{"id":"https://openalex.org/W2540224028","doi":"https://doi.org/10.1109/wifs.2012.6412651","title":"Detection and information theoretic measures for quantifying the distinguishability between multimedia operator chains","display_name":"Detection and information theoretic measures for quantifying the distinguishability between multimedia operator chains","publication_year":2012,"publication_date":"2012-12-01","ids":{"openalex":"https://openalex.org/W2540224028","doi":"https://doi.org/10.1109/wifs.2012.6412651","mag":"2540224028"},"language":"en","primary_location":{"id":"doi:10.1109/wifs.2012.6412651","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wifs.2012.6412651","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE International Workshop on Information Forensics and Security (WIFS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://zenodo.org/record/3436053","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038872849","display_name":"Pedro Comesa\u00f1a","orcid":"https://orcid.org/0000-0001-5406-0066"},"institutions":[{"id":"https://openalex.org/I6289922","display_name":"Universidade de Vigo","ror":"https://ror.org/05rdf8595","country_code":"ES","type":"education","lineage":["https://openalex.org/I6289922"]}],"countries":["ES"],"is_corresponding":true,"raw_author_name":"Pedro Comesana","raw_affiliation_strings":["Signal Theory and Communications Department, Campus-Lagoas, Marcosende, Vigo, Spain"],"affiliations":[{"raw_affiliation_string":"Signal Theory and Communications Department, Campus-Lagoas, Marcosende, Vigo, Spain","institution_ids":["https://openalex.org/I6289922"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5038872849"],"corresponding_institution_ids":["https://openalex.org/I6289922"],"apc_list":null,"apc_paid":null,"fwci":1.6472,"has_fulltext":false,"cited_by_count":25,"citation_normalized_percentile":{"value":0.86713825,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"211","last_page":"216"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12859","display_name":"Cell Image Analysis Techniques","score":0.9883000254631042,"subfield":{"id":"https://openalex.org/subfields/1304","display_name":"Biophysics"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T10688","display_name":"Image and Signal Denoising Methods","score":0.9872999787330627,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7593814134597778},{"id":"https://openalex.org/keywords/operator","display_name":"Operator (biology)","score":0.7386099696159363},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3896408677101135},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.34355461597442627}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7593814134597778},{"id":"https://openalex.org/C17020691","wikidata":"https://www.wikidata.org/wiki/Q139677","display_name":"Operator (biology)","level":5,"score":0.7386099696159363},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3896408677101135},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.34355461597442627},{"id":"https://openalex.org/C86339819","wikidata":"https://www.wikidata.org/wiki/Q407384","display_name":"Transcription factor","level":3,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C158448853","wikidata":"https://www.wikidata.org/wiki/Q425218","display_name":"Repressor","level":4,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/wifs.2012.6412651","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wifs.2012.6412651","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE International Workshop on Information Forensics and Security (WIFS)","raw_type":"proceedings-article"},{"id":"pmh:oai:zenodo.org:3436053","is_oa":true,"landing_page_url":"https://zenodo.org/record/3436053","pdf_url":null,"source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/conferencePaper"}],"best_oa_location":{"id":"pmh:oai:zenodo.org:3436053","is_oa":true,"landing_page_url":"https://zenodo.org/record/3436053","pdf_url":null,"source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/conferencePaper"},"sustainable_development_goals":[{"score":0.5699999928474426,"id":"https://metadata.un.org/sdg/4","display_name":"Quality Education"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W37427133","https://openalex.org/W200526583","https://openalex.org/W1527181506","https://openalex.org/W2070040249","https://openalex.org/W2099111195","https://openalex.org/W2118779391","https://openalex.org/W2123889042","https://openalex.org/W2132622920","https://openalex.org/W2144616839","https://openalex.org/W2147386143","https://openalex.org/W2166805414","https://openalex.org/W2478708596","https://openalex.org/W2535842235","https://openalex.org/W6608096262","https://openalex.org/W6668164699"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Despite":[0],"the":[1,9,43,63,75,82,91,103],"large":[2],"number":[3],"of":[4,17,45,105],"contributions":[5],"on":[6,20],"forensics":[7,92],"in":[8,38,108],"recent":[10],"years,":[11],"there":[12],"is":[13,97,117],"still":[14],"a":[15,35,99],"lack":[16],"fundamental":[18,58],"limits":[19],"how":[21],"easily":[22],"two":[23],"signal":[24],"processing":[25],"operators":[26],"(or":[27],"operator":[28,79],"chains)":[29],"can":[30],"be":[31,88],"distinguished.":[32],"We":[33],"take":[34],"first":[36],"step":[37],"this":[39,95],"direction":[40],"by":[41],"proposing":[42],"use":[44,104],"some":[46],"detection":[47],"and":[48,62],"information":[49],"theoretic":[50],"measures":[51,67,107],"that":[52,86],"are":[53,68,71],"suitable":[54],"for":[55,73],"assessing":[56],"those":[57,66,106],"limits.":[59],"The":[60],"optimality":[61],"links":[64],"between":[65,77],"discussed;":[69],"they":[70],"used":[72],"quantifying":[74],"distinguishability":[76],"different":[78,83],"chains,":[80],"considering":[81],"prior":[84],"knowledge":[85],"could":[87],"available":[89],"at":[90],"analyst.":[93],"Although":[94],"work":[96],"mainly":[98],"theoretical":[100],"motivation":[101],"to":[102,113],"forensic":[109],"applications,":[110],"its":[111],"particularization":[112],"three":[114],"practical":[115],"scenarios":[116],"illustrated.":[118]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
