메뉴 건너뛰기




Volumn 15, Issue 3, 2011, Pages 493-504

Image authentication based on perceptual hash using Gabor filters

Author keywords

Gabor filter; Image authentication; Perceptual hash; Reference metrics

Indexed keywords

AUTHENTICATION; GABOR FILTERS; HASH FUNCTIONS;

EID: 79951771642     PISSN: 14327643     EISSN: 14337479     Source Type: Journal    
DOI: 10.1007/s00500-009-0529-7     Document Type: Article
Times cited : (14)

References (30)
  • 3
    • 0018925643 scopus 로고
    • Two dimensional spectral analysis of cortical receptive field profile
    • doi:10.1016/0042-6989(80)90065-6
    • Daugman JG (1980) Two dimensional spectral analysis of cortical receptive field profile. Vis Res 20(10): 847-856. doi: 10. 1016/0042-6989(80)90065-6.
    • (1980) Vis Res , vol.20 , Issue.10 , pp. 847-856
    • Daugman, J.G.1
  • 4
    • 0020045244 scopus 로고
    • Spatial frequency selectivity of cells in macaque visual cortex
    • De Valois RL, Albrecht DG, Thorell LG (1982) Spatial frequency selectivity of cells in macaque visual cortex. Vis Res 20(10): 545-559.
    • (1982) Vis Res , vol.20 , Issue.10 , pp. 545-559
    • de Valois, R.L.1    Albrecht, D.G.2    Thorell, L.G.3
  • 5
    • 0032650557 scopus 로고    scopus 로고
    • Content-based digital signature for motion pictures authentication and content-fragile watermarking
    • (ICMCS'1999), Florence, Italy, doi: 10. 1109/MMCS. 1999. 778274
    • Dittmann J, Steinmetz A, Steinmetz R (1999) Content-based digital signature for motion pictures authentication and content-fragile watermarking. In: Proceedings of the IEEE international conference on multimedia computing and systems (ICMCS'1999), Florence, Italy, vol 2, pp 209-213. doi: 10. 1109/MMCS. 1999. 778274.
    • (1999) Proceedings of the IEEE international conference on multimedia computing and systems , vol.2 , pp. 209-213
    • Dittmann, J.1    Steinmetz, A.2    Steinmetz, R.3
  • 6
    • 70349322108 scopus 로고    scopus 로고
    • ECRYPT Network of Excellence Technical Report, D. WVL. 7, Accessed 12 February 2009
    • ECRYPT Network of Excellence Technical Report (2005) D. WVL. 7: First summary report on forensic tracking. http://www. ecrypt. eu. org/ecrypt1/documents/D. WVL. 7-1. 1. pdf. Accessed 12 February 2009.
    • (2005) First summary report on forensic tracking.
  • 7
    • 67149138623 scopus 로고    scopus 로고
    • ECRYPT Network of Excellence Technical Report, D. WVL. 11, Accessed 12 February 2009
    • ECRYPT Network of Excellence Technical Report (2006) D. WVL. 11: Benchmarking metrics and concepts for perceptual hashing. http://www. ecrypt. eu. org/ecrypt1/documents/D. WVL. 11-1. 0. pdf. Accessed 12 February 2009.
    • (2006) Benchmarking metrics and concepts for perceptual hashing.
  • 9
    • 47749122959 scopus 로고    scopus 로고
    • Content-based image authentication: current status, issues, and challenges
    • (ICSC'2007), Irvine, California, doi: 10. 1109/ICSC. 2007. 100
    • Han SH, Chu CH, Yang SY (2007) Content-based image authentication: current status, issues, and challenges. In: Proceedings of the IEEE international conference on semantic computing (ICSC'2007), Irvine, California, pp 630-636. doi: 10. 1109/ICSC. 2007. 100.
    • (2007) Proceedings of the IEEE international conference on semantic computing , pp. 630-636
    • Han, S.H.1    Chu, C.H.2    Yang, S.Y.3
  • 10
    • 44949125398 scopus 로고    scopus 로고
    • Methods for image authentication: a survey
    • doi:10.1007/s11042-007-0154-3
    • Haouzia A, Noumeir R (2008) Methods for image authentication: a survey. Multimed Tools Appl 39(1): 1-46. doi: 10. 1007/s11042-007-0154-3.
    • (2008) Multimed Tools Appl , vol.39 , Issue.1 , pp. 1-46
    • Haouzia, A.1    Noumeir, R.2
  • 11
    • 0023583669 scopus 로고
    • An evaluation of the two-dimensional Gabor filter model of simple receptive fields in cat striate cortex
    • Jones JP, Palmer L (1987) An evaluation of the two-dimensional Gabor filter model of simple receptive fields in cat striate cortex. J Neurophysiol 58(6): 1233-1258.
    • (1987) J Neurophysiol , vol.58 , Issue.6 , pp. 1233-1258
    • Jones, J.P.1    Palmer, L.2
  • 12
    • 0037372152 scopus 로고    scopus 로고
    • Content-based image copy detection
    • doi:0.1016/S0923-5965(02)00130-3
    • Kim C (2003) Content-based image copy detection. Signal Process Image Commun 18(3): 169-184. doi: 0. 1016/S0923-5965(02)00130-3.
    • (2003) Signal Process Image Commun , vol.18 , Issue.3 , pp. 169-184
    • Kim, C.1
  • 14
    • 79951772068 scopus 로고    scopus 로고
    • Multimedia content authentication based on neural networks
    • Columbus F (ed), Nova Science Publishers, Inc
    • Lian SG (2008) Multimedia content authentication based on neural networks. In: Columbus F (ed) Neurocomputing research trends. Nova Science Publishers, Inc., pp 223-238.
    • (2008) Neurocomputing research trends. , pp. 223-238
    • Lian, S.G.1
  • 15
    • 57249084077 scopus 로고    scopus 로고
    • Image authentication based on fractal features
    • doi:10.1142/S0218348X08004034
    • Lian SG (2008) Image authentication based on fractal features. Fractals 16(4): 287-297. doi: 10. 1142/S0218348X08004034.
    • (2008) Fractals , vol.16 , Issue.4 , pp. 287-297
    • Lian, S.G.1
  • 16
    • 33748433928 scopus 로고    scopus 로고
    • Secure hash function based on neural network
    • doi:10.1016/j.neucom.2006.04.00
    • Lian SG, Sun JS, Wang ZQ (2006) Secure hash function based on neural network. Int J Neurocomput 69(16-18): 2346-2350. doi: 10. 1016/j. neucom. 2006. 04. 00.
    • (2006) Int J Neurocomput , vol.69 , Issue.16-18 , pp. 2346-2350
    • Lian, S.G.1    Sun, J.S.2    Wang, Z.Q.3
  • 17
    • 64249107623 scopus 로고    scopus 로고
    • Recent advances in multimedia information system security
    • Lian SG, Kanellopoulos D, Ruffo G (2009) Recent advances in multimedia information system security. Inform 33(1): 3-24.
    • (2009) Inform , vol.33 , Issue.1 , pp. 3-24
    • Lian, S.G.1    Kanellopoulos, D.2    Ruffo, G.3
  • 18
    • 0032223822 scopus 로고    scopus 로고
    • Robust image authentication method surviving JPEG lossy compression
    • San Jose, CA, USA, doi: 10. 1117/12. 298462
    • Lin CY, Chang SF (1998) Robust image authentication method surviving JPEG lossy compression. In: Proceedings of SPIE, storage and retrieval of image/video database, San Jose, CA, USA, vol 3312, pp 296-307. doi: 10. 1117/12. 298462.
    • (1998) Proceedings of SPIE, storage and retrieval of image/video database , vol.3312 , pp. 296-307
    • Lin, C.Y.1    Chang, S.F.2
  • 19
    • 0037818310 scopus 로고    scopus 로고
    • Structural digital signature for image authentication
    • doi:10.1145/357744.357893
    • Lu CS, Liao HYM (2003) Structural digital signature for image authentication. IEEE Trans Multimedia 5(2): 161-173. doi: 10. 1145/357744. 357893.
    • (2003) IEEE Trans Multimedia , vol.5 , Issue.2 , pp. 161-173
    • Lu, C.S.1    Liao, H.Y.M.2
  • 21
    • 33750344108 scopus 로고    scopus 로고
    • Perceptual image hashing via feature points: performance evaluation and trade-offs
    • doi: 10. 1109/TIP. 2006. 881948
    • Monga V, Evans RL (2006) Perceptual image hashing via feature points: performance evaluation and trade-offs. IEEE Trans Image Process 15(11): 3453-3466. doi: 10. 1109/TIP. 2006. 881948.
    • (2006) IEEE Trans Image Process , vol.15 , Issue.11 , pp. 3453-3466
    • Monga, V.1    Evans, R.L.2
  • 22
    • 85007375266 scopus 로고    scopus 로고
    • Towards robust content based techniques for image authentication
    • Redondo Beach, CA, USA, doi: 10. 1109/MMSP. 1998. 738950
    • Queluz MP (1998) Towards robust content based techniques for image authentication. In: the second IEEE workshop on multimedia signal processing (MSP'1998), Redondo Beach, CA, USA, pp 297-302. doi: 10. 1109/MMSP. 1998. 738950.
    • (1998) The second IEEE workshop on multimedia signal processing (MSP'1998) , pp. 297-302
    • Queluz, M.P.1
  • 23
    • 0030409375 scopus 로고    scopus 로고
    • A robust content based digital signature for image authentication
    • Laussane, Switzerland, doi: 10. 1109/ICIP. 1996. 560425
    • Scheneider M, Chang SF (1996) A robust content based digital signature for image authentication. In: Proceeding of the IEEE international conference on image processing, Laussane, Switzerland, vol 3, pp 227-230. doi: 10. 1109/ICIP. 1996. 560425.
    • (1996) Proceeding of the IEEE international conference on image processing , vol.3 , pp. 227-230
    • Scheneider, M.1    Chang, S.F.2
  • 24
    • 33744764278 scopus 로고    scopus 로고
    • Robust and secure image hashing
    • doi:10.1109/TIFS.2006.873601
    • Swaminathan A, Mao YN, Wu M (2006) Robust and secure image hashing. IEEE Trans Inf Forensics Secur 1(2): 215-230. doi: 10. 1109/TIFS. 2006. 873601.
    • (2006) IEEE Trans Inf Forensics Secur , vol.1 , Issue.2 , pp. 215-230
    • Swaminathan, A.1    Mao, Y.N.2    Wu, M.3
  • 26
    • 34548069995 scopus 로고    scopus 로고
    • Recent development of perceptual image hashing
    • doi:10.1007/s11741-007-0401-2
    • Wang SZ, Zhang XP (2007) Recent development of perceptual image hashing. J Shanghai University 11(4): 323-331. doi: 10. 1007/s11741-007-0401-2.
    • (2007) J Shanghai University , vol.11 , Issue.4 , pp. 323-331
    • Wang, S.Z.1    Zhang, X.P.2
  • 27
    • 65349129287 scopus 로고    scopus 로고
    • Secure multimedia watermarking authentication in wavelet domain
    • doi: 10. 1117/1. 2954129
    • Wang JW, Lian SG, Liu GJ, Dai YW (2008) Secure multimedia watermarking authentication in wavelet domain. SPIE J Electron Imaging 17(03): 033010. doi: 10. 1117/1. 2954129.
    • (2008) SPIE J Electron Imaging , vol.17 , Issue.3 , pp. 033010
    • Wang, J.W.1    Lian, S.G.2    Liu, G.J.3    Dai, Y.W.4
  • 28
    • 65349114922 scopus 로고    scopus 로고
    • On the design of secure multimedia authentication
    • Wang JW, Lian SG, Liu GJ (2009) On the design of secure multimedia authentication. J Univers Comput Sci 15(2): 426-443.
    • (2009) J Univers Comput Sci , vol.15 , Issue.2 , pp. 426-443
    • Wang, J.W.1    Lian, S.G.2    Liu, G.J.3
  • 29
    • 34248561901 scopus 로고    scopus 로고
    • Novel image copy detection with rotating tolerance
    • doi:10.1016/j.jss.2006.12.001
    • Wu MN, Lin CC, Chang CC (2007) Novel image copy detection with rotating tolerance. J Syst Softw 80(7): 1057-1069. doi: 10. 1016/j. jss. 2006. 12. 001.
    • (2007) J Syst Softw , vol.80 , Issue.7 , pp. 1057-1069
    • Wu, M.N.1    Lin, C.C.2    Chang, C.C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.