메뉴 건너뛰기




Volumn 19, Issue 4, 2010, Pages 981-994

Perceptual image hashing based on virtual watermark detection

Author keywords

Image hashing; Robustness; Security; Virtual watermark detection

Indexed keywords

EMBEDDED WATERMARKS; FEATURE VECTORS; GEOMETRIC ATTACKS; HASH VALUE; IMAGE HASHING; LINEAR CORRELATION; MUTUAL INFORMATIONS; PSEUDO-RANDOM NOISE; REAL VALUES; STATE OF THE ART; WATERMARK DETECTION; WATERMARK DETECTORS;

EID: 77949696748     PISSN: 10577149     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIP.2009.2038637     Document Type: Article
Times cited : (89)

References (43)
  • 3
    • 84898309971 scopus 로고    scopus 로고
    • Statistical watermark detection in the transform domain for digital images
    • C.-T. Li, Ed. Hershey, PA: IGI Global, ch. VII
    • F. Khelifi, F. Kurugollu, and A. Bouridane, "Statistical watermark detection in the transform domain for digital images," in Multimedia Forens. Sec., C.-T. Li, Ed. Hershey, PA: IGI Global, 2008, ch. VII, pp. 121-139.
    • (2008) Multimedia Forens. Sec. , pp. 121-139
    • Khelifi, F.1    Kurugollu, F.2    Bouridane, A.3
  • 5
    • 0030409375 scopus 로고    scopus 로고
    • A robust content-based digital signature for image authentication
    • Lausanne, Switzerland, Sep.
    • M. Schneider and S. F. Chang, "A robust content-based digital signature for image authentication," in Proc. IEEE Int. Conf. Image Processing, Lausanne, Switzerland, Sep. 1996.
    • (1996) Proc. IEEE Int. Conf. Image Processing
    • Schneider, M.1    Chang, S.F.2
  • 6
    • 0032223822 scopus 로고    scopus 로고
    • A robust image authentication method surviving JPEG lossy compression
    • San Jose, CA, Jan.
    • C. Y. Lin and S. F. Chang, "A robust image authentication method surviving JPEG lossy compression," in Proc. SPIE Storage and Retrieval of Image/Video Database, San Jose, CA, Jan. 1998, vol.3312.
    • (1998) Proc. SPIE Storage and Retrieval of Image/Video Database , vol.3312
    • Lin, C.Y.1    Chang, S.F.2
  • 9
    • 4544313881 scopus 로고    scopus 로고
    • Design and statistical analysis of a hashaided image watermarking system
    • Oct.
    • J. Cannons and P. Moulin, "Design and statistical analysis of a hashaided image watermarking system," IEEE Trans. Image Process., vol.13, no.10, pp. 1393-1408, Oct. 2004.
    • (2004) IEEE Trans. Image Process. , vol.13 , Issue.10 , pp. 1393-1408
    • Cannons, J.1    Moulin, P.2
  • 10
    • 0031247975 scopus 로고    scopus 로고
    • Geometric hashing: An overview
    • Oct.-Dec.
    • H. J. Wolfson and I. Rigoutsos, "Geometric hashing: An overview," IEEE Comput. Sci. Eng., vol.4, pp. 10-21, Oct.-Dec. 1997.
    • (1997) IEEE Comput. Sci. Eng. , vol.4 , pp. 10-21
    • Wolfson, H.J.1    Rigoutsos, I.2
  • 11
    • 0031247490 scopus 로고    scopus 로고
    • Medical image registration using geometric hashing
    • Oct.-Dec.
    • A. P. Gueziec, X. Pennec, and N. Ayache, "Medical image registration using geometric hashing," IEEE Comput. Sci. Eng., vol.4, pp. 29-41, Oct.-Dec. 1997.
    • (1997) IEEE Comput. Sci. Eng. , vol.4 , pp. 29-41
    • Gueziec, A.P.1    Pennec, X.2    Ayache, N.3
  • 12
    • 33645004781 scopus 로고    scopus 로고
    • A clustering based approach to perceptual image hashing
    • Mar.
    • V. Monga, A. Banerjee, and B. L. Evans, "A clustering based approach to perceptual image hashing," IEEE Trans. Inf. Forens. Sec., vol.1, pp. 68-79, Mar. 2006.
    • (2006) IEEE Trans. Inf. Forens. Sec. , vol.1 , pp. 68-79
    • Monga, V.1    Banerjee, A.2    Evans, B.L.3
  • 13
    • 48849093183 scopus 로고    scopus 로고
    • Analysis of the hash function design strategy called SMASH
    • Aug.
    • M. Lamberger, N. Pramstaller, C. Rechberger, and V. Rijmen, "Analysis of the hash function design strategy called SMASH," IEEE Trans. Inf. Theory, vol.54, no.8, pp. 3647-3655, Aug. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.8 , pp. 3647-3655
    • Lamberger, M.1    Pramstaller, N.2    Rechberger, C.3    Rijmen, V.4
  • 16
    • 33747375321 scopus 로고    scopus 로고
    • Image authentication under geometric attacks via structure matching
    • Presented atAmsterdam, The Netherlands, Jul.
    • V. Monga, D. Vats, and B. L. Evans, "Image authentication under geometric attacks via structure matching," presented at the IEEE Int. Conf. Multimedia and Expo., Amsterdam, The Netherlands, Jul. 2005.
    • (2005) The IEEE Int. Conf. Multimedia and Expo.
    • Monga, V.1    Vats, D.2    Evans, B.L.3
  • 17
    • 20444464472 scopus 로고    scopus 로고
    • Robust perceptual image hashing using feature points
    • Presented at, Singapore, Oct.
    • V. Monga, D. Vats, and B. L. Evans, "Robust perceptual image hashing using feature points," presented at the IEEE Int. Conf. Image Processing, Singapore, Oct. 2004.
    • (2004) The IEEE Int. Conf. Image Processing
    • Monga, V.1    Vats, D.2    Evans, B.L.3
  • 18
    • 33750344108 scopus 로고    scopus 로고
    • Perceptual image hashing via feature points: Performance evaluation and tradeoffs
    • Nov.
    • V. Monga and B. L. Evans, "Perceptual image hashing via feature points: Performance evaluation and tradeoffs," IEEE Trans. Image Process., vol.15, no.11, pp. 3453-3466, Nov. 2006.
    • (2006) IEEE Trans. Image Process. , vol.15 , Issue.11 , pp. 3453-3466
    • Monga, V.1    Evans, B.L.2
  • 22
    • 34548085689 scopus 로고    scopus 로고
    • Robust and secure image hashing via non-negative matrix factorizations
    • Sep.
    • V. Monga and M. K. Mihcak, "Robust and secure image hashing via non-negative matrix factorizations," IEEE Trans. Inf. Forens. Sec., vol.2, pp. 376-390, Sep. 2007.
    • (2007) IEEE Trans. Inf. Forens. Sec. , vol.2 , pp. 376-390
    • Monga, V.1    Mihcak, M.K.2
  • 24
    • 0035335388 scopus 로고    scopus 로고
    • Rotation, scale, and translation resilient watermarking for images
    • May
    • C. Y. Lin, M.Wu, J. A. Bloom, I. J. Cox, M. L. Miller, and Y. M. Lui, "Rotation, scale, and translation resilient watermarking for images," IEEE Trans. Image Process., vol.10, no.5, pp. 767-782, May 2001.
    • (2001) IEEE Trans. Image Process. , vol.10 , Issue.5 , pp. 767-782
    • Lin, C.Y.1    Wu, M.2    Bloom, J.A.3    Cox, I.J.4    Miller, M.L.5    Lui, Y.M.6
  • 25
    • 34548104101 scopus 로고    scopus 로고
    • Unicity distance of robust image hashing
    • Sep.
    • Y. Mao and M. Wu, "Unicity distance of robust image hashing," IEEE Trans. Inf. Forens. Sec., vol.2, pp. 462-467, Sep. 2007.
    • (2007) IEEE Trans. Inf. Forens. Sec. , vol.2 , pp. 462-467
    • Mao, Y.1    Wu, M.2
  • 26
    • 85008058265 scopus 로고    scopus 로고
    • Analysis of the security of perceptual image hashing based on non-negative matrix factorization
    • Jan.
    • F. Khelifi and J. Jiang, "Analysis of the security of perceptual image hashing based on non-negative matrix factorization," IEEE Signal Process. Lett., vol.17, no.1, pp. 43-46, Jan. 2010.
    • (2010) IEEE Signal Process. Lett. , vol.17 , Issue.1 , pp. 43-46
    • Khelifi, F.1    Jiang, J.2
  • 29
    • 0035335237 scopus 로고    scopus 로고
    • A new decoder for the optimum recovery of nonadditive watermarks
    • May
    • M. Barni, F. Bartolini, A. De Rosa, and A. Piva, "A new decoder for the optimum recovery of nonadditive watermarks," IEEE Trans. Image Process., vol.10, no.5, pp. 755-766, May 2001.
    • (2001) IEEE Trans. Image Process. , vol.10 , Issue.5 , pp. 755-766
    • Barni, M.1    Bartolini, F.2    De Rosa, A.3    Piva, A.4
  • 30
    • 0037851033 scopus 로고    scopus 로고
    • Robust optimum detection of transform domain multiplicative watermarks
    • Apr.
    • Q. Cheng and T. S. Huang, "Robust optimum detection of transform domain multiplicative watermarks," IEEE Trans. Signal Process., vol.51, no.4, pp. 906-924, Apr. 2003.
    • (2003) IEEE Trans. Signal Process. , vol.51 , Issue.4 , pp. 906-924
    • Cheng, Q.1    Huang, T.S.2
  • 34
    • 77949758244 scopus 로고    scopus 로고
    • [Online]. Available:
    • [Online]. Available: http://decsai.ugr.es/cvg/dbimagenesTest Images 2009
  • 35
    • 0027700869 scopus 로고
    • High confidence visual recognition of persons by a test of statistical independence
    • Nov.
    • J. G. Daugman, "High confidence visual recognition of persons by a test of statistical independence," IEEE Trans. Pattern Anal. Mach. Intell., vol.15, no.11, pp. 1148-1161, Nov. 1993.
    • (1993) IEEE Trans. Pattern Anal. Mach. Intell. , vol.15 , Issue.11 , pp. 1148-1161
    • Daugman, J.G.1
  • 36
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • Oct.
    • C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol.28, pp. 656-715, Oct. 1949.
    • (1949) Bell Syst. Tech. J. , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 38
    • 21844463487 scopus 로고    scopus 로고
    • Watermarking security: Theory and practice
    • Oct.
    • F. Cayre, C. Fontaine, and T. Furon, "Watermarking security: Theory and practice," IEEE Trans. Signal Process., vol.53, no.10, pp. 3976-3987, Oct. 2005.
    • (2005) IEEE Trans. Signal Process , vol.53 , Issue.10 , pp. 3976-3987
    • Cayre, F.1    Fontaine, C.2    Furon, T.3
  • 41
    • 77949708822 scopus 로고    scopus 로고
    • [Online]. Available
    • [Online]. Available: http://users.ece.utexas.edu/bevans/projects/ hashingMatlabCodes2009.
  • 43
    • 0035440147 scopus 로고    scopus 로고
    • An additive approach to transform domain information hiding and optimum detection structure
    • Sep.
    • Q. Cheng and T. S. Huang, "An additive approach to transform domain information hiding and optimum detection structure," IEEE Trans. Multimedia, vol.3, pp. 273-284, Sep. 2001.
    • (2001) IEEE Trans. Multimedia , vol.3 , pp. 273-284
    • Cheng, Q.1    Huang, T.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.