer Science","Digital-Forensics and Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-31960-5_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T01:18:47Z","timestamp":1748827127000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-31960-5_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319319599","9783319319605"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-31960-5_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}