{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:14:36Z","timestamp":1750220076670,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":62,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,4,30]],"date-time":"2023-04-30T00:00:00Z","timestamp":1682812800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,4,30]]},"DOI":"10.1145\/3543507.3583225","type":"proceedings-article","created":{"date-parts":[[2023,4,26]],"date-time":"2023-04-26T23:30:51Z","timestamp":1682551851000},"page":"2054-2065","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Web Photo Source Identification based on Neural Enhanced Camera Fingerprint"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2922-9346","authenticated-orcid":false,"given":"Feng","family":"Qian","sequence":"first","affiliation":[{"name":"Ant Group, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4972-2640","authenticated-orcid":false,"given":"Sifeng","family":"He","sequence":"additional","affiliation":[{"name":"Ant Group, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3487-1790","authenticated-orcid":false,"given":"Honghao","family":"Huang","sequence":"additional","affiliation":[{"name":"Ant Group, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2365-8687","authenticated-orcid":false,"given":"Huanyu","family":"Ma","sequence":"additional","affiliation":[{"name":"Ant Group, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2766-3109","authenticated-orcid":false,"given":"Xiaobo","family":"Zhang","sequence":"additional","affiliation":[{"name":"Ant Group, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0369-4020","authenticated-orcid":false,"given":"Lei","family":"Yang","sequence":"additional","affiliation":[{"name":"Ant Group, China"}]}],"member":"320","published-online":{"date-parts":[[2023,4,30]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2021379"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2021379"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23099"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2192272"},{"key":"e_1_3_2_2_5_1","volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","author":"Ben-Sasson Eli","year":"2014","unstructured":"Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, and Madars Virza. 2014. Succinct { Non-Interactive} zero knowledge for a von neumann architecture. In 23rd USENIX Security Symposium (USENIX Security 14). 781\u2013796."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2942211"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.916285"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2015.7368565"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2916364"},{"key":"e_1_3_2_2_10_1","volume-title":"Mobile Computational Photography: A Tour. CoRR abs\/2102.09000","author":"Delbracio Mauricio","year":"2021","unstructured":"Mauricio Delbracio, Damien Kelly, Michael\u00a0S. Brown, and Peyman Milanfar. 2021. Mobile Computational Photography: A Tour. CoRR abs\/2102.09000 (2021). arXiv:2102.09000https:\/\/arxiv.org\/abs\/2102.09000"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_31"},{"key":"e_1_3_2_2_12_1","unstructured":"Morris\u00a0J Dworkin 2015. SHA-3 standard: Permutation-based hash and extendable-output functions. (2015)."},{"key":"e_1_3_2_2_13_1","volume-title":"23rd USENIX Security Symposium","author":"Eli Ben-Sasson Eran\u00a0Tromer","year":"2014","unstructured":"Eran\u00a0Tromer Eli Ben-Sasson, Alessandro\u00a0Chiesa and Madars Virza. 2014. Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture. 23rd USENIX Security Symposium (2014)."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2003.10093"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.3390\/data6080087"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.3390\/jimaging7070102"},{"volume-title":"Digital image forensics","author":"Fridrich Jessica","key":"e_1_3_2_2_17_1","unstructured":"Jessica Fridrich. 2013. Sensor defects in digital image forensic. In Digital image forensics. Springer, 179\u2013218."},{"key":"e_1_3_2_2_18_1","volume-title":"Copyright and Creativity: Authors and Photographers. CoRR cs.CY\/0311054","author":"Galbi A.","year":"2003","unstructured":"Douglas\u00a0A. Galbi. 2003. Copyright and Creativity: Authors and Photographers. CoRR cs.CY\/0311054 (2003). http:\/\/arxiv.org\/abs\/cs\/0311054"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-015-0146-7"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2788002"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01231-1_17"},{"key":"e_1_3_2_2_22_1","volume-title":"Image Database\u2019case-study. In Proceedings of the on Multimedia and security. 109\u2013114","author":"Gloe Thomas","year":"2012","unstructured":"Thomas Gloe, Stefan Pfennig, and Matthias Kirchner. 2012. Unexpected artefacts in PRNU-based camera identification: A\u2019Dresden Image Database\u2019case-study. In Proceedings of the on Multimedia and security. 109\u2013114."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00195207"},{"volume-title":"Media forensics and security, Vol.\u00a07254","author":"Goljan Miroslav","key":"e_1_3_2_2_24_1","unstructured":"Miroslav Goljan, Jessica Fridrich, and Tom\u00e1\u0161 Filler. 2009. Large scale test of sensor fingerprint camera identification. In Media forensics and security, Vol.\u00a07254. SPIE, 170\u2013181."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2007.4379530"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49896-5_11"},{"key":"e_1_3_2_2_27_1","volume-title":"Digital image splicing detection based on Markov features in DCT and DWT domain. Pattern recognition 45, 12","author":"He Zhongwei","year":"2012","unstructured":"Zhongwei He, Wei Lu, Wei Sun, and Jiwu Huang. 2012. Digital image splicing detection based on Markov features in DCT and DWT domain. Pattern recognition 45, 12 (2012), 4292\u20134299."},{"key":"e_1_3_2_2_28_1","unstructured":"Alexander Hermans Lucas Beyer and Bastian Leibe. 2017. In defense of the triplet loss for person re-identification. arXiv preprint arXiv:1703.07737 (2017)."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain53845.2021.00089"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01366"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s102070100002"},{"key":"e_1_3_2_2_32_1","volume-title":"Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980","author":"Kingma P","year":"2014","unstructured":"Diederik\u00a0P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS47025.2019.9035103"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2025545"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW.2017.49"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2620280"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2016.2599849"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1155\/2018"},{"key":"e_1_3_2_2_39_1","volume-title":"AUC: a misleading measure of the performance of predictive distribution models. Global ecology and Biogeography 17, 2","author":"Lobo M","year":"2008","unstructured":"Jorge\u00a0M Lobo, Alberto Jim\u00e9nez-Valverde, and Raimundo Real. 2008. AUC: a misleading measure of the performance of predictive distribution models. Global ecology and Biogeography 17, 2 (2008), 145\u2013151."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.873602"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-013-0688-y"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMM48946.2020.9142035"},{"key":"e_1_3_2_2_43_1","volume-title":"Southern African Conference for Artificial Intelligence Research. Springer, 267\u2013281","author":"Mouton Coenraad","year":"2021","unstructured":"Coenraad Mouton, Johannes\u00a0C Myburgh, and Marelie\u00a0H Davel. 2021. Stride and translation invariance in CNNs. In Southern African Conference for Artificial Intelligence Research. Springer, 267\u2013281."},{"volume-title":"Photo response non-uniformity based image forensics in the presence of challenging factors. Ph.\u00a0D. Dissertation","author":"Quan Yijun","key":"e_1_3_2_2_44_1","unstructured":"Yijun Quan. 2020. Photo response non-uniformity based image forensics in the presence of challenging factors. Ph.\u00a0D. Dissertation. University of Warwick, Coventry, UK. https:\/\/ethos.bl.uk\/OrderDetails.do?uin=uk.bl.ethos.837398"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29959-0_22"},{"volume-title":"Journal of Physics: Conference Series, Vol.\u00a0978","author":"Rachmawati Dian","key":"e_1_3_2_2_46_1","unstructured":"Dian Rachmawati, JT Tarigan, and ABC Ginting. 2018. A comparative study of Message Digest 5 (MD5) and SHA256 algorithm. In Journal of Physics: Conference Series, Vol.\u00a0978. IOP Publishing, 012116."},{"key":"e_1_3_2_2_47_1","volume-title":"Picture thresholding using an iterative selection method","author":"Ridler TW","year":"1978","unstructured":"TW Ridler, S Calvard, 1978. Picture thresholding using an iterative selection method. IEEE trans syst Man Cybern 8, 8 (1978), 630\u2013632."},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2207.01323"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25937-4_24"},{"key":"e_1_3_2_2_50_1","volume-title":"Generalized and separable sobel operators. Machine vision for three-dimensional scenes","author":"Seger Olle","year":"2012","unstructured":"Olle Seger. 2012. Generalized and separable sobel operators. Machine vision for three-dimensional scenes (2012), 347."},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.207"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13635-017-0067-2"},{"key":"e_1_3_2_2_53_1","first-page":"93","article-title":"Can I Use this Photo I Found on Facebook? Applying Copyright Law and Fair Use Analysis to Photographs on Social Networking Sites Republished for News Reporting Purposes","volume":"10","author":"Stewart R.","year":"2012","unstructured":"Daxton\u00a0R. Stewart. 2012. Can I Use this Photo I Found on Facebook? Applying Copyright Law and Fair Use Analysis to Photographs on Social Networking Sites Republished for News Reporting Purposes. J. Telecommun. High Technol. Law 10, 1 (2012), 93\u2013122. http:\/\/www.jthtl.org\/content\/articles\/V10I1\/JTHTLv10i1_Stewart.PDF","journal-title":"J. Telecommun. High Technol. Law"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2415461"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2697402"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2022.3157867"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.180"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00283"},{"key":"e_1_3_2_2_59_1","volume-title":"25th USENIX Security Symposium, USENIX Security 16","author":"Xu Yi","year":"2016","unstructured":"Yi Xu, True Price, Jan-Michael Frahm, and Fabian Monrose. 2016. Virtual U: Defeating Face Liveness Detection by Building Virtual Models from Your Public Photos. In 25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10-12, 2016, Thorsten Holz and Stefan Savage (Eds.). USENIX Association, 497\u2013512. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/xu"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.3390\/s22093388"},{"key":"e_1_3_2_2_61_1","volume-title":"DynamicISP: Dynamically Controlled Image Signal Processor for Image Recognition. ArXiv abs\/2211.01146","author":"Yoshimura Masakazu","year":"2022","unstructured":"Masakazu Yoshimura, Junji Otsuka, Atsushi Irie, and Takeshi Ohashi. 2022. DynamicISP: Dynamically Controlled Image Signal Processor for Image Recognition. ArXiv abs\/2211.01146 (2022)."},{"key":"e_1_3_2_2_62_1","volume-title":"Beyond a gaussian denoiser: Residual learning of deep cnn for image denoising","author":"Zhang Kai","year":"2017","unstructured":"Kai Zhang, Wangmeng Zuo, Yunjin Chen, Deyu Meng, and Lei Zhang. 2017. Beyond a gaussian denoiser: Residual learning of deep cnn for image denoising. IEEE transactions on image processing 26, 7 (2017), 3142\u20133155."}],"event":{"name":"WWW '23: The ACM Web Conference 2023","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Austin TX USA","acronym":"WWW '23"},"container-title":["Proceedings of the ACM Web Conference 2023"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3543507.3583225","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3543507.3583225","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:19Z","timestamp":1750183759000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3543507.3583225"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,30]]},"references-count":62,"alternative-id":["10.1145\/3543507.3583225","10.1145\/3543507"],"URL":"https:\/\/doi.org\/10.1145\/3543507.3583225","relation":{},"subject":[],"published":{"date-parts":[[2023,4,30]]},"assertion":[{"value":"2023-04-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}