{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T20:56:54Z","timestamp":1768337814209,"version":"3.49.0"},"reference-count":37,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","license":[{"start":{"date-parts":[[2014,8,1]],"date-time":"2014-08-01T00:00:00Z","timestamp":1406851200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"REWIND Project (Future and Emerging Technologies Program within the 7FP of the European Commission)","award":["268478"],"award-info":[{"award-number":["268478"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Inform. Theory"],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/tit.2014.2325571","type":"journal-article","created":{"date-parts":[[2014,6,2]],"date-time":"2014-06-02T19:49:33Z","timestamp":1401738573000},"page":"4848-4866","source":"Crossref","is-referenced-by-count":28,"title":["Binary Hypothesis Testing Game With Training Data"],"prefix":"10.1109","volume":"60","author":[{"given":"Mauro","family":"Barni","sequence":"first","affiliation":[]},{"given":"Benedetta","family":"Tondi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2008.4712454"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/496701"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.916285"},{"key":"ref30","volume":"2","author":"kay","year":"1998","journal-title":"Fundamentals of Statistical Signal Processing Detection Theory"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"75410s","DOI":"10.1117\/12.839055","article-title":"Sensor noise camera identification: Countering counter-forensics","volume":"7541","author":"goljan","year":"0","journal-title":"Proc SPIE"},{"key":"ref36","volume":"2","author":"kendall","year":"1979","journal-title":"The Advanced Theory of Statistics"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/18.556596"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/18.720546"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"695750-1","DOI":"10.1155\/2010\/695750","article-title":"Securing collaborative spectrum sensing against untrustworthy secondary users in cognitive radio networks","volume":"2010","author":"wang","year":"2009","journal-title":"EURASIP J Adv Signal Process"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2010.2091277"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-0757-7_12"},{"key":"ref13","first-page":"306","article-title":"An information-theoretic model for steganography","volume":"1525","author":"cachin","year":"1998","journal-title":"Proc 2nd Int Workshop IH"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2012.6288237"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2002.1003844"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2003.822578"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.824920"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2007.911210"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2237397"},{"key":"ref28","author":"osborne","year":"1994","journal-title":"A Course in Game Theory"},{"key":"ref4","first-page":"469","article-title":"Biometric template security: Challenges and solutions","author":"jain","year":"2005","journal-title":"Proc EUSIPCO"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.36.1.48"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014066"},{"key":"ref6","author":"cox","year":"2002","journal-title":"Digital Watermarking"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.geb.2007.02.002"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2006.313444"},{"key":"ref8","first-page":"54","article-title":"Undermining an anomaly-based intrusion detection system using common exploits","author":"tan","year":"2002","journal-title":"Proc RAID"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139192903"},{"key":"ref2","first-page":"38","article-title":"Special issue on digital forensics","volume":"26","author":"delp","year":"2009","journal-title":"IEEE Signal Process Mag"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1529282.1529575"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6639361"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.2307\/1911196"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2012.6412649"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.2307\/1911197"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1002\/0471200611"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/18.32134"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511921889"},{"key":"ref25","doi-asserted-by":"crossref","DOI":"10.1561\/9781933019543","author":"csisz\u00e1r","year":"2004","journal-title":"Information Theory and Statistics A Tutorial Delft"}],"container-title":["IEEE Transactions on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/18\/6851961\/06824190.pdf?arnumber=6824190","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:16:04Z","timestamp":1642004164000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6824190\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":37,"journal-issue":{"issue":"8"},"URL":"https:\/\/doi.org\/10.1109\/tit.2014.2325571","relation":{},"ISSN":["0018-9448","1557-9654"],"issn-type":[{"value":"0018-9448","type":"print"},{"value":"1557-9654","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,8]]}}}