{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T11:42:41Z","timestamp":1725536561375},"publisher-location":"Berlin, Heidelberg","reference-count":35,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642035203"},{"type":"electronic","value":"9783642035210"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03521-0_10","type":"book-chapter","created":{"date-parts":[[2009,8,5]],"date-time":"2009-08-05T00:31:29Z","timestamp":1249432289000},"page":"104-115","source":"Crossref","is-referenced-by-count":7,"title":["Using Sensor Noise to Identify Low Resolution Compressed Videos from YouTube"],"prefix":"10.1007","author":[{"given":"Wiger","family":"van Houten","sequence":"first","affiliation":[]},{"given":"Zeno","family":"Geradts","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1109\/TIFS.2006.873602","volume":"1","author":"J. Luk\u00e1\u0161","year":"2006","unstructured":"Luk\u00e1\u0161, J., Fridrich, J., Goljan, M.: Digital Camera Identification from Sensor Pattern Noise. IEEE Trans. on Information Forensics and Security\u00a01, 205\u2013214 (2006)","journal-title":"IEEE Trans. on Information Forensics and Security"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Geradts, Z., Bijhold, J., Kieft, M., Kurosawa, K., Kuroki, K., Saitoh, N.: Methods for Identification of Images Acquired with Digital Cameras. In: Proc. SPIE, vol.\u00a04232 (2001)","DOI":"10.1117\/12.417569"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Alles, E.J., Geradts, Z.J.M.H., Veenman, C.J.: Source Camera Identification for Low Resolution Heavily Compressed Images. In: Int. Conf on Computational Sciences and Its Applications, 2008. ICCSA 2008, pp. 557\u2013567 (2008)","DOI":"10.1109\/ICCSA.2008.18"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Chen, M., Fridrich, J., Goljan, M.: Digital Imaging Sensor Identification (Further Study). In: Proceedings of the SPIE, Security, Steganography, and Watermarking of Multimedia Contents IX, vol.\u00a06505, p. 65050P (2007)","DOI":"10.1117\/12.703370"},{"issue":"1","key":"10_CR5","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/TIFS.2007.916285","volume":"3","author":"M. Chen","year":"2008","unstructured":"Chen, M., Fridrich, J., Goljan, M., Luk\u00e1\u0161, J.: Determining Image Origin and Integrity Using Sensor Noise. IEEE Trans. on Information Forensics and Security\u00a03(1), 74\u201390 (2008)","journal-title":"IEEE Trans. on Information Forensics and Security"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Khanna, N., Mikkilineni, A.K., Chiu, G.T.C., Allebach, J.P., Delp, E.J.: Scanner Identification Using Sensor Pattern Noise. In: Proc. SPIE, Security, Steganography, and Watermarking of Multimedia Contents IX, vol.\u00a06505, p. 65051K (2007)","DOI":"10.1117\/12.705837"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Gou, H., Swaminathan, A., Wu, M.: Robust Scanner Identification Based on Noise Features. In: Proc. SPIE, Security, Steganography, and Watermarking of Multimedia Contents IX, vol.\u00a06505, p. 65050S (2007)","DOI":"10.1117\/12.704688"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Chen, M., Fridrich, J., Goljan, M., Luk\u00e1\u0161, J.: Source Digital Camcorder Identification using Sensor Photo Response Non-Uniformity. In: Proc. SPIE, vol.\u00a06505 (2007)","DOI":"10.1117\/12.696519"},{"key":"10_CR9","unstructured":"Mih\u00e7ak, M.K., Kozintsev, I., Ramchandran, K.: Spatially Adaptive Statistical Modeling of Wavelet Image Coefficients and its Application to Denoising. In: Proc. IEEE Int. Conf. Acoust. Speech, and Signal Proc., pp. 3253\u20133256 (1999)"},{"key":"10_CR10","unstructured":"Johnson, M.K., Farid, H.: Exposing digital forgeries through chromatic aberration. MM&Sec 2006. In: Proceedings of the Multimedia and Security Workshop 2006, Geneva, Switzerland, September 26-27, pp. 48\u201355 (2006)"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Van, L.T., Emmanuel, S., Kankanhalli, M.S.: Identifying Source Cell Phone Using Chromatic Aberration. In: Proceedings of the 2007 IEEE International Conference on Multimedia and EXPO (ICME 2007), pp. 883\u2013886 (2007)","DOI":"10.1109\/ICME.2007.4284792"},{"key":"10_CR12","unstructured":"Holst, G.C., Lomheim, T.S.: CMOS \/ CCD Sensors and Camera Systems. JCD Publishing and SPIE Press (2007)"},{"key":"10_CR13","doi-asserted-by":"publisher","first-page":"45207","DOI":"10.1088\/0957-0233\/19\/4\/045207","volume":"19","author":"K. Irie","year":"2008","unstructured":"Irie, K., McKinnon, A.E., Unsworth, K., Woodhead, I.M.: A Model for Measurement of Noise in CCD Digital-Video Cameras. Measurement Science and Technology\u00a019, 45207 (2008)","journal-title":"Measurement Science and Technology"},{"key":"10_CR14","volume-title":"Quantum Theory of Light","author":"R. Loudon","year":"2001","unstructured":"Loudon, R.: Quantum Theory of Light. Oxford University Press, Oxford (2001)"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Tian, H., Fowler, B.A., El Gamal, A.: Analysis of Temporal Noise in CMOS APS. In: Proc. SPIE Vol. 3649, Sensors, Cameras, and Systems for Scientific\/Industrial Applications, pp. 177\u2013185 (1999)","DOI":"10.1117\/12.347073"},{"key":"10_CR16","doi-asserted-by":"publisher","first-page":"941","DOI":"10.1109\/TCSI.2003.813977","volume":"I","author":"K. Salama","year":"2003","unstructured":"Salama, K., El Gamal, A.: Analysis of Active Pixel Sensor Readout Circuit. IEEE Trans. on Circuits and Systems\u00a0I, 941\u2013945 (2003)","journal-title":"IEEE Trans. on Circuits and Systems"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"El Gamal, A., Fowler, B., Min, H., Liu, X.: Modeling and Estimation of FPN Components in CMOS Image Sensors. In: Morley, M.M. (ed.) Proc. SPIE, Solid State Sensor Arrays: Development and Applications II, vol.\u00a03301, pp. 168\u2013177 (1998)","DOI":"10.1117\/12.304560"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Gloe, T., Kirchner, M., Winkler, A., B\u00f6hme, R.: Can We Trust Digital Image Forensics? In: Proc. of 15th International Conference on Multimedia, pp. 79\u201386 (2007)","DOI":"10.1145\/1291233.1291252"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Ferrero, A., Campos, J., Pons, A.: Correction of Photoresponse Nonuniformity for Matrix Detectors Based on Prior Compensation for Their Nonlinear Behavior. Applied Optics\u00a045(11) (2006)","DOI":"10.1364\/AO.45.002422"},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Bayram, S., Sencar, H.T., Memon, N., Avc\u0131ba\u015f, \u0130.: Source Camera Identification Based on CFA Interpolation. In: ICIP 2005, vol.\u00a03, pp. 69\u201372 (2005)","DOI":"10.1109\/ICIP.2005.1530330"},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Long, Y., Huang, Y.: Image Based Source Camera Identification using Demosaicking. In: IEEE 8th Workshop on Multimedia Signal Processing, October 3-6, pp. 419\u2013424 (2006)","DOI":"10.1109\/MMSP.2006.285343"},{"key":"10_CR22","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1093\/biomet\/81.3.425","volume":"81","author":"D.L. Donoho","year":"1994","unstructured":"Donoho, D.L., Johnstone, I.M.: Ideal Spatial Adaptation by Wavelet Shrinkage. Biometrika\u00a081, 425\u2013455 (1994)","journal-title":"Biometrika"},{"key":"10_CR23","volume-title":"A Friendly Guide to Wavelets","author":"G. Kaiser","year":"1994","unstructured":"Kaiser, G.: A Friendly Guide to Wavelets. Birkhauser Boston Inc, Basel (1994)"},{"key":"10_CR24","unstructured":"Donoho, D., Maleki, A., Shahram, M.: WaveLab 850, http:\/\/www-stat.stanford.edu\/~wavelab\/"},{"key":"10_CR25","unstructured":"van der Mark, M., van Houten, W., Geradts, Z.: NFI PRNUCompare, http:\/\/prnucompare.sourceforge.net"},{"key":"10_CR26","unstructured":"FFmpeg, free program to convert audio and video, http:\/\/www.ffmpeg.org"},{"key":"10_CR27","doi-asserted-by":"crossref","unstructured":"Mallat, S.: A Wavelet Tour of Signal Processing, 2nd edn. Academic Press (1999)","DOI":"10.1016\/B978-012466606-1\/50008-8"},{"key":"10_CR28","doi-asserted-by":"publisher","first-page":"1532","DOI":"10.1109\/83.862633","volume":"9","author":"S.G. Chang","year":"2000","unstructured":"Chang, S.G., Yu, B., Vetterli, M.: Adaptive Wavelet Thresholding for Image Denoising and Compression. IEEE Trans. on Image Processing\u00a09, 1532\u20131546 (2000)","journal-title":"IEEE Trans. on Image Processing"},{"key":"10_CR29","doi-asserted-by":"crossref","unstructured":"Goljan, M., Fridrich, J., Filler, T.: Large Scale Test of Sensor Fingerprint Camera Identification. In: Proc. SPIE, Electronic Imaging, Security and Forensics of Multimedia Contents XI, San Jose, CA, January 18-22 (2009)","DOI":"10.1117\/12.805701"},{"key":"10_CR30","doi-asserted-by":"crossref","unstructured":"Bayram, S., Sencar, H.T., Memon, N.: Improvements on Source Camera-Model Identification Based on CFA Interpolation. In: Proc. WG 11.9 Intl. Conf. on Digital Forensics (2006)","DOI":"10.1109\/ICIP.2005.1530330"},{"key":"10_CR31","doi-asserted-by":"crossref","unstructured":"\u00c7eliktutan, O., Avc\u0131ba\u015f, \u0130., Sankur, B.: Blind Identification of Cellular Phone Cameras. In: Proceedings of the SPIE, Security, Steganography, and Watermarking of Multimedia Contents IX, vol.\u00a06505, p. 65051H (2007)","DOI":"10.1117\/12.703920"},{"key":"10_CR32","unstructured":"Virtualdub: A free AVI\/MPEG-1 processing utility, http:\/\/www.virtualdub.org"},{"key":"10_CR33","unstructured":"MSN Webcam Recorder, http:\/\/ml20rc.msnfanatic.com\/"},{"key":"10_CR34","doi-asserted-by":"crossref","unstructured":"Goljan, M., Fridrich, J.: Camera Identification from Cropped and Scaled Images. In: Proc. SPIE, Electronic Imaging, Forensics, Security, Steganography, and Watermarking of Multimedia Contents X, January 26-31, pp. OE-1\u2013OE-13. San Jose (2008)","DOI":"10.1117\/12.766732"},{"key":"10_CR35","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1109\/TIFS.2008.926993","volume":"3","author":"O. \u00c7eliktutan","year":"2008","unstructured":"\u00c7eliktutan, O., Sankur, B., Avc\u0131ba\u015f, \u0130.: Blind Identification of Source Cell-phone Model. IEEE Trans. on Information Forensics and Security\u00a03, 553\u2013566 (2008)","journal-title":"IEEE Trans. on Information Forensics and Security"}],"container-title":["Lecture Notes in Computer Science","Computational Forensics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03521-0_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T17:23:07Z","timestamp":1558459387000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03521-0_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642035203","9783642035210"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03521-0_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}