{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,20]],"date-time":"2022-04-20T01:10:50Z","timestamp":1650417050272},"reference-count":18,"publisher":"Institution of Engineering and Technology (IET)","issue":"4","license":[{"start":{"date-parts":[[2015,4,1]],"date-time":"2015-04-01T00:00:00Z","timestamp":1427846400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"},{"start":{"date-parts":[[2015,4,1]],"date-time":"2015-04-01T00:00:00Z","timestamp":1427846400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IET Image Processing"],"published-print":{"date-parts":[[2015,4]]},"DOI":"10.1049\/iet-ipr.2014.0316","type":"journal-article","created":{"date-parts":[[2014,10,15]],"date-time":"2014-10-15T15:45:32Z","timestamp":1413387932000},"page":"329-337","source":"Crossref","is-referenced-by-count":5,"title":["Acquisition source identification through a blind image classification"],"prefix":"10.1049","volume":"9","author":[{"given":"Irene","family":"Amerini","sequence":"first","affiliation":[{"name":"Media Integration and Communication Center, University of FlorenceItaly"}]},{"given":"Rudy","family":"Becarelli","sequence":"additional","affiliation":[{"name":"Media Integration and Communication Center, University of FlorenceItaly"}]},{"given":"Bruno","family":"Bertini","sequence":"additional","affiliation":[{"name":"Media Integration and Communication Center, University of FlorenceItaly"}]},{"given":"Roberto","family":"Caldelli","sequence":"additional","affiliation":[{"name":"Media Integration and Communication Center, University of FlorenceItaly"},{"name":"CNIT \u2013 National Interuniversity Consortium for TelecommunicationsParmaItaly"}]}],"member":"265","published-online":{"date-parts":[[2015,4]]},"reference":[{"key":"e_1_2_6_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2013.04.007"},{"issue":"6","key":"e_1_2_6_3_1","first-page":"389","article-title":"A bibliography on blind methods for identifying image forgery","volume":"25","author":"Mahdian B.","year":"2010","journal-title":"Signal Process.: Image Commun."},{"key":"e_1_2_6_4_1","unstructured":"2008 N. Khanna G.T.\u2010C. Chiu J.P. Allebach E.J. Delp Forensic techniques for classifying scanner computer generated and digital camera images 1653 1656"},{"key":"e_1_2_6_5_1","unstructured":"2008 ICASSP'08 C. McKay A. Swaminathan H. Gou M. Wu Image acquisition forensics: Forensic analysis to identify imaging source 1657 1660"},{"key":"e_1_2_6_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2004.839896"},{"issue":"1","key":"e_1_2_6_7_1","doi-asserted-by":"crossref","first-page":"21","DOI":"10.4018\/jdcf.2010010102","article-title":"A DFT\u2010based analysis to discern between camera and scanned images","volume":"2","author":"Caldelli R.","year":"2009","journal-title":"Int. J. Digit. Crime Forensics (IJDCF), e\u2010Forensics"},{"key":"e_1_2_6_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.873602"},{"issue":"1","key":"e_1_2_6_9_1","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1016\/j.diin.2008.06.004","article-title":"Classification of digital camera\u2010models based on demosaicing artifacts","volume":"5","author":"Bayram S.","year":"2008","journal-title":"Digit. Investig."},{"key":"e_1_2_6_10_1","doi-asserted-by":"crossref","unstructured":"2006 Proc. Sixth Annual Digital Forensic Research Workshop (DFRWS\u201906) N. Khanna A.K. Mikkilineni A.F. Martone A survey of forensic characterisation methods for physical devices Digital Investigation 3 17 28","DOI":"10.1016\/j.diin.2006.06.014"},{"key":"e_1_2_6_11_1","unstructured":"2010 IEEE Int. Symp. on Circuits and Systems (ISCAS'10) C.\u2010T. Li Unsupervised classification of digital images enhanced sensor pattern noise"},{"key":"e_1_2_6_12_1","unstructured":"2010 2010 IEEE Int. Workshop on\u2019 R. Caldelli I. Amerini F. Picchioni M. Innocenti Fast image clustering of unknown source images in: Information Forensics and Security (WIFS) 1 5"},{"key":"e_1_2_6_13_1","unstructured":"2010 2010 IEEE Int. Workshop on B.B. Liu H.\u2010K. Lee Y. Hu C.\u2010H. Choi On classification of source cameras: A graph based approach in: Information Forensics and Security (WIFS) 1 5"},{"key":"e_1_2_6_14_1","first-page":"23","volume-title":"Digital watermarking, Vol. 6526 of Lecture Notes in Computer Science","author":"Pan F.","year":"2011"},{"key":"e_1_2_6_15_1","first-page":"292","volume-title":"Digital forensics and watermarking, Vol. 7128 of lecture notes in computer science","author":"Zhang R.","year":"2012"},{"key":"e_1_2_6_16_1","volume-title":"\u2018Creating and detecting doctored and virtual images: Implications to the child pornography prevention act\u2019","author":"Farid H."},{"key":"e_1_2_6_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.868688"},{"key":"e_1_2_6_18_1","unstructured":"1999 ICASSP IEEE Int. Conf. on Acoustics Speech and Signal Processing Proc. M. Mihcak I. Kozintsev K. Ramchandran Spatially adaptive statistical modeling of wavelet image coefficients and its application to denoising 3253 3256"},{"key":"e_1_2_6_19_1","doi-asserted-by":"publisher","DOI":"10.1002\/9780470316801"}],"container-title":["IET Image Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-ipr.2014.0316","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1049\/iet-ipr.2014.0316","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-ipr.2014.0316","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,20]],"date-time":"2022-04-20T00:42:00Z","timestamp":1650415320000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1049\/iet-ipr.2014.0316"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4]]},"references-count":18,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2015,4]]}},"alternative-id":["10.1049\/iet-ipr.2014.0316"],"URL":"https:\/\/doi.org\/10.1049\/iet-ipr.2014.0316","archive":["Portico"],"relation":{},"ISSN":["1751-9667","1751-9667"],"issn-type":[{"value":"1751-9667","type":"print"},{"value":"1751-9667","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,4]]}}}