{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T20:19:09Z","timestamp":1743106749722,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319486796"},{"type":"electronic","value":"9783319486802"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-48680-2_64","type":"book-chapter","created":{"date-parts":[[2016,10,20]],"date-time":"2016-10-20T13:31:00Z","timestamp":1476970260000},"page":"735-746","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Using PNU-Based Techniques to Detect Alien Frames in Videos"],"prefix":"10.1007","author":[{"given":"Giuseppe","family":"Cattaneo","sequence":"first","affiliation":[]},{"given":"Gianluca","family":"Roscigno","sequence":"additional","affiliation":[]},{"given":"Andrea","family":"Bruno","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,21]]},"reference":[{"key":"64_CR1","doi-asserted-by":"crossref","unstructured":"Bayram, S., Sencar, H.T., Memon, N.: Video copy detection based on source device characteristics: a complementary approach to content-based methods. In: Proceedings of the 1st ACM International Conference on Multimedia Information Retrieval, pp. 435\u2013442. ACM (2008)","DOI":"10.1145\/1460096.1460167"},{"key":"64_CR2","doi-asserted-by":"crossref","unstructured":"Bayram, S., Sencar, H.T., Memon, N.: Efficient techniques for sensor fingerprint matching in large image and video databases. In: IS&T\/SPIE Electronic Imaging, vol. 7541, pp. 1\u20138. International Society for Optics and Photonics (2010)","DOI":"10.1117\/12.845737"},{"issue":"2","key":"64_CR3","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/s12652-011-0070-2","volume":"4","author":"A Castiglione","year":"2013","unstructured":"Castiglione, A., Cattaneo, G., Cembalo, M., Ferraro Petrillo, U.: Experimentations with source camera identification and online social networks. J. Ambient Intell. Humaniz. Comput. 4(2), 265\u2013274 (2013)","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"key":"64_CR4","doi-asserted-by":"crossref","unstructured":"Cattaneo, G., Faruolo, P., Ferraro Petrillo, U.: Experiments on improving sensor pattern noise extraction for source camera identification. In: Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), pp. 609\u2013616 (2012)","DOI":"10.1109\/IMIS.2012.35"},{"key":"64_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1007\/978-3-319-25903-1_42","volume-title":"Advanced Concepts for Intelligent Vision Systems","author":"G Cattaneo","year":"2015","unstructured":"Cattaneo, G., Ferraro Petrillo, U., Roscigno, G., De Fusco, C.: A PNU-based technique to detect forged regions in digital images. ACIVS 2015. LNCS, vol. 9386, pp. 486\u2013498. Springer, Heidelberg (2015). doi:\n                    10.1007\/978-3-319-25903-1_42"},{"key":"64_CR6","doi-asserted-by":"crossref","unstructured":"Cattaneo, G., Roscigno, G.: A possible pitfall in the experimental analysis of tampering detection algorithms. In: 17th International Conference on Network-Based Information Systems (NBiS 2014), pp. 279\u2013286 (2014)","DOI":"10.1109\/NBiS.2014.82"},{"key":"64_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1007\/978-3-642-55032-4_66","volume-title":"Information and Communication Technology","author":"G Cattaneo","year":"2014","unstructured":"Cattaneo, G., Roscigno, G., Ferraro Petrillo, U.: Experimental evaluation of an algorithm for the detection of tampered JPEG images. In: Linawati, Mahendra, M.S., Neuhold, E.J., Tjoa, A.M., You, I. (eds.) ICT-EurAsia 2014. LNCS, vol. 8407, pp. 643\u2013652. Springer, Heidelberg (2014)"},{"key":"64_CR8","doi-asserted-by":"crossref","unstructured":"Cattaneo, G., Roscigno, G., Ferraro Petrillo, U.: A scalable approach to source camera identification over Hadoop. In: IEEE 28th International Conference on Advanced Information Networking and Applications (AINA), pp. 366\u2013373. IEEE (2014)","DOI":"10.1109\/AINA.2014.47"},{"issue":"3","key":"64_CR9","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1016\/j.sigpro.2009.08.010","volume":"90","author":"A Cheddad","year":"2010","unstructured":"Cheddad, A., Condell, J., Curran, K., McKevitt, P.: Digital image steganography: survey and analysis of current methods. Signal Process. 90(3), 727\u2013752 (2010)","journal-title":"Signal Process."},{"key":"64_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1007\/978-3-540-77370-2_23","volume-title":"Information Hiding","author":"M Chen","year":"2008","unstructured":"Chen, M., Fridrich, J., Luk\u00e1\u0161, J., Goljan, M.: Imaging sensor noise as digital X-ray for revealing forgeries. In: Furon, T., Cayre, F., Do\u00ebrr, G., Bas, P. (eds.) IH 2007. LNCS, vol. 4567, pp. 342\u2013358. Springer, Heidelberg (2008)"},{"key":"64_CR11","doi-asserted-by":"crossref","unstructured":"Chen, M., Fridrich, J., Goljan, M., Luk\u00e1\u0161, J.: Source digital camcorder identification using sensor photo response non-uniformity. In: Electronic Imaging 2007, p. 65051G. International Society for Optics and Photonics (2007)","DOI":"10.1117\/12.696519"},{"issue":"1","key":"64_CR12","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/TIFS.2007.916285","volume":"3","author":"M Chen","year":"2008","unstructured":"Chen, M., Fridrich, J., Goljan, M., Luk\u00e1\u0161, J.: Determining image origin and integrity using sensor noise. IEEE Trans. Inf. Forensics Secur. 3(1), 74\u201390 (2008)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"64_CR13","doi-asserted-by":"crossref","unstructured":"Chierchia, G., Cozzolino, D., Poggi, G., Sansone, C., Verdoliva, L.: Guided filtering for PRNU-based localization of small-size image forgeries. In: International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2014, pp. 6231\u20136235. IEEE (2014)","DOI":"10.1109\/ICASSP.2014.6854802"},{"issue":"1","key":"64_CR14","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1109\/TIFS.2008.2012215","volume":"4","author":"H Farid","year":"2009","unstructured":"Farid, H.: Exposing digital forgeries from JPEG ghosts. IEEE Trans. Inf. Forensics Secur. 4(1), 154\u2013160 (2009)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"8","key":"64_CR15","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1016\/j.patrec.2005.10.010","volume":"27","author":"T Fawcett","year":"2006","unstructured":"Fawcett, T.: An introduction to ROC analysis. Pattern Recogn. Lett. 27(8), 861\u2013874 (2006)","journal-title":"Pattern Recogn. Lett."},{"issue":"2","key":"64_CR16","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1109\/TIFS.2006.873602","volume":"1","author":"J Fridrich","year":"2006","unstructured":"Fridrich, J., Luk\u00e1\u0161, J., Goljan, M.: Digital camera identification from sensor noise. IEEE Trans. Inf. Secur. Forensics 1(2), 205\u2013214 (2006)","journal-title":"IEEE Trans. Inf. Secur. Forensics"},{"key":"64_CR17","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M., Du, R.: Steganalysis based on JPEG compatibility. In: International Symposium on the Convergence of IT and Communications (ITCom), vol. 4518, pp. 275\u2013280. International Society for Optics and Photonics (2001)","DOI":"10.1117\/12.448213"},{"key":"64_CR18","doi-asserted-by":"crossref","unstructured":"Goljan, M., Fridrich, J., Filler, T.: Large scale test of sensor fingerprint camera identification. In: IS&T\/SPIE, Electronic Imaging, Security and Forensics of Multimedia Contents XI, vol. 7254, pp. 1\u201312. International Society for Optics and Photonics (2009)","DOI":"10.1117\/12.805701"},{"key":"64_CR19","unstructured":"Hsu, C.C., Hung, T.Y., Lin, C.W., Hsu, C.T.: Video forgery detection using correlation of noise residue. In: IEEE 10th Workshop on Multimedia Signal Processing, 2008, pp. 170\u2013174. IEEE (2008)"},{"key":"64_CR20","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/978-1-4614-3501-3_3","volume-title":"The Era of Interactive Media","author":"DK Hyun","year":"2013","unstructured":"Hyun, D.K., Lee, M.J., Ryu, S.J., Lee, H.Y., Lee, H.K.: Forgery detection for surveillance video. In: Hyun, D.-K., Lee, M.-J., Ryu, S.-J., Lee, H.-Y., Lee, H.-K. (eds.) The Era of Interactive Media, pp. 25\u201336. Springer, Heidelberg (2013)"},{"key":"64_CR21","unstructured":"ITU Telecommunication Standardization Sector: H.264: advanced video coding for generic audiovisual services, February 2016. \n                    http:\/\/www.itu.int\/rec\/T-REC-H.264\n                    \n                  . Accessed 30 Apr 2016"},{"key":"64_CR22","doi-asserted-by":"crossref","unstructured":"Luk\u00e1\u0161, J., Fridrich, J., Goljan, M.: Detecting digital image forgeries using sensor pattern noise. In: Electronic Imaging 2006, p. 60720Y. International Society for Optics and Photonics (2006)","DOI":"10.1117\/12.640109"},{"key":"64_CR23","volume-title":"H.264 and MPEG-4 Video Compression: Video Coding for Next-Generation Multimedia","author":"IE Richardson","year":"2004","unstructured":"Richardson, I.E.: H.264 and MPEG-4 Video Compression: Video Coding for Next-Generation Multimedia. Wiley, Hoboken (2004)"},{"key":"64_CR24","doi-asserted-by":"crossref","unstructured":"Ye, S., Sun, Q., Chang, E.C.: Detecting digital image forgeries by measuring inconsistencies of blocking artifact. In: IEEE International Conference on Multimedia and Expo 2007, pp. 12\u201315. IEEE, July 2007","DOI":"10.1109\/ICME.2007.4284574"}],"container-title":["Lecture Notes in Computer Science","Advanced Concepts for Intelligent Vision Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-48680-2_64","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T22:13:37Z","timestamp":1558476817000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-48680-2_64"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319486796","9783319486802"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-48680-2_64","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"21 October 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACIVS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Concepts for Intelligent Vision Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lecce","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 October 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 October 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acivs2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/acivs.org\/acivs2016\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}