{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T09:37:15Z","timestamp":1729676235350,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,12]]},"DOI":"10.1109\/wifs.2012.6412649","type":"proceedings-article","created":{"date-parts":[[2013,1,25]],"date-time":"2013-01-25T19:44:59Z","timestamp":1359143099000},"page":"199-204","source":"Crossref","is-referenced-by-count":6,"title":["Optimum forensic and counter-forensic strategies for source identification with training data"],"prefix":"10.1109","author":[{"given":"Mauro","family":"Barni","sequence":"first","affiliation":[]},{"given":"Benedetta","family":"Tondi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"A Course in Game Theory","year":"1994","author":"osborne","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2012.6288236"},{"key":"10","volume":"2","author":"kendall","year":"1979","journal-title":"The Advanced Theory of Statistics"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2012.6288237"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.36.1.48"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511921889"},{"key":"5","doi-asserted-by":"crossref","DOI":"10.1002\/0471200611","author":"cover","year":"1991","journal-title":"Elements of Information Theory"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2237397"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/18.32134"},{"key":"8","article-title":"Sensor noise camera identification: Countering counter forensics","author":"goljan","year":"0","journal-title":"SPIE Conference on Media Forensics and Security San Jose CA 2010"}],"event":{"name":"2012 IEEE International Workshop on Information Forensics and Security (WIFS)","start":{"date-parts":[[2012,12,2]]},"location":"Costa Adeje - Tenerife, Spain","end":{"date-parts":[[2012,12,5]]}},"container-title":["2012 IEEE International Workshop on Information Forensics and Security (WIFS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6395850\/6412607\/06412649.pdf?arnumber=6412649","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T06:24:45Z","timestamp":1498026285000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6412649\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,12]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/wifs.2012.6412649","relation":{},"subject":[],"published":{"date-parts":[[2012,12]]}}}