{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T06:38:23Z","timestamp":1743143903557,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662438855"},{"type":"electronic","value":"9783662438862"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-43886-2_14","type":"book-chapter","created":{"date-parts":[[2014,7,8]],"date-time":"2014-07-08T09:11:39Z","timestamp":1404810699000},"page":"192-204","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Camera Source Identification Game with Incomplete Information"],"prefix":"10.1007","author":[{"given":"Hui","family":"Zeng","sequence":"first","affiliation":[]},{"given":"Xiangui","family":"Kang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,7,9]]},"reference":[{"issue":"2","key":"14_CR1","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1109\/TIFS.2006.873602","volume":"1","author":"J Lukas","year":"2006","unstructured":"Lukas, J., Fridrich, J., Goljan, M.: Digital camera identification from sensor noise. IEEE Trans. Inf. Forensics Secur. 1(2), 205\u2013214 (2006)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"14_CR2","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/TIFS.2007.916285","volume":"3","author":"M Chen","year":"2008","unstructured":"Chen, M., Fridrich, J., Goljan, M., Lukas, J.: Determining image origin and integrity using sensor noise. IEEE Trans. Inf. Forensics Secur. 3(1), 74\u201390 (2008)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"14_CR3","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1109\/TCSVT.2011.2160750","volume":"22","author":"C-T Li","year":"2012","unstructured":"Li, C.-T., Li, Y.: Color-decoupled photo response non-uniformity for digital image forensics. IEEE Trans. Circ. Syst. Video Technol. 22(2), 260\u2013271 (2012)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"issue":"4","key":"14_CR4","doi-asserted-by":"publisher","first-page":"1404","DOI":"10.1109\/TIFS.2012.2192272","volume":"7","author":"S Bayram","year":"2012","unstructured":"Bayram, S., Sencar, H.T., Memon, N.D.: Efficient sensor fingerprint matching through fingerprint binarization. IEEE Trans. Inf. Forensics Secur. 7(4), 1404\u20131413 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"14_CR5","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1109\/TIFS.2010.2046268","volume":"5","author":"C-T Li","year":"2010","unstructured":"Li, C.-T.: Source camera identification using enhanced sensor pattern noise. IEEE Trans.Inf. Forensics Secur. 5(2), 280\u2013287 (2010)","journal-title":"IEEE Trans.Inf. Forensics Secur."},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Chuang, W., Su, H., Wu, M.: Exploring compression effects for improved source camera identification using strongly compressed video. In: IEEE International Conference on Image Processing, Brussels, Belgium, pp. 1953\u20131956 (2011)","DOI":"10.1109\/ICIP.2011.6115855"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Wu, G., Kang, X., Liu, K.J.R.: A context adaptive predictor of sensor pattern noise for camera source identification. In: IEEE International Conference on Image Processing, Orlando, USA, pp. 237\u2013240 (2012)","DOI":"10.1109\/ICIP.2012.6466839"},{"issue":"2","key":"14_CR8","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1109\/TIFS.2011.2168214","volume":"7","author":"X Kang","year":"2012","unstructured":"Kang, X., Li, Y., Qu, Z., Huang, J.: Enhancing source camera identification performance with a camera reference phase sensor pattern noise. IEEE Trans. Inf. Forensics Secur. 7(2), 393\u2013402 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Gloe, T., Kirchner, M., Winkler, A., Bohme, R.: Can we trust digital image forensics? Multimedia \u201907. In: Proceedings of the 15th international conference on Multimedia, pp. 78\u201386 (2007)","DOI":"10.1145\/1291233.1291252"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Steinebach, M., Liu, H., Fan, P., Katzenbeisser, S.: Cell phone camera ballistics: attacks and countermeasures. In: SPIE 2010, Multimedia on Mobile Devices, vol. 7542, pp. 0B\u20130C (2010)","DOI":"10.1117\/12.838870"},{"issue":"1","key":"14_CR11","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1109\/TIFS.2010.2099220","volume":"6","author":"M Goljan","year":"2011","unstructured":"Goljan, M., Fridrich, J., Chen, M.: Defending against fingerprint-copy attack in sensor-based camera identification. IEEE Trans. Inf. Forensics Secur. 6(1), 227\u2013236 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Caldelli, R., Amerini, I. Novi, A.: An analysis on attacker actions in fingerprint-copy attack in source camera identification. In: 2011 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 1\u20136 (2011)","DOI":"10.1109\/WIFS.2011.6123122"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Liu, X., Tanaka, M., Okutomi,M.: Noise level estimation using weak textured patches of a single noisy image. In: IEEE International Conference on Image Processing, Orlando, USA, pp. 665\u2013668 (2012)","DOI":"10.1109\/ICIP.2012.6466947"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Barni, M.: A game theoretic approach to Source Identification with known statistics. In: 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Kyoto, pp. 1745\u20131748 (2012)","DOI":"10.1109\/ICASSP.2012.6288236"},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"Barni, M., Tondi, B.: Optimum forensic and counter-forensic strategies for source identification with training data. In: 2012 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 199\u2013204 (2012)","DOI":"10.1109\/WIFS.2012.6412649"},{"issue":"3","key":"14_CR16","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1109\/TIFS.2012.2237397","volume":"8","author":"M Barni","year":"2013","unstructured":"Barni, M., Tondi, B.: The source identification game: An information theoretic perspective. IEEE Trans. Inf. Forensics Secur. 8(3), 450\u2013463 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"14_CR17","doi-asserted-by":"crossref","unstructured":"Stamm, M.C., Lin, W.S., Liu, K.J.R.: Forensics vs. anti-forensics: a decision and game theoretic framework. In: 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Kyoto, pp. 1749\u20131752 (2012)","DOI":"10.1109\/ICASSP.2012.6288237"},{"issue":"7","key":"14_CR18","doi-asserted-by":"publisher","first-page":"1798","DOI":"10.1109\/TIP.2010.2045030","volume":"19","author":"Y Chen","year":"2010","unstructured":"Chen, Y., Lin, W.S., Liu, K.J.R.: Risk-distortion analysis for video collusion attacks: a mouse-and-cat game. IEEE Trans. Image Process. 19(7), 1798\u20131807 (2010)","journal-title":"IEEE Trans. Image Process."},{"key":"14_CR19","doi-asserted-by":"crossref","unstructured":"Zeng, H., Kang, X., Huang, J.: Mixed-strategy Nash equilibrium in the camera source identification game.In: IEEE International Conference on Image Processing, Melbourne, Australia (2013)","DOI":"10.1109\/ICIP.2013.6738921"},{"key":"14_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"454","DOI":"10.1007\/978-3-642-04438-0_38","volume-title":"Digital Watermarking","author":"M Goljan","year":"2009","unstructured":"Goljan, M.: Digital camera identification from images \u2013 estimating false acceptance probability. In: Kim, H.-J., Katzenbeisser, S., Ho, A.T.S. (eds.) IWDW 2008. LNCS, vol. 5450, pp. 454\u2013468. Springer, Heidelberg (2009)"},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"Zeng, H., Jiang, Y., Kang, X., Liu, L.: Game theoretic analysis of camera source identification. In: APSIPA Annual Summit and Conference, Kaohsiung, Taiwan (2013)","DOI":"10.1109\/APSIPA.2013.6694150"},{"key":"14_CR22","volume-title":"Game Theory","author":"D Fudenberg","year":"1991","unstructured":"Fudenberg, D., Tirole, J.: Game Theory. MIT Press, Cambridge (1991)"},{"key":"14_CR23","volume-title":"A Course in Game Theory","author":"MJ Osborne","year":"1994","unstructured":"Osborne, M.J., Rubinstein, A.: A Course in Game Theory. MIT Press, Cambridge (1994)"},{"key":"14_CR24","unstructured":"Hespanha, J.: An introductory course in noncooperative game theory. Published online, 2011. http:\/\/www.ece.ucsb.edu\/\u02dchespanha\/"},{"issue":"4","key":"14_CR25","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600\u2013612 (2004)","journal-title":"IEEE Trans. Image Process."},{"issue":"2\u20134","key":"14_CR26","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1080\/15567281.2010.531500","volume":"3","author":"T Gloe","year":"2010","unstructured":"Gloe, T., Bohme, R.: The dresden image database for benchmarking digital image forensics. J. Digit. Forensic Pract. 3(2\u20134), 150\u2013159 (2010)","journal-title":"J. Digit. Forensic Pract."}],"container-title":["Lecture Notes in Computer Science","Digital-Forensics and Watermarking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-43886-2_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,7]],"date-time":"2023-02-07T23:59:48Z","timestamp":1675814388000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-43886-2_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662438855","9783662438862"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-43886-2_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"9 July 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}