{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T21:56:07Z","timestamp":1762984567145,"version":"3.45.0"},"reference-count":24,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2020,6,19]],"date-time":"2020-06-19T00:00:00Z","timestamp":1592524800000},"content-version":"vor","delay-in-days":79,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Forensic Science International: Digital Investigation"],"published-print":{"date-parts":[[2020,4]]},"DOI":"10.1016\/j.fsidi.2020.300916","type":"journal-article","created":{"date-parts":[[2020,5,29]],"date-time":"2020-05-29T19:16:18Z","timestamp":1590779778000},"page":"300916","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":2,"special_numbering":"S","title":["Towards Open-Set Forensic Source Grouping on JPEG Header Information"],"prefix":"10.1016","volume":"32","author":[{"given":"Patrick","family":"Mullan","sequence":"first","affiliation":[]},{"given":"Christian","family":"Riess","sequence":"additional","affiliation":[]},{"given":"Felix","family":"Freiling","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.fsidi.2020.300916_bib1","series-title":"International Conference on Acoustics, Speech and Signal Processing","first-page":"2007","article-title":"Towards open set camera model identification using a deep learning framework","author":"Bayar","year":"2018"},{"key":"10.1016\/j.fsidi.2020.300916_bib2","series-title":"International Conference on Image Processing","first-page":"4098","article-title":"Augmented convolutional feature maps for robust CNN-based camera model identification","author":"Bayar","year":"2017"},{"key":"10.1016\/j.fsidi.2020.300916_bib3","doi-asserted-by":"crossref","first-page":"77","DOI":"10.2352\/ISSN.2470-1173.2017.7.MWSF-328","article-title":"Design principles of convolutional neural networks for multimedia forensics","author":"Bayar","year":"2017","journal-title":"Electron. Imag."},{"key":"10.1016\/j.fsidi.2020.300916_bib4","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1109\/LSP.2016.2641006","article-title":"First steps toward camera model identification with convolutional neural networks","volume":"24","author":"Bondi","year":"2017","journal-title":"Signal Process. Lett."},{"key":"10.1016\/j.fsidi.2020.300916_bib5","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/s10994-006-6226-1","article-title":"Extremely randomized trees","volume":"63","author":"Geurts","year":"2006","journal-title":"Mach. Learn."},{"key":"10.1016\/j.fsidi.2020.300916_bib6","series-title":"International Workshop on Information Forensics and Security","first-page":"139","article-title":"Forensic analysis of ordered data structures on the example of JPEG files","author":"Gloe","year":"2012"},{"key":"10.1016\/j.fsidi.2020.300916_bib7","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1016\/j.diin.2014.03.009","article-title":"Forensic analysis of video file formats","volume":"11","author":"Gloe","year":"2014","journal-title":"Digit. Invest."},{"key":"10.1016\/j.fsidi.2020.300916_bib8","series-title":"1st IEEE IFS-TC Image Forensics Challenge, Category \u201cFormat-Based Attacks\u201d","article-title":"How we learned to stop worrying about content and love the metadata","author":"Gloe","year":"2013"},{"key":"10.1016\/j.fsidi.2020.300916_bib9","series-title":"Media Forensics and Security I, IS&T-SPIE Electronic Imaging Symposium, San Jose, CA, USA, January 19-21, 2009, Proceedings","article-title":"Large scale test of sensor fingerprint camera identification","author":"Goljan","year":"2009"},{"year":"2019","series-title":"We Need No Pixels: Video Manipulation Detection Using Stream Descriptors","author":"G\u00fcera","key":"10.1016\/j.fsidi.2020.300916_bib10"},{"year":"1992","series-title":"JPEG File Interchange Format","author":"Hamilton","key":"10.1016\/j.fsidi.2020.300916_bib11"},{"year":"2011","series-title":"Data Mining: Concepts and Techniques","author":"Han","key":"10.1016\/j.fsidi.2020.300916_bib12"},{"year":"2009","series-title":"The Elements of Statistical Learning: Data Mining, Inference, and Prediction","author":"Hastie","key":"10.1016\/j.fsidi.2020.300916_bib13"},{"key":"10.1016\/j.fsidi.2020.300916_bib14","doi-asserted-by":"crossref","first-page":"635","DOI":"10.1109\/TIFS.2018.2859760","article-title":"A\u00a0video forensic framework for the unsupervised analysis of MP4-like file container","volume":"14","author":"Iuliani","year":"2019","journal-title":"Trans. Inf. Forens. Sec."},{"year":"2019","series-title":"An In-Depth Study on Open-Set Camera Model Identification","author":"J\u00fanior","key":"10.1016\/j.fsidi.2020.300916_bib15"},{"key":"10.1016\/j.fsidi.2020.300916_bib16","doi-asserted-by":"crossref","first-page":"1066","DOI":"10.1109\/TIFS.2011.2128309","article-title":"Digital image authentication from JPEG headers","volume":"6","author":"Kee","year":"2011","journal-title":"Trans. Inf. Forens. Sec."},{"key":"10.1016\/j.fsidi.2020.300916_bib17","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1109\/TIFS.2006.873602","article-title":"Digital camera identification from sensor pattern noise","volume":"1","author":"Luk\u00e1s","year":"2006","journal-title":"Trans. Inf. Forens. Sec."},{"key":"10.1016\/j.fsidi.2020.300916_bib18","doi-asserted-by":"crossref","first-page":"2197","DOI":"10.1109\/TIFS.2017.2701335","article-title":"Blind PRNU-based image clustering for source identification","volume":"12","author":"Marra","year":"2017","journal-title":"Trans. Inf. Forens. Sec."},{"key":"10.1016\/j.fsidi.2020.300916_bib19","series-title":"International Conference on Acoustics, Speech and Signal Processing","first-page":"1657","article-title":"Image acquisition forensics: forensic analysis to identify imaging source","author":"McKay","year":"2008"},{"key":"10.1016\/j.fsidi.2020.300916_bib20","doi-asserted-by":"crossref","first-page":"S68","DOI":"10.1016\/j.diin.2019.01.016","article-title":"Forensic source identification using JPEG image headers: the case of smartphones","volume":"28","author":"Mullan","year":"2019","journal-title":"Digit. Invest."},{"year":"1992","series-title":"JPEG: Still Image Data Compression Standard","author":"Pennebaker","key":"10.1016\/j.fsidi.2020.300916_bib21"},{"key":"10.1016\/j.fsidi.2020.300916_bib22","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1109\/MSP.2018.2847326","article-title":"Forensic camera model identification: highlights from the IEEE signal processing Cup 2018 student competition [SP competitions]","volume":"35","author":"Stamm","year":"2018","journal-title":"Signal Process. Mag."},{"key":"10.1016\/j.fsidi.2020.300916_bib23","article-title":"The JPEG still picture compression standard","volume":"38","author":"Wallace","year":"1992","journal-title":"Trans. Consumer Electron."},{"key":"10.1016\/j.fsidi.2020.300916_bib24","series-title":"Transactions on Graphics","first-page":"28:1","article-title":"Handheld multi-frame super-resolution","author":"Wronski","year":"2019"}],"container-title":["Forensic Science International: Digital Investigation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2666281720300111?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2666281720300111?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T20:51:28Z","timestamp":1762980688000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2666281720300111"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4]]},"references-count":24,"alternative-id":["S2666281720300111"],"URL":"https:\/\/doi.org\/10.1016\/j.fsidi.2020.300916","relation":{},"ISSN":["2666-2817"],"issn-type":[{"type":"print","value":"2666-2817"}],"subject":[],"published":{"date-parts":[[2020,4]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Towards Open-Set Forensic Source Grouping on JPEG Header Information","name":"articletitle","label":"Article Title"},{"value":"Forensic Science International: Digital Investigation","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.fsidi.2020.300916","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2020 The Author(s). Published by Elsevier Ltd.","name":"copyright","label":"Copyright"}],"article-number":"300916"}}