{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T22:49:16Z","timestamp":1762642156212,"version":"3.37.3"},"reference-count":39,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"Security Technologies Returning Accountability, Trust and User-Centric Services in the Cloud"},{"DOI":"10.13039\/501100003524","name":"Ministry of Business, Innovation and Employment","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003524","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2021,1,1]]},"DOI":"10.1109\/tdsc.2019.2892448","type":"journal-article","created":{"date-parts":[[2019,1,14]],"date-time":"2019-01-14T14:46:39Z","timestamp":1547477199000},"page":"426-437","source":"Crossref","is-referenced-by-count":10,"title":["e-PRNU: Encrypted Domain PRNU-Based Camera Attribution for Preserving Privacy"],"prefix":"10.1109","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0258-4586","authenticated-orcid":false,"given":"Manoranjan","family":"Mohanty","sequence":"first","affiliation":[]},{"given":"Ming","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9607-376X","authenticated-orcid":false,"given":"Muhammad Rizwan","family":"Asghar","sequence":"additional","affiliation":[]},{"given":"Giovanni","family":"Russello","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"213","article-title":"Identity-based encryption from the weil pairing","volume":"2139","author":"boneh","year":"2001","journal-title":"Proc Annu Int Cryptology Conf"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1109\/LSP.2016.2639036"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1109\/TIFS.2016.2585085"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1109\/CloudCom.2013.77"},{"key":"ref31","first-page":"1","article-title":"Scale me, crop me, know me not: supporting scaling and cropping in secret image sharing","author":"mohanty","year":"2013","journal-title":"Proc IEEE Int Conf Multimedia Expo"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1145\/2393347.2396394"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1109\/TIFS.2015.2415461"},{"key":"ref36","first-page":"754 108","article-title":"Managing a large database of camera fingerprints","author":"goljan","year":"2010","journal-title":"Proc IS&T\/SPIE Electronic Imaging 97"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1109\/TIFS.2010.2099220"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1109\/MSP.2008.931079"},{"key":"ref10","first-page":"754 109","article-title":"Efficient techniques for sensor fingerprint matching in large image and video databases","author":"bayram","year":"2010","journal-title":"Proc Int Soc Opt Eng"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/ICME.2007.4284577"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/TCSVT.2011.2160750"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1145\/1877972.1878002"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"280","DOI":"10.1109\/TIFS.2010.2046268","article-title":"Source camera identification using enhanced sensor pattern noise","volume":"5","author":"li","year":"2010","journal-title":"IEEE Trans Inf Forensics Secur"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/WIFS.2010.5711454"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1117\/12.640109"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/TIFS.2014.2302078"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1145\/1291233.1291252"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1016\/j.diin.2015.01.017"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/TIFS.2017.2697402"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/MMSP.2013.6659300"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1109\/ICIP.2016.7532338"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/TIFS.2008.926987"},{"key":"ref6","first-page":"176","author":"bertini","year":"2015","journal-title":"Smartphone verification and user profiles linking across social networks by camera fingerprinting"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/TIFS.2015.2493982"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/TIFS.2014.2361200"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1007\/978-3-540-30576-7_18"},{"key":"ref7","article-title":"Recent advances in counter PRNU based source attribution and beyond","volume":"9409","author":"karak\u00fc\u00e7\u00fck","year":"2015","journal-title":"IS&T Electronic Imaging &#x2013; Media Watermarking Security and Forensics"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/TIFS.2006.873602"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1007\/978-1-4614-0757-7"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00166"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1364\/OE.22.000470"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.2352\/ISSN.2470-1173.2016.8.MWSF-087"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1007\/978-1-4614-0757-7_12"},{"key":"ref24","first-page":"68 190e","article-title":"Camera identification from cropped and scaled images","author":"goljan","year":"2008","journal-title":"Proc Electron Imaging"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1117\/12.2003234"},{"key":"ref26","first-page":"75 410s","article-title":"Sensor noise camera identification: Countering counter-forensics","author":"goljan","year":"2010","journal-title":"Proc IS&T\/SPIE Electronic Imaging 97"},{"key":"ref25","first-page":"90","article-title":"A study of the robustness of PRNU-based camera identification","author":"rosenfeld","year":"2010","journal-title":"Proc SPIE Media Forensics Security"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/9316344\/08611191.pdf?arnumber=8611191","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:53:35Z","timestamp":1641988415000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8611191\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,1]]},"references-count":39,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2019.2892448","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"type":"print","value":"1545-5971"},{"type":"electronic","value":"1941-0018"},{"type":"electronic","value":"2160-9209"}],"subject":[],"published":{"date-parts":[[2021,1,1]]}}}