메뉴 건너뛰기




Volumn 2, Issue , 2008, Pages 119-122

Robust image hashing for image authentication based on DCT-DWT composite domain

Author keywords

[No Author keywords available]

Indexed keywords

BINARY QUANTIZATION; BIT-STRING; DWT COEFFICIENTS; IMAGE AUTHENTICATION; IMAGE HASH; IMAGE HASHING; MALICIOUS ATTACK;

EID: 67449123343     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISDA.2008.66     Document Type: Conference Paper
Times cited : (6)

References (7)
  • 1
    • 33750344108 scopus 로고    scopus 로고
    • Perceptual image hashing via feature points: Performance evaluation and tradeoffs
    • November
    • V.Monga and B.L.Evans, "Perceptual image hashing via feature points: performance evaluation and tradeoffs", IEEE Trans. Image processing, VOL.15, NO.11, November 2006, pp.3453-3465.
    • (2006) IEEE Trans. Image processing , vol.15 , Issue.11 , pp. 3453-3465
    • Monga, V.1    Evans, B.L.2
  • 2
    • 33645004781 scopus 로고    scopus 로고
    • A Clustering Based Approach to Perceptual Image Hashing
    • Information forensics and security, March
    • V.Monga and B.L.Evans, "A Clustering Based Approach to Perceptual Image Hashing", IEEE Trans. Information forensics and security, VOL.1, NO.1, March 2006, pp.68-79.
    • (2006) IEEE Trans , vol.1 , Issue.1 , pp. 68-79
    • Monga, V.1    Evans, B.L.2
  • 3
    • 0030409375 scopus 로고    scopus 로고
    • A robust content based digital signature for image authentication
    • Sep
    • M.Schneider and S.F.chang, "A robust content based digital signature for image authentication", in Proc. of IEEE Conference of Image Processing, VOL.3, Sep. 1996, pp.227-230.
    • (1996) Proc. of IEEE Conference of Image Processing , vol.3 , pp. 227-230
    • Schneider, M.1    chang, S.F.2
  • 5
    • 0037818310 scopus 로고    scopus 로고
    • Structural digital signature for image authentication: An incidental distortion resistant scheme
    • Jun
    • C.Lu, H.Yuan M.Liao, "Structural digital signature for image authentication: an incidental distortion resistant scheme", IEEE Trans.Multimedia, VOL.5, NO.2, Jun.2003, pp.161-173.
    • (2003) IEEE Trans.Multimedia , vol.5 , Issue.2 , pp. 161-173
    • Lu, C.1    Yuan, H.2    Liao, M.3
  • 6
    • 0035248504 scopus 로고    scopus 로고
    • A robust image authentication method distinguishing JPEG compression from malicious manipulation
    • Feb
    • C.Y. Lin and S.F. Chang, "A robust image authentication method distinguishing JPEG compression from malicious manipulation", IEEE Trans.on Circuits and Systems for Video Technology, VOL.11, NO.2, Feb.2001, pp.153-168.
    • (2001) IEEE Trans.on Circuits and Systems for Video Technology , vol.11 , Issue.2 , pp. 153-168
    • Lin, C.Y.1    Chang, S.F.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.