{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T18:14:26Z","timestamp":1775326466853,"version":"3.50.1"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2010,11,6]],"date-time":"2010-11-06T00:00:00Z","timestamp":1289001600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int J Comput Vis"],"published-print":{"date-parts":[[2011,3]]},"DOI":"10.1007\/s11263-010-0403-1","type":"journal-article","created":{"date-parts":[[2010,11,5]],"date-time":"2010-11-05T17:52:48Z","timestamp":1288979568000},"page":"71-91","source":"Crossref","is-referenced-by-count":68,"title":["Digital Image Forgery Detection Based on Lens and Sensor Aberration"],"prefix":"10.1007","volume":"92","author":[{"given":"Ido","family":"Yerushalmy","sequence":"first","affiliation":[]},{"given":"Hagit","family":"Hel-Or","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,11,6]]},"reference":[{"key":"403_CR1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781139644181","volume-title":"Principles of optics, electromagnetic theory of propagation, interference and diffraction of light","author":"M. Born","year":"1999","unstructured":"Born, M., & Wolf, E. (1999). Principles of optics, electromagnetic theory of propagation, interference and diffraction of light. Cambridge: Cambridge University Press."},{"key":"403_CR2","doi-asserted-by":"crossref","unstructured":"Cutzu, F., Hammoud, R., & Leykin, A. (2003). Estimating the photorealism of images: distinguishing paintings from photographs. In Proc. IEEE conference on computer vision and pattern recognition.","DOI":"10.1109\/CVPR.2003.1211484"},{"key":"403_CR3","volume-title":"Microlens arrays","author":"D. Daly","year":"2001","unstructured":"Daly, D. (2001). Microlens arrays. Boca Raton: CRC Press."},{"key":"403_CR4","unstructured":"Fridrich, J., Soukal, D., & Luk\u00e1\u0161, J. (2003). Detection of copy-move forgery in digital images. In Proc. digital forensic research workshop, Cleveland, OH."},{"key":"403_CR5","volume-title":"Digital image processing","author":"R. C. Gonzalez","year":"2002","unstructured":"Gonzalez, R. C., & Woods, R. E. (2002). Digital image processing. New York: Prentice Hall."},{"key":"403_CR6","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1016\/0004-3702(81)90024-2","volume":"17","author":"B. K. P. Horn","year":"1981","unstructured":"Horn, B. K. P., & Schunck, B. G. (1981). Determining optical flow. Artificial Intelligence, 17, 185\u2013203.","journal-title":"Artificial Intelligence"},{"key":"403_CR7","volume-title":"Digital image processing","author":"B. Jahne","year":"2005","unstructured":"Jahne, B. (2005). Digital image processing. Berlin: Springer."},{"key":"403_CR8","volume-title":"Fundamentals of optics","author":"F. A. Jenkins","year":"1976","unstructured":"Jenkins, F. A., & White, H. E. (1976). Fundamentals of optics (4th ed.). New York: Mcgraw-Hill.","edition":"4"},{"key":"403_CR9","first-page":"1","volume-title":"Proc. ACM multimedia and security workshop","author":"M. K. Johnson","year":"2005","unstructured":"Johnson, M. K., & Farid, H. (2005). Exposing digital forgeries by detecting inconsistencies in lighting. In Proc. ACM multimedia and security workshop, New York (pp.\u00a01\u20139)."},{"key":"403_CR10","doi-asserted-by":"crossref","unstructured":"Johnson, M. K., & Farid, H. (2006). Exposing digital forgeries through chromatic aberration. In Proc. ACM multimedia and security workshop, Geneva, Switzerland.","DOI":"10.1145\/1161366.1161376"},{"key":"403_CR11","first-page":"474","volume-title":"Proc. international conference on pattern recognition (ICPR)","author":"D. Keren","year":"2002","unstructured":"Keren, D. (2002). Painter identification using local features and naive Bayes. In Proc. international conference on pattern recognition (ICPR) (Vol.\u00a0II, pp.\u00a0474\u2013477). Berlin: Springer."},{"issue":"2","key":"403_CR12","doi-asserted-by":"crossref","first-page":"845","DOI":"10.1109\/TSP.2004.839896","volume":"53","author":"S. Lyu","year":"2005","unstructured":"Lyu, S., & Farid, H. (2005). How realistic is photorealistic? IEEE Transactions on Signal Processing, 53(2), 845\u2013850.","journal-title":"IEEE Transactions on Signal Processing"},{"key":"403_CR13","doi-asserted-by":"crossref","unstructured":"Lyu, S., Rockmore, D., & Farid, H. (2004). A\u00a0digital technique for art authentication. In Proc. National Academy of Sciences.","DOI":"10.1073\/pnas.0406398101"},{"key":"403_CR14","doi-asserted-by":"crossref","first-page":"593","DOI":"10.1016\/S0167-8655(00)00118-5","volume":"22","author":"H. Muller","year":"2001","unstructured":"Muller, H., Muller, W., Squire, D. M., et al. (2001). Performance evaluation in content-based image retrieval: overview and proposals. Pattern Recognition Letters, 22, 593\u2013601.","journal-title":"Pattern Recognition Letters"},{"key":"403_CR15","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1016\/0734-189X(89)90035-2","volume":"46","author":"S. Negahdaripour","year":"1989","unstructured":"Negahdaripour, S., & Horn, B. K. P. (1989). A\u00a0direct method for locating the focus of expansion. Computer Vision Graphics and Image Processing, 46, 303\u2013326.","journal-title":"Computer Vision Graphics and Image Processing"},{"key":"403_CR16","volume-title":"Charge-coupled device technology","author":"S. Ochi","year":"1997","unstructured":"Ochi, S., Lizuka, T., Sato, Y., Hamasaki, M., Abe, H., Narabu, T., Kato, K., & Kagawa, Y. (1997). Charge-coupled device technology. Boca Raton: CRC Press."},{"key":"403_CR17","unstructured":"Parr, R. (2006). Digital photography FAQ. http:\/\/www.cs.duke.edu\/~parr\/photography\/faq.html ."},{"key":"403_CR18","volume-title":"Introduction to optics","author":"F. L. Pedrotti","year":"2006","unstructured":"Pedrotti, F. L., Pedrotti, L. M., & Pedrotti, L. S. (2006). Introduction to optics. Reading: Addison-Wesley."},{"issue":"10","key":"403_CR19","doi-asserted-by":"crossref","first-page":"3948","DOI":"10.1109\/TSP.2005.855406","volume":"53","author":"A. C. Popescu","year":"2005","unstructured":"Popescu, A. C., & Farid, H. (2005). Exposing digital forgeries in color filter array interpolated images. IEEE Transactions on Signal Processing, 53(10), 3948\u20133959.","journal-title":"IEEE Transactions on Signal Processing"},{"key":"403_CR20","doi-asserted-by":"crossref","DOI":"10.4324\/9780080499253","volume-title":"Applied photographic optics","author":"S. F. Ray","year":"2002","unstructured":"Ray, S. F. (2002). Applied photographic optics (3rd ed.). Boston: Focal Press.","edition":"3"},{"key":"403_CR21","volume-title":"Robust regression and outlier detection","author":"P. J. Rousseeuw","year":"2003","unstructured":"Rousseeuw, P. J., & Leroy, A. M. (2003). Robust regression and outlier detection. New York: Wiley."},{"key":"403_CR22","volume-title":"Optics in photography","author":"K. Rudolf","year":"1992","unstructured":"Rudolf, K. (1992). Optics in photography. Bellingham: SPIE."},{"key":"403_CR23","doi-asserted-by":"crossref","unstructured":"Schroff, F., Criminisi, A., & Zisserman, A. (2008). Object class segmentation using random forests. In Proc. British machine vision conference.","DOI":"10.5244\/C.22.54"},{"key":"403_CR24","volume-title":"Modern optical engineering","author":"W. J. Smith","year":"2007","unstructured":"Smith, W. J. (2007). Modern optical engineering (4th ed.). New York: McGraw-Hill.","edition":"4"},{"key":"403_CR25","doi-asserted-by":"crossref","unstructured":"Szummer, M., & Picard, W. (1998). Indoor-outdoor image classification. In Proc. IEEE intl workshop on content based access of image and video databases.","DOI":"10.1109\/CAIVD.1998.646032"},{"key":"403_CR26","unstructured":"van Walree, P. (2009). Photographic optics collection. http:\/\/toothwalker.org\/optics.html ."},{"key":"403_CR27","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-2440-0","volume-title":"The nature of statistical learning theory","author":"V. N. Vapnik","year":"1995","unstructured":"Vapnik, V. N. (1995). The nature of statistical learning theory. Berlin: Springer."},{"key":"403_CR28","doi-asserted-by":"crossref","unstructured":"Wang, W., & Farid, H. (2006). Exposing digital forgeries in video by detecting double MPEG compression. In Proc. ACM multimedia and security workshop, Geneva, Switzerland.","DOI":"10.1145\/1161366.1161375"},{"key":"403_CR29","doi-asserted-by":"crossref","unstructured":"Wolfgang, R. B., & Delp, E. J. (1996). A\u00a0watermark for digital images. In Proc. IEEE intl conference on image processing.","DOI":"10.1109\/ICIP.1996.560423"},{"key":"403_CR30","volume-title":"Color science: concepts and methods, quantitative data and formulae","author":"G. Wyszecki","year":"1982","unstructured":"Wyszecki, G., & Styles, W. S. (1982). Color science: concepts and methods, quantitative data and formulae (2nd ed.). New York: Wiley.","edition":"2"}],"container-title":["International Journal of Computer Vision"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11263-010-0403-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11263-010-0403-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11263-010-0403-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,13]],"date-time":"2020-06-13T15:23:38Z","timestamp":1592061818000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11263-010-0403-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,11,6]]},"references-count":30,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,3]]}},"alternative-id":["403"],"URL":"https:\/\/doi.org\/10.1007\/s11263-010-0403-1","relation":{},"ISSN":["0920-5691","1573-1405"],"issn-type":[{"value":"0920-5691","type":"print"},{"value":"1573-1405","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,11,6]]}}}