메뉴 건너뛰기




Volumn 3, Issue , 2005, Pages 77-80

Robust image hashing based on radial variance of pixels

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL COMPLEXITY; DATA COMPRESSION; DECISION THEORY; IMAGE ANALYSIS; OPTIMAL SYSTEMS; SIGNAL DISTORTION; VECTORS;

EID: 33749259245     PISSN: 15224880     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICIP.2005.1530332     Document Type: Conference Paper
Times cited : (27)

References (11)
  • 1
    • 0032308292 scopus 로고    scopus 로고
    • Compression tolerant image authentication
    • October
    • S. Bhattacharjee and M. Kutter, "Compression tolerant image authentication," ICIP98, vol. 1, pp. 435-439, October 1998.
    • (1998) ICIP98 , vol.1 , pp. 435-439
    • Bhattacharjee, S.1    Kutter, M.2
  • 2
    • 6344278566 scopus 로고    scopus 로고
    • Generating robust digital signature for image/video authentication
    • Sept 98
    • C.-Y. Lin and S.-F. Chang, "Generating robust digital signature for image/video authentication," ACM Multimedia, Sept 98.
    • ACM Multimedia
    • Lin, C.-Y.1    Chang, S.-F.2
  • 4
    • 0035765566 scopus 로고    scopus 로고
    • Visual hashing of video: Applications and techniques
    • July 01
    • J. Oostveen, T. Kalker, and J. Haitsma, "Visual hashing of video: applications and techniques," SPIE, vol. 4472, pp. 121-131, July 01.
    • SPIE , vol.4472 , pp. 121-131
    • Oostveen, J.1    Kalker, T.2    Haitsma, J.3
  • 5
    • 84962762130 scopus 로고    scopus 로고
    • Robust hash functions for digital water-marking
    • March Las Vegas, USA
    • J. Fridrich and M. Goljan, "Robust hash functions for digital water-marking," ITCC'00, pp. 173-178, March 2000, Las Vegas, USA.
    • (2000) ITCC'00 , pp. 173-178
    • Fridrich, J.1    Goljan, M.2
  • 6
    • 20144386063 scopus 로고    scopus 로고
    • Compression tolerant dct based image hash
    • May
    • C. Kailasanathan and R. Safavi Naini, "Compression tolerant dct based image hash," ICDCSW, pp. 562-567, May 2003.
    • (2003) ICDCSW , pp. 562-567
    • Kailasanathan, C.1    Naini, R.S.2
  • 7
    • 0035248504 scopus 로고    scopus 로고
    • A robust image authentication method distinguishing JPEG compression from malicious manipulation
    • Feb.
    • C.-Y. Lin and S.-F. Chang, "A robust image authentication method distinguishing JPEG compression from malicious manipulation," IEEE Trans. on CSVT, vol. 11, no. 2, pp. 153-168, Feb. 2001.
    • (2001) IEEE Trans. on CSVT , vol.11 , Issue.2 , pp. 153-168
    • Lin, C.-Y.1    Chang, S.-F.2
  • 8
    • 0344271942 scopus 로고    scopus 로고
    • Dither-based secure image hashing using distributed coding
    • Sept.
    • M. Johnson and K. Ramchandran, "Dither-based secure image hashing using distributed coding," ICIP, pp. 751-754, Sept. 2003.
    • (2003) ICIP , pp. 751-754
    • Johnson, M.1    Ramchandran, K.2
  • 10
    • 0029513797 scopus 로고
    • Rapid scene analysis on compressed video
    • December
    • B.-L. Yeo and B. Liu, "Rapid scene analysis on compressed video," IEEE Trans. on CSVT, vol. 5, no. 6, pp. 533-544, December 1995.
    • (1995) IEEE Trans. on CSVT , vol.5 , Issue.6 , pp. 533-544
    • Yeo, B.-L.1    Liu, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.