{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T04:41:44Z","timestamp":1729658504409,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,12]]},"DOI":"10.1109\/wifs.2009.5386459","type":"proceedings-article","created":{"date-parts":[[2010,1,22]],"date-time":"2010-01-22T16:14:24Z","timestamp":1264176864000},"page":"171-175","source":"Crossref","is-referenced-by-count":6,"title":["Source cell phone camera identification based on singular value decomposition"],"prefix":"10.1109","author":[{"given":"Gokhan","family":"Gul","sequence":"first","affiliation":[]},{"given":"Ismail","family":"Avcibas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Blind Identification of Cellular Phone Cameras","author":"celiktutan","year":"2007","journal-title":"19th SPIE Electronic Imaging Conf 6505 Security Steganography and Watermarking of Multimedia Contents"},{"journal-title":"LIBSVM A library for support vector machines","year":"2001","author":"chang","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/0167-8655(94)90127-9"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2007.366212"},{"key":"ref14","article-title":"Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines","author":"lyu","year":"2002","journal-title":"Proc of Information Hiding Workshop"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2002.807363"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"2749","DOI":"10.1155\/ASP.2005.2749","article-title":"Image Steganalysis with Binary Similarity Measures","volume":"2005","author":"avcibas","year":"2005","journal-title":"EURASIP J on Applied Signal Processing"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.873602"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.926993"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MMSP.2006.285343"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2004.1418853"},{"key":"ref8","first-page":"1","article-title":"Source camera identification based on sensor dust characteristics","author":"dirik","year":"2007","journal-title":"Proc Signal Processing Applications Public Security Forensics"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1364\/OE.14.011551"},{"key":"ref2","article-title":"Overview of State-of-the-art in Digital Image Forensics","author":"sencar","year":"2008","journal-title":"Part of Indian Statistical Institute Platinum Jubilee Monograph series titled 'Statistical Science and Interdisciplinary Research'"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/40.743681"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2006.884010"}],"event":{"name":"2009 First IEEE International Workshop on Information Forensics and Security (WIFS 2009)","start":{"date-parts":[[2009,12,6]]},"location":"London","end":{"date-parts":[[2009,12,9]]}},"container-title":["2009 First IEEE International Workshop on Information Forensics and Security (WIFS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5377995\/5386439\/05386459.pdf?arnumber=5386459","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T23:59:41Z","timestamp":1497830381000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5386459\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,12]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/wifs.2009.5386459","relation":{},"subject":[],"published":{"date-parts":[[2009,12]]}}}