{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T00:23:20Z","timestamp":1773879800319,"version":"3.50.1"},"reference-count":23,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2014,12,1]],"date-time":"2014-12-01T00:00:00Z","timestamp":1417392000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"Center for Interdisciplinary Studies in Security and Privacy, New York University Abu Dhabi, Abu Dhabi, United Arab Emirates"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/tifs.2014.2361200","type":"journal-article","created":{"date-parts":[[2014,10,1]],"date-time":"2014-10-01T18:39:07Z","timestamp":1412188747000},"page":"2277-2290","source":"Crossref","is-referenced-by-count":48,"title":["Analysis of Seam-Carving-Based Anonymization of Images Against PRNU Noise Pattern-Based Source Attribution"],"prefix":"10.1109","volume":"9","author":[{"given":"Ahmet Emir","family":"Dirik","sequence":"first","affiliation":[]},{"given":"Husrev Taha","family":"Sencar","sequence":"additional","affiliation":[]},{"given":"Nasir","family":"Memon","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-0757-7_12"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1364\/OE.22.000470"},{"key":"ref12","first-page":"68190e1","article-title":"Camera identification from cropped and scaled images","volume":"6819","author":"goljan","year":"2008","journal-title":"Proc SPIE"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"86650b","DOI":"10.1117\/12.2003234","article-title":"Sensor fingerprint digests for fast camera identification from geometrically distorted images","volume":"8665","author":"goljan","year":"2013","journal-title":"Proc SPIE"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MMSP.2013.6659300"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.1145\/1276377.1276390","article-title":"Seam carving for content-aware image resizing","volume":"26","author":"avidan","year":"2007","journal-title":"ACM Trans Graph"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1111\/j.1556-4029.2012.02057.x"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"72540i","DOI":"10.1117\/12.805701","article-title":"Large scale test of sensor fingerprint camera identification","volume":"7254","author":"goljan","year":"2009","journal-title":"Proc SPIE"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.1142\/p191","volume":"31","author":"kotz","year":"2000","journal-title":"Extreme Value Distributions"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04898-2_246"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.916285"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.926987"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2046556.2046559"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2009.4959851"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"72540","DOI":"10.1117\/12.814705","article-title":"A study of the robustness of PRNU-based camera identification","volume":"7254","author":"rosenfeld","year":"2009","journal-title":"Proc SPIE"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"454","DOI":"10.1007\/978-3-642-04438-0_38","article-title":"Digital camera identification from images&#x2014;Estimating false acceptance probability","volume":"5450","author":"goljan","year":"2009","journal-title":"Digital Watermarking"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.873602"},{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4614-0757-7","author":"sencar","year":"2013","journal-title":"Digital Image Forensics There is More to a Picture than Meets the Eye"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1291233.1291252"},{"key":"ref20","first-page":"120","article-title":"Fast normalized cross-correlation","volume":"10","author":"lewis","year":"1995","journal-title":"Vis Int"},{"key":"ref22","author":"siegmund","year":"1985","journal-title":"Sequential Analysis Tests and Confidence Intervals"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177731118"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1117\/12.909659"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/6953163\/06914598.pdf?arnumber=6914598","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:00:38Z","timestamp":1642003238000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6914598"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":23,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2014.2361200","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,12]]}}}