메뉴 건너뛰기




Volumn 2, Issue , 2006, Pages

Robust image hashing via non-negative matrix factorizations

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; DATABASE SYSTEMS; ERROR ANALYSIS; IMAGE ANALYSIS; SINGULAR VALUE DECOMPOSITION; VECTORS;

EID: 33845404068     PISSN: 15206149     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (23)

References (18)
  • 2
    • 30744435344 scopus 로고    scopus 로고
    • Watermarking via optimization algorithms for quantizing randomized semi-global image statistics
    • Apr
    • K. Mihcak, R. Venkatesan, and T. Liu, "Watermarking via optimization algorithms for quantizing randomized semi-global image statistics," ACM Multimedia Systems Journal, Apr. 2005.
    • (2005) ACM Multimedia Systems Journal
    • Mihcak, K.1    Venkatesan, R.2    Liu, T.3
  • 3
    • 0030409375 scopus 로고    scopus 로고
    • A robust content based digital signature for image authentication
    • Sept
    • M. Schneider and S. F. Chang, "A robust content based digital signature for image authentication," Proc. IEEE Conf. on Image Processing, vol. 3, pp. 227-230, Sept. 1996.
    • (1996) Proc. IEEE Conf. on Image Processing , vol.3 , pp. 227-230
    • Schneider, M.1    Chang, S.F.2
  • 4
    • 20444458213 scopus 로고    scopus 로고
    • Image authentication surviving acceptable modifications using statistical measures and k-mean segmentation
    • June
    • C. Kailasanathan and R. Safavi Naini, "Image authentication surviving acceptable modifications using statistical measures and k-mean segmentation," Proc. IEEE-EURASIP Work. Nonlinear Sig. and Image, June 2001.
    • (2001) Proc. IEEE-EURASIP Work. Nonlinear Sig. and Image
    • Kailasanathan, C.1    Safavi Naini, R.2
  • 6
    • 0035248504 scopus 로고    scopus 로고
    • A robust image authentication system distinguishing JPEG compression from malicious manipulation
    • Feb
    • C. Y. Lin and S. F. Chang, "A robust image authentication system distinguishing JPEG compression from malicious manipulation," IEEE Trans. on Circuits and Systems for Video Technology, vol. 11, no. 2, pp. 153-168, Feb. 2001.
    • (2001) IEEE Trans. on Circuits and Systems for Video Technology , vol.11 , Issue.2 , pp. 153-168
    • Lin, C.Y.1    Chang, S.F.2
  • 7
    • 0037818310 scopus 로고    scopus 로고
    • Structural digital signature for image authentication
    • June
    • C.-S. Lu and H.-Y. M. Liao, "Structural digital signature for image authentication," IEEE Transactions on Multimedia, pp. 161-173, June 2003.
    • (2003) IEEE Transactions on Multimedia , pp. 161-173
    • Lu, C.-S.1    Liao, H.-Y.M.2
  • 14
    • 0033592606 scopus 로고    scopus 로고
    • Learning the parts of objects by non-negative matrix factorization
    • Oct
    • Daniel D. Lee and H. Sebastian Seung, "Learning the parts of objects by non-negative matrix factorization," Nature, vol. 401, Oct. 1999.
    • (1999) Nature , vol.401
    • Lee, D.D.1    Sebastian Seung, H.2
  • 15
    • 0042356818 scopus 로고    scopus 로고
    • Analyzing non-negative matrix factorization for image classification
    • Aug
    • B. Schiele D. Guillemet and J. Vitria, "Analyzing non-negative matrix factorization for image classification," IEEE Int. Conf. Pattern Recognition, vol. 2, pp. 116-119, Aug. 2002.
    • (2002) IEEE Int. Conf. Pattern Recognition , vol.2 , pp. 116-119
    • Schiele, B.1    Guillemet, D.2    Vitria, J.3
  • 18
    • 17044365507 scopus 로고    scopus 로고
    • Fair evaluation procedures for watermarking systems
    • "Fair evaluation procedures for watermarking systems," http://www.petitcolas.net/fabien/watermarking/stirmark, 2000.
    • (2000)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.