{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,24]],"date-time":"2025-05-24T05:06:02Z","timestamp":1748063162382,"version":"3.37.3"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"16","license":[{"start":{"date-parts":[[2021,6,2]],"date-time":"2021-06-02T00:00:00Z","timestamp":1622592000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,6,2]],"date-time":"2021-06-02T00:00:00Z","timestamp":1622592000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"PHC-Utique","award":["17G1405"],"award-info":[{"award-number":["17G1405"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2022,7]]},"DOI":"10.1007\/s11042-021-10973-2","type":"journal-article","created":{"date-parts":[[2021,6,2]],"date-time":"2021-06-02T10:11:08Z","timestamp":1622628668000},"page":"22789-22806","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Automatic source scanner identification using 1D convolutional neural network"],"prefix":"10.1007","volume":"81","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4153-3287","authenticated-orcid":false,"given":"Chaima","family":"Ben Rabah","sequence":"first","affiliation":[]},{"given":"Gouenou","family":"Coatrieux","sequence":"additional","affiliation":[]},{"given":"Riadh","family":"Abdelfattah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,2]]},"reference":[{"key":"10973_CR1","unstructured":"Abadi M, Barham P, Chen J, Chen Z, Davis A, Dean J, Devin M, Ghemawat S, Irving G, Isard M, et al (2016) Tensorflow: a system for large-scale machine learning. In: 12th {USENIX} symposium on operating systems design and implementation ({OSDI} 16), pp 265\u2013283"},{"key":"10973_CR2","doi-asserted-by":"crossref","unstructured":"Al Banna MH, Haider MA, Al Nahian MJ, Islam MM, Taher KA, Kaiser MS (2019) Camera model identification using deep cnn and transfer learning approach. In: 2019 International conference on robotics, electrical and signal processing techniques (ICREST). IEEE, pp 626\u2013630","DOI":"10.1109\/ICREST.2019.8644194"},{"key":"10973_CR3","unstructured":"Alain G, Bengio Y (2018) Understanding intermediate layers using linear classifier probes. 1610.01644"},{"key":"10973_CR4","doi-asserted-by":"crossref","unstructured":"Arkah ZM, Alzubaidi L, Ali AA, Abdulameer AT (2018) Digital color documents authentication using qr code based on digital watermarking. In: International conference on intelligent systems design and applications. Springer, pp 1093\u20131101","DOI":"10.1007\/978-3-030-16657-1_102"},{"key":"10973_CR5","doi-asserted-by":"crossref","unstructured":"Barni M, Costanzo A, Nowroozi E, Tondi B (2018) Cnn-based detection of generic contrast adjustment with jpeg post-processing. In: 2018 25th IEEE international conference on image processing (ICIP). IEEE, pp 3803\u20133807","DOI":"10.1109\/ICIP.2018.8451698"},{"key":"10973_CR6","doi-asserted-by":"crossref","unstructured":"Bondi L, Lameri S, G\u00fcera D, Bestagini P, Delp EJ, Tubaro S (2017) Tampering detection and localization through clustering of camera-based cnn features. In: 2017 IEEE conference on computer vision and pattern recognition workshops (CVPRW). IEEE, pp 1855\u20131864","DOI":"10.1109\/CVPRW.2017.232"},{"key":"10973_CR7","doi-asserted-by":"crossref","unstructured":"Cu VL, Burie JC, Ogier JM (2018) Watermarking for security issue of handwritten documents with fully convolutional networks. In: 2018 16th international conference on frontiers in handwriting recognition (ICFHR). IEEE, pp 303\u2013308","DOI":"10.1109\/ICFHR-2018.2018.00060"},{"issue":"4","key":"10973_CR8","first-page":"209","volume":"3","author":"M Damshenas","year":"2014","unstructured":"Damshenas M, Dehghantanha A, Mahmoud R (2014) A survey on digital forensics trends. International Journal of Cyber-Security and Digital Forensics 3(4):209\u2013235","journal-title":"International Journal of Cyber-Security and Digital Forensics"},{"key":"10973_CR9","doi-asserted-by":"publisher","first-page":"25878","DOI":"10.1109\/ACCESS.2019.2897360","volume":"7","author":"X Ding","year":"2019","unstructured":"Ding X, Chen Y, Tang Z, Huang Y (2019) Camera identification based on domain knowledge-driven deep multi-task learning. IEEE Access 7:25878\u201325890","journal-title":"IEEE Access"},{"key":"10973_CR10","unstructured":"Foi A, Katkovnik V, Egiazarian K (2006) Pointwise shape-adaptive dct denoising with structure preservation in luminance-chrominance space. In: Proc. of the 2nd international workshop on video processing and quality metrics for consumer electronics, VPQM"},{"issue":"9","key":"10973_CR11","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1109\/LSP.2005.853048","volume":"12","author":"JE Fowler","year":"2005","unstructured":"Fowler JE (2005) The redundant discrete wavelet transform and additive noise. IEEE Signal Processing Letters 12(9):629\u2013632","journal-title":"IEEE Signal Processing Letters"},{"key":"10973_CR12","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1016\/j.patrec.2018.01.005","volume":"126","author":"D Freire-Obreg\u00f3n","year":"2019","unstructured":"Freire-Obreg\u00f3n D, Narducci F, Barra S, Castrill\u00f3n-Santana M (2019) Deep learning for source camera identification on mobile devices. Pattern Recogn Lett 126:86\u201391","journal-title":"Pattern Recogn Lett"},{"issue":"3","key":"10973_CR13","doi-asserted-by":"publisher","first-page":"741","DOI":"10.1007\/s11554-019-00860-3","volume":"16","author":"S Gao","year":"2019","unstructured":"Gao S, Liao X, Liu X (2019) Real-time detecting one specific tampering operation in multiple operator chains. J Real-Time Image Proc 16(3):741\u2013750","journal-title":"J Real-Time Image Proc"},{"key":"10973_CR14","doi-asserted-by":"crossref","unstructured":"Gloe T, Franz E, Winkler A (2007) Forensics for flatbed scanners. In: Security, steganography, and watermarking of multimedia contents IX, vol 6505. International Society for Optics and Photonics, p 65051I","DOI":"10.1117\/12.704165"},{"key":"10973_CR15","doi-asserted-by":"crossref","unstructured":"Gumilang M, Purwarianti A (2018) Experiments on character and word level features for text classification using deep neural network. In: 2018 third international conference on informatics and computing (ICIC). IEEE, pp 1\u20136","DOI":"10.1109\/IAC.2018.8780509"},{"key":"10973_CR16","doi-asserted-by":"crossref","unstructured":"Gumilang M, Purwarianti A (2018) Experiments on character and word level features for text classification using deep neural network. In: 2018 Third international conference on informatics and computing (ICIC). IEEE, pp 1\u20136","DOI":"10.1109\/IAC.2018.8780509"},{"key":"10973_CR17","doi-asserted-by":"publisher","first-page":"2556","DOI":"10.1109\/TIFS.2020.2972159","volume":"15","author":"S Haddad","year":"2020","unstructured":"Haddad S, Coatrieux G, Moreau-Gaudry A, Cozic M (2020) Joint watermarking-encryption-jpeg-ls for medical image reliability control in encrypted and compressed domains. IEEE Transactions on Information Forensics and Security 15:2556\u20132569","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"10973_CR18","unstructured":"Holst GC (1998) CCD arrays, cameras, and displays"},{"key":"10973_CR19","doi-asserted-by":"crossref","unstructured":"Joshi S, Gupta G, Khanna N (2017) Source classification using document images from smartphones and flatbed scanners. In: National conference on computer vision, pattern recognition, image processing, and graphics. Springer, pp 281\u2013292","DOI":"10.1007\/978-981-13-0020-2_25"},{"key":"10973_CR20","unstructured":"Keras CF (2015) Github"},{"key":"10973_CR21","doi-asserted-by":"crossref","unstructured":"Khanna N, Mikkilineni AK, Chiu GT, Allebach JP, Delp EJ (2007) Scanner identification using sensor pattern noise. In: Security, steganography, and watermarking of multimedia contents IX, vol 6505. International Society for Optics and Photonics, p 65051K","DOI":"10.1117\/12.705837"},{"issue":"1","key":"10973_CR22","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1109\/TIFS.2008.2009604","volume":"4","author":"N Khanna","year":"2009","unstructured":"Khanna N, Mikkilineni AK, Delp EJ (2009) Scanner identification using feature-based processing and analysis. IEEE Transactions on Information Forensics and Security 4(1):123\u2013139","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"10973_CR23","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1016\/j.neucom.2019.07.084","volume":"365","author":"DG Kim","year":"2019","unstructured":"Kim DG, Hou JU, Lee HK (2019) Learning deep features for source color laser printer identification based on cascaded learning. Neurocomputing 365:219\u2013228","journal-title":"Neurocomputing"},{"key":"10973_CR24","unstructured":"Kingma DP, Ba J (2014) Adam: a method for stochastic optimization. arXiv:arXiv:14126980"},{"key":"10973_CR25","doi-asserted-by":"crossref","unstructured":"Kiranyaz S, Avci O, Abdeljaber O, Ince T, Gabbouj M, Inman DJ (2019) 1d convolutional neural networks and applications: a survey. arXiv:190503554","DOI":"10.1109\/ICASSP.2019.8682194"},{"issue":"2.1","key":"10973_CR26","first-page":"765","volume":"18","author":"M Krasnyanskiy","year":"2018","unstructured":"Krasnyanskiy M, Obukhov A, Voyakina A, Skvortsov V, Khvorov V (2018) The algorithm of document routing in the electronic document management system using machine learning methods. International Multidisciplinary Scientific GeoConference: SGEM 18(2.1):765\u2013772","journal-title":"International Multidisciplinary Scientific GeoConference: SGEM"},{"issue":"1","key":"10973_CR27","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1214\/aoms\/1177729694","volume":"22","author":"S Kullback","year":"1951","unstructured":"Kullback S, Leibler RA (1951) On information and sufficiency. The Annals of Mathematical Statistics 22(1):79\u201386","journal-title":"The Annals of Mathematical Statistics"},{"key":"10973_CR28","doi-asserted-by":"crossref","unstructured":"Li Y, Baidoo C, Cai T, Kusi GA (2019) Speech emotion recognition using 1d cnn with no attention. In: 2019 23rd international computer science and engineering conference (ICSEC)","DOI":"10.1109\/ICSEC47112.2019.8974716"},{"issue":"20","key":"10973_CR29","doi-asserted-by":"publisher","first-page":"20739","DOI":"10.1007\/s11042-016-3971-4","volume":"76","author":"X Liao","year":"2017","unstructured":"Liao X, Li K, Yin J (2017) Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform. Multimedia Tools and Applications 76(20):20739\u201320753","journal-title":"Multimedia Tools and Applications"},{"issue":"19","key":"10973_CR30","doi-asserted-by":"publisher","first-page":"26851","DOI":"10.1007\/s11042-016-4251-z","volume":"78","author":"A Liu","year":"2019","unstructured":"Liu A, Zhao Z, Zhang C, Su Y (2019) Smooth filtering identification based on convolutional neural networks. Multimed Tools Applic 78(19):26851\u201326865","journal-title":"Multimed Tools Applic"},{"key":"10973_CR31","volume-title":"A wavelet tour of signal processing","author":"S Mallat","year":"1999","unstructured":"Mallat S (1999) A wavelet tour of signal processing. Elsevier, Amsterdam"},{"key":"10973_CR32","doi-asserted-by":"crossref","unstructured":"Mazumdar A, Singh J, Tomar YS, Bora PK (2019) Detection of image manipulations using siamese convolutional neural networks. In: International conference on pattern recognition and machine intelligence. Springer, pp 226\u2013233","DOI":"10.1007\/978-3-030-34869-4_25"},{"key":"10973_CR33","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa F, Varoquaux G, Gramfort A, Michel V, Thirion B, Grisel O, Blondel M, Prettenhofer P, Weiss R, Dubourg V et al (2011) Scikit-learn: machine learning in python. The Journal of Machine Learning Research 12:2825\u20132830","journal-title":"The Journal of Machine Learning Research"},{"key":"10973_CR34","doi-asserted-by":"crossref","unstructured":"Rabah CB, Coatrieux G, Abdelfattah R (2020) Boosting up source scanner identification using wavelets and convolutional neural networks. Traitement du signal 37(6)","DOI":"10.18280\/ts.370601"},{"key":"10973_CR35","unstructured":"Rabah CB, Coatrieux G, Abdelfattah R (2019) Semi-blind source scanner identification. In: 2019 International conference on internet of things, embedded systems and communications (IINTEC). IEEE, pp 220\u2013225"},{"key":"10973_CR36","unstructured":"Rabah CB, Coatrieux G, Abdelfattah R (in press) Boosting up source scanner identification using wavelets and convolutional neural networks. Traitement du Signal"},{"key":"10973_CR37","doi-asserted-by":"crossref","unstructured":"Rahim N, Foozy CFM (2020) Source camera identification for online social network images using texture feature. In: International conference on soft computing and data mining. Springer, pp 283\u2013296","DOI":"10.1007\/978-3-030-36056-6_28"},{"key":"10973_CR38","doi-asserted-by":"crossref","unstructured":"Salau AO, Olowoyo TD, Akinola SO (2020) Accent classification of the three major nigerian indigenous languages using 1d cnn lstm network model. In: Advances in computational intelligence techniques. Springer, pp 1\u201316","DOI":"10.1007\/978-981-15-2620-6_1"},{"issue":"37","key":"10973_CR39","doi-asserted-by":"publisher","first-page":"28079","DOI":"10.1007\/s11042-020-09106-y","volume":"79","author":"VU Sameer","year":"2020","unstructured":"Sameer VU, Naskar R (2020) Deep siamese network for limited labels classification in source camera identification. Multimedia Tools and Applications 79 (37):28079\u201328104","journal-title":"Multimedia Tools and Applications"},{"key":"10973_CR40","doi-asserted-by":"crossref","unstructured":"Sameer VU, Sarkar A, Naskar R (2017) Source camera identification model: classifier learning, role of learning curves and their interpretation. In: 2017 International conference on wireless communications, signal processing and networking (WiSPNET). IEEE, pp 2660\u20132666","DOI":"10.1109\/WiSPNET.2017.8300246"},{"key":"10973_CR41","doi-asserted-by":"crossref","unstructured":"Singh M, Kaur H, Kakkar A (2015) Digital signature verification scheme for image authentication. In: 2015 2nd international conference on recent advances in engineering & computational sciences (RAECS). IEEE, pp 1\u20135","DOI":"10.1109\/RAECS.2015.7453277"},{"issue":"1","key":"10973_CR42","first-page":"1929","volume":"15","author":"N Srivastava","year":"2014","unstructured":"Srivastava N, Hinton G, Krizhevsky A, Sutskever I, Salakhutdinov R (2014) Dropout: a simple way to prevent neural networks from overfitting. The Journal of Machine Learning Research 15(1):1929\u20131958","journal-title":"The Journal of Machine Learning Research"},{"key":"10973_CR43","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.forsciint.2014.04.018","volume":"241","author":"S Sugawara","year":"2014","unstructured":"Sugawara S (2014) Identification of scanner models by comparison of scanned hologram images. Forensic Science International 241:69\u201383","journal-title":"Forensic Science International"},{"key":"10973_CR44","unstructured":"Tang Y (2015) Deep learning using linear support vector machines. 1306.0239"},{"key":"10973_CR45","first-page":"184","volume":"70","author":"MJ Tsai","year":"2019","unstructured":"Tsai MJ, Tao YH, Yuadi I (2019) Deep learning for printed document source identification. Signal Processing: Image Communication 70:184\u2013198","journal-title":"Signal Processing: Image Communication"},{"key":"10973_CR46","unstructured":"Wikipedia Contributors (2020) Radial basis function kernel \u2014 Wikipedia, the free encyclopedia. https:\/\/en.wikipedia.org\/w\/index.php?title=Radial_basis_function_kernel&oldid=993555025. [Online; Accessed 18 Dec 2020]"},{"key":"10973_CR47","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1016\/j.bspc.2018.08.035","volume":"47","author":"J Zhao","year":"2019","unstructured":"Zhao J, Mao X, Chen L (2019) Speech emotion recognition using deep 1d & 2d cnn lstm networks. Biomedical Signal Processing and Control 47:312\u2013323","journal-title":"Biomedical Signal Processing and Control"},{"key":"10973_CR48","doi-asserted-by":"crossref","unstructured":"Zou Z, Liu Y, Zhang W, Chen Y (2019) Camera model identification based on residual extraction module and squeezenet. In: Proceedings of the 2nd international conference on big data technologies, pp 211\u2013215","DOI":"10.1145\/3358528.3358578"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10973-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-10973-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10973-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,22]],"date-time":"2022-06-22T07:27:22Z","timestamp":1655882842000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-10973-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,2]]},"references-count":48,"journal-issue":{"issue":"16","published-print":{"date-parts":[[2022,7]]}},"alternative-id":["10973"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-10973-2","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2021,6,2]]},"assertion":[{"value":"1 April 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 January 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 March 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 June 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of Interests"}}]}}