{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T13:35:05Z","timestamp":1772544905927,"version":"3.50.1"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2020,10,19]],"date-time":"2020-10-19T00:00:00Z","timestamp":1603065600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,10,19]],"date-time":"2020-10-19T00:00:00Z","timestamp":1603065600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,2]]},"DOI":"10.1007\/s11042-020-09763-z","type":"journal-article","created":{"date-parts":[[2020,10,19]],"date-time":"2020-10-19T08:03:16Z","timestamp":1603094596000},"page":"6617-6638","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["A fast source camera identification and verification method based on PRNU analysis for use in video forensic investigations"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2120-2774","authenticated-orcid":false,"given":"Wen-Chao","family":"Yang","sequence":"first","affiliation":[]},{"given":"Jiajun","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Chung-Hao","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,19]]},"reference":[{"key":"9763_CR1","unstructured":"Bestagini P, Lubin L (2019) Special session 15: new challenges in video PRNU. In: IEEE Int. Conf. Image process. (ICIP) http:\/\/2019.ieeeicip.org\/upload\/files\/201812121036101863.pdf. Accessed 10 Sept 2019"},{"key":"9763_CR2","doi-asserted-by":"publisher","first-page":"1G","DOI":"10.1117\/12.696519","volume-title":"SPIE electron","author":"M Chen","year":"2007","unstructured":"Chen M, Fridrich J, Goljan M, Luk\u00e1s J (2007) Source digital camcorder identification using sensor photo-response non-uniformity. In: SPIE electron. Imag, Photonics West, pp 1G\u20131H. https:\/\/doi.org\/10.1117\/12.696519"},{"issue":"1","key":"9763_CR3","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/TIFS.2007.916285","volume":"3","author":"M Chen","year":"2008","unstructured":"Chen M, Fridrich J, Goljan M, Luk\u00e1s J (2008) Determining image origin and integrity using sensor noise. IEEE Trans Inf Forensics Security 3(1):74\u201390. https:\/\/doi.org\/10.1109\/TIFS.2007.916285","journal-title":"IEEE Trans Inf Forensics Security"},{"key":"9763_CR4","doi-asserted-by":"publisher","unstructured":"Chuang W, Su H, Wu M (2011) Exploring compression effects for improved source camera identification using strongly compressed video. In: IEEE Int. Conf. Image process. (ICIP), pp.1953-1956. https:\/\/doi.org\/10.1109\/ICIP.2011.6115855","DOI":"10.1109\/ICIP.2011.6115855"},{"key":"9763_CR5","doi-asserted-by":"publisher","first-page":"788007","DOI":"10.1117\/12.872489","volume":"7880","author":"A Cortiana","year":"2011","unstructured":"Cortiana A, Conotter V, Boato G, De Natale FGB (2011) Performance comparison of denoising filters for source camera identification. In: SPIE Media Watermarking, Security, and Forensics III 7880:788007. https:\/\/doi.org\/10.1117\/12.872489","journal-title":"In: SPIE Media Watermarking, Security, and Forensics III"},{"issue":"8","key":"9763_CR6","doi-asserted-by":"publisher","first-page":"2080","DOI":"10.1109\/TIP.2007.901238","volume":"16","author":"K Dabov","year":"2007","unstructured":"Dabov K, Foi A, Katkovnik V, Egiazarian K (2007) Image denoising by sparse 3-D transform-domain collaborative filtering. IEEE Trans Image Process 16(8):2080\u20132095. https:\/\/doi.org\/10.1109\/TIP.2007.901238","journal-title":"IEEE Trans Image Process"},{"issue":"3","key":"9763_CR7","doi-asserted-by":"publisher","first-page":"139","DOI":"10.4103\/jfsm.jfsm_8_17","volume":"3","author":"M Du","year":"2017","unstructured":"Du M (2017) Analysis of errors in forensic science. J Forensic Sci Med 3(3):139\u2013143. https:\/\/doi.org\/10.4103\/jfsm.jfsm_8_17","journal-title":"J Forensic Sci Med"},{"key":"9763_CR8","doi-asserted-by":"publisher","unstructured":"Goljan M, Chen M, Comesa\u00f1a P, Fridrich J (2016) Effect of compression on sensor-fingerprint based camera identification. In: IS&T Int. Symp. Electron. Imag., Media Watermarking, Security, and Forensics, San Francisco, CA, p 1\u201310. https:\/\/doi.org\/10.2352\/ISSN.2470-1173.2016.8.MWSF-086","DOI":"10.2352\/ISSN.2470-1173.2016.8.MWSF-086"},{"key":"9763_CR9","doi-asserted-by":"publisher","first-page":"83030H","DOI":"10.1117\/12.909659","volume":"8303","author":"M Goljan","year":"2012","unstructured":"Goljan M, Fridrich J (2012) Sensor-fingerprint based identification of images corrected for lens distortion. SPIE Media Watermarking, Security, and Forensics 8303:83030H. https:\/\/doi.org\/10.1117\/12.909659","journal-title":"SPIE Media Watermarking, Security, and Forensics"},{"key":"9763_CR10","doi-asserted-by":"publisher","first-page":"72540I","DOI":"10.1117\/12.805701","volume":"7254","author":"M Goljan","year":"2009","unstructured":"Goljan M, Fridrich J, Filler T (2009) Large scale test of sensor fingerprint camera identification. In: SPIE Media Forensics and Security 7254:72540I. https:\/\/doi.org\/10.1117\/12.805701","journal-title":"In: SPIE Media Forensics and Security"},{"issue":"3","key":"9763_CR11","doi-asserted-by":"publisher","first-page":"649","DOI":"10.3390\/s19030649","volume":"19","author":"M Iuliani","year":"2019","unstructured":"Iuliani M, Fontani M, Shullani D, Piva A (2019) Hybrid reference-based video source identification. Sensors 19(3):649. https:\/\/doi.org\/10.3390\/s19030649","journal-title":"Sensors"},{"issue":"1","key":"9763_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1687-5281-2014-19","volume":"2014","author":"X Kang","year":"2014","unstructured":"Kang X, Chen J, Lin K, Anjie P (2014) A context-adaptive spn predictor for trustworthy source camera identification. EURASIP J Image Video Process 2014(1):1\u201311. https:\/\/doi.org\/10.1186\/1687-5281-2014-19","journal-title":"EURASIP J Image Video Process"},{"issue":"2","key":"9763_CR13","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1109\/TIFS.2011.2168214","volume":"7","author":"X Kang","year":"2012","unstructured":"Kang X, Li Y, Qu Z, Huang J (2012) Enhancing source camera identification performance with a camera reference phase sensor pattern noise. IEEE Trans Inf Forensics Security 7(2):393\u2013402. https:\/\/doi.org\/10.1109\/TIFS.2011.2168214","journal-title":"IEEE Trans Inf Forensics Security"},{"key":"9763_CR14","doi-asserted-by":"publisher","unstructured":"Kurosawa K, Kuroki K, Saitoh N (1999) CCD fingerprint method-identification of a video camera from videotaped images. In: Int. Conf. Image Process. p 537\u2013540. https:\/\/doi.org\/10.1109\/ICIP.1999.817172","DOI":"10.1109\/ICIP.1999.817172"},{"issue":"2","key":"9763_CR15","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1109\/TIFS.2016.2620280","volume":"12","author":"A Lawgaly","year":"2016","unstructured":"Lawgaly A, Khelifi F (2016) Sensor pattern noise estimation based on improved locally adaptive DCT filtering and weighted averaging for source camera identification and verification. IEEE Trans Inf Forensics Security 12(2):392\u2013404. https:\/\/doi.org\/10.1109\/TIFS.2016.2620280","journal-title":"IEEE Trans Inf Forensics Security"},{"issue":"2","key":"9763_CR16","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1109\/TIFS.2010.2046268","volume":"5","author":"C Li","year":"2010","unstructured":"Li C (2010) Source camera identification using enhanced sensor pattern noise. IEEE Trans Inf Forensics Security 5(2):280\u2013287. https:\/\/doi.org\/10.1109\/TIFS.2010.2046268","journal-title":"IEEE Trans Inf Forensics Security"},{"issue":"2","key":"9763_CR17","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1109\/TCSVT.2011.2160750","volume":"22","author":"C Li","year":"2012","unstructured":"Li C, Li Y (2012) Color-decoupled photo response non-uniformity for digital image forensics. IEEE Trans Circuits Syst Video Technol 22(2):260\u2013271. https:\/\/doi.org\/10.1109\/TCSVT.2011.2160750","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"1","key":"9763_CR18","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1109\/TIFS.2015.2478748","volume":"11","author":"X Lin","year":"2016","unstructured":"Lin X, Li C (2016) Preprocessing reference sensor pattern noise via spectrum equalization. IEEE Trans Inf Forensics Security 11(1):126\u2013140. https:\/\/doi.org\/10.1109\/TIFS.2015.2478748","journal-title":"IEEE Trans Inf Forensics Security"},{"key":"9763_CR19","doi-asserted-by":"crossref","unstructured":"Lukas J, Fridrich J, Goljan M (2005) Digital \u2018bullet scratches\u2019 for images. In: IEEE Int. Conf. Image process. (ICIP), Genova, Italy, p III-65\u2013III-68","DOI":"10.1109\/ICIP.2005.1530329"},{"issue":"2","key":"9763_CR20","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1109\/TIFS.2006.873602","volume":"1","author":"J Lukas","year":"2006","unstructured":"Lukas J, Fridrich J, Goljan M (2006) Digital camera identification from sensor pattern noise. IEEE Trans Inf Forensics Security 1(2):205\u2013214. https:\/\/doi.org\/10.1109\/TIFS.2006.873602","journal-title":"IEEE Trans Inf Forensics Security"},{"key":"9763_CR21","doi-asserted-by":"publisher","unstructured":"McCloskey S (2008) Confidence weighting for sensor fingerprinting. In: IEEE Computer Society Conf. Computer Vision and Pattern Recognition Workshops, p 23\u201328. https:\/\/doi.org\/10.1109\/CVPRW.2008.4562986","DOI":"10.1109\/CVPRW.2008.4562986"},{"key":"9763_CR22","doi-asserted-by":"publisher","unstructured":"M\u0131h\u00e7ak MK, Kozintsev I, Ramchandran K (1999) Spatially adaptive statistical modeling of wavelet image coefficients and its application to denoising. In: IEEE Int. Conf. Acoust., Speech, Signal Process. https:\/\/doi.org\/10.1109\/ICASSP.1999.757535","DOI":"10.1109\/ICASSP.1999.757535"},{"key":"9763_CR23","doi-asserted-by":"publisher","DOI":"10.1155\/2007\/42472","volume":"2007","author":"R \u00d6ktem","year":"2007","unstructured":"\u00d6ktem R, Egiazarian K, Lukin VV, Ponomarenko NN, Tsymbal OV (2007) Locally adaptive DCT filtering for signal-dependent noise removal. EURASIP J Adv Signal Process 2007:042472. https:\/\/doi.org\/10.1155\/2007\/42472","journal-title":"EURASIP J Adv Signal Process"},{"key":"9763_CR24","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1186\/s13635-017-0067-2","volume":"2017","author":"D Shullani","year":"2017","unstructured":"Shullani D, Fontani M, Iuliani M, Shaya OA, Piva A (2017) VISION: a video and image dataset for source identification. EURASIP J Inf Security 2017:15. https:\/\/doi.org\/10.1186\/s13635-017-0067-2","journal-title":"EURASIP J Inf Security"},{"key":"9763_CR25","unstructured":"Spy Blog - Watching Them, Watching Us (2019). Operation Algebra child rape convictions in Scotland: open WiFi tracking, digital camera image forensics. https:\/\/spyblog.org.uk\/ssl\/spyblog\/2009\/05\/09\/operation-algebra-child-rape-convictions-in-scotland-open-wifi-tracking-digi.html, Accessed 10 Sept 2019"},{"key":"9763_CR26","doi-asserted-by":"publisher","unstructured":"Taspinar S, Mohanty M, Memon N (2016) Source camera attribution using stabilized video. In: IEEE Int Workshop Inf Forensics Security (WIFS). https:\/\/doi.org\/10.1109\/WIFS.2016.7823918","DOI":"10.1109\/WIFS.2016.7823918"},{"issue":"1","key":"9763_CR27","doi-asserted-by":"publisher","first-page":"19","DOI":"10.6593\/FSJ.2017.1601.03","volume":"16","author":"W Yang","year":"2017","unstructured":"Yang W, Tsai L, Chen C (2017) Applying the sensor noise based camera identification technique to trace origin of digital images in forensic science. Forensic Sci J 16(1):19\u201342. https:\/\/doi.org\/10.6593\/FSJ.2017.1601.03","journal-title":"Forensic Sci J"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09763-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-09763-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09763-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,19]],"date-time":"2021-10-19T06:56:53Z","timestamp":1634626613000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-09763-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,19]]},"references-count":27,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2021,2]]}},"alternative-id":["9763"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-09763-z","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,10,19]]},"assertion":[{"value":"18 November 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 July 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 August 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 October 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}