메뉴 건너뛰기




Volumn , Issue , 2004, Pages 81-92

Geometric distortion-resilient image hashing system and its application scalability

Author keywords

Algorithms; Management

Indexed keywords

BENCHMARKING; COMPUTATIONAL COMPLEXITY; COMPUTATIONAL GEOMETRY; COSINE TRANSFORMS; DATABASE SYSTEMS; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; ERROR ANALYSIS; IMAGE PROCESSING; INFORMATION RETRIEVAL; ROBUSTNESS (CONTROL SYSTEMS); VECTOR QUANTIZATION;

EID: 11244284466     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1022431.1022448     Document Type: Conference Paper
Times cited : (18)

References (26)
  • 1
    • 0036709226 scopus 로고    scopus 로고
    • Geometrically invariant watermarking using feature points
    • P. Bas, J. M. Chassery, and B. Macq, "Geometrically invariant watermarking using feature points," IEEE Trans. Image Processing, Vol. 11, pp. 1014-1028, 2002.
    • (2002) IEEE Trans. Image Processing , vol.11 , pp. 1014-1028
    • Bas, P.1    Chassery, J.M.2    Macq, B.3
  • 4
    • 0032650557 scopus 로고    scopus 로고
    • Content-based digital signature for motion pictures authentication and content-fragile watermarking
    • Italy
    • J. Dittmann, A. Steinmetz, and R. Steinmetz, "Content-based Digital Signature for Motion Pictures Authentication and Content-Fragile Watermarking", Proc. IEEE Int. Conf. Multimedia Computing and Systems, Italy, Vol. II, pp. 209-213, 1999.
    • (1999) Proc. IEEE Int. Conf. Multimedia Computing and Systems , vol.2 , pp. 209-213
    • Dittmann, J.1    Steinmetz, A.2    Steinmetz, R.3
  • 9
    • 0037372152 scopus 로고    scopus 로고
    • Content-based image copy detection
    • C. Kim, "Content-based Image Copy Detection," Signal Processing: Image Communication, Vol. 18, pp. 169-184, 2003.
    • (2003) Signal Processing: Image Communication , vol.18 , pp. 169-184
    • Kim, C.1
  • 14
    • 0035248504 scopus 로고    scopus 로고
    • A robust image authentication method distinguishing JPEG compression from malicious manipulation
    • C. Y. Lin and S. F. Chang, "A Robust Image Authentication Method Distinguishing JPEG Compression from Malicious Manipulation," IEEE Trans. on Circuits and Systems for Video Tech., Vol. 11, No. 2, pp. 153-168, 2001.
    • (2001) IEEE Trans. on Circuits and Systems for Video Tech. , vol.11 , Issue.2 , pp. 153-168
    • Lin, C.Y.1    Chang, S.F.2
  • 15
    • 0037818310 scopus 로고    scopus 로고
    • Structural digital signature for image authentication: An incidental distortion resistant scheme
    • C. S. Lu and H. Y. Mark Liao, "Structural Digital Signature for Image Authentication: An Incidental Distortion Resistant Scheme," IEEE Trans. on Multimedia, Vol. 5, No. 2, pp. 161-173, 2003.
    • (2003) IEEE Trans. on Multimedia , vol.5 , Issue.2 , pp. 161-173
    • Lu, C.S.1    Liao, H.Y.M.2
  • 16
    • 4344670344 scopus 로고    scopus 로고
    • On the security of structural information extraction/embedding for images
    • Vancouver, Canada
    • C. S. Lu, "On the Security of Structural Information Extraction/Embedding for Images," Proc. IEEE Int. Symposium on Circuits and Systems, Vancouver, Canada, 2004.
    • (2004) Proc. IEEE Int. Symposium on Circuits and Systems
    • Lu, C.S.1
  • 23
    • 85032751954 scopus 로고    scopus 로고
    • Watermarking schemes evaluation
    • F. Petitcolas, "Watermarking Schemes Evaluation," IEEE Signal Processing Magazine, Vol. 17, No. 5, pp. 58-64, 2000.
    • (2000) IEEE Signal Processing Magazine , vol.17 , Issue.5 , pp. 58-64
    • Petitcolas, F.1
  • 26
    • 1942436689 scopus 로고    scopus 로고
    • Image quality assessment: From error visibility to structural similarity
    • Z. Wang, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli, "Image Quality Assessment: From Error Visibility to Structural Similarity," IEEE Trans. on Image Processing, Vol. 13, No. 4, pp. 600-612, 2004.
    • (2004) IEEE Trans. on Image Processing , vol.13 , Issue.4 , pp. 600-612
    • Wang, Z.1    Bovik, A.C.2    Sheikh, H.R.3    Simoncelli, E.P.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.