{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T13:49:54Z","timestamp":1769521794663,"version":"3.49.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T00:00:00Z","timestamp":1658102400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T00:00:00Z","timestamp":1658102400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2020YFB1406902,A12003"],"award-info":[{"award-number":["2020YFB1406902,A12003"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Science Foundation of China","doi-asserted-by":"publisher","award":["62076080"],"award-info":[{"award-number":["62076080"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,7,18]]},"DOI":"10.1109\/icme52920.2022.9859965","type":"proceedings-article","created":{"date-parts":[[2022,8,26]],"date-time":"2022-08-26T19:45:18Z","timestamp":1661543118000},"page":"1-6","source":"Crossref","is-referenced-by-count":11,"title":["Source Camera Identification with Multi-Scale Feature Fusion Network"],"prefix":"10.1109","author":[{"given":"Chen","family":"Hui","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Harbin Institute of Technology,Harbin,China,150001"}]},{"given":"Feng","family":"Jiang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Harbin Institute of Technology,Harbin,China,150001"}]},{"given":"Shaohui","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Harbin Institute of Technology,Harbin,China,150001"}]},{"given":"Debin","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Harbin Institute of Technology,Harbin,China,150001"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS47025.2019.9035103"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2302078"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1117\/12.872489"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.4018\/jdcf.2010040102"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2018.8462585"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2020.3008855"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/s21144701"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2916364"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2016.7823908"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1186\/s13635-020-0101-7"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.873602"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102079"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-0757-7_6"},{"key":"ref5","first-page":"72540i","article-title":"Large scale test of sensor fingerprint camera identification","volume":"7254","author":"goljan","year":"2009","journal-title":"Media Forensics Secur Int Soc Opt Photon"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS49906.2020.9360911"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/jimaging6030009"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/app11156752"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2017.08.009"},{"key":"ref1","article-title":"Adversarial analysis for source camera identification","author":"bo","year":"2020","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"ref20","first-page":"234","article-title":"U-net: Convolutional networks for biomedical image segmentation","author":"ronneberger","year":"0","journal-title":"International Conference on Medical Image Computing and Computer-Assisted Intervention"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1148\/ryct.2020200075"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60964-5_44"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1186\/s13635-017-0067-2"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/TIFS.2007.916285","article-title":"Determining image origin and integrity using sensor noise","volume":"3","author":"mo","year":"2008","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"ref26","article-title":"Adam: A method for stochastic optimization","author":"kingma","year":"2014","journal-title":"Computer Science"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.106"}],"event":{"name":"2022 IEEE International Conference on Multimedia and Expo (ICME)","location":"Taipei, Taiwan","start":{"date-parts":[[2022,7,18]]},"end":{"date-parts":[[2022,7,22]]}},"container-title":["2022 IEEE International Conference on Multimedia and Expo (ICME)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9859562\/9858923\/09859965.pdf?arnumber=9859965","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,19]],"date-time":"2022-09-19T20:24:29Z","timestamp":1663619069000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9859965\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,18]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/icme52920.2022.9859965","relation":{},"subject":[],"published":{"date-parts":[[2022,7,18]]}}}