[1] Kurosawa K, Kuroki K, Saitoh N. CCD fingerprint method-identification of a video camera from videotaped images[C]//Image Processing. IEEE, 1999:537-540. [2] Geradts Z J, Bijhold J, Kieft M, et al. Methods for identification of images acquired with digital cameras[J]. Enabling Technologies for Law Enforcement, 2001, 4232:505-512. [3] Bayram S, Sencar H, Memon N, et al. Source camera identification based on CFA interpolation[C]//Image Processing. IEEE, 2005:69. [4] Swaminathan A, Wu M, Liu K J R. Nonintrusive component forensics of visual sensors using output images[J]. IEEE Transactions on Information Forensics and Security, 2007, 2(1):91-106. [5] Sorrell M J. Digital camera source identification through JPEG quantisation[M]. USA:IGI Global, 2009:291-313. [6] Alles E J, Geradts Z J, Veenman C J. Source camera identification for heavily JPEG compressed low resolution still images[J]. Journal of Forensic Sciences, 2009, 54(3):628-638. [7] Choi K S, Lam E Y, Wong K K. Source camera identification using footprints from lens aberration[C]//The International Society for Optical Engineering, 2006, 6069:172-179. [8] Van L T, Emmanuel S, Kankanhalli M. Identifying source cell phone using chromatic aberration[C]//Multimedia and Expo. IEEE, 2007:9804424. [9] 杨锐,骆伟祺,黄继武. 多媒体取证[J]. 中国科学-信息科学,2013, 43(12):1654-1672. Yang R, Luo W Q, Huang J W. Multimedia forensics[J]. China Science-Information Science, 2013, 43(12):1654-1672. (in Chinese) [10] Al-Ani M, Khelifi F. On the SPN estimation in image forensics:a systematic empirical evaluation[J]. IEEE Transactions on Information Forensics and Security, 2017, 12(5):1067-1081. [11] Lukas J, Fridrich J, Goljan M. Digital camera identification from sensor pattern noise[J]. IEEE Transactions on Information Forensics and Security, 2006, 1(2):205-214. [12] Kang X, Chen J, Lin K, et al. A context-adaptive SPN predictor for trustworthy source camera identification[J]. EURASIP Journal on Image and Video Processing, 2014(1):19.1-19.11. [13] Cooper, Alan J. Improved photo response non-uniformity (PRNU) based source camera identification[J]. Forensic Science International, 2013, 226(1/3):132-141. [14] Zeng H, Kang X. Fast source camera identification using content adaptive guided image filter[J]. Journal of Forensic Sciences, 2016, 61(2):520-526. [15] Cortiana A, Conotter V, Boato G, et al. Performance comparison of denoising filters for source camera identification[C]//Media Watermarking, Security and Forensics Ⅲ. International Society for Optics and Photonics, 2011, 7880(1):788007-788007-6. [16] Nam S, Hwang Y, Matsushita Y, et al. A holistic approach to cross-channel image noise modeling and its application to image denoising[C]//IEEE Conference on Computer Vision and Pattern Recognition. IEEE, 2016:1683-1691. [17] Xu J, Zhang L, Zhang D, et al. Multi-channel weighted nuclear norm minimization for real color image denoising[C]//IEEE International Conference on Computer Vision. IEEE, 2017:1096-1104. [18] Xu J, Zhang L, Zhang D. A trilateral weighted sparse coding scheme for real-world image denoising[J]. The European Conference on Computer Vision, 2018, 11212:20-36. [19] Guo S, Yan Z, Zhang K, et al. Toward convolutional blind denoising of real photographs[C]//IEEE Conference on Computer Vision and Pattern Recognition, 2019, 1712-1722. [20] Tibshirani R. Regression shrinkage and selection via the lasso[J]. Journal of the Royal Statistical Society, 1996, 58(1):267-288. [21] Gloe T, Böhme R. The Dresden image database for benchmarking digital image forensics[J]. Journal of Digital Forensic Practice, 2010, 3(2/4):150-159. [22] Goljan M, Fridrich J, Tomáă F. Large scale test of sensor fingerprint camera identification[C]//Media Forensics and Security, 2009:72540I. 01-72540I.12. [23] Galdi C, Hartung F, Dugelay J. SOCRatES:a database of realistic data for source camera recognition on smartphones[C]//International Conference on Pattern Recognition Applications and Methods, 2019:19-21. [24] Shullani D, Fontani M, Iuliani M, et al. VISION:a video and image dataset for source identification[J]. EURASIP Journal on Information Security, 2017(1):15.1-15.16. [25] Tian H, Xiao Y, Cao G, et al, Daxing smartphone identification dataset[J]. IEEE Access, 2009, 7:101046-101053. |