{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T16:41:32Z","timestamp":1720629692613},"reference-count":46,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2018,12,1]],"date-time":"2018-12-01T00:00:00Z","timestamp":1543622400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2018,9,18]],"date-time":"2018-09-18T00:00:00Z","timestamp":1537228800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100013407","name":"Netherlands eScience Center","doi-asserted-by":"crossref","award":["027.013.702","660.011.310"],"id":[{"id":"10.13039\/100013407","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Digital Investigation"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1016\/j.diin.2018.09.002","type":"journal-article","created":{"date-parts":[[2018,9,18]],"date-time":"2018-09-18T13:17:21Z","timestamp":1537276641000},"page":"3-16","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":7,"special_numbering":"C","title":["A Jungle Computing approach to common image source identification in large collections of images"],"prefix":"10.1016","volume":"27","author":[{"given":"B.","family":"van Werkhoven","sequence":"first","affiliation":[]},{"given":"P.","family":"Hijma","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-4692-7245","authenticated-orcid":false,"given":"C.J.H.","family":"Jacobs","sequence":"additional","affiliation":[]},{"given":"J.","family":"Maassen","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-5912-5295","authenticated-orcid":false,"given":"Z.J.M.H.","family":"Geradts","sequence":"additional","affiliation":[]},{"given":"H.E.","family":"Bal","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.diin.2018.09.002_bib1","unstructured":"Advanced Micro Devices, clFFT, OpenCL Fast Fourier Transforms (FFTs), http:\/\/clmathlibraries.github.io\/clFFT\/, accessed on February 2018."},{"issue":"5","key":"10.1016\/j.diin.2018.09.002_bib2","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/MC.2016.127","article-title":"A\u00a0medium-scale distributed system for computer science research: infrastructure for the long term","volume":"49","author":"Bal","year":"2016","journal-title":"Computer"},{"issue":"4","key":"10.1016\/j.diin.2018.09.002_bib3","doi-asserted-by":"crossref","first-page":"1404","DOI":"10.1109\/TIFS.2012.2192272","article-title":"Efficient sensor fingerprint matching through fingerprint binarization","volume":"7","author":"Bayram","year":"2012","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.diin.2018.09.002_bib4","series-title":"International Conference on Digital Forensics and Cyber Crime","first-page":"176","article-title":"Smartphone verification and user profiles linking across social networks by camera fingerprinting","author":"Bertini","year":"2015"},{"issue":"3","key":"10.1016\/j.diin.2018.09.002_bib5","doi-asserted-by":"crossref","first-page":"532","DOI":"10.1109\/TPAMI.2007.1183","article-title":"Blind camera fingerprinting and image clustering","volume":"30","author":"Bloy","year":"2008","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"10.1016\/j.diin.2018.09.002_bib6","series-title":"2010 IEEE International Workshop on Information Forensics and Security","first-page":"1","article-title":"Fast image clustering of unknown source images","author":"Caldelli","year":"2010"},{"key":"10.1016\/j.diin.2018.09.002_bib7","series-title":"Electronic Imaging 2007","article-title":"Digital imaging sensor identification (further study)","author":"Chen","year":"2007"},{"issue":"1","key":"10.1016\/j.diin.2018.09.002_bib8","first-page":"74","article-title":"Determining image origin and integrity using sensor noise, Information Forensics and Security","volume":"3","author":"Chen","year":"2008","journal-title":"IEEE Transactions on"},{"key":"10.1016\/j.diin.2018.09.002_bib9","series-title":"2011 18th IEEE International Conference on Image Processing","first-page":"1953","article-title":"Exploring compression effects for improved source camera identification using strongly compressed video","author":"Chuang","year":"2011"},{"issue":"1","key":"10.1016\/j.diin.2018.09.002_bib10","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1016\/j.forsciint.2012.12.018","article-title":"Improved photo response non-uniformity (PRNU) based source camera identification","volume":"226","author":"Cooper","year":"2013","journal-title":"Forensic Sci. Int."},{"key":"10.1016\/j.diin.2018.09.002_bib11","series-title":"Systems, Signals and Image Processing (IWSSIP), 2015 International Conference on","first-page":"249","article-title":"An efficient clustering technique for cameras identification using sensor pattern noise","author":"Fahmy","year":"2015"},{"key":"10.1016\/j.diin.2018.09.002_bib12","author":"fastcluster"},{"issue":"2","key":"10.1016\/j.diin.2018.09.002_bib13","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/MSP.2008.931078","article-title":"Digital image forensics","volume":"26","author":"Fridrich","year":"2009","journal-title":"IEEE Signal Process. Mag."},{"key":"10.1016\/j.diin.2018.09.002_bib14","series-title":"Digital Image Forensics","first-page":"179","article-title":"Sensor defects in digital image forensic","author":"Fridrich","year":"2013"},{"key":"10.1016\/j.diin.2018.09.002_bib15","series-title":"Enabling Technologies for Law Enforcement","first-page":"505","article-title":"Methods for identification of images acquired with digital cameras","author":"Geradts","year":"2001"},{"issue":"3","key":"10.1016\/j.diin.2018.09.002_bib16","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1016\/j.diin.2013.08.002","article-title":"Improving source camera identification using a simplified total variation based noise removal algorithm","volume":"10","author":"Gisolf","year":"2013","journal-title":"Digit. Invest."},{"key":"10.1016\/j.diin.2018.09.002_bib17","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1016\/j.forsciint.2014.08.034","article-title":"Common source identification of images in large databases","volume":"244","author":"Gisolf","year":"2014","journal-title":"Forensic Sci. Int."},{"key":"10.1016\/j.diin.2018.09.002_bib18","first-page":"1585","article-title":"The Dresden image database\u2019 for Benchmarking digital image forensics","volume":"2","author":"Gloe","year":"2010"},{"key":"10.1016\/j.diin.2018.09.002_bib19","series-title":"International Workshop on Digital Watermarking","first-page":"454","article-title":"Digital camera identification from images\u2013estimating false acceptance probability","author":"Goljan","year":"2008"},{"key":"10.1016\/j.diin.2018.09.002_bib20","series-title":"IS&T\/SPIE Electronic Imaging","article-title":"Sensor fingerprint digests for fast camera identification from geometrically distorted images","author":"Goljan","year":"2013"},{"key":"10.1016\/j.diin.2018.09.002_bib21","series-title":"Common Source Identification Cashmere","author":"Hijma","year":"2018"},{"key":"10.1016\/j.diin.2018.09.002_bib22","series-title":"Many-Core Levels","author":"Hijma","year":"2018"},{"key":"10.1016\/j.diin.2018.09.002_bib23","series-title":"Parallel & Distributed Processing Symposium (IPDPS), 2015 IEEE 29th International","first-page":"1","article-title":"Cashmere: heterogeneous many-core computing","author":"Hijma","year":"2015"},{"issue":"1","key":"10.1016\/j.diin.2018.09.002_bib24","first-page":"1","article-title":"Stepwise-refinement for performance: a methodology for many-core programming","volume":"27","author":"Hijma","year":"2015","journal-title":"Concurrency Comput. Pract. Ex."},{"key":"10.1016\/j.diin.2018.09.002_bib25","author":"Hijma","year":"2018","journal-title":"Cashmere"},{"key":"10.1016\/j.diin.2018.09.002_bib26","series-title":"Handbook of Digital Forensics of Multimedia Data and Devices","author":"Ho","year":"2015"},{"key":"10.1016\/j.diin.2018.09.002_bib27","series-title":"NLeSC\/Constellation: constellation version 2.0.0","author":"Jacobs","year":"2018"},{"key":"10.1016\/j.diin.2018.09.002_bib28","series-title":"SPIE\/IS&T Electronic Imaging, International Society for Optics and Photonics","article-title":"Recent advances in counter PRNU based source attribution and beyond","author":"Karak\u00fc\u00e7\u00fck","year":"2015"},{"key":"10.1016\/j.diin.2018.09.002_bib29","series-title":"Circuits and Systems (ISCAS), Proceedings of 2010 IEEE International Symposium on","first-page":"3429","article-title":"Unsupervised classification of digital images using enhanced sensor pattern noise","author":"Li","year":"2010"},{"key":"10.1016\/j.diin.2018.09.002_bib30","unstructured":"X. Lin, C.-T. Li, Large-scale image clustering based on camera fingerprints, IEEE Transactions on Information Forensics and Security."},{"key":"10.1016\/j.diin.2018.09.002_bib31","series-title":"Proceedings of the 2011 Workshop on Dynamic Distributed Data-intensive Applications, Programming Abstractions, and Systems, 3DAPAS \u201911","first-page":"7","article-title":"Towards jungle computing with ibis\/constellation","author":"Maassen","year":"2011"},{"key":"10.1016\/j.diin.2018.09.002_bib32","unstructured":"D. M\u00fcllner, Modern Hierarchical, Agglomerative Clustering Algorithms, arXiv preprint arXiv:1109.2378."},{"key":"10.1016\/j.diin.2018.09.002_bib33","unstructured":"Nvidia, CUDA Programming Guide, http:\/\/docs.nvidia.com\/cuda\/, accessed on February 2018."},{"key":"10.1016\/j.diin.2018.09.002_bib34","unstructured":"Nvidia, cuFFT, the NVIDIA CUDA Fast Fourier Transform library. , http:\/\/docs.nvidia.com\/cuda\/cufft, accessed on February 2018."},{"key":"10.1016\/j.diin.2018.09.002_bib35","unstructured":"TOP500 Supercomputer Sites, https:\/\/www.top500.org, accessed on February 2018."},{"key":"10.1016\/j.diin.2018.09.002_bib36","series-title":"2013 IEEE International Conference on Acoustics, Speech and Signal Processing","first-page":"3023","article-title":"Forensic sensor pattern noise extraction from large image data set","author":"Qu","year":"2013"},{"key":"10.1016\/j.diin.2018.09.002_bib37","unstructured":"SciPy Reference Guide, https:\/\/docs.scipy.org\/doc\/scipy-0.18.1\/reference\/generated\/scipy.cluster.hierarchy.linkage.html, accessed on February 2018."},{"key":"10.1016\/j.diin.2018.09.002_bib38","series-title":"Grids, Clouds and Virtualization","first-page":"167","article-title":"Jungle computing: Distributed supercomputing beyond clusters, grids, and clouds","author":"Seinstra","year":"2011"},{"key":"10.1016\/j.diin.2018.09.002_bib39","doi-asserted-by":"crossref","unstructured":"A. Singh, J. Malik, A comprehensive study of passive digital image forensics techniques based on intrinsic fingerprints, Int. J. Comput. Appl. 116 (19).","DOI":"10.5120\/20444-2794"},{"key":"10.1016\/j.diin.2018.09.002_bib40","unstructured":"Software repitory of the Common Source Identification Cashmere application, https:\/\/github.com\/JungleComputing\/common-source-identification-cashmere."},{"key":"10.1016\/j.diin.2018.09.002_bib41","unstructured":"Software repository of the Common Source Identification Desktop application, https:\/\/github.com\/JungleComputing\/common-source-identification-desktop."},{"key":"10.1016\/j.diin.2018.09.002_bib42","unstructured":"Software repository of the Cashmere library, https:\/\/github.com\/JungleComputing\/cashmere."},{"key":"10.1016\/j.diin.2018.09.002_bib43","unstructured":"Software repository of the MCL programming system, https:\/\/github.com\/JungleComputing\/mcl."},{"key":"10.1016\/j.diin.2018.09.002_bib44","unstructured":"Software repository of the Constellation library, https:\/\/github.com\/NLeSC\/Constellation."},{"key":"10.1016\/j.diin.2018.09.002_bib45","article-title":"Kernel tuner: a search-optimizing GPU code auto-tuner","author":"van Werkhoven","year":"2018","journal-title":"Future Generat. Comput. Syst."},{"key":"10.1016\/j.diin.2018.09.002_bib46","author":"van Werkhoven"}],"container-title":["Digital Investigation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S174228761830149X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S174228761830149X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,10,24]],"date-time":"2019-10-24T06:42:55Z","timestamp":1571899375000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S174228761830149X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":46,"alternative-id":["S174228761830149X"],"URL":"https:\/\/doi.org\/10.1016\/j.diin.2018.09.002","relation":{},"ISSN":["1742-2876"],"issn-type":[{"value":"1742-2876","type":"print"}],"subject":[],"published":{"date-parts":[[2018,12]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A Jungle Computing approach to common image source identification in large collections of images","name":"articletitle","label":"Article Title"},{"value":"Digital Investigation","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.diin.2018.09.002","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2018 The Authors. Published by Elsevier Ltd.","name":"copyright","label":"Copyright"}]}}