{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,3]],"date-time":"2026-05-03T14:32:49Z","timestamp":1777818769938,"version":"3.51.4"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"9-10","license":[{"start":{"date-parts":[[2019,12,9]],"date-time":"2019-12-09T00:00:00Z","timestamp":1575849600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,12,9]],"date-time":"2019-12-09T00:00:00Z","timestamp":1575849600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2020,3]]},"DOI":"10.1007\/s11042-019-08236-2","type":"journal-article","created":{"date-parts":[[2019,12,9]],"date-time":"2019-12-09T04:29:13Z","timestamp":1575865753000},"page":"5767-5788","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":30,"title":["An improved surveillance video forgery detection technique using sensor pattern noise and correlation of noise residues"],"prefix":"10.1007","volume":"79","author":[{"given":"Muhammad Aizad","family":"Fayyaz","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Adeel","family":"Anjum","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sheikh","family":"Ziauddin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4895-7544","authenticated-orcid":false,"given":"Ahmed","family":"Khan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Aaliya","family":"Sarfaraz","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2019,12,9]]},"reference":[{"key":"8236_CR1","doi-asserted-by":"crossref","unstructured":"Altinisik E, Tasdemir K, Sencar HT (2018) Extracting Prnu Noise from H.264 Coded Videos. In: 2018 26th European signal processing conference (EUSIPCO). pp 1367\u20131371. IEEE.","DOI":"10.23919\/EUSIPCO.2018.8553173"},{"issue":"11","key":"8236_CR2","doi-asserted-by":"publisher","first-page":"2987","DOI":"10.1109\/TIFS.2019.2911173","volume":"14","author":"Z Ba","year":"2019","unstructured":"Ba Z, Qin Z, Fu X, Ren K (2019) CIM: camera in motion for smartphone authentication. IEEE Trans Inf Forensics Secur 14(11):2987\u20133002","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"8236_CR3","doi-asserted-by":"crossref","unstructured":"Bestagini P, Milani S, Tagliasacchi M, Tubaro S (2013) Local tampering detection invideo sequences. In: 2013 IEEE 15th international workshop on multimedia signal processing (MMSP), pp 488\u2013493","DOI":"10.1109\/MMSP.2013.6659337"},{"key":"8236_CR4","doi-asserted-by":"crossref","unstructured":"Cooper AJ (2013) Improved photo response non-uniformity (PRNU) based source camera identification. Forensic Sci Int 226(1\u20133), 132\u2013141.","DOI":"10.1016\/j.forsciint.2012.12.018"},{"issue":"4","key":"8236_CR5","doi-asserted-by":"publisher","first-page":"1099","DOI":"10.1111\/1556-4029.13658","volume":"63","author":"SM Fadl","year":"2018","unstructured":"Fadl SM, Han Q, Li Q (2018) Authentication of surveillance videos: detecting frame duplication based on residual frame. J Forensic Sci 63(4):1099\u20131109","journal-title":"J Forensic Sci"},{"key":"8236_CR6","doi-asserted-by":"crossref","unstructured":"Hosler B et al (2019) A video camera model identification system using deep learning and fusion. In: ICASSP 2019\u20132019 IEEE international conference on acoustics, speech and signal processing (ICASSP). Brighton, pp 8271\u20138275","DOI":"10.1109\/ICASSP.2019.8682608"},{"key":"8236_CR7","unstructured":"Hsu YF, Chang SF (2007) Image splicing detection using camera response function consistency and automatic segmentation. In: 2007 IEEE international conference on multimedia and expo, pp 28\u201331"},{"key":"8236_CR8","unstructured":"Hsu C-C, Hung T-Y, Lin C-W, Hsu C-T (2008) Video forgery detection using correlation of noise residue. In: 2008 IEEE 10th workshop on multimedia signal processing, pp 170\u2013174"},{"key":"8236_CR9","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1016\/j.cose.2018.04.013","volume":"77","author":"T Huang","year":"2018","unstructured":"Huang T, Zhang X, Huang W, Lin L, Weifeng S (2018) A multi-channel approach through fusion of audio for detecting video inter-frame forgery. Comput Secur 77:412\u2013426","journal-title":"Comput Secur"},{"issue":"1","key":"8236_CR10","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1186\/s13673-017-0101-x","volume":"7","author":"JH Huh","year":"2017","unstructured":"Huh JH (2017) PLC-based design of monitoring system for ICT-integrated vertical fish farm. Human-centric Comput Inf Sci 7(1):20","journal-title":"Human-centric Comput Inf Sci"},{"key":"8236_CR11","first-page":"25","volume-title":"Forgery detection for surveillance video","author":"D-K Hyun","year":"2013","unstructured":"Hyun D-K, Lee M-J, Ryu S-J, Lee H-Y, Lee H-K (2013) Forgery detection for surveillance video. Springer New York, New York, pp 25\u201336"},{"key":"8236_CR12","doi-asserted-by":"crossref","unstructured":"Jeyalakshmi A, Chitra DR (2018) Comparative study of feature extraction using several wavelet transforms for source camera identification. In: 2018 2nd international conference on inventive systems and control (ICISC), Coimbatore, pp 1407\u20131414","DOI":"10.1109\/ICISC.2018.8398923"},{"key":"8236_CR13","doi-asserted-by":"publisher","first-page":"25323","DOI":"10.1109\/ACCESS.2018.2819624","volume":"6","author":"S Jia","year":"2018","unstructured":"Jia S, Xu Z, Wang H, Feng C, Wang T (2018) Coarse-to-fine copy-move forgery detection for video forensics. IEEE Access 6:25323\u201325335","journal-title":"IEEE Access"},{"issue":"5","key":"8236_CR14","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1109\/LSP.2013.2251632","volume":"20","author":"X Jiang","year":"2013","unstructured":"Jiang X, Wang W, Sun T, Shi YQ, Wang S (2013) Detection of double compression in mpeg-4 videos based on Markov statistics. IEEE Signal Process Lett 20(5):447\u2013450","journal-title":"IEEE Signal Process Lett"},{"issue":"13","key":"8236_CR15","doi-asserted-by":"publisher","first-page":"3499","DOI":"10.3390\/su11133499","volume":"11","author":"SH Jung","year":"2019","unstructured":"Jung SH, Huh JH (2019) A novel on transmission line tower big data analysis model using altered K-means and ADQL. Sustainability 11(13):3499","journal-title":"Sustainability"},{"key":"8236_CR16","unstructured":"In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X (Vol. 6819, p. 68190G). International Society for Optics and Photonics."},{"issue":"2","key":"8236_CR17","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1109\/TIFS.2016.2620280","volume":"12","author":"A Lawgaly","year":"2017","unstructured":"Lawgaly A, Khelifi F (2017) Sensor pattern noise estimation based on improvedlocallyadaptivedctfilteringandweightedaveragingforsource cameraidentificationandverification. IEEE Trans Inf Forensics Secur 12(2):392\u2013404","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"8236_CR18","unstructured":"Le QV, Ngiam J, Coates A, Lahiri A, Prochnow B, Ng AY (2011) On optimization methods for deep learning. In: Proceedings of the 28th international conference on international conference on machine learning. Omnipress, pp 265\u2013272"},{"key":"8236_CR19","doi-asserted-by":"crossref","unstructured":"LeCun Y, Bengio Y, Hinton G (2015) Deep learning. Nature 521(7553):436\u2013444.","DOI":"10.1038\/nature14539"},{"issue":"1","key":"8236_CR20","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1109\/TIFS.2015.2478748","volume":"11","author":"X Lin","year":"2016","unstructured":"Lin X, Li CT (2016) Preprocessing reference sensor pattern noise via spectrum equalization. IEEE Trans Inf Forensics Secur 11(1):126\u2013140","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"3","key":"8236_CR21","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1109\/LSP.2016.2521349","volume":"23","author":"X Lin","year":"2016","unstructured":"Lin X, Li CT (2016) Enhancing sensor pattern noise via filtering distortion removal. IEEE Signal Process Lett 23(3):381\u2013385","journal-title":"IEEE Signal Process Lett"},{"issue":"6","key":"8236_CR22","doi-asserted-by":"publisher","first-page":"7405","DOI":"10.1007\/s11042-017-4652-7","volume":"77","author":"Y Liu","year":"2018","unstructured":"Liu Y, Huang T, Liu Y (2018) A novel video forgery detection algorithm for blue screencompositing based on 3-stage foreground analysis and tracking. Multimed Tools Appl 77(6):7405\u20137427","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"8236_CR23","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1109\/TIFS.2006.873602","volume":"1","author":"J Lukas","year":"2006","unstructured":"Lukas J, Fridrich J, Goljan M (2006) Digital camera identification from sensor pattern noise. IEEE Trans Inf Forensics Secur 1(2):205\u2013214","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"8236_CR24","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1016\/j.jvcir.2018.03.015","volume":"53","author":"T Mahmood","year":"2018","unstructured":"Mahmood T, Mehmood Z, Shah M, Saba T (2018) A robust technique for copy-move forgery detection and localization in digital images via stationary wavelet and discrete cosine transform. J Vis Commun Image Represent 53:202\u2013214","journal-title":"J Vis Commun Image Represent"},{"key":"8236_CR25","doi-asserted-by":"crossref","unstructured":"Malik SUR, Khan SU, Srinivasan SK (2013) Modeling and analysis of state-of-the-art VM-based cloud management platforms. In: IEEE transactions on cloud computing, pp 50\u201363","DOI":"10.1109\/TCC.2013.3"},{"issue":"5","key":"8236_CR26","doi-asserted-by":"publisher","first-page":"693","DOI":"10.1109\/LSP.2016.2549059","volume":"23","author":"A Mehrish","year":"2016","unstructured":"Mehrish A, Subramanyam AV, Emmanuel S (2016) Sensor pattern noise estimation using probabilistically estimated raw values. IEEE Signal Process Lett 23(5):693\u2013697","journal-title":"IEEE Signal Process Lett"},{"key":"8236_CR27","doi-asserted-by":"crossref","unstructured":"Pandey RC, Singh SK, Shukla KK (2014) Passive copy-move forgery detection in videos. In: 2014 international conference on computer and communication technology (ICCCT), pp 301\u2013306","DOI":"10.1109\/ICCCT.2014.7001509"},{"key":"8236_CR28","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1016\/j.forsciint.2013.12.022","volume":"236","author":"C Richao","year":"2014","unstructured":"Richao C, Yang G, Zhu N (2014) Detection of objectbased manipulation by the statistical features of object contour. Forensic Sci Int 236:164\u2013169","journal-title":"Forensic Sci Int"},{"key":"8236_CR29","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.neunet.2014.09.003","volume":"61","author":"J Schmidhuber","year":"2015","unstructured":"Schmidhuber J (2015) Deep learning in neural networks: an overview. Neural Netw 61:85\u2013117","journal-title":"Neural Netw"},{"issue":"2","key":"8236_CR30","doi-asserted-by":"publisher","first-page":"164","DOI":"10.3390\/electronics8020164","volume":"8","author":"YS Seo","year":"2019","unstructured":"Seo YS, Huh JH (2019) Automatic emotion-based music classification for supporting intelligent IoT applications. Electronics 8(2):164","journal-title":"Electronics"},{"issue":"4","key":"8236_CR31","doi-asserted-by":"publisher","first-page":"825","DOI":"10.1109\/TMM.2017.2760098","volume":"20","author":"L Su","year":"2018","unstructured":"Su L, Li C, Lai Y, Yang J (2018) A fast forgery detection algorithm based on exponential-fourier moments for video region duplication. IEEE Trans Multimedia 20(4):825\u2013840","journal-title":"IEEE Trans Multimedia"},{"key":"8236_CR32","doi-asserted-by":"crossref","unstructured":"Wahab AWA, Bagiwa MA, Idris MYI, Khan S, Razak Z, Ariffin MRK (2014) Passive video forgery detection techniques: a survey. In 2014 10th international conference on information assurance and security. IEEE, pp 29\u201334","DOI":"10.1109\/ISIAS.2014.7064616"},{"key":"8236_CR33","doi-asserted-by":"crossref","unstructured":"Wu G, Kang X, Liu KJR (2012) A context adaptive predictor of sensor pattern noise for camera source identification. In: 2012 19th IEEE international conference on image processing, Orlando, pp 237\u2013240","DOI":"10.1109\/ICIP.2012.6466839"},{"key":"8236_CR34","doi-asserted-by":"crossref","unstructured":"Xu J, Liang Y, Tian X, Xie A (2016) A novel video inter-frame forgery detection method based on histogram intersection. In: 2016 IEEE\/CIC international conference on communications in China (ICCC), pp 1\u20136","DOI":"10.1109\/ICCChina.2016.7636851"},{"issue":"4","key":"8236_CR35","doi-asserted-by":"publisher","first-page":"1793","DOI":"10.1007\/s11042-014-2374-7","volume":"75","author":"J Yang","year":"2016","unstructured":"Yang J, Huang T, Lichao S (2016) Using similarity analysis to detect frame duplication forgery in videos. Multimed Tools Appl 75(4):1793\u20131811","journal-title":"Multimed Tools Appl"},{"key":"8236_CR36","doi-asserted-by":"crossref","unstructured":"Yaqub W, Mohanty M, Memon N (2018) Towards camera identification from cropped query images. In: 2018 25th IEEE international conference on image processing (ICIP), Athens, pp 3798\u20133802. IEEE.","DOI":"10.1109\/ICIP.2018.8451749"},{"issue":"19","key":"8236_CR37","doi-asserted-by":"publisher","first-page":"25389","DOI":"10.1007\/s11042-018-5791-1","volume":"77","author":"D-N Zhao","year":"2018","unstructured":"Zhao D-N, Wang R-K, Lu Z-M (2018) Inter-frame passive-blind forgery detection for video shot based on similarity analysis. Multimed Tools Appl 77(19):25389\u201325408","journal-title":"Multimed Tools Appl"},{"key":"8236_CR38","unstructured":"Zhu Y, Guo C, Luo G (2018) A detection method for facial expression reenacted forgery in videos"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-08236-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-019-08236-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-08236-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,8]],"date-time":"2020-12-08T00:34:33Z","timestamp":1607387673000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-019-08236-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,9]]},"references-count":38,"journal-issue":{"issue":"9-10","published-print":{"date-parts":[[2020,3]]}},"alternative-id":["8236"],"URL":"https:\/\/doi.org\/10.1007\/s11042-019-08236-2","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12,9]]},"assertion":[{"value":"16 March 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 August 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 September 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 December 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Mentioned authors have no conflict of interest upon this article. This article does not contain any studies with human participants or animals performed by any of the authors.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}}]}}