{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T20:10:35Z","timestamp":1759435835196,"version":"build-2065373602"},"publisher-location":"New York, NY, USA","reference-count":80,"publisher":"ACM","funder":[{"name":"National Research Foundation of Korea (NRF)","award":["RS-2024-00464269","RS-2023-00277848"],"award-info":[{"award-number":["RS-2024-00464269","RS-2023-00277848"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,23]]},"DOI":"10.1145\/3711875.3729158","type":"proceedings-article","created":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T19:30:22Z","timestamp":1759433422000},"page":"473-486","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["CAMPrints: Leveraging the \"Fingerprints\" of Digital Cameras to Combat Image Theft"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5508-1851","authenticated-orcid":false,"given":"Bangjie","family":"Sun","sequence":"first","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6563-275X","authenticated-orcid":false,"given":"Mun Choon","family":"Chan","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0798-704X","authenticated-orcid":false,"given":"Jun","family":"Han","sequence":"additional","affiliation":[{"name":"KAIST, Daejeon, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2025,9,25]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Digital camera identification using PRNU: A feature based approach. Digital investigation 19","author":"Akshatha KR","year":"2016","unstructured":"KR Akshatha, A Kotegar Karunakar, H Anitha, U Raghavendra, and Dinesh Shetty. 2016. Digital camera identification using PRNU: A feature based approach. Digital investigation 19 (2016), 69\u201377."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.14201\/ADCAIJ2020934968"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Chiara Albisani Massimo Iuliani and Alessandro Piva. 2021. Checking PRNU Usability on modern devices. 2535\u20132539 pages.","DOI":"10.1109\/ICASSP39728.2021.9413611"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Andrea Alfarano Luca Maiano Lorenzo Papa and Irene Amerini. 2024. Estimating optical flow: A comprehensive review of the state of the art. 104160 pages.","DOI":"10.1016\/j.cviu.2024.104160"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Sevinc Bayram Husrev Sencar Nasir Memon and Ismail Avcibas. 2005. Source camera identification based on CFA interpolation. III\u201369 pages.","DOI":"10.1109\/ICIP.2005.1530330"},{"key":"e_1_3_2_1_6_1","volume-title":"Classification of digital camera-models based on demosaicing artifacts. digital investigation 5, 1-2","author":"Bayram Sevinc","year":"2008","unstructured":"Sevinc Bayram, Husrev T Sencar, and Nasir Memon. 2008. Classification of digital camera-models based on demosaicing artifacts. digital investigation 5, 1-2 (2008), 49\u201359."},{"key":"e_1_3_2_1_7_1","unstructured":"berify. 2018. [Infographic] A Snapshot of Online Image Theft. https:\/\/berify.com\/blog\/image-theft\/"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Nabeel Nisar Bhat and Tiziano Bianchi. 2022. Investigating inconsistencies in prnu-based camera identification. 851\u2013855 pages.","DOI":"10.1109\/ICIP46576.2022.9897923"},{"key":"e_1_3_2_1_9_1","unstructured":"Luca Bondi Paolo Bestagini and Nicol\u00f2 Bonettini. 2021. Python porting of PRNU extractor and helper functions. https:\/\/github.com\/polimi-ispl\/prnu-python."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Matthew Boutell and Jiebo Luo. 2004. Photo classification by integrating image content and camera metadata. 901\u2013904 pages.","DOI":"10.1109\/ICPR.2004.1333918"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-13354-5"},{"key":"e_1_3_2_1_12_1","unstructured":"C2PA. 2024. About C2PA. https:\/\/c2pa.org\/about\/"},{"key":"e_1_3_2_1_13_1","unstructured":"Mirco Ceccarelli Francesco Argentieri Alessandro Piva Dasara Shullani and Daniele Baracchi. 2021. PRNU extraction via denoiser based on convolutional neural network (DRUNet). https:\/\/github.com\/ocrim1996\/prnu-python."},{"key":"e_1_3_2_1_14_1","volume-title":"Automatic source camera identification using the intrinsic lens radial distortion. Optics express 14, 24","author":"Choi Kai San","year":"2006","unstructured":"Kai San Choi, Edmund Y Lam, and Kenneth KY Wong. 2006. Automatic source camera identification using the intrinsic lens radial distortion. Optics express 14, 24 (2006), 11551\u201311565."},{"key":"e_1_3_2_1_15_1","unstructured":"Cassidy Cole. 2024. How Artists Can Use Copyright Law to Protect Their Work and Build Their Legacy. https:\/\/www.artworkarchive.com\/blog\/how-artists-can-use-copyright-law-to-protect-their-work-and-build-their-legacy"},{"key":"e_1_3_2_1_16_1","unstructured":"Copytrack. 2019. How Big a Problem Is Copyright Infringement? https:\/\/nanpa.org\/2019\/04\/24\/how-big-a-problem-is-copyright-infringement\/"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2916364"},{"key":"e_1_3_2_1_18_1","unstructured":"DATAINTELO. 2024. Copyright Licensing Market Outlook. https:\/\/dataintelo.com\/report\/global-copyright-licensing-market"},{"key":"e_1_3_2_1_19_1","unstructured":"Dealavo. 2024. Reverse image search and its role in e-commerce. https:\/\/dealavo.com\/en\/reverse-image-search\/"},{"key":"e_1_3_2_1_20_1","unstructured":"Dunja Djudjic. 2019. Over 2.5 billion online images are stolen every day Copy-track reports. https:\/\/www.diyphotography.net\/over-2-5-billion-online-images-are-stolen-every-day-copytrack-reports\/"},{"key":"e_1_3_2_1_21_1","unstructured":"Minh N Do and Martin Vetterli. 2000. Texture similarity measurement using Kullback-Leibler distance on wavelet subbands. 730\u2013733 pages."},{"key":"e_1_3_2_1_22_1","unstructured":"DomainTools. 2024. A Brief Comparison of Reverse Image Searching Platforms. https:\/\/www.domaintools.com\/resources\/blog\/a-brief-comparison-of-reverse-image-searching-platforms\/"},{"key":"e_1_3_2_1_23_1","unstructured":"Stanley Dunthorne. 2023. Who's stealing my images? How to use Reverse Image Search. https:\/\/www.hallaminternet.com\/who-is-stealing-my-images\/"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.2352\/ISSN.2470-1173.2016.8.MWSF-087"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Eitan Flor Ramazan Aygun Suat Mercan and Kemal Akkaya. 2021. PRNU-based source camera identification for multimedia forensics. 168\u2013175 pages.","DOI":"10.1109\/IRI51335.2021.00029"},{"key":"e_1_3_2_1_26_1","unstructured":"Vegard Flovik. 2020. Deep learning based reverse image search for industrial applications. https:\/\/towardsdatascience.com\/deep-learning-based-reverse-image-search-for-industrial-applications-33ba4b0d32c4"},{"key":"e_1_3_2_1_27_1","unstructured":"Marco Fontani. 2017. PRNU-based Camera Identification in Amped Authenticate. https:\/\/blog.ampedsoftware.com\/2017\/10\/04\/prnu-based-camera-identification-in-amped-authenticate"},{"key":"e_1_3_2_1_28_1","unstructured":"Mathieu Gaillard and El\u0151d Egyed-Zsigmond. 2017. Large scale reverse image search."},{"key":"e_1_3_2_1_29_1","volume-title":"CNN features for reverse image search. Document num\u00e9rique 21, 1","author":"Gaillard Mathieu","year":"2018","unstructured":"Mathieu Gaillard, El\u00f6d Egyed-Zsigmond, and Michael Granitzer. 2018. CNN features for reverse image search. Document num\u00e9rique 21, 1 (2018), 63\u201390."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Chiara Galdi Frank Hartung and Jean-Luc Dugelay. 2019. SOCRatES: A Database of Realistic Data for SOurce Camera REcognition on Smartphones. 648\u2013655 pages.","DOI":"10.5220\/0007403706480655"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Shang Gao Guanshuo Xu and Rui-Min Hu. 2012. Camera model identification based on the characteristic of CFA and interpolation. 268\u2013280 pages.","DOI":"10.1007\/978-3-642-32205-1_22"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"Miroslav Goljan. 2008. Digital camera identification from images-estimating false acceptance probability. 454\u2013468 pages.","DOI":"10.1007\/978-3-642-04438-0_38"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.2352\/ISSN.2470-1173.2016.8.MWSF-086"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Miroslav Goljan and Jessica Fridrich. 2008. Camera identification from cropped and scaled images. 154\u2013166 pages.","DOI":"10.1117\/12.766732"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Miroslav Goljan and Jessica Fridrich. 2012. Sensor-fingerprint based identification of images corrected for lens distortion. 132\u2013144 pages.","DOI":"10.1117\/12.909659"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2099220"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"Miroslav Goljan Jessica Fridrich and Mo Chen. 2010. Sensor noise camera identification: Countering counter-forensics. 283\u2013294 pages.","DOI":"10.1117\/12.839055"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","unstructured":"Miroslav Goljan Jessica Fridrich and Tom\u00e1\u0161 Filler. 2009. Large scale test of sensor fingerprint camera identification. 170\u2013181 pages.","DOI":"10.1117\/12.805701"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"Miroslav Goljan Jessica Fridrich and Tom\u00e1\u0161 Filler. 2010. Managing a large database of camera fingerprints. 75\u201386 pages.","DOI":"10.1117\/12.838378"},{"key":"e_1_3_2_1_40_1","unstructured":"Matt Golowczynski. 2020. Google reverse image search: Everything you need to know. https:\/\/smartframe.io\/blog\/google-reverse-image-search-everything-you-need-to-know\/"},{"key":"e_1_3_2_1_41_1","unstructured":"Google. 2024. Google Images. https:\/\/images.google.com\/"},{"key":"e_1_3_2_1_42_1","unstructured":"Geoff Harris. 2020. A lot of photographers find out about image theft when the culprits tag them in social media. https:\/\/amateurphotographer.com\/technique\/interviews\/a-lot-of-photographers-find-out-about-image-theft-when-companies-tag-them-in-social-media\/"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"crossref","unstructured":"Kaiming He Xiangyu Zhang Shaoqing Ren and Jian Sun. 2016. Deep residual learning for image recognition. 770\u2013778 pages.","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_44_1","unstructured":"Aaron Hockley. 2019. Flickr Addresses Copyright Challenges in Partnership with Pixsy. https:\/\/techphotoguy.com\/flickr-copyright-infringement-pixsy\/"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"crossref","unstructured":"Chen Hui Feng Jiang Shaohui Liu and Debin Zhao. 2022. Source camera identification with multi-scale feature fusion network. 6 pages.","DOI":"10.1109\/ICME52920.2022.9859965"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3070478"},{"key":"e_1_3_2_1_47_1","unstructured":"Rahul Kad. 2023. Reverse Image Search Engine. https:\/\/github.com\/RAHUL-KAD\/Reverse-Image-Search-Engine."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"crossref","unstructured":"Roland Kwitt and Andreas Uhl. 2008. Image similarity measurement by Kullback-Leibler divergences between complex wavelet subband statistics for texture retrieval. 933\u2013936 pages.","DOI":"10.1109\/ICIP.2008.4711909"},{"key":"e_1_3_2_1_49_1","unstructured":"Laaposto. 2024. Image verification assistant. https:\/\/mever.iti.gr\/forensics\/results\/396d47c2d379d8dbcd9aa3a8311e0bdbde5cf433\/"},{"key":"e_1_3_2_1_50_1","volume-title":"Fits: Matching camera fingerprints subject to software noise pollution. 1660\u20131674 pages.","author":"Liu Liu","year":"2023","unstructured":"Liu Liu, Xinwen Fu, Xiaodong Chen, Jianpeng Wang, Zhongjie Ba, Feng Lin, Li Lu, and Kui Ren. 2023. Fits: Matching camera fingerprints subject to software noise pollution. 1660\u20131674 pages."},{"key":"e_1_3_2_1_51_1","unstructured":"Rae Marie Manar. 2024. 9 Common Reasons for Copyright Infringement and Its Effects. https:\/\/www.artworkarchive.com\/blog\/how-artists-can-use-copyright-law-to-protect-their-work-and-build-their-legacy"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.3390\/s22207871"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2701335"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.3390\/s23073462"},{"key":"e_1_3_2_1_55_1","unstructured":"MOBILedit. 2024. Answers the question if a photo was taken by a suspected camera. https:\/\/www.mobiledit.com\/camera-ballistics"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-2496(02)00028-7"},{"key":"e_1_3_2_1_57_1","volume-title":"Infringement Report","author":"NANPA.","year":"2019","unstructured":"NANPA. 2019. Global Infringement Report 2019. https:\/\/www.copytrack.com\/blog\/global-infringement-report-2019"},{"key":"e_1_3_2_1_58_1","volume-title":"Equivalence of digital image correlation criteria for pattern matching. Applied optics 49, 28","author":"Pan Bing","year":"2010","unstructured":"Bing Pan, Huimin Xie, and Zhaoyang Wang. 2010. Equivalence of digital image correlation criteria for pattern matching. Applied optics 49, 28 (2010), 5501\u20135509."},{"key":"e_1_3_2_1_59_1","unstructured":"Pixsy. 2024. About Pixsy. https:\/\/www.pixsy.com\/about"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"crossref","unstructured":"Feng Qian Sifeng He Honghao Huang et al. 2023. Web Photo Source Identification based on Neural Enhanced Camera Fingerprint.","DOI":"10.1145\/3543507.3583225"},{"key":"e_1_3_2_1_61_1","volume-title":"Forecast to","year":"2029","unstructured":"QYResearch. 2024. Global Copyright Licensing Market Insights, Forecast to 2029. https:\/\/www.qyresearch.com\/reports\/1114678\/copyright-licensing"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"crossref","unstructured":"Caleb Riggs Tanner Douglas and Kanwalinderjit Gagneja. 2018. Image mapping through metadata. 8 pages.","DOI":"10.1109\/SSIC.2018.8556664"},{"key":"e_1_3_2_1_63_1","volume-title":"Photo sharing market Outlook (2023 to","author":"Saha Sudip","year":"2033","unstructured":"Sudip Saha. 2022. Photo sharing market Outlook (2023 to 2033). https:\/\/www.futuremarketinsights.com\/reports\/photo-sharing-market"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"crossref","unstructured":"Kai San Choi Edmund Y Lam and Kenneth KY Wong. 2006. Source camera identification using footprints from lens aberration. 172\u2013179 pages.","DOI":"10.1117\/12.649775"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.106833"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"crossref","unstructured":"Paras Nath Singh and Tara P Gowdar. 2021. Reverse image search improved by deep learning. 596\u2013600 pages.","DOI":"10.1109\/MysuruCon52639.2021.9641572"},{"key":"e_1_3_2_1_67_1","unstructured":"TELEDYNE Vision Solutions. 2024. Scientific Camera Noise Sources. https:\/\/www.teledynevisionsolutions.com\/learn\/learning-center\/scientific-imaging\/scientific-camera-noise-sources\/"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"crossref","unstructured":"Matthew James Sorrell. 2009. Digital camera source identification through JPEG quantisation. 291\u2013313 pages.","DOI":"10.4018\/978-1-59904-869-7.ch014"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-022-01611-x"},{"key":"e_1_3_2_1_70_1","unstructured":"Benjamin Sutton. 2018. How Artists Can Use Copyright Law to Safeguard Their Work. https:\/\/www.artsy.net\/article\/artsy-editorial-artists-copyright-law-safeguard-work"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2022.109050"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"crossref","unstructured":"Chunwei Tian Menghua Zheng Wangmeng Zuo Bob Zhang Yanning Zhang and David Zhang. 2023. Multi-stage image denoising with the wavelet transform. https:\/\/github.com\/hellloxiaotian\/MWDCNN.","DOI":"10.1016\/j.patcog.2022.109050"},{"key":"e_1_3_2_1_73_1","unstructured":"TinEye. 2024. About TinEye. https:\/\/tineye.com\/about"},{"key":"e_1_3_2_1_74_1","unstructured":"Diego Valsesia. 2016. Imaging using random projections: compression communication camera identification."},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2015.2455417"},{"key":"e_1_3_2_1_76_1","unstructured":"Diego Valsesia Giulio Coluccia Tiziano Bianchi Enrico Magli et al. 2015. CAMERA IDENTIFICATION AND IMAGE RETRIEVAL VIA COMPRESSED PRNU."},{"key":"e_1_3_2_1_77_1","unstructured":"Angela Villaruz. 2024. Pros and Cons of Reverse Image Search. https:\/\/www.softlist.io\/pros-and-cons-of-reverse-image-search\/"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"crossref","unstructured":"Waheeb Yaqub Manoranjan Mohanty and Nasir Memon. 2018. Towards camera identification from cropped query images. 3798\u20133802 pages.","DOI":"10.1109\/ICIP.2018.8451749"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"crossref","unstructured":"Wen-Na Zhang Yun-Xia Liu Ze-Yu Zou Yun-Li Zang Yang Yang and Bonnie Ngai-Fong Law. 2019. Effective source camera identification based on MSEPLL denoising applied to small image patches. 1740\u20131744 pages.","DOI":"10.1109\/APSIPAASC47483.2019.9023312"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"crossref","unstructured":"Feng Zhao Qingming Huang and Wen Gao. 2006. Image matching by normalized cross-correlation. II-II pages.","DOI":"10.1109\/ICASSP.2006.1660446"}],"event":{"name":"MobiSys '25: 23rd Annual International Conference on Mobile Systems, Applications and Services","location":"Hilton Anaheim Anaheim CA USA","acronym":"MobiSys '25","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the 23rd Annual International Conference on Mobile Systems, Applications and Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3711875.3729158","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T19:33:38Z","timestamp":1759433618000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3711875.3729158"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,23]]},"references-count":80,"alternative-id":["10.1145\/3711875.3729158","10.1145\/3711875"],"URL":"https:\/\/doi.org\/10.1145\/3711875.3729158","relation":{},"subject":[],"published":{"date-parts":[[2025,6,23]]},"assertion":[{"value":"2025-09-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}