-
1
-
-
0033342928
-
End-stopped wavelets for detection low-level features
-
Denver, Colorado, doi: 10. 1109/TIP. 2006. 881948
-
Bhattacharjee S, Vandergheynst P (1999) End-stopped wavelets for detection low-level features. In: Proceedings of SPIE, wavelet applications in signal and image processing, Denver, Colorado, vol 3813, pp 732-741. doi: 10. 1109/TIP. 2006. 881948.
-
(1999)
Proceedings of SPIE, wavelet applications in signal and image processing
, vol.3813
, pp. 732-741
-
-
Bhattacharjee, S.1
Vandergheynst, P.2
-
2
-
-
84942244978
-
A review of algorithms for audio fingerprinting
-
(MSP'2002), St. Thomas, Virgin Islands, USA
-
Cano P, Baltle E, Kalker T, Haitsma J (2002) A review of algorithms for audio fingerprinting. In: The IEEE workshop on multimedia signal processing (MSP'2002), St. Thomas, Virgin Islands, USA, pp 169-173.
-
(2002)
The IEEE workshop on multimedia signal processing
, pp. 169-173
-
-
Cano, P.1
Baltle, E.2
Kalker, T.3
Haitsma, J.4
-
3
-
-
0018925643
-
Two dimensional spectral analysis of cortical receptive field profile
-
doi:10.1016/0042-6989(80)90065-6
-
Daugman JG (1980) Two dimensional spectral analysis of cortical receptive field profile. Vis Res 20(10): 847-856. doi: 10. 1016/0042-6989(80)90065-6.
-
(1980)
Vis Res
, vol.20
, Issue.10
, pp. 847-856
-
-
Daugman, J.G.1
-
4
-
-
0020045244
-
Spatial frequency selectivity of cells in macaque visual cortex
-
De Valois RL, Albrecht DG, Thorell LG (1982) Spatial frequency selectivity of cells in macaque visual cortex. Vis Res 20(10): 545-559.
-
(1982)
Vis Res
, vol.20
, Issue.10
, pp. 545-559
-
-
de Valois, R.L.1
Albrecht, D.G.2
Thorell, L.G.3
-
5
-
-
0032650557
-
Content-based digital signature for motion pictures authentication and content-fragile watermarking
-
(ICMCS'1999), Florence, Italy, doi: 10. 1109/MMCS. 1999. 778274
-
Dittmann J, Steinmetz A, Steinmetz R (1999) Content-based digital signature for motion pictures authentication and content-fragile watermarking. In: Proceedings of the IEEE international conference on multimedia computing and systems (ICMCS'1999), Florence, Italy, vol 2, pp 209-213. doi: 10. 1109/MMCS. 1999. 778274.
-
(1999)
Proceedings of the IEEE international conference on multimedia computing and systems
, vol.2
, pp. 209-213
-
-
Dittmann, J.1
Steinmetz, A.2
Steinmetz, R.3
-
6
-
-
70349322108
-
-
ECRYPT Network of Excellence Technical Report, D. WVL. 7, Accessed 12 February 2009
-
ECRYPT Network of Excellence Technical Report (2005) D. WVL. 7: First summary report on forensic tracking. http://www. ecrypt. eu. org/ecrypt1/documents/D. WVL. 7-1. 1. pdf. Accessed 12 February 2009.
-
(2005)
First summary report on forensic tracking.
-
-
-
7
-
-
67149138623
-
-
ECRYPT Network of Excellence Technical Report, D. WVL. 11, Accessed 12 February 2009
-
ECRYPT Network of Excellence Technical Report (2006) D. WVL. 11: Benchmarking metrics and concepts for perceptual hashing. http://www. ecrypt. eu. org/ecrypt1/documents/D. WVL. 11-1. 0. pdf. Accessed 12 February 2009.
-
(2006)
Benchmarking metrics and concepts for perceptual hashing.
-
-
-
8
-
-
84962762130
-
Robust hash function for digital watermarking
-
(ITCC'2000), Las Vegas, Nevada, doi: 10. 1109/ITCC. 2000. 844203
-
Fridrich J, Gojan M, Du R (2000) Robust hash function for digital watermarking. In: Proceeding of the IEEE international conference on information technology: coding and computing (ITCC'2000), Las Vegas, Nevada, pp 178-183. doi: 10. 1109/ITCC. 2000. 844203.
-
(2000)
Proceeding of the IEEE international conference on information technology: Coding and computing
, pp. 178-183
-
-
Fridrich, J.1
Gojan, M.2
Du, R.3
-
9
-
-
47749122959
-
Content-based image authentication: current status, issues, and challenges
-
(ICSC'2007), Irvine, California, doi: 10. 1109/ICSC. 2007. 100
-
Han SH, Chu CH, Yang SY (2007) Content-based image authentication: current status, issues, and challenges. In: Proceedings of the IEEE international conference on semantic computing (ICSC'2007), Irvine, California, pp 630-636. doi: 10. 1109/ICSC. 2007. 100.
-
(2007)
Proceedings of the IEEE international conference on semantic computing
, pp. 630-636
-
-
Han, S.H.1
Chu, C.H.2
Yang, S.Y.3
-
10
-
-
44949125398
-
Methods for image authentication: a survey
-
doi:10.1007/s11042-007-0154-3
-
Haouzia A, Noumeir R (2008) Methods for image authentication: a survey. Multimed Tools Appl 39(1): 1-46. doi: 10. 1007/s11042-007-0154-3.
-
(2008)
Multimed Tools Appl
, vol.39
, Issue.1
, pp. 1-46
-
-
Haouzia, A.1
Noumeir, R.2
-
11
-
-
0023583669
-
An evaluation of the two-dimensional Gabor filter model of simple receptive fields in cat striate cortex
-
Jones JP, Palmer L (1987) An evaluation of the two-dimensional Gabor filter model of simple receptive fields in cat striate cortex. J Neurophysiol 58(6): 1233-1258.
-
(1987)
J Neurophysiol
, vol.58
, Issue.6
, pp. 1233-1258
-
-
Jones, J.P.1
Palmer, L.2
-
12
-
-
0037372152
-
Content-based image copy detection
-
doi:0.1016/S0923-5965(02)00130-3
-
Kim C (2003) Content-based image copy detection. Signal Process Image Commun 18(3): 169-184. doi: 0. 1016/S0923-5965(02)00130-3.
-
(2003)
Signal Process Image Commun
, vol.18
, Issue.3
, pp. 169-184
-
-
Kim, C.1
-
14
-
-
79951772068
-
Multimedia content authentication based on neural networks
-
Columbus F (ed), Nova Science Publishers, Inc
-
Lian SG (2008) Multimedia content authentication based on neural networks. In: Columbus F (ed) Neurocomputing research trends. Nova Science Publishers, Inc., pp 223-238.
-
(2008)
Neurocomputing research trends.
, pp. 223-238
-
-
Lian, S.G.1
-
15
-
-
57249084077
-
Image authentication based on fractal features
-
doi:10.1142/S0218348X08004034
-
Lian SG (2008) Image authentication based on fractal features. Fractals 16(4): 287-297. doi: 10. 1142/S0218348X08004034.
-
(2008)
Fractals
, vol.16
, Issue.4
, pp. 287-297
-
-
Lian, S.G.1
-
16
-
-
33748433928
-
Secure hash function based on neural network
-
doi:10.1016/j.neucom.2006.04.00
-
Lian SG, Sun JS, Wang ZQ (2006) Secure hash function based on neural network. Int J Neurocomput 69(16-18): 2346-2350. doi: 10. 1016/j. neucom. 2006. 04. 00.
-
(2006)
Int J Neurocomput
, vol.69
, Issue.16-18
, pp. 2346-2350
-
-
Lian, S.G.1
Sun, J.S.2
Wang, Z.Q.3
-
17
-
-
64249107623
-
Recent advances in multimedia information system security
-
Lian SG, Kanellopoulos D, Ruffo G (2009) Recent advances in multimedia information system security. Inform 33(1): 3-24.
-
(2009)
Inform
, vol.33
, Issue.1
, pp. 3-24
-
-
Lian, S.G.1
Kanellopoulos, D.2
Ruffo, G.3
-
18
-
-
0032223822
-
Robust image authentication method surviving JPEG lossy compression
-
San Jose, CA, USA, doi: 10. 1117/12. 298462
-
Lin CY, Chang SF (1998) Robust image authentication method surviving JPEG lossy compression. In: Proceedings of SPIE, storage and retrieval of image/video database, San Jose, CA, USA, vol 3312, pp 296-307. doi: 10. 1117/12. 298462.
-
(1998)
Proceedings of SPIE, storage and retrieval of image/video database
, vol.3312
, pp. 296-307
-
-
Lin, C.Y.1
Chang, S.F.2
-
19
-
-
0037818310
-
Structural digital signature for image authentication
-
doi:10.1145/357744.357893
-
Lu CS, Liao HYM (2003) Structural digital signature for image authentication. IEEE Trans Multimedia 5(2): 161-173. doi: 10. 1145/357744. 357893.
-
(2003)
IEEE Trans Multimedia
, vol.5
, Issue.2
, pp. 161-173
-
-
Lu, C.S.1
Liao, H.Y.M.2
-
21
-
-
33750344108
-
Perceptual image hashing via feature points: performance evaluation and trade-offs
-
doi: 10. 1109/TIP. 2006. 881948
-
Monga V, Evans RL (2006) Perceptual image hashing via feature points: performance evaluation and trade-offs. IEEE Trans Image Process 15(11): 3453-3466. doi: 10. 1109/TIP. 2006. 881948.
-
(2006)
IEEE Trans Image Process
, vol.15
, Issue.11
, pp. 3453-3466
-
-
Monga, V.1
Evans, R.L.2
-
22
-
-
85007375266
-
Towards robust content based techniques for image authentication
-
Redondo Beach, CA, USA, doi: 10. 1109/MMSP. 1998. 738950
-
Queluz MP (1998) Towards robust content based techniques for image authentication. In: the second IEEE workshop on multimedia signal processing (MSP'1998), Redondo Beach, CA, USA, pp 297-302. doi: 10. 1109/MMSP. 1998. 738950.
-
(1998)
The second IEEE workshop on multimedia signal processing (MSP'1998)
, pp. 297-302
-
-
Queluz, M.P.1
-
23
-
-
0030409375
-
A robust content based digital signature for image authentication
-
Laussane, Switzerland, doi: 10. 1109/ICIP. 1996. 560425
-
Scheneider M, Chang SF (1996) A robust content based digital signature for image authentication. In: Proceeding of the IEEE international conference on image processing, Laussane, Switzerland, vol 3, pp 227-230. doi: 10. 1109/ICIP. 1996. 560425.
-
(1996)
Proceeding of the IEEE international conference on image processing
, vol.3
, pp. 227-230
-
-
Scheneider, M.1
Chang, S.F.2
-
24
-
-
33744764278
-
Robust and secure image hashing
-
doi:10.1109/TIFS.2006.873601
-
Swaminathan A, Mao YN, Wu M (2006) Robust and secure image hashing. IEEE Trans Inf Forensics Secur 1(2): 215-230. doi: 10. 1109/TIFS. 2006. 873601.
-
(2006)
IEEE Trans Inf Forensics Secur
, vol.1
, Issue.2
, pp. 215-230
-
-
Swaminathan, A.1
Mao, Y.N.2
Wu, M.3
-
25
-
-
0034444578
-
Robust image hashing
-
Vancouver, BC, Canada, doi: 10. 1109/ICIP. 2000. 899541
-
Venkatesan R, Koon SM, Jakubowski MH, Moulin P (2000) Robust image hashing. In: Processing of the IEEE international conference on image processing (ICIP'2000), Vancouver, BC, Canada, vol 3, pp 664-666. doi: 10. 1109/ICIP. 2000. 899541.
-
(2000)
Processing of the IEEE international conference on image processing (ICIP'2000)
, vol.3
, pp. 664-666
-
-
Venkatesan, R.1
Koon, S.M.2
Jakubowski, M.H.3
Moulin, P.4
-
26
-
-
34548069995
-
Recent development of perceptual image hashing
-
doi:10.1007/s11741-007-0401-2
-
Wang SZ, Zhang XP (2007) Recent development of perceptual image hashing. J Shanghai University 11(4): 323-331. doi: 10. 1007/s11741-007-0401-2.
-
(2007)
J Shanghai University
, vol.11
, Issue.4
, pp. 323-331
-
-
Wang, S.Z.1
Zhang, X.P.2
-
27
-
-
65349129287
-
Secure multimedia watermarking authentication in wavelet domain
-
doi: 10. 1117/1. 2954129
-
Wang JW, Lian SG, Liu GJ, Dai YW (2008) Secure multimedia watermarking authentication in wavelet domain. SPIE J Electron Imaging 17(03): 033010. doi: 10. 1117/1. 2954129.
-
(2008)
SPIE J Electron Imaging
, vol.17
, Issue.3
, pp. 033010
-
-
Wang, J.W.1
Lian, S.G.2
Liu, G.J.3
Dai, Y.W.4
-
28
-
-
65349114922
-
On the design of secure multimedia authentication
-
Wang JW, Lian SG, Liu GJ (2009) On the design of secure multimedia authentication. J Univers Comput Sci 15(2): 426-443.
-
(2009)
J Univers Comput Sci
, vol.15
, Issue.2
, pp. 426-443
-
-
Wang, J.W.1
Lian, S.G.2
Liu, G.J.3
-
29
-
-
34248561901
-
Novel image copy detection with rotating tolerance
-
doi:10.1016/j.jss.2006.12.001
-
Wu MN, Lin CC, Chang CC (2007) Novel image copy detection with rotating tolerance. J Syst Softw 80(7): 1057-1069. doi: 10. 1016/j. jss. 2006. 12. 001.
-
(2007)
J Syst Softw
, vol.80
, Issue.7
, pp. 1057-1069
-
-
Wu, M.N.1
Lin, C.C.2
Chang, C.C.3
-
30
-
-
40349114782
-
Block mean value based image perceptual hashing
-
Pasadena, California, doi: 10. 1109/IIH-MSP. 2006. 265125
-
Yang B, Gu F, Niu XM (2006) Block mean value based image perceptual hashing. In: Proceeding of the IEEE international conference on intelligent information hiding and multimedia signal processing (IIH-MSP'2006), Pasadena, California, pp 167-170. doi: 10. 1109/IIH-MSP. 2006. 265125.
-
(2006)
Proceeding of the IEEE international conference on intelligent information hiding and multimedia signal processing (IIH-MSP'2006)
, pp. 167-170
-
-
Yang, B.1
Gu, F.2
Niu, X.M.3
|