<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>0188-6266</journal-id>
<journal-title><![CDATA[Acta universitaria]]></journal-title>
<abbrev-journal-title><![CDATA[Acta univ]]></abbrev-journal-title>
<issn>0188-6266</issn>
<publisher>
<publisher-name><![CDATA[Universidad de Guanajuato, Dirección de Investigación y Posgrado]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S0188-62662022000100118</article-id>
<article-id pub-id-type="doi">10.15174/au.2022.3317</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[Método para identificar el dispositivo de captura de una imagen digital no manipulada basado en la distancia de Hellinger]]></article-title>
<article-title xml:lang="en"><![CDATA[Identification method of the capture device of an unmanipulated digital image based on Hellinger distance]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Quintanar Reséndiz]]></surname>
<given-names><![CDATA[Ana Laura]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Hernández Sánchez]]></surname>
<given-names><![CDATA[Jerónimo de Jesús]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Juárez Santiago]]></surname>
<given-names><![CDATA[Brenda]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Santos Osorio]]></surname>
<given-names><![CDATA[Rene]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Ledesma Uribe]]></surname>
<given-names><![CDATA[Norma Alejandra]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Vázquez Medina]]></surname>
<given-names><![CDATA[Rubén]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Instituto Politécnico Nacional Centro de Investigación en Ciencia Aplicada y Tecnología Avanzada ]]></institution>
<addr-line><![CDATA[Querétaro Querétaro]]></addr-line>
<country>Mexico</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Universidad Tecnológica de San Juan del Río Mecatrónica y Tecnologías de la Información y Comunicación ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Mexico</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>00</month>
<year>2022</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>00</month>
<year>2022</year>
</pub-date>
<volume>32</volume>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S0188-62662022000100118&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S0188-62662022000100118&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S0188-62662022000100118&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen Se propone un método basado en la distancia de Hellinger y la función de densidad de probabilidad de señales (Photo Response Non-Uniformity [PRNU]) para identificar el dispositivo de captura de imágenes digitales. El método asocia una imagen digital no modificada (imagen en disputa) con uno de un conjunto de dispositivos de captura candidatos, al comparar la huella digital insertada en la imagen en disputa contra la base de datos creada con las huellas digitales de los dispositivos de captura. El método propuesto se implementó en MatlabTM para demostrar su funcionamiento, luego se comparó en un caso de estudio controlado contra dos métodos diferentes: uno propuesto por Goljan et al. (2009) con un porcentaje de similitud promedio del 100% y el otro por Quintanar-Reséndiz et al. (2021) con el 99.35%, y para el método propuesto resultó ser de 97.68%.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract A method based on Hellinger distance and Photo Response Non-Uniformity (PRNU) signal probability density function is proposed to identify the digital image capture device. The method is applied to an unmanipulated digital image (disputed image) and allows to associate it with one of a set of candidates capture devices. This association is performed through the fingerprint imprinted by the capturing device on the disputed image, then this imprinted fingerprint is compared with the fingerprint of each capturing device. The proposed method was implemented in MatlabTM to show its performance and compared against two different methods. The first method, proposed by Goljan et al. (2009), reached a mean similarity percentage of 100%, and the second method, proposed by Quintanar-Reséndiz et al. (2021), reached 99.35%; and the method proposed here reached a mean similarity percentage of 97.68%.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[Funciones hash]]></kwd>
<kwd lng="es"><![CDATA[códigos de autenticación]]></kwd>
<kwd lng="es"><![CDATA[huellas de imágenes digitales]]></kwd>
<kwd lng="es"><![CDATA[ruido intrínseco]]></kwd>
<kwd lng="es"><![CDATA[distancia de Hellinger]]></kwd>
<kwd lng="en"><![CDATA[Hash functions]]></kwd>
<kwd lng="en"><![CDATA[authentication codes]]></kwd>
<kwd lng="en"><![CDATA[fingerprints in digital images]]></kwd>
<kwd lng="en"><![CDATA[intrinsic noise]]></kwd>
<kwd lng="en"><![CDATA[Hellinger distance]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Al-Ani]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Khelifi]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[On the SPN estimation in image forensics: A systematic empirical evaluation]]></article-title>
<source><![CDATA[IEEE Transactions on Information Forensics and Security]]></source>
<year>2017</year>
<volume>12</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>1067-81</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Balamurugan]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Maghilnan]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Kumar]]></surname>
<given-names><![CDATA[M. R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Source camera identification using SPN with PRNU estimation and enhancement]]></source>
<year>2017</year>
<conf-name><![CDATA[ 2017 International Conference on Intelligent Computing and Control (I2C2)]]></conf-name>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bellare]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Canetti]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Krawczyk]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Keying Hash functions for message authentication]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Koblitz]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<source><![CDATA[Advances in Cryptology - CRYPTO &#8217;96. Lecture Notes in Computer Science]]></source>
<year>1996</year>
<page-range>1-15</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chang]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Chien]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
</person-group>
<source><![CDATA[Feature extraction based hellinger distance algorithm for non-intrusive aging load identification in residential buildings]]></source>
<year>2015</year>
<conf-name><![CDATA[ 2015 IEEE Industry Applications Society Annual Meeting]]></conf-name>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Source camera identification using enhanced sensor pattern noise]]></article-title>
<source><![CDATA[IEEE Transactions on Information Forensics and Security]]></source>
<year>2010</year>
<volume>5</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>280-7</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cooper]]></surname>
<given-names><![CDATA[A. J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Improved photo response non-uniformity (PRNU) based source camera identification]]></article-title>
<source><![CDATA[Forensic Science International]]></source>
<year>2013</year>
<volume>226</volume>
<numero>1-3</numero>
<issue>1-3</issue>
<page-range>132-41</page-range></nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fridrich]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Digital image forensics]]></article-title>
<source><![CDATA[IEEE Signal Processing Magazine]]></source>
<year>2009</year>
<volume>26</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>26-37</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gloe]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Bhöme]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The dresden image database for benchmarking digital image forensics]]></article-title>
<source><![CDATA[Journal of Digital Forensic Practice]]></source>
<year>2010</year>
<volume>3</volume>
<numero>2-4</numero>
<issue>2-4</issue>
<page-range>150-9</page-range></nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Goljan]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Fridrich]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Filler]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Large scale test of sensor fingerprint camera identification]]></article-title>
<source><![CDATA[Proceedings Media Forensics and Security]]></source>
<year>2009</year>
<volume>7254</volume>
<page-range>170-1181</page-range></nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Grunnet]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[HMAC Hash message authentication code function]]></article-title>
<source><![CDATA[MathWorks]]></source>
<year>2021</year>
</nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[DataHash]]></article-title>
<source><![CDATA[MathWorks]]></source>
<year>2022</year>
</nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="book">
<collab>Instituto Nacional de Estadística y Geografía</collab>
<source><![CDATA[Demografía y Sociedad. TIC&#8217;s en hogares]]></source>
<year>2019</year>
<publisher-name><![CDATA[INEGI]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Long]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Peng]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhu]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Identifying natural images and computer generated graphics based on binary similarity measures of PRNU]]></article-title>
<source><![CDATA[Multimedia Tools and Applications]]></source>
<year>2019</year>
<volume>78</volume>
<page-range>489-506</page-range></nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lukas]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Fridrich]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Goljan]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Digital camera identification from sensor pattern noise]]></article-title>
<source><![CDATA[IEEE Transactions on Information Forensics and Security]]></source>
<year>2006</year>
<volume>1</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>205-14</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mehrish]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Subramanyam]]></surname>
<given-names><![CDATA[A. V.]]></given-names>
</name>
<name>
<surname><![CDATA[Emmanuel]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Robust PRNU estimation from probabilistic raw measurements]]></article-title>
<source><![CDATA[Signal Processing: Image Communication]]></source>
<year>2018</year>
<volume>66</volume>
<page-range>30-41</page-range></nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Quintanar-Reséndiz]]></surname>
<given-names><![CDATA[A. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Rodríguez-Santos]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Pichardo-Méndez]]></surname>
<given-names><![CDATA[J. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Delgado-Gutiérrez]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Jiménez Ramírez]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
<name>
<surname><![CDATA[Vázquez-Medina]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Capture device identification from digital images using Kullback-Leibler divergence]]></article-title>
<source><![CDATA[Multimedia Tools and Applications]]></source>
<year>2021</year>
<volume>80</volume>
<numero>13</numero>
<issue>13</issue>
<page-range>19513-38</page-range></nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Saito]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Tomioka]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Kitazawa]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A theoretical framework for estimating false acceptance rate of PRNU-based camera identification]]></article-title>
<source><![CDATA[IEEE Transactions on Information Forensics and Security]]></source>
<year>2017</year>
<volume>12</volume>
<numero>9</numero>
<issue>9</issue>
<page-range>2026-35</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sandoval]]></surname>
<given-names><![CDATA[A. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Arenas]]></surname>
<given-names><![CDATA[D. M.]]></given-names>
</name>
<name>
<surname><![CDATA[García]]></surname>
<given-names><![CDATA[L. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Hernández-Castro]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Analysis of errors in exif metadata on mobile devices]]></article-title>
<source><![CDATA[Multimedia Tools and Applications]]></source>
<year>2015</year>
<volume>74</volume>
<page-range>4735-63</page-range></nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Seshadri]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Akshatha]]></surname>
<given-names><![CDATA[K. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Karunakar]]></surname>
<given-names><![CDATA[A. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Paul]]></surname>
<given-names><![CDATA[K. H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A preliminary approach to using PRNU based transfer learning for camera identification]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Arai]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Kapoor]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Advances in Computer Vision. CVC 2019. Advances in Intelligent Systems and Computing]]></source>
<year>2020</year>
<page-range>246-55</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhao]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Zheng]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Qiao]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Xu]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Source camera identification via low dimensional PRNU features]]></article-title>
<source><![CDATA[Multimedia Tools and Applications]]></source>
<year>2019</year>
<volume>78</volume>
<page-range>8247-69</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
