메뉴 건너뛰기




Volumn 11, Issue 4, 2007, Pages 323-331

Recent development of perceptual image hashing

Author keywords

Image authentication; Image hashing; Perceptual robustness; Security

Indexed keywords


EID: 34548069995     PISSN: 10076417     EISSN: None     Source Type: Journal    
DOI: 10.1007/s11741-007-0401-2     Document Type: Article
Times cited : (21)

References (42)
  • 2
    • 84947943261 scopus 로고    scopus 로고
    • Protecting digital media content [J]
    • 7
    • Memon N, Wong P W. Protecting digital media content [J]. Communications of the ACM, 1998, 41(7), 34-43.
    • (1998) Communications of the ACM , vol.41 , pp. 34-43
    • Memon, N.1    Wong, P.W.2
  • 3
    • 0031996445 scopus 로고    scopus 로고
    • Exploring steganography: Seeing the unseen [J]
    • 2
    • Johnson N F, Jajodia S. Exploring steganography: seeing the unseen [J]. IEEE Computer, 1998, 31(2): 26-34.
    • (1998) IEEE Computer , vol.31 , pp. 26-34
    • Johnson, N.F.1    Jajodia, S.2
  • 4
    • 11844252006 scopus 로고    scopus 로고
    • Cyber warfare: Steganography vs. steganalysis [J]
    • 10
    • Wang H, Wang S. Cyber warfare: steganography vs. steganalysis [J]. Communications of the ACM, 2004, 47(10): 76-82.
    • (2004) Communications of the ACM , vol.47 , pp. 76-82
    • Wang, H.1    Wang, S.2
  • 5
    • 84867951498 scopus 로고    scopus 로고
    • Undercover communication using digital media as disguise and countermeasures [J]
    • 1
    • Wang S, Chen C, Zhang X. Undercover communication using digital media as disguise and countermeasures [J]. Journal of Shanghai University (English Edition), 2006, 10(1): 33-43.
    • (2006) Journal of Shanghai University (English Edition) , vol.10 , pp. 33-43
    • Wang, S.1    Chen, C.2    Zhang, X.3
  • 6
    • 0037153490 scopus 로고    scopus 로고
    • Image fragile watermarking based on fusion of multi-resolution tamper detection [J]
    • 24
    • Hu J Q, Huang J W, Huang D R, Shi Y Q. Image fragile watermarking based on fusion of multi-resolution tamper detection [J]. Electronics Letters, 2002, 38(24): 1512-1513.
    • (2002) Electronics Letters , vol.38 , pp. 1512-1513
    • Hu, J.Q.1    Huang, J.W.2    Huang, D.R.3    Shi, Y.Q.4
  • 7
    • 31344433959 scopus 로고    scopus 로고
    • New semifragile image authentication watermarking techniques using random bias and nonuniform quantization [J]
    • 1
    • Maeno K, Sun Q, Chang S F, Suto M. New semifragile image authentication watermarking techniques using random bias and nonuniform quantization [J]. IEEE Transactions on Multimedia, 2006, 8(1): 32-45.
    • (2006) IEEE Transactions on Multimedia , vol.8 , pp. 32-45
    • Maeno, K.1    Sun, Q.2    Chang, S.F.3    Suto, M.4
  • 8
    • 84944325291 scopus 로고    scopus 로고
    • An extendible hash for multi-precision similarity querying of image databases [C]
    • Roma, Italy
    • Lin S, Ozsu M T, Oria V, Ng R. An extendible hash for multi-precision similarity querying of image databases [C]// Proceedings of the 27th VLDB Conference, Roma, Italy. 2001: 221-230.
    • (2001) Proceedings of the 27th VLDB Conference , pp. 221-230
    • Lin, S.1    Ozsu, M.T.2    Oria, V.3    Ng, R.4
  • 9
    • 33750921676 scopus 로고    scopus 로고
    • Robustness and security of a wavelet-based CBIR hashing algorithm [C]
    • Geneva, Switzerland
    • Meixner A, Uhl A. Robustness and security of a wavelet-based CBIR hashing algorithm [C]// Proceedings of the 8th workshop on Multimedia and security, Geneva, Switzerland. 2006: 140-145.
    • (2006) Proceedings of the 8th workshop on Multimedia and security , pp. 140-145
    • Meixner, A.1    Uhl, A.2
  • 17
    • 0037818310 scopus 로고    scopus 로고
    • Structural digital signature for image authentication [J]
    • 2
    • Lu C S, Liao H Y M. Structural digital signature for image authentication [J]. IEEE Transactions on Multimedia, 2003, 5(2): 161-173.
    • (2003) IEEE Transactions on Multimedia , vol.5 , pp. 161-173
    • Lu, C.S.1    Liao, H.Y.M.2
  • 18
    • 33750344108 scopus 로고    scopus 로고
    • Perceptual image hashing via feature points: Performance evaluation and tradeoffs [J]
    • 11
    • Monga V, Evans B L. Perceptual image hashing via feature points: performance evaluation and tradeoffs [J]. IEEE Transactions on Image Processing, 2006, 15(11): 3453-3466.
    • (2006) IEEE Transactions on Image Processing , vol.15 , pp. 3453-3466
    • Monga, V.1    Evans, B.L.2
  • 27
    • 30744471653 scopus 로고    scopus 로고
    • Geometric distortion-resilient image hashing scheme and its applications on copy detection and authentication [J]
    • 2
    • Lu C S, Hsu C Y. Geometric distortion-resilient image hashing scheme and its applications on copy detection and authentication [J]. Multimedia Systems, 2005, 11(2): 159-173.
    • (2005) Multimedia Systems , vol.11 , pp. 159-173
    • Lu, C.S.1    Hsu, C.Y.2
  • 34
    • 34548069805 scopus 로고    scopus 로고
    • Image hashing based on human visual system [J]
    • 11
    • Qin C, Wang S, Zhang X. Image hashing based on human visual system [J]. Journal of Image and Graphics, 2006, 11(11): 1678-1681 (in Chinese).
    • (2006) Journal of Image and Graphics , vol.11 , pp. 1678-1681
    • Qin, C.1    Wang, S.2    Zhang, X.3
  • 36
    • 34547340074 scopus 로고    scopus 로고
    • Image block feature vectors based on a singular-value information metric and color-texture description [J]
    • 3
    • Wang S, Lu X, Su S, Zhang X. Image block feature vectors based on a singular-value information metric and color-texture description [J]. Journal of Shanghai University (English Edition), 2007, 11(3): 205-209.
    • (2007) Journal of Shanghai University (English Edition) , vol.11 , pp. 205-209
    • Wang, S.1    Lu, X.2    Su, S.3    Zhang, X.4
  • 41
    • 34548105790 scopus 로고    scopus 로고
    • Personal rights management-taming camera-phones for individual privacy enforcement [C]
    • Cambridge, UK
    • Deng M, Fritsch L, Kursawe K. Personal rights management-taming camera-phones for individual privacy enforcement [C]// 6th Workshop on Privacy Enhancing Technologies, Cambridge, UK. 2006.
    • (2006) 6th Workshop on Privacy Enhancing Technologies
    • Deng, M.1    Fritsch, L.2    Kursawe, K.3
  • 42
    • 34548103963 scopus 로고    scopus 로고
    • http://www.howtoforge.org/fight_image_spam_with_fuzzyocr_spamassassin_p2.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.