{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T07:25:18Z","timestamp":1648625118266},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2016,1,25]],"date-time":"2016-01-25T00:00:00Z","timestamp":1453680000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1007\/s00607-015-0482-5","type":"journal-article","created":{"date-parts":[[2016,1,25]],"date-time":"2016-01-25T07:32:36Z","timestamp":1453707156000},"page":"1251-1286","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Theia: a tool for the forensic analysis of mobile devices pictures"],"prefix":"10.1007","volume":"98","author":[{"given":"Ana Lucila Sandoval","family":"Orozco","sequence":"first","affiliation":[]},{"given":"Jocelin Rosales","family":"Corripio","sequence":"additional","affiliation":[]},{"given":"David Manuel Arenas","family":"Gonz\u00e1lez","sequence":"additional","affiliation":[]},{"given":"Luis Javier Garc\u00eda","family":"Villalba","sequence":"additional","affiliation":[]},{"given":"Julio","family":"Hernandez-Castro","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,25]]},"reference":[{"key":"482_CR1","unstructured":"Hsu J (2010) The worldwide mobile phone camera module market and Taiwan\u2019s industry. Market Intelligence & Consulting Institute (MIC), pp 1\u201318"},{"key":"482_CR2","doi-asserted-by":"publisher","unstructured":"Baer R (2010) Resolution limits in digital photography: the looming end of the pixel wars\u2014OSA technical digest (CD). In: Proceedings of the imaging systems, p. ITuB3. doi: 10.1364\/IS.2010.ITuB3","DOI":"10.1364\/IS.2010.ITuB3"},{"issue":"2","key":"482_CR3","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1080\/01449290512331321910","volume":"24","author":"L Srivastava","year":"2005","unstructured":"Srivastava L (2005) Mobile phones and the evolution of social behavior. Behav Inf Technol 24(2):111\u2013129","journal-title":"Behav Inf Technol"},{"key":"482_CR4","doi-asserted-by":"publisher","unstructured":"Van Lanh T, Chong KS, Emmanuel S, Kankanhalli MS (2007) A survey on digital camera image forensic methods. In: Proceedings of the IEEE international conference on multimedia and expo, pp 16\u201319. doi: 10.1109\/ICME.2007.4284575","DOI":"10.1109\/ICME.2007.4284575"},{"key":"482_CR5","doi-asserted-by":"publisher","unstructured":"Gloe T, Kirchner M, Winkler A, Bohme R (2007) Can we trust digital image forensics? In: Proceedings of the 15th international conference on multimedia, pp 78\u201386. doi: 10.1145\/1291233.1291252","DOI":"10.1145\/1291233.1291252"},{"issue":"1\u20132","key":"482_CR6","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/S0020-0255(01)00194-3","volume":"141","author":"C Chang","year":"2002","unstructured":"Chang C (2002) A steganographic method based upon JPEG and quantization table modification. Inf Sci 141(1\u20132):123\u2013138. doi: 10.1016\/S0020-0255(01)00194-3","journal-title":"Inf Sci"},{"issue":"24","key":"482_CR7","doi-asserted-by":"publisher","first-page":"4909","DOI":"10.1016\/j.ins.2010.08.039","volume":"180","author":"R Chamlawi","year":"2010","unstructured":"Chamlawi R, Khan A (2010) Digital image authentication and recovery: employing integer transform based information embedding and extraction. Inf Sci 180(24):4909\u20134928. doi: 10.1016\/j.ins.2010.08.039","journal-title":"Inf Sci"},{"issue":"2","key":"482_CR8","doi-asserted-by":"publisher","first-page":"550","DOI":"10.1016\/j.ins.2006.05.002","volume":"177","author":"HH Tsai","year":"2007","unstructured":"Tsai HH (2007) Color image watermark extraction based on support vector machines. Inf Sci 177(2):550\u2013569. doi: 10.1016\/j.ins.2006.05.002","journal-title":"Inf Sci"},{"key":"482_CR9","doi-asserted-by":"publisher","first-page":"S74","DOI":"10.1016\/j.diin.2010.05.010","volume":"7","author":"VLL Thing","year":"2010","unstructured":"Thing VLL, Ng KY, Chang EC (2010) Live memory forensics of mobile phones. Digit Investig 7:S74\u2013S82. doi: 10.1016\/j.diin.2010.05.010","journal-title":"Digit Investig"},{"key":"482_CR10","doi-asserted-by":"publisher","unstructured":"Mckay C, Swaminathan A, Gou H, Wu M (2008) Image acquisition forensics: forensic analysis to identify imaging source. In: Proceedings of the IEEE international conference on acoustics, speech and signal processing (ICASSP), pp 1657\u20131660. doi: 10.1109\/ICASSP.2008.4517945","DOI":"10.1109\/ICASSP.2008.4517945"},{"key":"482_CR11","doi-asserted-by":"publisher","unstructured":"Choi KS (2006) Source camera identification using footprints from lens aberration. In: Proceedings on digital photography II. SPIE\u2014The International Society for Optical Engineering, vol 852, no 6069, p 60, 690J\u201360, 690J\u20138. doi: 10.1117\/12.649775","DOI":"10.1117\/12.649775"},{"key":"482_CR12","doi-asserted-by":"publisher","unstructured":"Van LT, Emmanuel S, Kankanhalli M (2007) Identifying source cell phone using chromatic aberration. In: IEEE international conference on multimedia and expo, pp 883\u2013886. doi: 10.1109\/ICME.2007.4284792","DOI":"10.1109\/ICME.2007.4284792"},{"key":"482_CR13","doi-asserted-by":"publisher","unstructured":"Geradts ZJ, Bijhold J, Kieft M, Kurosawa K, Kuroki K, Saitoh N (2001) Methods for identification of images acquired with digital cameras. In: Proceedings of the international conference on enabling technologies for law enforcement and security, vol 4232, pp 505\u2013512. doi: 10.1117\/12.417569","DOI":"10.1117\/12.417569"},{"issue":"2","key":"482_CR14","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1109\/TIFS.2006.873602","volume":"1","author":"J Lukas","year":"2006","unstructured":"Lukas J, Fridrich J, Goljan M (2006) Digital camera identification from sensor pattern noise. IEEE Trans Inf Foren Secur 1(2):205\u2013214. doi: 10.1109\/TIFS.2006.873602","journal-title":"IEEE Trans Inf Foren Secur"},{"key":"482_CR15","doi-asserted-by":"publisher","unstructured":"Costa FDO, Eckmann M, Scheirer WJ, Rocha A (2012) Open set source camera attribution. In: Proceedings of the 25th conference on graphics, patterns and images. IEEE, New York, pp 71\u201378. doi: 10.1109\/SIBGRAPI.2012.19","DOI":"10.1109\/SIBGRAPI.2012.19"},{"key":"482_CR16","doi-asserted-by":"crossref","unstructured":"de Costa OF, Silva E, Eckmann M, Scheirer WJ, Rocha A (2014) Open set source camera attribution and device linking. Pattern Recognit Lett 39(0):92\u2013101","DOI":"10.1016\/j.patrec.2013.09.006"},{"key":"482_CR17","doi-asserted-by":"publisher","unstructured":"Bayram S, Sencar H, Memon N, Avcibas I (2005) Source camera identification based on CFA interpolation. In: Proceedings of the IEEE international conference on image processing, vol 3, pp 69\u201372. doi: 10.1109\/ICIP.2005.1530330","DOI":"10.1109\/ICIP.2005.1530330"},{"key":"482_CR18","unstructured":"Bayram S, Sencar HT, Memon N (2006) Improvements on source camera-model identification based on CFA interpolation. In: Proceedings of the working group international conference on digital forensics. Springer, Berlin, pp 24\u201327"},{"issue":"2","key":"482_CR19","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1109\/TIP.2002.807363","volume":"12","author":"I Avcibas","year":"2003","unstructured":"Avcibas I, Memon N, Sankur B (2003) Steganalysis using image quality metrics. IEEE Trans Image Process 12(2):221\u2013229. doi: 10.1109\/TIP.2002.807363","journal-title":"IEEE Trans Image Process"},{"key":"482_CR20","doi-asserted-by":"publisher","unstructured":"Celiktutan O, Avcibas I, Sankur B, Ayerden NP, Capar C (2006) Source cell-phone identification. In: Proceedings of the IEEE 14th signal processing and communications applications, pp 1\u20133. doi: 10.1109\/SIU.2006.1659882","DOI":"10.1109\/SIU.2006.1659882"},{"key":"482_CR21","doi-asserted-by":"crossref","unstructured":"Cao H, Kot AC (2010) Mobile camera identification using demosaicing features. In: Proceedings of 2010 IEEE international symposium on circuits and systems (ISCAS). IEEE, New York, pp 1683\u20131686","DOI":"10.1109\/ISCAS.2010.5537502"},{"key":"482_CR22","doi-asserted-by":"publisher","unstructured":"Ho J, Au O, Zhou J, Guo Y (2010) Inter-channel demosaicking traces for digital image forensics. In: 2010 IEEE international conference on multimedia and expo (ICME), pp 1475\u20131480. doi: 10.1109\/ICME.2010.5582951","DOI":"10.1109\/ICME.2010.5582951"},{"key":"482_CR23","doi-asserted-by":"publisher","unstructured":"Mehdi KL, Sencar HT, Memon N (2004) Blind source camera identification. In: Proceedings of the international conference on image processing, vol 1. IEEE, New York, pp 709\u2013712. doi: 10.1109\/ICIP.2004.1418853","DOI":"10.1109\/ICIP.2004.1418853"},{"issue":"6","key":"482_CR24","doi-asserted-by":"publisher","first-page":"935","DOI":"10.1016\/j.patcog.2004.11.013","volume":"38","author":"M Boutell","year":"2005","unstructured":"Boutell M, Luo J (2005) Beyond pixels: exploiting camera metadata for photo classification. Pattern Recognit 38(6):935\u2013946. doi: 10.1016\/j.patcog.2004.11.013","journal-title":"Pattern Recognit"},{"key":"482_CR25","doi-asserted-by":"publisher","unstructured":"Lai CL, Chen YS (2009) The application of intelligent system to digital image forensics. In: Proceedings of the international conference on machine learning and cybernetics, vol 5. IEEE, New York, pp 2991\u20132998. doi: 10.1109\/ICMLC.2009.5212589","DOI":"10.1109\/ICMLC.2009.5212589"},{"key":"482_CR26","doi-asserted-by":"publisher","unstructured":"Hu Y, Li CT, Zhou C (2010) Selecting forensic features for robust source camera identification. In: Proceeding of the 2010 international computer symposium (ICS), pp 506\u2013511. doi: 10.1109\/COMPSYM.2010.5685458","DOI":"10.1109\/COMPSYM.2010.5685458"},{"issue":"4","key":"482_CR27","doi-asserted-by":"crossref","first-page":"1418","DOI":"10.1109\/TIFS.2011.2162830","volume":"6","author":"L Ozparlak","year":"2011","unstructured":"Ozparlak L, Avcibas I (2011) Differentiating between images using wavelet-based transforms: a comparative study. IEEE Trans Inf Foren Secur 6(4):1418\u20131431","journal-title":"IEEE Trans Inf Foren Secur"},{"key":"482_CR28","doi-asserted-by":"publisher","unstructured":"Liu Q, Li X, Chen L, Cho H, Cooper AP, Chen Z, Qiao M, Sung AH (2012) Identification of smartphone-image source and manipulation. In: Jiang H, Ding W, Ali M, Wu X (eds) Advanced research in applied artificial intelligence. Lecture notes in computer science, vol 7345. Springer, Berlin, pp 262\u2013271. doi: 10.1007\/978-3-642-31087-4-28","DOI":"10.1007\/978-3-642-31087-4-28"},{"issue":"9","key":"482_CR29","doi-asserted-by":"crossref","first-page":"829","DOI":"10.1007\/s00607-013-0313-5","volume":"96","author":"AL Sandoval Orozco","year":"2013","unstructured":"Sandoval Orozco AL, Rosales Corripio J, Garcia Villalba LJ, Hernandez-Castro JC (2013) Source identification for mobile devices, based on wavelet transforms combined with sensor imperfections. Computing 96(9):829\u2013841","journal-title":"Computing"},{"key":"482_CR30","doi-asserted-by":"publisher","unstructured":"Jang CJ, Lee JY, Won Lee J, Cho HG (2007) Smart management system for digital photographs using temporal and spatial features with EXIF metadata. In: Proceedings of the 2nd international conference on digital information management. ICDIM \u201907, vol 1, pp 110\u2013115. doi: 10.1109\/ICDIM.2007.4444209","DOI":"10.1109\/ICDIM.2007.4444209"},{"key":"482_CR31","doi-asserted-by":"publisher","unstructured":"Fan J, Kot A, Cao H, Sattar F (2011) Modeling the EXIF-image correlation for image manipulation detection. In: Proceedings of the 18th IEEE international conference on image processing (ICIP), pp 1945\u20131948. doi: 10.1109\/ICIP.2011.6115853","DOI":"10.1109\/ICIP.2011.6115853"},{"key":"482_CR32","doi-asserted-by":"publisher","unstructured":"Boutell M, Luo J (2004) Photo classification by integrating image content and camera metadata. In: Proceedings of the 17th international conference on pattern recognition, vol 4, pp 901\u2013904. doi: 10.1109\/ICPR.2004.1333918","DOI":"10.1109\/ICPR.2004.1333918"},{"issue":"3","key":"482_CR33","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1109\/MMUL.2005.50","volume":"12","author":"J Tesic","year":"2005","unstructured":"Tesic J (2005) Metadata practices for consumer photos. IEEE Multimedia 12(3):86\u201392. doi: 10.1109\/MMUL.2005.50","journal-title":"IEEE Multimedia"},{"issue":"2","key":"482_CR34","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1108\/07378830810880388","volume":"26","author":"NL Romero","year":"2008","unstructured":"Romero NL, Chornet VG, Cobos JS, Carot AS, Centellas FC, Mendez MC (2008) Recovery of descriptive information in images from digital libraries by means of EXIF metadata. Library Hi Tech 26(2):302\u2013315. doi: 10.1108\/07378830810880388","journal-title":"Library Hi Tech"},{"issue":"24","key":"482_CR35","doi-asserted-by":"publisher","first-page":"11551","DOI":"10.1364\/OE.14.011551","volume":"14","author":"KS Choi","year":"2006","unstructured":"Choi KS, Lam EY, Wong KY (2006) Automatic source camera identification using the intrinsic lens radial distortion. Optics Express 14(24):11551\u201311565. doi: 10.1364\/OE.14.011551","journal-title":"Optics Express"},{"key":"482_CR36","doi-asserted-by":"publisher","unstructured":"Long Y, Huang Y (2006) Image based source camera identification using demosaicking. In: Proceedings of the IEEE 8th workshop on multimedia signal processing, pp 419\u2013424. doi: 10.1109\/MMSP.2006.285343","DOI":"10.1109\/MMSP.2006.285343"},{"key":"482_CR37","unstructured":"Dirik AE, Sencar HT, Memon N (2007) Source camera identification based on sensor dust characteristics. In: Workshop on signal processing applications for public security and forensics. IEEE, New York, pp 1\u20136"},{"key":"482_CR38","doi-asserted-by":"publisher","unstructured":"Tsai MJ, Lai CL, Liu J (2007) Camera\/mobile phone source identification for digital forensics. In: Proceedings of the international conference on acoustics speech and signal processing, pp II-221\u2013II-224. doi: 10.1109\/ICASSP.2007.366212","DOI":"10.1109\/ICASSP.2007.366212"},{"key":"482_CR39","doi-asserted-by":"publisher","unstructured":"Van LT, Emmanuel S, Kankanhalli M (2007) Identifying source cell phone using chromatic aberration. In: Proceedings of the IEEE international conference on multimedia and expo, pp 883\u2013886. doi: 10.1109\/ICME.2007.4284792","DOI":"10.1109\/ICME.2007.4284792"},{"issue":"3","key":"482_CR40","doi-asserted-by":"publisher","first-page":"553566","DOI":"10.1109\/TIFS.2008.926993","volume":"3","author":"O Celiktutan","year":"2008","unstructured":"Celiktutan O, Sankur B, Avcibas I (2008) Blind identification of source cell-phone model. IEEE Trans Inf Foren Secur 3(3):553566. doi: 10.1109\/TIFS.2008.926993","journal-title":"IEEE Trans Inf Foren Secur"},{"key":"482_CR41","unstructured":"Sandoval Orozco A, Arenas Gonzalez D, Rosales Corripio J, Garcia Villalba L, Hernandez-Castro J (2013) Techniques for source camera identification. In: Proceedings of the 6th international conference on information technology, pp 1\u20139"},{"key":"482_CR42","unstructured":"Hamilton E (2004) JPEG file interchange format. Version 1.02, September 1, 1992. http:\/\/www.w3.org\/Graphics\/JPEG\/jfif3.pdf"},{"key":"482_CR43","unstructured":"Adobe developers association. TiFF Revision 6.0 (1992). http:\/\/partners.adobe.com\/public\/developer\/en\/tiff\/TIFF6.pdf"},{"key":"482_CR44","unstructured":"Committee S (2010) Exchangeable image file for digital still cameras: Exif version 2.3, April 26, 2010. http:\/\/www.cipa.jp\/english\/hyoujunka\/kikaku\/pdf\/DC-008-2010-E.pdf"},{"issue":"13","key":"482_CR45","doi-asserted-by":"publisher","first-page":"4735","DOI":"10.1007\/s11042-013-1837-6","volume":"74","author":"A Sandoval Orozco","year":"2015","unstructured":"Sandoval Orozco A, Arenas Gonz\u00e1lez D, Garca Villalba L, Hernndez-Castro J (2015) Analysis of errors in Exif metadata on mobile devices. Multimed Tools Appl 74(13):4735\u20134763. doi: 10.1007\/s11042-013-1837-6","journal-title":"Multimed Tools Appl"},{"key":"482_CR46","unstructured":"International T, Telecommunications P, Press C, Illustrator A (2007) International Press Telecommunications Council. Image Rochester, pp 3\u20135"},{"key":"482_CR47","unstructured":"Wandel M (2010) Exif Jpeg header manipulation tool. http:\/\/www.sentex.net\/~mwandel\/jhead\/"},{"key":"482_CR48","unstructured":"Adobe Developers Association (2005) XMP specification. http:\/\/partners.adobe.com\/public\/developer\/en\/xmp\/"},{"key":"482_CR49","unstructured":"Harvey P (2005) ExifTool. http:\/\/www.sno.phy.queensu.ca\/~phil\/exiftool\/"},{"key":"482_CR50","unstructured":"Raskin A (2007) Exif viewer 1.81. https:\/\/addons.mozilla.org\/es-es\/firefox\/addon\/exif-viewer\/"},{"key":"482_CR51","unstructured":"Kowalski M (2010) ExifPro image viewer. http:\/\/www.exifpro.com\/"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-015-0482-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00607-015-0482-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-015-0482-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-015-0482-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T14:30:30Z","timestamp":1559140230000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00607-015-0482-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1,25]]},"references-count":51,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["482"],"URL":"https:\/\/doi.org\/10.1007\/s00607-015-0482-5","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"value":"0010-485X","type":"print"},{"value":"1436-5057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,1,25]]}}}