{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T12:17:38Z","timestamp":1725884258634},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319571850"},{"type":"electronic","value":"9783319571867"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-57186-7_35","type":"book-chapter","created":{"date-parts":[[2017,4,12]],"date-time":"2017-04-12T15:29:15Z","timestamp":1492010955000},"page":"475-489","source":"Crossref","is-referenced-by-count":6,"title":["An Efficient Implementation of the Algorithm by Luk\u00e1\u0161 et al. on Hadoop"],"prefix":"10.1007","author":[{"given":"Giuseppe","family":"Cattaneo","sequence":"first","affiliation":[]},{"given":"Umberto","family":"Ferraro Petrillo","sequence":"additional","affiliation":[]},{"given":"Michele","family":"Nappi","sequence":"additional","affiliation":[]},{"given":"Fabio","family":"Narducci","sequence":"additional","affiliation":[]},{"given":"Gianluca","family":"Roscigno","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,4,13]]},"reference":[{"key":"35_CR1","doi-asserted-by":"crossref","unstructured":"Bayram, S., Sencar, H.T., Memon, N., Avcibas, I.: Source camera identification based on CFA interpolation. In: IEEE International Conference on Image Processing (ICIP), vol. 3, pp. 69\u201372. IEEE (2005)","DOI":"10.1109\/ICIP.2005.1530330"},{"key":"35_CR2","doi-asserted-by":"crossref","unstructured":"Cattaneo, G., Ferraro Petrillo, U., Giancarlo, R., Roscigno, G.: An effective extension of the applicability of alignment-free biological sequence comparison algorithms with Hadoop. J. Supercomput., 1\u201317 (2016). http:\/\/dx.doi.org\/10.1007\/s11227-016-1835-3","DOI":"10.1007\/s11227-016-1835-3"},{"key":"35_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1007\/978-3-319-25903-1_42","volume-title":"Advanced Concepts for Intelligent Vision Systems","author":"G Cattaneo","year":"2015","unstructured":"Cattaneo, G., Ferraro Petrillo, U., Roscigno, G., Fusco, C.: A PNU-based technique to detect forged regions in digital images. In: Battiato, S., Blanc-Talon, J., Gallo, G., Philips, W., Popescu, D., Scheunders, P. (eds.) ACIVS 2015. LNCS, vol. 9386, pp. 486\u2013498. Springer, Cham (2015). doi: 10.1007\/978-3-319-25903-1_42"},{"key":"35_CR4","doi-asserted-by":"crossref","unstructured":"Cattaneo, G., Roscigno, G.: A possible pitfall in the experimental analysis of tampering detection algorithms. In: 17th International Conference on Network-Based Information Systems (NBiS), pp. 279\u2013286, September 2014","DOI":"10.1109\/NBiS.2014.82"},{"key":"35_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"735","DOI":"10.1007\/978-3-319-48680-2_64","volume-title":"Advanced Concepts for Intelligent Vision Systems","author":"G Cattaneo","year":"2016","unstructured":"Cattaneo, G., Roscigno, G., Bruno, A.: Using PNU-based techniques to detect alien frames in videos. In: Blanc-Talon, J., Distante, C., Philips, W., Popescu, D., Scheunders, P. (eds.) ACIVS 2016. LNCS, vol. 10016, pp. 735\u2013746. Springer, Cham (2016). doi: 10.1007\/978-3-319-48680-2_64"},{"key":"35_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1007\/978-3-642-55032-4_66","volume-title":"Information and Communication Technology","author":"G Cattaneo","year":"2014","unstructured":"Cattaneo, G., Roscigno, G., Ferraro Petrillo, U.: Experimental evaluation of an algorithm for the detection of tampered JPEG images. In: Linawati, M.M.S., Neuhold, E.J., Tjoa, A.M., You, I. (eds.) CT-EurAsia 2014. LNCS, vol. 8407, pp. 643\u2013652. Springer, Heidelberg (2014). doi: 10.1007\/978-3-642-55032-4_66"},{"key":"35_CR7","doi-asserted-by":"crossref","unstructured":"Cattaneo, G., Roscigno, G., Ferraro Petrillo, U.: A scalable approach to source camera identification over Hadoop. In: IEEE 28th International Conference on Advanced Information Networking and Applications (AINA), pp. 366\u2013373. IEEE (2014)","DOI":"10.1109\/AINA.2014.47"},{"issue":"3\/4","key":"35_CR8","first-page":"28","volume":"3","author":"J Choi","year":"2013","unstructured":"Choi, J., Choi, C., Ko, B., Choi, D., Kim, P.: Detecting web based DDoS attack using MapReduce operations in cloud computing environment. J. Internet Serv. Inf. Secur. (JISIS) 3(3\/4), 28\u201337 (2013)","journal-title":"J. Internet Serv. Inf. Secur. (JISIS)"},{"issue":"1","key":"35_CR9","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1145\/1327452.1327492","volume":"51","author":"J Dean","year":"2008","unstructured":"Dean, J., Ghemawat, S.: MapReduce: simplified data processing on large clusters. Commun. ACM 51(1), 107\u2013113 (2008)","journal-title":"Commun. ACM"},{"key":"35_CR10","doi-asserted-by":"crossref","unstructured":"Ferraro Petrillo, U., Roscigno, G., Cattaneo, G., Giancarlo, R.: FASTdoop: a versatile and efficient library for the input of FASTA and FASTQ files for MapReduce Hadoop bioinformatics applications. Bioinformatics (2017). https:\/\/dx.doi.org\/10.1093\/bioinformatics\/btx010","DOI":"10.1093\/bioinformatics\/btx010"},{"key":"35_CR11","unstructured":"Fridrich, J., Luk\u00e1\u0161, J., Goljan, M.: Detecting digital image forgeries using sensor pattern noise. In: SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII, vol. 6072, pp. 1\u201311 (2006)"},{"key":"35_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1007\/978-3-642-31971-6_3","volume-title":"Transactions on Data Hiding and Multimedia Security VIII","author":"T Gloe","year":"2012","unstructured":"Gloe, T.: Feature-based forensic camera model identification. In: Shi, Y.Q., Katzenbeisser, S. (eds.) Transactions on Data Hiding and Multimedia Security VIII. LNCS, vol. 7228, pp. 42\u201362. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-31971-6_3"},{"key":"35_CR13","doi-asserted-by":"crossref","unstructured":"Goljan, M., Fridrich, J., Filler, T.: Large scale test of sensor fingerprint camera identification. In: IS&T\/SPIE, Electronic Imaging, Security and Forensics of Multimedia Contents XI, vol. 7254, pp. 1\u201312. International Society for Optics and Photonics (2009)","DOI":"10.1117\/12.805701"},{"key":"35_CR14","doi-asserted-by":"crossref","unstructured":"Goljan, M., Fridrich, J., Filler, T.: Managing a large database of camera fingerprints. In: SPIE Conference on Media Forensics and Security, vol. 7541, pp. 1\u201312. International Society for Optics and Photonics (2010)","DOI":"10.1117\/12.838378"},{"key":"35_CR15","doi-asserted-by":"crossref","unstructured":"Golpayegani, N., Halem, M.: Cloud computing for satellite data processing on high end compute clusters. In: IEEE International Conference on Cloud Computing, pp. 88\u201392. IEEE (2009)","DOI":"10.1109\/CLOUD.2009.71"},{"key":"35_CR16","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1109\/TIFS.2006.873602","volume":"1","author":"J Luk\u00e1\u0161","year":"2006","unstructured":"Luk\u00e1\u0161, J., Fridrich, J., Goljan, M.: Digital camera identification from sensor pattern noise. IEEE Trans. Inf. Forensics Secur. 1, 205\u2013214 (2006)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"9","key":"35_CR17","doi-asserted-by":"crossref","first-page":"1297","DOI":"10.1101\/gr.107524.110","volume":"20","author":"A McKenna","year":"2010","unstructured":"McKenna, A., Hanna, M., Banks, E., Sivachenko, A., Cibulskis, K., Kernytsky, A., Garimella, K., Altshuler, D., Gabriel, S., Daly, M., et al.: The genome analysis toolkit: a MapReduce framework for analyzing next-generation DNA sequencing data. Genome Res. 20(9), 1297\u20131303 (2010)","journal-title":"Genome Res."},{"key":"35_CR18","unstructured":"Precision Optical Imaging: ISO Noise Chart 15739 (2011). http:\/\/www.precisionopticalimaging.com\/products\/products.asp?type=15739"},{"key":"35_CR19","doi-asserted-by":"crossref","unstructured":"Shvachko, K., Kuang, H., Radia, S., Chansler, R.: The Hadoop distributed file system. In: IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST), pp. 1\u201310. IEEE (2010)","DOI":"10.1109\/MSST.2010.5496972"},{"key":"35_CR20","unstructured":"The Apache Software Foundation: Apache Hadoop (2016). http:\/\/hadoop.apache.org\/"},{"key":"35_CR21","unstructured":"White, T.: The small files problem. Cloudera (2009). http:\/\/www.cloudera.com\/blog\/2009\/02\/the-small-files-problem\/"}],"container-title":["Lecture Notes in Computer Science","Green, Pervasive, and Cloud Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-57186-7_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,21]],"date-time":"2019-09-21T00:30:08Z","timestamp":1569025808000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-57186-7_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319571850","9783319571867"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-57186-7_35","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}