<?xml version="1.0" encoding="utf-8"?>
<?xml-stylesheet type="text/xsl" href="style/detail_T.xsl"?>
<bibitem type="J">   <ARLID>0398095</ARLID> <utime>20240103203158.6</utime><mtime>20131112235959.9</mtime>   <WOS>000324575200010</WOS> <SCOPUS>84882993598</SCOPUS>  <DOI>10.1109/TIFS.2013.2276000</DOI>           <title language="eng" primary="1">Blind Verification of Digital Image Originality: A Statistical Approach</title>  <specification> <page_count>10 s.</page_count> <media_type>P</media_type> </specification>   <serial><ARLID>cav_un_epca*0311611</ARLID><ISSN>1556-6013</ISSN><title>IEEE Transactions on Information Forensics and Security</title><part_num/><part_title/><volume_id>8</volume_id><volume>9 (2013)</volume><page_num>1531-1540</page_num></serial>    <keyword>blind verification</keyword>   <keyword>image extraction</keyword>   <keyword>camera fingerprints</keyword>    <author primary="1"> <ARLID>cav_un_auth*0206076</ARLID> <name1>Mahdian</name1> <name2>Babak</name2> <full_dept language="cz">Zpracování obrazové informace</full_dept> <full_dept language="eng">Department of Image Processing</full_dept> <department language="cz">ZOI</department> <department language="eng">ZOI</department> <institution>UTIA-B</institution> <full_dept>Department of Image Processing</full_dept>  <fullinstit>Ústav teorie informace a automatizace AV ČR, v. v. i.</fullinstit> </author> <author primary="0"> <ARLID>cav_un_auth*0226884</ARLID> <name1>Nedbal</name1> <name2>R.</name2> <country>CZ</country>  </author> <author primary="0"> <ARLID>cav_un_auth*0101189</ARLID> <name1>Saic</name1> <name2>Stanislav</name2> <full_dept language="cz">Zpracování obrazové informace</full_dept> <full_dept>Department of Image Processing</full_dept> <department language="cz">ZOI</department> <department>ZOI</department> <institution>UTIA-B</institution> <full_dept>Department of Image Processing</full_dept>  <fullinstit>Ústav teorie informace a automatizace AV ČR, v. v. i.</fullinstit> </author>   <source> <url>http://library.utia.cas.cz/separaty/2013/ZOI/mahdian-0398095.pdf</url> </source>        <cas_special> <project> <project_id>VG20102013064</project_id> <agency>GA MV</agency> <ARLID>cav_un_auth*0273814</ARLID> </project> <project> <project_id>GA13-28462S</project_id> <agency>GA ČR</agency> <ARLID>cav_un_auth*0292615</ARLID> </project>  <abstract language="eng" primary="1">Many methods for verifying the integrity of digital images employ various fingerprints associated with acquisition devices. Data on an acquisition device and fingerprints are extracted from an image and confronted with a reference data set that includes all possible fingerprints of the acquisition device. This allows us to draw a conclusion whether the digital image has been modified or not. Thus it is critical to have a sufficiently large, reliable, and true reference data set, otherwise critical miscalculations can arise. Reference data sets are extracted from image data sets that in turn are collected from unknown and nonguaranteed environments (mostly from the Internet). Since often software modifications leave no obvious traces in the image file (e.g., in metadata), it is not easy to recognize original images, from which fingerprints of acquisition devices can be extracted to form true reference data sets. This is the problem addressed in this paper.</abstract>     <reportyear>2014</reportyear>  <RIV>JC</RIV>     <unknown tag="mrcbC52"> 4 A 4a 20231122135859.1 </unknown> <inst_support> RVO:67985556 </inst_support>  <permalink>http://hdl.handle.net/11104/0225914</permalink>          <unknown tag="mrcbT16-e">COMPUTERSCIENCETHEORYMETHODS|ENGINEERINGELECTRICALELECTRONIC</unknown> <unknown tag="mrcbT16-f">2.379</unknown> <unknown tag="mrcbT16-g">0.227</unknown> <unknown tag="mrcbT16-h">3.VII</unknown> <unknown tag="mrcbT16-i">0.00766</unknown> <unknown tag="mrcbT16-j">0.91</unknown> <unknown tag="mrcbT16-k">1598</unknown> <unknown tag="mrcbT16-l">176</unknown> <unknown tag="mrcbT16-s">1.033</unknown> <unknown tag="mrcbT16-z">ScienceCitationIndexExpanded</unknown> <unknown tag="mrcbT16-4">Q1</unknown> <unknown tag="mrcbT16-B">76.163</unknown> <unknown tag="mrcbT16-C">82.770</unknown> <unknown tag="mrcbT16-D">Q1</unknown> <unknown tag="mrcbT16-E">Q1</unknown> <arlyear>2013</arlyear>    <unknown tag="mrcbTft">  Soubory v repozitáři: mahdian-0398095.pdf </unknown>    <unknown tag="mrcbU14"> 84882993598 SCOPUS </unknown> <unknown tag="mrcbU34"> 000324575200010 WOS </unknown> <unknown tag="mrcbU63"> cav_un_epca*0311611 IEEE Transactions on Information Forensics and Security 1556-6013 1556-6021 Roč. 8 č. 9 2013 1531 1540 </unknown> </cas_special> </bibitem>