{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T04:10:13Z","timestamp":1749787813380,"version":"3.41.0"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319498058"},{"type":"electronic","value":"9783319498065"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49806-5_22","type":"book-chapter","created":{"date-parts":[[2016,11,23]],"date-time":"2016-11-23T12:34:29Z","timestamp":1479904469000},"page":"409-425","source":"Crossref","is-referenced-by-count":1,"title":["Digital Forensic Source Camera Identification with Efficient Feature Selection Using Filter, Wrapper and Hybrid Approaches"],"prefix":"10.1007","author":[{"given":"Venkata Udaya","family":"Sameer","sequence":"first","affiliation":[]},{"given":"S.","family":"Sugumaran","sequence":"additional","affiliation":[]},{"given":"Ruchira","family":"Naskar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,24]]},"reference":[{"issue":"3","key":"22_CR1","doi-asserted-by":"crossref","first-page":"553","DOI":"10.1109\/TIFS.2008.926993","volume":"3","author":"O Celiktutan","year":"2008","unstructured":"Celiktutan, O., Sankur, B., Avcibas, I.: Blind identification of source cell-phone model. IEEE Trans. Inf. Forensics Secur. 3(3), 553\u2013566 (2008)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"Bayram, S., Sencar, H.T., Memon, N.: Improvements on source camera-model identification based on CFA interpolation. In: Proceeding of WG (2006)","DOI":"10.1109\/ICIP.2005.1530330"},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Kharrazi, M., Sencar, H.T., Memon, N.: Blind source camera identification. In: International Conference on Image Processing (ICIP) (2004)","DOI":"10.1109\/ICIP.2004.1418853"},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"Tsai, M.-J.: Adaptive feature selection for digital camera source identification. In: IEEE International Symposium on Circuits, Systems, pp. 412\u2013415 (2008)","DOI":"10.1109\/ISCAS.2008.4541442"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Tsai, M.-J.: A Hybrid model for digital camera source identification. IEEE International Conference on Image Processing (ICIP), pp. 2901\u20132904 (2009)","DOI":"10.1109\/ICIP.2009.5413414"},{"issue":"2","key":"22_CR6","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1109\/TIFS.2006.873602","volume":"1","author":"J Lukas","year":"2006","unstructured":"Lukas, J.: Digital camera identification from sensor pattern noise. IEEE Trans. Inf. Forensics Secur. 1(2), 205\u2013214 (2006)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"22_CR7","doi-asserted-by":"crossref","first-page":"280","DOI":"10.1109\/TIFS.2010.2046268","volume":"5","author":"C-T Li","year":"2010","unstructured":"Li, C.-T.: Digital camera identification from sensor pattern noise. IEEE Trans. Inf. Forensics Secur. 5(2), 280\u2013287 (2010)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"22_CR8","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1109\/TIFS.2015.2478748","volume":"11","author":"X Lin","year":"2016","unstructured":"Lin, X., Li, C.-T.: Preprocessing reference sensor pattern noise via spectrum equalization. IEEE Trans. Inf. Forensics Secur. 11(1), 126\u2013140 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"Biney, A.G., Sellahewa, H.: Analysis of smartphone model identification using digital images. In: International Conference on Image Processing (ICIP) (2013)","DOI":"10.1109\/ICIP.2013.6738924"},{"issue":"4","key":"22_CR10","doi-asserted-by":"crossref","first-page":"041102","DOI":"10.1117\/1.2401138","volume":"15","author":"S Bayram","year":"2006","unstructured":"Bayram, S., Avcibas, I., Sankur, B., Memon, N.: Image manipulation detection. J. Electronic Imaging 15(4), 041102 (2006). International Society for Optics and Photonics","journal-title":"J. Electronic Imaging"},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"Avcibas, I., Sankur, B., Memon, N.: Image steganalysis with binary similarity measures. In: International Conference on Image Processing (ICIP), vol. 3 (2002)","DOI":"10.1109\/ICIP.2002.1039053"},{"issue":"2","key":"22_CR12","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1109\/TIP.2002.807363","volume":"12","author":"I Avcibas","year":"2003","unstructured":"Avcibas, I., Memon, N., Sankur, B.: Steganalysis using image quality metrics. IEEE Trans. Image Process. 12(2), 221\u2013229 (2003)","journal-title":"IEEE Trans. Image Process."},{"issue":"1","key":"22_CR13","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1109\/TIFS.2005.863485","volume":"1","author":"S Lyu","year":"2006","unstructured":"Lyu, S., Farid, H.: Steganalysis using higher-order image statistics. IEEE Trans. Inf. Forensics Secur. 1(1), 111\u2013119 (2006)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"22_CR14","unstructured":"Guyon, I., Elisseeff, A.: An introduction to variable and feature selection. J. Mach. Learn. Res. 3, 1157\u20131182 (2003)"},{"key":"22_CR15","doi-asserted-by":"crossref","unstructured":"Schaffernicht, E., Gross, H.M.: Weighted mutual information for feature selection. In: International Conference on Artificial Neural Networks (2011)","DOI":"10.1007\/978-3-642-21738-8_24"},{"issue":"1","key":"22_CR16","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/s13721-012-0006-6","volume":"1","author":"J Hulse Van","year":"2012","unstructured":"Van Hulse, J., Khoshgoftaar, T.M., Napolitano, A., Wald, R.: Threshold-based feature selection techniques for high-dimensional bioinformatics data. Network Modeling Anal. Health Inform. Bioinform. 1(1), 47\u201361 (2012)","journal-title":"Network Modeling Anal. Health Inform. Bioinform."},{"key":"22_CR17","unstructured":"Liu, D., Cho, S.Y., Sun, D.M., Qiu, Z.D.: A spearman correlation coefficient ranking for matching-score fusion on speaker recognition. In: TENCON (2010)"},{"key":"22_CR18","doi-asserted-by":"crossref","unstructured":"Yuan, C., Sun, D., Liu, D., Cho, S. Y., Zhang, Y.: A research on feature selection and fusion in palmprint recognition. In: International Workshop on Emerging Techniques and Challenges for Hand-Based Biometrics (ETCHB) (2010)","DOI":"10.1109\/ETCHB.2010.5559290"},{"key":"22_CR19","doi-asserted-by":"crossref","unstructured":"Onpans, J., Rasmequan, S., Jantarakongkul, B., Chinnasarn, K., Rodtook, A.: Intrusion feature selection using mmodified heuristic greedy algorithm of itemset. In: International Symposium on Communications and Information Technologies (ISCIT) (2013)","DOI":"10.1109\/ISCIT.2013.6645936"},{"key":"22_CR20","doi-asserted-by":"crossref","unstructured":"Rachburee, N., Punlumjeak, W.: A comparision of feature selection approach between Greedy, IG-ratio, Chi-square, and mRMR in educational mining. In: International Conference on Information Technology and Electrical Engineering (ICITEE) (2015)","DOI":"10.1109\/ICITEED.2015.7408983"},{"key":"22_CR21","doi-asserted-by":"crossref","unstructured":"Bhasin, V., Bedi, P., Singhal, A.: Feature selection for steganalysis based on modified stochastic diffusion search using fisher score. In: International Conference on Advances in Computing, Communications and Informatics (ICACCI), September 2014","DOI":"10.1109\/ICACCI.2014.6968568"},{"key":"22_CR22","doi-asserted-by":"crossref","unstructured":"Singh, B., Sankhwar, J.S., Vyas, O.P.: Optimization of feature selection method for high dimensional data using fisher score and minimum spanning tree. In: INDICON, December 2014","DOI":"10.1109\/INDICON.2014.7030450"},{"key":"22_CR23","doi-asserted-by":"crossref","unstructured":"Xu, J., Yin, Y., Man, H., He, H.: Feature selection based on sparse imputation. In: International Joint Conference on Neural Networks (IJCNN), June 2012","DOI":"10.1109\/IJCNN.2012.6252639"},{"issue":"1","key":"22_CR24","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1016\/S0004-3702(97)00043-X","volume":"97","author":"R Kohavi","year":"1997","unstructured":"Kohavi, R., John, G.H.: Wrappers for feature subset selection. Artif. Intell. 97(1), 273\u2013324 (1997)","journal-title":"Artif. Intell."},{"key":"22_CR25","doi-asserted-by":"crossref","unstructured":"Chen, Y.-H., Lin, T.-C.: Dimension reduction techniques for accessing chinese readability. In: International Conference on Machine Learning and Cybernetics, July 2014","DOI":"10.1109\/ICMLC.2014.7009154"},{"key":"22_CR26","doi-asserted-by":"crossref","unstructured":"Packianather, M.S., kapoor, B.: A wrapper-based feature selection approach using bees algorithm for a wood defect classification system. In: System of Systems Engineering Conference (2015)","DOI":"10.1109\/SYSOSE.2015.7151902"},{"key":"22_CR27","unstructured":"Yu, E., Cho, S.: GA-SVM wrapper approach for feature subset selection in keystroke dynamics identity verification. In: Proceedings of the International Joint Conference on Neural Networks (2003)"},{"key":"22_CR28","unstructured":"Talukder, K.H., Harada, K.: Haar wavelet based approach for image compression and quality assessment of compressed image. Int. J. Appl. Math. 36(1) (2007)"},{"key":"22_CR29","unstructured":"Gunawan, I.P., Halim, A.: Haar wavelet decomposition based blockiness detector and picture quality assessment method for JPEG images. In: International Conference on Advanced Computer Science and Information System (2011)"},{"key":"22_CR30","unstructured":"Gloe, T., Bhme, R.: Dresden image database\u2019 for benchmarking digital image forensics. In: IEEE International Conference on Acoustics, Speech and Signal Processing (2007)"},{"issue":"3","key":"22_CR31","first-page":"27:1","volume":"2","author":"C-C Chang","year":"2011","unstructured":"Chang, C.-C., Lin, C.-J.: LIBSVM: a library for support vector machines. ACM Trans. Intell. Syst. Technol. 2(3), 27:1\u201327:27 (2011)","journal-title":"ACM Trans. Intell. Syst. Technol."},{"key":"22_CR32","unstructured":"Ng, A.: \u201cCS229 Lecture Notes\u201d, CS229 Lecture notes, Stanford (2000)"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49806-5_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T20:41:53Z","timestamp":1749760913000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49806-5_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319498058","9783319498065"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49806-5_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}