J. Lukas, J. Fridrich, and M. Goljan, Digital Camera Identification From Sensor Pattern Noise, IEEE Transactions on Information Forensics and Security, vol.1, issue.2, p.205214, 2006.
DOI : 10.1109/TIFS.2006.873602

S. Choi, E. Y. Lam, and K. K. Wong, Source camera identification using footprints from lens aberration, Digital Photography II, pp.60690-60690, 2006.
DOI : 10.1117/12.649775

A. E. Dirik, H. T. Sencar, and N. Memon, Source camera identification based on sensor dust characteristics, IEEE Workshop on Signal Processing Applications for Public Security and Forensics, SAFE 07, pp.11-13, 2007.

S. Bayram, H. T. Sencar, and N. Memon, Improvements on source camera model identification based on cfa interpolation, International Conference on Digital Forensics, 2006.

M. Kharrazi, H. T. Sencar, and N. Memon, Blind source camera identification, 2004 International Conference on Image Processing, 2004. ICIP '04., p.709712, 2004.
DOI : 10.1109/ICIP.2004.1418853

O. Celiktutan, B. Sankur, and I. Avcibas, Blind Identification of Source Cell-Phone Model, IEEE Transactions on Information Forensics and Security, vol.3, issue.3, p.553566, 2008.
DOI : 10.1109/TIFS.2008.926993

J. Fridrich, Digital image forensic using sensor noise, IEEE Signal Processing Magazine, vol.26, issue.2, p.2637, 2009.

M. Goljan and J. Fridrich, Estimation of lens distortion correction from single images, Proc. SPIE, Electronic Imaging, MediaWatermarking, Security, and Forensics, 2014.

M. Goljan and J. Fridrich, Camera identification from cropped and scaled images, Proc. SPIE, Electronic Imaging, Forensics, Security, Steganography, and Watermarking of Multimedia Contents X, 2008.

C. Li and R. Satta, Empirical investigation into the correlation between vignetting effect and the quality of sensor pattern noise, IET Computer Vision, vol.6, issue.6, p.560566, 2012.
DOI : 10.1049/iet-cvi.2012.0044

J. Fridrich and J. Kodovsky, Rich Models for Steganalysis of Digital Images, IEEE Transactions on Information Forensics and Security, vol.7, issue.3, p.868882, 2012.
DOI : 10.1109/TIFS.2012.2190402

X. Qiu, H. Li, W. Luo, and J. Huang, A universal image forensic strategy based on steganalytic model, Proceedings of the 2nd ACM workshop on Information hiding and multimedia security, IH&MMSec '14, p.165170, 2014.
DOI : 10.1145/2600918.2600941

D. Cozzolino, D. Gragnaniello, and L. Verdoliva, Image forgery detection through residual-based local descriptors and block-matching, 2014 IEEE International Conference on Image Processing (ICIP), p.52975301, 2014.
DOI : 10.1109/ICIP.2014.7026072

T. Filler, J. Fridrich, and M. Goljan, Using sensor pattern noise for camera model identification, 2008 15th IEEE International Conference on Image Processing, p.12961299, 2008.
DOI : 10.1109/ICIP.2008.4712000

Y. Bengio, O. Delalleau, and N. L. Roux, The curse of dimensionality for local kernel machines, 2005.

T. Gloe and R. Böhme, The dresden image database for benchmarking digital image forensics, Proceedings of the ACM Symposium on Applied Computing, p.15841590, 2010.

C. Chang and C. Lin, LIBSVM, ACM Transactions on Intelligent Systems and Technology, vol.2, issue.3, 2011.
DOI : 10.1145/1961189.1961199

C. Hsu, C. Chang, and C. Lin, A practical guide to support vector classification, Tech. Rep, 2003.