{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:28:28Z","timestamp":1759332508326,"version":"3.28.0"},"reference-count":52,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,12,6]],"date-time":"2020-12-06T00:00:00Z","timestamp":1607212800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,12,6]],"date-time":"2020-12-06T00:00:00Z","timestamp":1607212800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,12,6]],"date-time":"2020-12-06T00:00:00Z","timestamp":1607212800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,12,6]]},"DOI":"10.1109\/wifs49906.2020.9360911","type":"proceedings-article","created":{"date-parts":[[2021,2,25]],"date-time":"2021-02-25T21:12:41Z","timestamp":1614287561000},"page":"1-6","source":"Crossref","is-referenced-by-count":4,"title":["Empirical Evaluation of PRNU Fingerprint Variation for Mismatched Imaging Pipelines"],"prefix":"10.1109","author":[{"given":"Sharad","family":"Joshi","sequence":"first","affiliation":[]},{"given":"Pawel","family":"Korus","sequence":"additional","affiliation":[]},{"given":"Nitin","family":"Khanna","sequence":"additional","affiliation":[]},{"given":"Nasir","family":"Memon","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Lightzone","year":"0","key":"ref39"},{"journal-title":"Aftershot pro 3 raw photo editor","year":"0","key":"ref38"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2549059"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2011.2160750"},{"article-title":"Fusion of camera model and source device specific forensic methods for improved tamper detection","year":"2020","author":"poyraz","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2017.8297051"},{"year":"0","key":"ref37"},{"key":"ref36","first-page":"97","article-title":"Learning photo-graphic global tonal adjustment with a database of input\/output image pairs","author":"bychkovsky","year":"2011","journal-title":"CVPR 2011"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2713168.2713194"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2018.04.013"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2415461"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2385634"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2859587"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/496701"},{"journal-title":"Digital Image Forensics There is More to a Picture than Meets the Eye","year":"2013","author":"arbib","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2521349"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2015.7301808"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"280","DOI":"10.1109\/TIFS.2010.2046268","article-title":"Source camera identification using enhanced sensor pattern noise","volume":"5","author":"li","year":"2010","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1111\/1556-4029.13017"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2012.12.018"},{"article-title":"Spn-cnn: Boosting sensor-based source camera attribution with deep learning","year":"2020","author":"kirchner","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2007.901238"},{"key":"ref50","first-page":"454","article-title":"Digital camera identification from images&#x2013;estimating false acceptance probability","author":"goljan","year":"2008","journal-title":"International Workshop on Digital Watermarking"},{"article-title":"A leak in prnu based source identification? questioning fingerprint uniqueness","year":"2020","author":"iuliani","key":"ref51"},{"key":"ref52","first-page":"69","article-title":"Camera identification from hdr images","author":"morshedi","year":"2019","journal-title":"Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29959-0_22"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1117\/12.872489"},{"journal-title":"Dcraw Decoding Raw Digital Photos in Linux","year":"0","key":"ref40"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1877972.1878002"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2980179.2982399"},{"article-title":"Noise2noise: Learning image restoration without clean data","year":"2018","author":"lehtinen","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3130800.3130816"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00276"},{"article-title":"Neural imaging pipelines-the scourge or hope of forensics?","year":"2019","author":"korus","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00882"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2168214"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.873602"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2017.08.009"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2016.12.013"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1186\/1687-5281-2014-19"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.916285"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2640938"},{"journal-title":"Dcraw","year":"0","key":"ref49"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2015.7368580"},{"journal-title":"Lightroom","year":"0","key":"ref46"},{"journal-title":"Capture one","year":"0","key":"ref45"},{"key":"ref48","first-page":"234","article-title":"U-net: Convolutional networks for biomedical image segmentation","author":"ronneberger","year":"2015","journal-title":"International Conference on Medical Image Computing and Computer-Assisted Intervention"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/2980179.2982399"},{"journal-title":"Affinity photo","year":"0","key":"ref42"},{"journal-title":"LIBRA","year":"0","key":"ref41"},{"journal-title":"Dxomark","year":"0","key":"ref44"},{"journal-title":"Skylum luminar","year":"0","key":"ref43"}],"event":{"name":"2020 IEEE International Workshop on Information Forensics and Security (WIFS)","start":{"date-parts":[[2020,12,6]]},"location":"New York, NY, USA","end":{"date-parts":[[2020,12,11]]}},"container-title":["2020 IEEE International Workshop on Information Forensics and Security (WIFS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9360831\/9360880\/09360911.pdf?arnumber=9360911","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,30]],"date-time":"2022-06-30T15:18:41Z","timestamp":1656602321000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9360911\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,6]]},"references-count":52,"URL":"https:\/\/doi.org\/10.1109\/wifs49906.2020.9360911","relation":{},"subject":[],"published":{"date-parts":[[2020,12,6]]}}}