{"id":"https://openalex.org/W2995675124","doi":"https://doi.org/10.1109/tencon.2019.8929355","title":"Mitigating Adaptive PRNU Denoising in Camera Model Identification: An Anti\u2013Counter Forensic Approach","display_name":"Mitigating Adaptive PRNU Denoising in Camera Model Identification: An Anti\u2013Counter Forensic Approach","publication_year":2019,"publication_date":"2019-10-01","ids":{"openalex":"https://openalex.org/W2995675124","doi":"https://doi.org/10.1109/tencon.2019.8929355","mag":"2995675124"},"language":"en","primary_location":{"id":"doi:10.1109/tencon.2019.8929355","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tencon.2019.8929355","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"TENCON 2019 - 2019 IEEE Region 10 Conference (TENCON)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5008919536","display_name":"Venkata Udaya Sameer","orcid":"https://orcid.org/0000-0002-8662-0571"},"institutions":[{"id":"https://openalex.org/I16292982","display_name":"National Institute of Technology Rourkela","ror":"https://ror.org/011gmn932","country_code":"IN","type":"education","lineage":["https://openalex.org/I16292982"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Venkata Udaya Sameer","raw_affiliation_strings":["National Institute of Technology, Rourkela, India"],"affiliations":[{"raw_affiliation_string":"National Institute of Technology, Rourkela, India","institution_ids":["https://openalex.org/I16292982"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013208803","display_name":"Ruchira Naskar","orcid":"https://orcid.org/0000-0002-6446-4379"},"institutions":[{"id":"https://openalex.org/I16292982","display_name":"National Institute of Technology Rourkela","ror":"https://ror.org/011gmn932","country_code":"IN","type":"education","lineage":["https://openalex.org/I16292982"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Ruchira Naskar","raw_affiliation_strings":["National Institute of Technology, Rourkela, India"],"affiliations":[{"raw_affiliation_string":"National Institute of Technology, Rourkela, India","institution_ids":["https://openalex.org/I16292982"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017273911","display_name":"Sowjanya Modalavalasa","orcid":"https://orcid.org/0000-0002-4688-8768"},"institutions":[{"id":"https://openalex.org/I16292982","display_name":"National Institute of Technology Rourkela","ror":"https://ror.org/011gmn932","country_code":"IN","type":"education","lineage":["https://openalex.org/I16292982"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sowjanya Modalavalasa","raw_affiliation_strings":["National Institute of Technology, Rourkela, India"],"affiliations":[{"raw_affiliation_string":"National Institute of Technology, Rourkela, India","institution_ids":["https://openalex.org/I16292982"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5008919536"],"corresponding_institution_ids":["https://openalex.org/I16292982"],"apc_list":null,"apc_paid":null,"fwci":0.1012,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.46437186,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":93},"biblio":{"volume":"1","issue":null,"first_page":"903","last_page":"907"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13114","display_name":"Image Processing Techniques and Applications","score":0.9559000134468079,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11105","display_name":"Advanced Image Processing Techniques","score":0.9535999894142151,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.7568387985229492},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7117917537689209},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.7037294507026672},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.6713796854019165},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.5401939153671265},{"id":"https://openalex.org/keywords/forensic-identification","display_name":"Forensic identification","score":0.48203718662261963},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.4687630832195282},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.45246952772140503},{"id":"https://openalex.org/keywords/local-binary-patterns","display_name":"Local binary patterns","score":0.4440656006336212},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.36849847435951233},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.16957178711891174}],"concepts":[{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.7568387985229492},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7117917537689209},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.7037294507026672},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.6713796854019165},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.5401939153671265},{"id":"https://openalex.org/C2780732888","wikidata":"https://www.wikidata.org/wiki/Q2314618","display_name":"Forensic identification","level":2,"score":0.48203718662261963},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.4687630832195282},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.45246952772140503},{"id":"https://openalex.org/C87335442","wikidata":"https://www.wikidata.org/wiki/Q2494345","display_name":"Local binary patterns","level":4,"score":0.4440656006336212},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.36849847435951233},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.16957178711891174},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C53533937","wikidata":"https://www.wikidata.org/wiki/Q185020","display_name":"Histogram","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tencon.2019.8929355","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tencon.2019.8929355","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"TENCON 2019 - 2019 IEEE Region 10 Conference (TENCON)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W1092174439","https://openalex.org/W1506864492","https://openalex.org/W2006262045","https://openalex.org/W2030174526","https://openalex.org/W2039051707","https://openalex.org/W2063252552","https://openalex.org/W2081891982","https://openalex.org/W2084252081","https://openalex.org/W2096754397","https://openalex.org/W2122246182","https://openalex.org/W2124695272","https://openalex.org/W2141701079","https://openalex.org/W2163352848","https://openalex.org/W2179432078","https://openalex.org/W2364293642","https://openalex.org/W2405563912","https://openalex.org/W2434948764","https://openalex.org/W2546888898","https://openalex.org/W2738710800","https://openalex.org/W2744908611","https://openalex.org/W2790248660","https://openalex.org/W6678642748","https://openalex.org/W6680944521","https://openalex.org/W6741399790"],"related_works":["https://openalex.org/W2055219403","https://openalex.org/W2791313072","https://openalex.org/W3166997759","https://openalex.org/W2794489335","https://openalex.org/W2080437822","https://openalex.org/W2153027217","https://openalex.org/W1589677080","https://openalex.org/W2770255720","https://openalex.org/W1509533962","https://openalex.org/W4402981185"],"abstract_inverted_index":{"Adaptive":[0],"PRNU":[1],"Denoising":[2],"(APD)":[3],"is":[4,156],"one":[5,166],"of":[6,10,27,43,84,104,120,139,167],"the":[7,70,75,102,136,153,161,168],"strongest":[8,169],"forms":[9],"state-of-the-art":[11],"counter-forensic":[12,122,144,170],"attacks,":[13],"that":[14,152],"has":[15],"largely":[16],"succeeded":[17],"to":[18,33,49,95,159],"prevent":[19],"Photo":[20],"Response":[21],"Non-Uniformity":[22],"(PRNU)":[23],"based":[24,82],"source":[25,63,108,118,146],"identification":[26,64,83,109,119,175],"digital":[28],"images.":[29,73,123],"A":[30],"major":[31],"way":[32],"thwart":[34],"such":[35,55],"attack":[36,56],"would":[37],"be":[38,58,66],"finding":[39],"a":[40,44,80],"successful":[41,143],"mapping":[42],"counter-forensically":[45,71,90],"modified":[46,72,91],"image,":[47],"back":[48],"its":[50],"source.":[51],"In":[52],"other":[53],"words,":[54],"will":[57],"rendered":[59],"obsolete":[60],"if":[61],"accurate":[62],"can":[65],"made":[67],"possible":[68],"with":[69,89],"For":[74],"first":[76],"time,":[77],"we":[78],"perform":[79],"feature":[81],"image":[85,114,133,145],"sources,":[86],"working":[87],"directly":[88],"images,":[92],"without":[93],"trying":[94],"recover":[96],"their":[97],"authentic":[98],"versions.":[99],"We":[100,124],"quantize":[101],"effects":[103],"APD":[105,121,132],"on":[106,131,172],"forensic":[107],"techniques,":[110],"and":[111],"explore":[112],"how":[113],"texture":[115,134],"helps":[116],"in":[117],"propose":[125],"Local":[126],"Binary":[127],"Pattern":[128],"(LBP)":[129],"extraction":[130],"layer,":[135],"key":[137],"component":[138],"our":[140],"work,":[141],"enabling":[142],"attribution.":[147],"Our":[148],"experimental":[149],"results":[150],"prove":[151],"proposed":[154],"methodology":[155],"highly":[157],"effective":[158],"mitigate":[160],"threats":[162],"posed":[163],"by":[164],"APD,":[165],"attacks":[171],"camera":[173],"model":[174],"today.":[176]},"counts_by_year":[{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
