{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T01:40:08Z","timestamp":1748828408122,"version":"3.41.0"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319319599"},{"type":"electronic","value":"9783319319605"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-31960-5_8","type":"book-chapter","created":{"date-parts":[[2016,3,30]],"date-time":"2016-03-30T08:15:28Z","timestamp":1459325728000},"page":"83-93","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Source Camera Model Identification Using Features from Contaminated Sensor Noise"],"prefix":"10.1007","author":[{"given":"Amel","family":"Tuama","sequence":"first","affiliation":[]},{"given":"Frederic","family":"Comby","sequence":"additional","affiliation":[]},{"given":"Marc","family":"Chaumont","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,31]]},"reference":[{"issue":"2","key":"8_CR1","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1109\/TIFS.2006.873602","volume":"1","author":"J Lukas","year":"2006","unstructured":"Lukas, J., Fridrich, J., Goljan, M.: Digital camera identification from sensor pattern noise. IEEE Trans. Inf. Forensics Secur. 1(2), 205\u2013214 (2006)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Choi, S., Lam, E.Y., Wong, K.K.Y.: Source camera identification using footprints from lens aberration. In: Proceedings of the SPIE, vol. 6069, San Jose, CA, p. 60690J60690J8 (2006)","DOI":"10.1117\/12.649775"},{"key":"8_CR3","unstructured":"Dirik, A.E., Sencar, H.T., Memon, N.: Source camera identification based on sensor dust characteristics. In: IEEE Workshop on Signal Processing Applications for Public Security and Forensics, SAFE 2007, Washington, USA, 11\u201313 April 2007"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Bayram, S., Sencar, H.T., Memon, N.: Improvements on source camera model identification based on CFA interpolation. In: International Conference on Digital Forensics, Orlando, FL (2006)","DOI":"10.1109\/ICIP.2005.1530330"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Kharrazi, M., Sencar, H.T., Memon, N.: Blind source camera identification. In: 2004 International Conference on Image Processing, ICIP 2004, vol. 1, pp. 709\u2013712, October 2004","DOI":"10.1109\/ICIP.2004.1418853"},{"issue":"3","key":"8_CR6","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1109\/TIFS.2008.926993","volume":"3","author":"O Celiktutan","year":"2008","unstructured":"Celiktutan, O., Sankur, B., Avcibas, I.: Blind identification of source cell-phone model. IEEE Trans. Inf. Forensics Secur. 3(3), 553\u2013566 (2008)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"8_CR7","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MSP.2008.931078","volume":"26","author":"J Fridrich","year":"2009","unstructured":"Fridrich, J.: Digital image forensic using sensor noise. IEEE Signal Process. Mag. 26(2), 26\u201337 (2009)","journal-title":"IEEE Signal Process. Mag."},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Goljan, M., Fridrich, J.: Estimation of lens distortion correction from single images. In: Proceedings of the SPIE, Electronic Imaging, MediaWatermarking, Security, and Forensics, San Francisco, CA, 26 February 2014","DOI":"10.1117\/12.2036804"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Goljan, M., Fridrich, J.: Camera identification from cropped and scaled images. In: Proceedings of the SPIE, Electronic Imaging, Forensics, Security, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, 26\u201331 January 2008","DOI":"10.1117\/12.766732"},{"key":"8_CR10","doi-asserted-by":"publisher","first-page":"560","DOI":"10.1049\/iet-cvi.2012.0044","volume":"6","author":"C-T Li","year":"2012","unstructured":"Li, C.-T., Satta, R.: Empirical investigation into the correlation between vignetting effect and the quality of sensor pattern noise. IET Comput. Vis. 6, 560\u2013566 (2012)","journal-title":"IET Comput. Vis."},{"issue":"3","key":"8_CR11","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"J Fridrich","year":"2012","unstructured":"Fridrich, J., Kodovsky, J.: Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. 7(3), 868\u2013882 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Qiu, X., Li, H., Luo, W., Huang, J.: A universal image forensic strategy based on steganalytic model. In: Proceedings of the 2nd ACM Workshop on Information Hiding and Multimedia Security IHMMSec, Salzburg, Austria, pp. 165\u2013170 (2014)","DOI":"10.1145\/2600918.2600941"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Cozzolino, D., Gragnaniello, D., Verdoliva, L.: Image forgery detection through residual-based local descriptors and block-matching. In: IEEE International Conference on Image Processing (ICIP), Paris, France, pp. 5297\u20135301, October 2014","DOI":"10.1109\/ICIP.2014.7026072"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Filler, T., Fridrich, J., Goljan, M.: Using sensor pattern noise for camera model identification. In: Proceedings of the 15th IEEE International Conference on Image Processing ICIP, San Diego, California, 12\u201315 October, pp. 1296\u20131299 (2008)","DOI":"10.1109\/ICIP.2008.4712000"},{"key":"8_CR15","unstructured":"Bengio, Y., Delalleau, O., Le Roux, N.: The curse of dimensionality for local kernel machines, Technical report 1258, D\u00e9partement d\u2019informatique et recherche op\u00e9rationnelle, Universit\u00e9 de Montr\u00e9al (2005)"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Gloe, T., B\u00f6hme, R.: The dresden image database for benchmarking digital image forensics. In: Proceedings of the ACM Symposium on Applied Computing, SAC 2010, New York, NY, USA, pp. 1584\u20131590 (2010)","DOI":"10.1145\/1774088.1774427"},{"key":"8_CR17","unstructured":"Chang, C.-C., Lin, C.-J.: Libsvm: a library for support vector machines. ACM Trans. Intell. Syst. Technol. (TIST) 2(3), 27:127:27 (2011). Software available at http:\/\/www.csie.ntu.edu.tw\/cjlin\/libsvm"},{"key":"8_CR18","unstructured":"Hsu, C.-W., Chang, C.-C., Lin, C.-J.: A practical guide to support vector classification, Technical report, Department of Computer Science, National Taiwan University (2003). http:\/\/www.csie.ntu.edu.tw\/~cjlin\/papers\/guide\/guide.pdf"}],"container-title":["Lecture Notes in Computer Science","Digital-Forensics and Watermarking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-31960-5_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T01:18:49Z","timestamp":1748827129000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-31960-5_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319319599","9783319319605"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-31960-5_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"31 March 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}