An analysis on attacker actions in fingerprint-copy attack in source camera identification | IEEE Conference Publication | IEEE Xplore