{"id":"https://openalex.org/W4285180101","doi":"https://doi.org/10.1109/tifs.2022.3179945","title":"Computational Sensor Fingerprints","display_name":"Computational Sensor Fingerprints","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4285180101","doi":"https://doi.org/10.1109/tifs.2022.3179945"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2022.3179945","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2022.3179945","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083368875","display_name":"Pawe\u0142 Korus","orcid":"https://orcid.org/0000-0002-4230-9853"},"institutions":[{"id":"https://openalex.org/I57206974","display_name":"New York University","ror":"https://ror.org/0190ak572","country_code":"US","type":"education","lineage":["https://openalex.org/I57206974"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Pawel Korus","raw_affiliation_strings":["Tandon School of Engineering, New York University, New York City, NY, USA","Tandon School of Engineering, New York University, USA, and Department of Telecommunications, AGH University of Science and Technology, Poland"],"affiliations":[{"raw_affiliation_string":"Tandon School of Engineering, New York University, New York City, NY, USA","institution_ids":["https://openalex.org/I57206974"]},{"raw_affiliation_string":"Tandon School of Engineering, New York University, USA, and Department of Telecommunications, AGH University of Science and Technology, Poland","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5006172625","display_name":"Nasir Memon","orcid":"https://orcid.org/0000-0002-0103-9762"},"institutions":[{"id":"https://openalex.org/I57206974","display_name":"New York University","ror":"https://ror.org/0190ak572","country_code":"US","type":"education","lineage":["https://openalex.org/I57206974"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nasir Memon","raw_affiliation_strings":["Tandon School of Engineering, New York University, New York City, NY, USA"],"affiliations":[{"raw_affiliation_string":"Tandon School of Engineering, New York University, New York City, NY, USA","institution_ids":["https://openalex.org/I57206974"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5083368875"],"corresponding_institution_ids":["https://openalex.org/I57206974"],"apc_list":null,"apc_paid":null,"fwci":0.7046,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.69745989,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"17","issue":null,"first_page":"2508","last_page":"2523"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13114","display_name":"Image Processing Techniques and Applications","score":0.9782000184059143,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.973800003528595,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8854250907897949},{"id":"https://openalex.org/keywords/pipeline","display_name":"Pipeline (software)","score":0.624321699142456},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6218656897544861},{"id":"https://openalex.org/keywords/fingerprint","display_name":"Fingerprint (computing)","score":0.6170613765716553},{"id":"https://openalex.org/keywords/fingerprint-recognition","display_name":"Fingerprint recognition","score":0.5065251588821411},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.4927063286304474},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.44965341687202454}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8854250907897949},{"id":"https://openalex.org/C43521106","wikidata":"https://www.wikidata.org/wiki/Q2165493","display_name":"Pipeline (software)","level":2,"score":0.624321699142456},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6218656897544861},{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.6170613765716553},{"id":"https://openalex.org/C168406668","wikidata":"https://www.wikidata.org/wiki/Q178022","display_name":"Fingerprint recognition","level":3,"score":0.5065251588821411},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.4927063286304474},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.44965341687202454},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2022.3179945","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2022.3179945","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1225426622","display_name":null,"funder_award_id":"1909488","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":74,"referenced_works":["https://openalex.org/W1524144700","https://openalex.org/W1647732624","https://openalex.org/W1973103453","https://openalex.org/W1994743750","https://openalex.org/W2009130368","https://openalex.org/W2055745001","https://openalex.org/W2081425458","https://openalex.org/W2088915293","https://openalex.org/W2096754397","https://openalex.org/W2116167573","https://openalex.org/W2116467012","https://openalex.org/W2124283009","https://openalex.org/W2129223290","https://openalex.org/W2170343586","https://openalex.org/W2170384881","https://openalex.org/W2270683370","https://openalex.org/W2556872594","https://openalex.org/W2560026874","https://openalex.org/W2577185574","https://openalex.org/W2610137797","https://openalex.org/W2610692499","https://openalex.org/W2611426089","https://openalex.org/W2741248492","https://openalex.org/W2753919623","https://openalex.org/W2762911267","https://openalex.org/W2766497195","https://openalex.org/W2792674338","https://openalex.org/W2798117183","https://openalex.org/W2798303923","https://openalex.org/W2799265886","https://openalex.org/W2800109307","https://openalex.org/W2800148787","https://openalex.org/W2883233582","https://openalex.org/W2885533020","https://openalex.org/W2888338418","https://openalex.org/W2902410427","https://openalex.org/W2903213484","https://openalex.org/W2903564017","https://openalex.org/W2914064859","https://openalex.org/W2948407537","https://openalex.org/W2952046917","https://openalex.org/W2952323569","https://openalex.org/W2952651666","https://openalex.org/W2953875340","https://openalex.org/W2957660717","https://openalex.org/W2962785568","https://openalex.org/W2963857521","https://openalex.org/W2964183857","https://openalex.org/W2979359179","https://openalex.org/W2982544354","https://openalex.org/W3009994855","https://openalex.org/W3011265505","https://openalex.org/W3016829532","https://openalex.org/W3034239311","https://openalex.org/W3034504121","https://openalex.org/W3034530968","https://openalex.org/W3034856584","https://openalex.org/W3035381835","https://openalex.org/W3037049838","https://openalex.org/W3084163766","https://openalex.org/W3098779409","https://openalex.org/W3110194847","https://openalex.org/W3122099796","https://openalex.org/W3133044949","https://openalex.org/W3134921302","https://openalex.org/W3143336910","https://openalex.org/W3179963848","https://openalex.org/W4230472795","https://openalex.org/W4248170299","https://openalex.org/W6739868092","https://openalex.org/W6759289460","https://openalex.org/W6767994496","https://openalex.org/W6771274819","https://openalex.org/W6788759759"],"related_works":["https://openalex.org/W2899307613","https://openalex.org/W1484138156","https://openalex.org/W2765102790","https://openalex.org/W3183455877","https://openalex.org/W2048249748","https://openalex.org/W2945473631","https://openalex.org/W2031869223","https://openalex.org/W2246203514","https://openalex.org/W2906535179","https://openalex.org/W2073763951"],"abstract_inverted_index":{"Analysis":[0],"of":[1,6,56,65,92,121,177,197],"imaging":[2],"sensors":[3,69,77],"is":[4,15,31,146],"one":[5],"the":[7,93,156],"most":[8],"reliable":[9],"photo":[10,27,95,168,210],"forensic":[11],"techniques,":[12],"but":[13,149],"it":[14,44],"increasingly":[16],"challenged":[17],"by":[18],"complex":[19],"image":[20,136],"processing":[21],"in":[22,54,155],"modern":[23],"cameras.":[24],"The":[25],"underlying":[26],"response":[28],"non-uniformity":[29],"(PRNU)":[30],"distilled":[32],"into":[33],"a":[34,118,201],"static":[35],"sensor":[36,74],"fingerprint":[37,102,131,188],"unique":[38],"for":[39,79,105,183,208],"each":[40],"device.":[41],"This":[42],"makes":[43],"easy":[45],"to":[46,61,70,107,128],"estimate":[47],"and":[48,50,97,110,124,138,161,186,204,212],"spoof":[49],"limits":[51],"its":[52,180],"reliability":[53,182],"face":[55],"sophisticated":[57],"attackers.":[58],"We":[59,141],"propose":[60],"exploit":[62],"computational":[63,73,171],"capabilities":[64],"emerging":[66],"intelligent":[67],"vision":[68],"design":[71],"next-generation":[72],"fingerprints.":[75],"Such":[76],"allow":[78],"running":[80],"neural":[81],"network":[82],"inference":[83],"directly":[84],"on":[85,134],"raw":[86],"pixels,":[87],"which":[88],"enables":[89],"end-to-end":[90],"optimization":[91],"entire":[94],"acquisition":[96,211],"distribution":[98,213],"pipeline.":[99],"Control":[100],"over":[101],"generation":[103,132],"allows":[104],"adaptation":[106],"various":[108],"requirements":[109],"threat":[111],"models.":[112],"In":[113],"this":[114,195],"study":[115],"we":[116,199],"provide":[117,163],"detailed":[119],"assessment":[120],"security":[122],"properties":[123],"evaluate":[125],"two":[126],"approaches":[127],"prevent":[129],"spoofing:":[130],"based":[133],"local":[135],"content":[137,150,185],"adversarial":[139,144],"training.":[140],"found":[142],"that":[143,190],"training":[145],"currently":[147],"impractical,":[148],"fingerprints":[151,172],"deliver":[152],"good":[153],"performance":[154],"considered":[157],"cross-domain":[158],"(RAW-RGB)":[159],"setting":[160],"could":[162],"robust":[164],"best-effort":[165],"protection":[166],"against":[167],"manipulation.":[169],"Moreover,":[170],"can":[173],"alleviate":[174],"other":[175],"limitations":[176],"PRNU,":[178],"e.g.,":[179],"limited":[181],"dark/texture":[184],"expensive":[187],"storage":[189],"hinders":[191],"scalability.":[192],"To":[193],"enable":[194],"line":[196],"work,":[198],"developed":[200],"novel":[202],"open-source":[203],"high-fidelity":[205],"simulation":[206],"environment":[207],"modeling":[209],"pipelines":[214],"(https://github.com/pkorus/neural-imaging).":[215]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
