-
2
-
-
0034444578
-
-
In Proc. IEEE Conf. Image Process
-
Venkatesan R., S. M. Koon, M. H. Jakubowski, P. Moulin, "Robust image hashing", In Proc. IEEE Conf. Image Process., pp.664-666, 2000.
-
(2000)
Robust Image Hashing
, pp. 664-666
-
-
Venkatesan, R.1
Koon, S.M.2
Jakubowski, M.H.3
Moulin, P.4
-
3
-
-
0035248504
-
A robust image authentication method distinguishing JPEG compression from malicious manipulation
-
Lin C. Y., S. F. Chang, "A robust image authentication method distinguishing JPEG compression from malicious manipulation", IEEE Trans. Circuits Syst. Video Technol., vol.11, no.2, pp.153-168, 2001.
-
(2001)
IEEE Trans. Circuits Syst. Video Technol.
, vol.11
, Issue.2
, pp. 153-168
-
-
Lin, C.Y.1
Chang, S.F.2
-
4
-
-
0037818310
-
Structural digital signature for image authentication
-
Lu C. -S., H.-Y. M. Liao, "Structural digital signature for image authentication", IEEE Trans. Multimedia, vol.5, no.3, pp.161-173, 2003.
-
(2003)
IEEE Trans. Multimedia
, vol.5
, Issue.3
, pp. 161-173
-
-
Lu C., -S.1
Liao H.-Y., M.2
-
7
-
-
20444500587
-
-
In Proc. IEEE Conf. Image Process
-
Kozat S. S., K. Mihcak, R. Venkatesan, "Robust perceptual image hashing via matrix invariances", In Proc. IEEE Conf. Image Process., pp.3443-3446, 2004.
-
(2004)
Robust Perceptual Image Hashing Via Matrix Invariances
, pp. 3443-3446
-
-
Kozat, S.S.1
Mihcak, K.2
Venkatesan, R.3
-
8
-
-
0032650557
-
-
In Proc. IEEE Int. Conf. Multimedia Comput. and Syst
-
Dittman J., A. Steinmetz, R. Steinmetz, "Content based digital signature for motion picture authentication and content-fragile watermarking", In Proc. IEEE Int. Conf. Multimedia Comput. and Syst., pp.209-213, 1999.
-
(1999)
Content Based Digital Signature For Motion Picture Authentication and Content-fragile Watermarking
, pp. 209-213
-
-
Dittman, J.1
Steinmetz, A.2
Steinmetz, R.3
-
10
-
-
0034444578
-
-
In Proc. IEEE Conf. Image Process
-
Venkatesan R., S. M. Koon, M. H. Jakubowski, P. Moulin, "Robust image hashing", In Proc. IEEE Conf. Image Process., pp.664-666, 2000.
-
(2000)
Robust Image Hashing
, pp. 664-666
-
-
Venkatesan, R.1
Koon, S.M.2
Jakubowski, M.H.3
Moulin, P.4
-
11
-
-
33747375321
-
-
In IEEE Int. Conf. Multimedia and Expo
-
Monga V., D. Vats, B. L. Evans, "Image authentication under geometric attacks via structure matching", In IEEE Int. Conf. Multimedia and Expo., pp.229-232, 2005.
-
(2005)
Image Authentication Under Geometric Attacks Via Structure Matching
, pp. 229-232
-
-
Monga, V.1
Vats, D.2
Evans, B.L.3
-
12
-
-
0015300275
-
Fourier preprocessing for hand print character recognition
-
Granlund G. H., "Fourier preprocessing for hand print character recognition", IEEE Trans. Comput., vol.C-21, no.2, pp.195-201, 1972.
-
(1972)
IEEE Trans. Comput
, vol.C-21
, Issue.2
, pp. 195-201
-
-
Granlund, G.H.1
-
13
-
-
79952796475
-
A Novel FFT Based Fast Algorithm for Solving High-Order Polynomial
-
Dong Fuguo, Zhou Tong, Wang Pingqin, "A Novel FFT Based Fast Algorithm for Solving High-Order Polynomial", JDCTA, vol.5, no.2, pp.126-132, 2011.
-
(2011)
JDCTA
, vol.5
, Issue.2
, pp. 126-132
-
-
Fuguo, D.1
Tong, Z.2
Pingqin, W.3
-
14
-
-
78651538188
-
A Preprocessing Method for NaXi Pictograph Character Recognition
-
Hai Guo, Jing-ying Zhao, Ming-jun Da, "A Preprocessing Method for NaXi Pictograph Character Recognition", JCIT, vol.5, no.2, pp.59-66, 2010.
-
(2010)
JCIT
, vol.5
, Issue.2
, pp. 59-66
-
-
Guo, H.1
Zhao, J.2
Da, M.3
-
15
-
-
79959571370
-
Robust Text Hashing for Content-Based Document Authentication
-
Tan L., X. Sun, "Robust Text Hashing for Content-Based Document Authentication", Info. Tech. Journal, vol.10, no.8, pp.1608-1613, 2011.
-
(2011)
Info. Tech. Journal
, vol.10
, Issue.8
, pp. 1608-1613
-
-
Tan, L.1
Sun, X.2
-
16
-
-
12344317125
-
Improving non-negative matrix factorizations through structured initialization
-
Wild S. M., "Improving non-negative matrix factorizations through structured initialization", HPattern RecognitionH, vol.37, no.11, pp.2217-2232, 2004.
-
(2004)
HPattern RecognitionH
, vol.37
, Issue.11
, pp. 2217-2232
-
-
Wild, S.M.1
-
17
-
-
85008058265
-
Analysis of the security of perceptual image hashing based on non-negative matrix factorization
-
Khelifi F., J. Jiang, "Analysis of the security of perceptual image hashing based on non-negative matrix factorization", IEEE HSign. Process. Lett.H, vol.17, no.1, pp.43-46, 2010.
-
(2010)
IEEE HSign. Process. Lett.H
, vol.17
, Issue.1
, pp. 43-46
-
-
Khelifi, F.1
Jiang, J.2
-
18
-
-
79953024813
-
Lexicographical framework for image hashing with implementation based on DCT and NMF
-
Tang Z., S. Wang, X. Zhang, W. Wei, Y. Zhao, "Lexicographical framework for image hashing with implementation based on DCT and NMF", Multimedia Tools Appl., vol.52, no.2, pp.325-345, 2010.
-
(2010)
Multimedia Tools Appl
, vol.52
, Issue.2
, pp. 325-345
-
-
Tang, Z.1
Wang, S.2
Zhang, X.3
Wei, W.4
Zhao, Y.5
-
19
-
-
33744764278
-
Robust and secure image hashing
-
Swaminathan A., Y. Mao, M. Wu, "Robust and secure image hashing", IEEE Trans. Inform. Foren. Security, vol.1, no.2, pp.215-230, 2006.
-
(2006)
IEEE Trans. Inform. Foren. Security
, vol.1
, Issue.2
, pp. 215-230
-
-
Swaminathan, A.1
Mao, Y.2
Wu, M.3
|