-
1
-
-
57849140746
-
Fragile watermarking with error-free restoration capability
-
Zhang X., and Wang S.: Fragile watermarking with error-free restoration capability, IEEE Transactions on Multimedia, 2008, 10, (8), pp. 1490-1499.
-
(2008)
IEEE Transactions on Multimedia
, vol.10
, Issue.8
, pp. 1490-1499
-
-
Zhang, X.1
Wang, S.2
-
2
-
-
0034444578
-
Robust image hashing
-
Vancouver, BC, Canada, September
-
Venkatesan R., Koon S.-M., Jakubowski M. H., and Moulin P.: Robust image hashing, Proc. of IEEE International Conference on Image Processing, Vancouver, BC, Canada, September 2000, pp. 664-666.
-
(2000)
Proc. of IEEE International Conference on Image Processing
, pp. 664-666
-
-
Venkatesan, R.1
Koon, S.-M.2
Jakubowski, M.H.3
Moulin, P.4
-
3
-
-
8844285948
-
Analysis of a wavelet-based robust hash algorithm
-
San Jose, CA, January
-
Meixner A., and Uhl A.: Analysis of a wavelet-based robust hash algorithm, Proc. SPIE-IS&T - Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, CA, January 2004, pp. 772-783.
-
(2004)
Proc. SPIE-IS&T - Security, Steganography, and Watermarking of Multimedia Contents VI
, pp. 772-783
-
-
Meixner, A.1
Uhl, A.2
-
4
-
-
84962762130
-
Robust hash functions for digital watermarking
-
Las Vergas, USA, March
-
Fridrich J., and Goljan M.: Robust hash functions for digital watermarking, Proc. of IEEE International Conference on Information Technology: Coding and Computing, Las Vergas, USA, March 2000, pp. 178-183.
-
(2000)
Proc. of IEEE International Conference on Information Technology: Coding and Computing
, pp. 178-183
-
-
Fridrich, J.1
Goljan, M.2
-
5
-
-
0035248504
-
A robust image authentication system distinguishing JPEG compression from malicious manipulation
-
Lin C. Y., and Chang S. F.: A robust image authentication system distinguishing JPEG compression from malicious manipulation, IEEE Transactions on Circuits System and Video Technology, 2001, 11, (2), pp. 153-168.
-
(2001)
IEEE Transactions on Circuits System and Video Technology
, vol.11
, Issue.2
, pp. 153-168
-
-
Lin, C.Y.1
Chang, S.F.2
-
6
-
-
84960919414
-
RASH: Radon soft hash algorithm
-
Toulouse, France, September
-
Lefebvre F., Macq B., and Legat J.-D.: RASH: Radon soft hash algorithm, Proc. of European Signal Processing Conference, Toulouse, France, September 2002, pp. 299-302.
-
(2002)
Proc. of European Signal Processing Conference
, pp. 299-302
-
-
Lefebvre, F.1
Macq, B.2
Legat, J.-D.3
-
8
-
-
20444500587
-
Robust perceptual image hashing via matrix invariants
-
2004 International Conference on Image Processing, ICIP 2004
-
Kozat S. S., Mihcak K., and Venkatesan R.: Robust perceptual image hashing via matrix invariants, Proc. of IEEE International Conference on Image Processing, Singapore, October 2004, pp. 3443-3446. (Pubitemid 40820815)
-
(2004)
Proceedings - International Conference on Image Processing, ICIP
, vol.2
, pp. 3443-3446
-
-
Kozat, S.S.1
Venkatesan, R.2
Mihcak, M.K.3
-
9
-
-
27844535360
-
Robust video hashing based on radial projections of key frames
-
Roover C. D., Vleeschouwer C. D., Lefebvre F., and Macq B.: Robust video hashing based on radial projections of key frames, IEEE Transactions on Signal Processing, 2005, 53, (10), pp. 4020-4036.
-
(2005)
IEEE Transactions on Signal Processing
, vol.53
, Issue.10
, pp. 4020-4036
-
-
Roover, C.D.1
Vleeschouwer, C.D.2
Lefebvre, F.3
Macq, B.4
-
10
-
-
33744764278
-
Robust and secure image hashing
-
DOI 10.1109/TIFS.2006.873601
-
Swaminathan A., Mao Y., and Wu M.: Robust and secure image hashing, IEEE Transactions on Information Forensics and Security, 2006, 1, (2), pp. 215-230. (Pubitemid 43824632)
-
(2006)
IEEE Transactions on Information Forensics and Security
, vol.1
, Issue.2
, pp. 215-230
-
-
Swaminathan, A.1
Mao, Y.2
Wu, M.3
-
11
-
-
79951591319
-
Attacks on perceptual image hashing
-
Bali, Indonesia, Dec
-
Wang S., and Zhang X.: Attacks on perceptual image hashing, Proc. of the 2nd International Conference on Ubiquitous Information Technologies and Applications, Bali, Indonesia, Dec. 2007, pp. 199-203.
-
(2007)
Proc. of the 2nd International Conference on Ubiquitous Information Technologies and Applications
, pp. 199-203
-
-
Wang, S.1
Zhang, X.2
-
12
-
-
34548104101
-
Unicity distance of robust image hashing
-
DOI 10.1109/TIFS.2007.902260
-
Mao Y. and Wu M.: Unicity distance of robust image hashing, IEEE Transactions on Information Forensics and Security, 2007, 2, (3), pp. 462-467. (Pubitemid 47290580)
-
(2007)
IEEE Transactions on Information Forensics and Security
, vol.2
, Issue.3
, pp. 462-467
-
-
Mao, Y.1
Wu, M.2
-
13
-
-
69949141557
-
On the security of non-forgeable robust hash functions
-
San Diego, California, USA, October
-
Li Q., and Roy S.: On the security of non-forgeable robust hash functions, Proc. of IEEE International Conference on Image Processing, San Diego, California, USA, October 2008, pp. 3124-3127.
-
(2008)
Proc. of IEEE International Conference on Image Processing
, pp. 3124-3127
-
-
Li, Q.1
Roy, S.2
-
14
-
-
34548085689
-
Robust and secure image hashing via non-negative matrix factorizations
-
DOI 10.1109/TIFS.2007.902670
-
Monga V., and Mihcak M. K.: Robust and secure image hashing via non-negative matrix factorizations, IEEE Transactions on Information Forensics and Security, 2007, 2, (3), pp. 376-390. (Pubitemid 47290573)
-
(2007)
IEEE Transactions on Information Forensics and Security
, vol.2
, Issue.3
, pp. 376-390
-
-
Monga, V.1
Mihcak, M.K.2
-
15
-
-
1942436689
-
Image quality assessment: From error visibility to structural similarity
-
Wang Z., Bovik A. C., Sheikh H. R., and Simoncelli E. P.: Image quality assessment: from error visibility to structural similarity, IEEE Transactions on Image Processing, 2004, 13, (4), pp. 600-612.
-
(2004)
IEEE Transactions on Image Processing
, vol.13
, Issue.4
, pp. 600-612
-
-
Wang, Z.1
Bovik, A.C.2
Sheikh, H.R.3
Simoncelli, E.P.4
-
16
-
-
72849135395
-
Perceptual similarity metric resilient to rotation for application in robust image hashing
-
Qingdao, China, June 4-6
-
Tang Z., Wang S., Zhang X., and Wei W.: Perceptual similarity metric resilient to rotation for application in robust image hashing, Proc. of the 3rd International Conference on Multimedia and Ubiquitous Engineering, Qingdao, China, June 4-6, 2009, pp. 183-188.
-
(2009)
Proc. of the 3rd International Conference on Multimedia and Ubiquitous Engineering
, pp. 183-188
-
-
Tang, Z.1
Wang, S.2
Zhang, X.3
Wei, W.4
-
18
-
-
84871204650
-
-
online. Available:, accessed May 2008
-
Ground Truth Database.[online]. Available: http://www.cs.washington.edu/ research/imagedatabase/groundtruth/, accessed May 2008.
-
Ground Truth Database
-
-
-
19
-
-
0004143760
-
-
New York, USA, Springer, 2005, 3rd Ed
-
Lehmann E. L., and Romano J. P.: Testing Statistical Hypotheses. (New York, USA, Springer, 2005, 3rd Ed), pp. 590-599.
-
Testing Statistical Hypotheses
, pp. 590-599
-
-
Lehmann, E.L.1
Romano, J.P.2
|