{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,12]],"date-time":"2025-05-12T10:45:09Z","timestamp":1747046709982,"version":"3.37.3"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2021,1,6]],"date-time":"2021-01-06T00:00:00Z","timestamp":1609891200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,6]],"date-time":"2021-01-06T00:00:00Z","timestamp":1609891200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100000083","name":"Directorate for Computer and Information Science and Engineering","doi-asserted-by":"publisher","award":["1553610"],"award-info":[{"award-number":["1553610"]}],"id":[{"id":"10.13039\/100000083","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1007\/s11042-020-09011-4","type":"journal-article","created":{"date-parts":[[2021,1,6]],"date-time":"2021-01-06T01:03:03Z","timestamp":1609894983000},"page":"11365-11393","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Robust camera model identification using demosaicing residual features"],"prefix":"10.1007","volume":"80","author":[{"given":"Chen","family":"Chen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3986-4039","authenticated-orcid":false,"given":"Matthew C.","family":"Stamm","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,6]]},"reference":[{"key":"9011_CR1","first-page":"1","volume":"19","author":"M Aly","year":"2005","unstructured":"Aly M (2005) Survey on multiclass classification methods. Neural Netw 19:1\u20139","journal-title":"Neural Netw"},{"issue":"7","key":"9011_CR2","doi-asserted-by":"publisher","first-page":"77","DOI":"10.2352\/ISSN.2470-1173.2017.7.MWSF-328","volume":"2017","author":"B Bayar","year":"2017","unstructured":"Bayar B, Stamm MC (2017) Design principles of convolutional neural networks for multimedia forensics. Electron Imaging 2017(7):77\u201386","journal-title":"Electron Imaging"},{"key":"9011_CR3","doi-asserted-by":"crossref","unstructured":"Bayram S, Sencar H, Memon N, Avcibas I (2005) Source camera identification based on cfa interpolation. In: IEEE International conference on image processing 2005, vol 3. IEEE, pp III\u201369","DOI":"10.1109\/ICIP.2005.1530330"},{"issue":"3","key":"9011_CR4","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1109\/LSP.2016.2641006","volume":"24","author":"L Bondi","year":"2017","unstructured":"Bondi L, Baroffio L, G\u00fcera D, Bestagini P, Delp EJ, Tubaro S (2017) First steps toward camera model identification with convolutional neural networks. IEEE Signal Process Lett 24(3):259\u2013263","journal-title":"IEEE Signal Process Lett"},{"issue":"4","key":"9011_CR5","doi-asserted-by":"publisher","first-page":"899","DOI":"10.1109\/TIFS.2009.2033749","volume":"4","author":"H Cao","year":"2009","unstructured":"Cao H, Kot AC (2009) Accurate detection of demosaicing regularity for digital image forensics. IEEE Trans Inf Forensic Secur 4(4):899\u2013910","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"9011_CR6","doi-asserted-by":"crossref","unstructured":"Chen C, Stamm MC (2015) Camera model identification framework using an ensemble of demosaicing features. In: 2015 IEEE international workshop on Information forensics and security (WIFS). IEEE, pp 1\u20136","DOI":"10.1109\/WIFS.2015.7368573"},{"issue":"1","key":"9011_CR7","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/TIFS.2007.916285","volume":"3","author":"M Chen","year":"2008","unstructured":"Chen M, Fridrich J, Goljan M, Luk\u00e1\u0161 J (2008) Determining image origin and integrity using sensor noise. IEEE Trans Inf Forensic Secur 3(1):74\u201390","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"9011_CR8","doi-asserted-by":"crossref","unstructured":"Deng Z, Gijsenij A, Zhang J (2011) Source camera identification using auto-white balance approximation. In: 2011 International conference on computer vision. IEEE, pp 57\u201364","DOI":"10.1109\/ICCV.2011.6126225"},{"key":"9011_CR9","doi-asserted-by":"crossref","unstructured":"Filler T, Fridrich J, Goljan M (2008) Using sensor pattern noise for camera model identification. In: 2008. ICIP 2008. 15th IEEE international conference on Image processing, pp 1296\u20131299","DOI":"10.1109\/ICIP.2008.4712000"},{"issue":"3","key":"9011_CR10","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"J Fridrich","year":"2012","unstructured":"Fridrich J, Kodovsky\u0300 J (2012) Rich models for steganalysis of digital images. IEEE Trans Inf Forensic Secur 7(3):868\u2013882","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"9","key":"9011_CR11","doi-asserted-by":"publisher","first-page":"997","DOI":"10.1109\/TIP.2002.801121","volume":"11","author":"BK Gunturk","year":"2002","unstructured":"Gunturk BK, Altunbasak Y, Mersereau RM (2002) Color plane interpolation using alternating projections. IEEE Trans Image Process 11(9):997\u20131013","journal-title":"IEEE Trans Image Process"},{"issue":"3","key":"9011_CR12","doi-asserted-by":"publisher","first-page":"1066","DOI":"10.1109\/TIFS.2011.2128309","volume":"6","author":"E Kee","year":"2011","unstructured":"Kee E, Johnson M, Farid H (2011) Digital image authentication from jpeg headers. IEEE Trans Inf Forensic Secur 6(3):1066\u20131075","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"9011_CR13","unstructured":"Kharrazi M, Sencar H, Memon N (2004) Blind source camera identification. In: 2004. ICIP \u201904. 2004 international conference on Image processing, vol 1, pp 709\u2013712"},{"issue":"2","key":"9011_CR14","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1109\/TIFS.2011.2175919","volume":"7","author":"J Kodovsky\u0300","year":"2012","unstructured":"Kodovsky\u0300 J, Fridrich J, Holub V (2012) Ensemble classifiers for steganalysis of digital media. IEEE Trans Inf Forensic Secur 7(2):432\u2013444","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"9011_CR15","first-page":"1","volume":"76","author":"F Marra","year":"2016","unstructured":"Marra F, Poggi G, Sansone C, Verdoliva L (2016) A study of co-occurrence based local features for camera model identification. Multimedia Tools and Applications 76:1\u201317","journal-title":"Multimedia Tools and Applications"},{"key":"9011_CR16","doi-asserted-by":"crossref","unstructured":"McKay C, Swaminathan A, Gou H, Wu M (2008) Image acquisition forensics: Forensic analysis to identify imaging source. In: 2008. ICASSP 2008. IEEE international conference on Acoustics, speech and signal processing. IEEE, pp 1657\u20131660","DOI":"10.1109\/ICASSP.2008.4517945"},{"key":"9011_CR17","first-page":"17","volume":"12","author":"S Milani","year":"2014","unstructured":"Milani S, Bestagini P, Tagliasacchi M, Tubaro S (2014) Demosaicing strategy identification via eigenalgorithms. Architecture 12:17","journal-title":"Architecture"},{"issue":"3","key":"9011_CR18","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1002\/ima.20109","volume":"17","author":"D Paliy","year":"2007","unstructured":"Paliy D, Katkovnik V, Bilcu R, Alenius S, Egiazarian K (2007) Spatially adaptive color filter array interpolation for noiseless and noisy data. Int J Imaging Syst Technol 17(3):105\u2013122","journal-title":"Int J Imaging Syst Technol"},{"key":"9011_CR19","unstructured":"San Choi K, Lam EY, Wong KK (2006) Source camera identification by jpeg compression statistics for image forensics. In: TENCON 2006. 2006 IEEE Region 10 conference. IEEE, pp 1\u20134"},{"key":"9011_CR20","doi-asserted-by":"crossref","unstructured":"San Choi K, Lam EY, Wong KK (2006) Source camera identification using footprints from lens aberration. In: SPIE Electronic imaging 2006, pp 60690j\u201360690j","DOI":"10.1117\/12.649775"},{"issue":"3","key":"9011_CR21","doi-asserted-by":"publisher","first-page":"492","DOI":"10.1109\/TIFS.2010.2053202","volume":"5","author":"MC Stamm","year":"2010","unstructured":"Stamm MC, Liu KJR (2010) Forensic detection of image manipulation using statistical intrinsic fingerprints. IEEE Trans Inf Forensic Secur 5(3):492\u2013506","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"9011_CR22","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1109\/ACCESS.2013.2260814","volume":"1","author":"MC Stamm","year":"2013","unstructured":"Stamm MC, Wu M, Liu KJR (2013) Information forensics: an overview of the first decade. IEEE Access 1:167\u2013200","journal-title":"IEEE Access"},{"issue":"1","key":"9011_CR23","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1109\/TIFS.2006.890307","volume":"2","author":"A Swaminathan","year":"2007","unstructured":"Swaminathan A, Wu M, Liu K (2007) Nonintrusive component forensics of visual sensors using output images. IEEE Trans Inf Forensic Secur 2 (1):91\u2013106","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"9011_CR24","unstructured":"The \u2019dresden image database\u2019. http:\/\/forensics.inf.tu-dresden.de\/ddimgdb\/. (Accessed on 04\/28\/2017)"},{"key":"9011_CR25","doi-asserted-by":"crossref","unstructured":"Tuama A, Comby F, Chaumont M (2016) Camera model identification with the use of deep convolutional neural networks. In: 2016 IEEE international workshop on Information forensics and security (WIFS). IEEE, pp 1\u20136","DOI":"10.1109\/WIFS.2016.7823908"},{"key":"9011_CR26","doi-asserted-by":"crossref","unstructured":"Van LT, Emmanuel S, Kankanhalli MS (2007) Identifying source cell phone using chromatic aberration. In: 2007 IEEE international conference on Multimedia and expo. IEEE, pp 883\u2013886","DOI":"10.1109\/ICME.2007.4284792"},{"key":"9011_CR27","doi-asserted-by":"crossref","unstructured":"Zhao X, Stamm MC (2016) Computationally efficient demosaicing filter estimation for forensic camera model identification. In: 2016 IEEE international conference on Image processing (ICIP). IEEE, pp 151\u2013155","DOI":"10.1109\/ICIP.2016.7532337"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09011-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-09011-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09011-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,16]],"date-time":"2021-04-16T05:47:05Z","timestamp":1618552025000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-09011-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,6]]},"references-count":27,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["9011"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-09011-4","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2021,1,6]]},"assertion":[{"value":"8 February 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 March 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 May 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 January 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}