-
2
-
-
0034444578
-
Robust image hashing
-
Sep.
-
R. Venkatesan, S. M. Koon, M. H. Jakubowski, and P. Moulin, "Robust image hashing," in Proc. IEEE Conf. Image Process., Sep. 2000, vol. 3, pp. 664-666.
-
(2000)
Proc. IEEE Conf. Image Process.
, vol.3
, pp. 664-666
-
-
Venkatesan, R.1
Koon, S.M.2
Jakubowski, M.H.3
Moulin, P.4
-
3
-
-
0141627166
-
A highly robust audio fingerprinting system
-
Oct.
-
J. Haitsma and T. Kalker, "A highly robust audio fingerprinting system," in Proc. Conf. Music Inf. Retrieval, Oct. 2002, vol. 32, pp. 107-115.
-
(2002)
Proc. Conf. Music Inf. Retrieval
, vol.32
, pp. 107-115
-
-
Haitsma, J.1
Kalker, T.2
-
4
-
-
33845669994
-
Spatio-temporal transform based video hashing
-
DOI 10.1109/TMM.2006.884614
-
B. Coskun, B. Sankur, and N. Memon, "Spatio-temporal transform based video hashing," IEEE Trans. Multimedia, vol. 8, no. 6, pp. 1190-1208, Dec. 2006. (Pubitemid 44955684)
-
(2006)
IEEE Transactions on Multimedia
, vol.8
, Issue.6
, pp. 1190-1208
-
-
Coskun, B.1
Sankur, B.2
Memon, N.3
-
5
-
-
64849093052
-
Distortion estimation in compressed music using only audio fingerprints
-
Feb.
-
P. J. O. Doets and R. L. Lagendijk, "Distortion estimation in compressed music using only audio fingerprints," IEEE Trans. Speech Audio Lang. Process., vol. 16, no. 2, pp. 302-317, Feb. 2008.
-
(2008)
IEEE Trans. Speech Audio Lang. Process.
, vol.16
, Issue.2
, pp. 302-317
-
-
Doets, P.J.O.1
Lagendijk, R.L.2
-
6
-
-
33750344108
-
Perceptual image hashing via feature points: Performance evaluation and tradeoffs
-
DOI 10.1109/TIP.2006.881948
-
V. Monga and B. L. Evans, "Perceptual image hashing via feature points: Performance evaluation and tradeoffs," IEEE Trans. Image Process., vol. 15, no. 11, pp. 3452-3465, Nov. 2006. (Pubitemid 44615140)
-
(2006)
IEEE Transactions on Image Processing
, vol.15
, Issue.11
, pp. 3452-3465
-
-
Monga, V.1
Evans, B.L.2
-
8
-
-
0035765566
-
Visual hashing of digital video: Applications and techniques
-
DOI 10.1117/12.449746
-
J. C. Oostveen, T. Kalker, and J. Haitsma, "Visual hashing of digital video: Applications and techniques," in Proc. SPIE Appl. Dig. Image Process. XXIV, Jul. 2001, vol. 4472, pp. 121-131. (Pubitemid 35152820)
-
(2001)
Proceedings of SPIE - The International Society for Optical Engineering
, vol.4472
, pp. 121-131
-
-
Oostveen, J.1
Kalker, T.2
Haitsma, J.3
-
9
-
-
38849134763
-
Histogram-based image hashing scheme robust against geometric deformations
-
Sep.
-
S. J. Xiang, H. J. Kim, and J. W. Huang, "Histogram-based image hashing scheme robust against geometric deformations," in Proc. 9th Workshop Multimedia Security, Dallas, TX, Sep. 2007, pp. 121-128.
-
(2007)
Proc. 9th Workshop Multimedia Security, Dallas, TX
, pp. 121-128
-
-
Xiang, S.J.1
Kim, H.J.2
Huang, J.W.3
-
10
-
-
39749116768
-
Histogram-based perceptual hashing for minimally changing video sequences
-
Dec.
-
H. Kevin, S. Martin, and X. B. Zhou, "Histogram-based perceptual hashing for minimally changing video sequences," in Proc. IEEE Conf. Autom. Production Cross Media Content Multi-Channel Distrib., Dec. 2006, pp. 236-241.
-
(2006)
Proc. IEEE Conf. Autom. Production Cross Media Content Multi-Channel Distrib.
, pp. 236-241
-
-
Kevin, H.1
Martin, S.2
Zhou, X.B.3
-
11
-
-
0141850639
-
New iterative geometric methods for robust perceptual image hashing
-
Philadephia, PA Nov.
-
M. K. Mihcak and R. Venkatesan, "New iterative geometric methods for robust perceptual image hashing," in Proc. ACMWorkshop Security Privacy Digit. Rights Manage., Philadephia, PA, Nov. 2001, vol. 2320, pp. 13-21.
-
(2001)
Proc. ACMWorkshop Security Privacy Digit. Rights Manage.
, vol.2320
, pp. 13-21
-
-
Mihcak, M.K.1
Venkatesan, R.2
-
12
-
-
85007375266
-
Towards robust, content based techniques for image authentication
-
Dec.
-
M. P. Queluz, "Towards robust, content based techniques for image authentication," in Proc. IEEE Workshop Multimedia Signal Process., Dec. 1998, pp. 297-302.
-
(1998)
Proc. IEEE Workshop Multimedia Signal Process.
, pp. 297-302
-
-
Queluz, M.P.1
-
13
-
-
20444500587
-
Robust perceptual image hashing via matrix invariants
-
2004 International Conference on Image Processing, ICIP 2004
-
S. S. Kozat, R. Venkatesan, and M. K. Mihçak, "Robust perceptual image hashing via matrix invariants," in Proc. IEEE Conf. Image Process., Oct. 2004, vol. 5, pp. 3443-3446. (Pubitemid 40820815)
-
(2004)
Proceedings - International Conference on Image Processing, ICIP
, vol.2
, pp. 3443-3446
-
-
Kozat, S.S.1
Venkatesan, R.2
Mihcak, M.K.3
-
14
-
-
34548085689
-
Robust and secure image hashing via non-negative matrix factorizations
-
DOI 10.1109/TIFS.2007.902670
-
V. Monga and M. K. Mihcak, "Robust and secure image hashing via non-negative matrix factorizations," IEEE Trans. Inf. Forensics Security, vol. 2, no. 3, pp. 376-390, Sep. 2007. (Pubitemid 47290573)
-
(2007)
IEEE Transactions on Information Forensics and Security
, vol.2
, Issue.3
, pp. 376-390
-
-
Monga, V.1
Mihcak, M.K.2
-
15
-
-
69949143849
-
A DCT-VQ based multipurpose image hashing scheme for copyright protection and content authentication
-
Sep.
-
F. X. Yu and Z. M. Lu, "A DCT-VQ based multipurpose image hashing scheme for copyright protection and content authentication," Int. J. Innov. Comput. Inf. Control, vol. 5, no. 9, pp. 2703-2710, Sep. 2009.
-
(2009)
Int. J. Innov. Comput. Inf. Control
, vol.5
, Issue.9
, pp. 2703-2710
-
-
Yu, F.X.1
Lu, Z.M.2
-
16
-
-
48149093483
-
Robust hash for detecting and localizing image tampering
-
S. Roy and Q. Sun, "Robust hash for detecting and localizing image tampering," in Proc. IEEE Conf. Image Process., Sep. 2007, vol. 6, pp. 117-120.
-
(2007)
Proc. IEEE Conf. Image Process., Sep.
, vol.6
, pp. 117-120
-
-
Roy, S.1
Sun, Q.2
-
17
-
-
1542529865
-
A robust image fingerprinting system using the Radon transform
-
Apr.
-
S. S. Jin, J. Haitsma, T. Kalker, and C. D. Yoo, "A robust image fingerprinting system using the Radon transform," Signal Process. Image Commun., vol. 19, no. 4, pp. 325-339, Apr. 2004.
-
(2004)
Signal Process. Image Commun.
, vol.19
, Issue.4
, pp. 325-339
-
-
Jin, S.S.1
Haitsma, J.2
Kalker, T.3
Yoo, C.D.4
-
18
-
-
33744764278
-
Robust and secure image hashing
-
DOI 10.1109/TIFS.2006.873601
-
A. Swaminathan, Y. Mao, and M. Wu, "Robust and secure image hashing," IEEE Trans. Inf. Forensics Security, vol. 1, no. 2, pp. 215-230, Jun. 2006. (Pubitemid 43824632)
-
(2006)
IEEE Transactions on Information Forensics and Security
, vol.1
, Issue.2
, pp. 215-230
-
-
Swaminathan, A.1
Mao, Y.2
Wu, M.3
-
19
-
-
27844535360
-
Robust video hashing based on radial projections of key frames
-
DOI 10.1109/TSP.2005.855414
-
C. D. Roover, C. D. Vleeschouwer, F. Lefèbvre, and B. Macq, "Robust video hashing based on radial projections of key frames," IEEE Trans. Signal Process., vol. 53, no. 10, pp. 4020-4037, Oct. 2005. (Pubitemid 41638251)
-
(2005)
IEEE Transactions on Signal Processing
, vol.53
, Issue.10
, pp. 4020-4037
-
-
De Roover, C.1
De Vleeschouwer, C.2
Lefebvre, F.3
MacQ, B.4
-
20
-
-
84947226140
-
A Perceptual Audio Hashing Algorithm: A Tool for Robust Audio Identification and Information Hiding
-
Information Hiding
-
M. K. Mihcak and R. Venkatesan, "A perceptual audio hashing algorithm: A tool for robust audio identification and information hiding," in Proc. Workshop Inf. Hiding, Pittsburgh, PA, Apr. 2001, vol. 2137, pp. 51-65. (Pubitemid 33367658)
-
(2001)
LECTURE NOTES in COMPUTER SCIENCE
, Issue.2137
, pp. 51-65
-
-
Mihcak, M.K.1
Venkatesan, R.2
-
21
-
-
33645004781
-
A clustering based approach to perceptual image hashing
-
Mar.
-
V. Monga, A. Banerjee, and B. L. Evans, "A clustering based approach to perceptual image hashing," IEEE Trans. Inf. Forensics Security, vol. 1, no. 1, pp. 68-79, Mar. 2006.
-
(2006)
IEEE Trans. Inf. Forensics Security
, vol.1
, Issue.1
, pp. 68-79
-
-
Monga, V.1
Banerjee, A.2
Evans, B.L.3
-
22
-
-
21844448383
-
A model for improving the performance of feature extraction based robust hashing
-
DOI 10.1117/12.587592, 06, Proceedings of SPIE-IS and T Electronic Imaging - Security, Steganography, and Watermarking of Multimedia Contents VII
-
E. P. McCarthy, F. Balado, G. C. M. Silvestre, and N. J. Hurley, "A model for improving the performance of feature extraction based robust hashing," in Proc. SPIE-Security, Steganography, and Watermarking of Multimedia Contents VII, Jan. 2005, vol. 5681, pp. 59-67. (Pubitemid 40952968)
-
(2005)
Proceedings of SPIE - The International Society for Optical Engineering
, vol.5681
, pp. 59-67
-
-
McCarthy, E.P.1
Balado, F.2
Silvestre, G.C.M.3
Hurley, N.J.4
-
23
-
-
34548104101
-
Unicity distance of robust image hashing
-
DOI 10.1109/TIFS.2007.902260
-
Y. Mao and M. Wu, "Unicity distance of robust image hashing," IEEE Trans. Inf. Forensics Security, vol. 2, no. 3, pp. 462-467, Sep. 2007. (Pubitemid 47290580)
-
(2007)
IEEE Transactions on Information Forensics and Security
, vol.2
, Issue.3
, pp. 462-467
-
-
Mao, Y.1
Wu, M.2
-
24
-
-
69949141557
-
On the security of non-forgeable robust hash functions
-
Oct.
-
Q. Li and S. Roy, "On the security of non-forgeable robust hash functions," in Proc. IEEE Conf. Image Process., Oct. 2008, pp. 3124-3127.
-
(2008)
Proc. IEEE Conf. Image Process.
, pp. 3124-3127
-
-
Li, Q.1
Roy, S.2
-
25
-
-
46449112798
-
Attacking some perceptual image hash algorithms
-
Jul.
-
W. Li and B. Preneel, "Attacking some perceptual image hash algorithms," in Proc. IEEE Conf. Multimedia Expo, Jul. 2007, pp. 879-882.
-
(2007)
Proc. IEEE Conf. Multimedia Expo
, pp. 879-882
-
-
Li, W.1
Preneel, B.2
-
26
-
-
70450227748
-
Quantum hashing for multimedia
-
Dec.
-
M. Jin and C. D. Yoo, "Quantum hashing for multimedia," IEEE Trans. Inf. Forensics Security, vol. 4, no. 4, pp. 982-994, Dec. 2009.
-
(2009)
IEEE Trans. Inf. Forensics Security
, vol.4
, Issue.4
, pp. 982-994
-
-
Jin, M.1
Yoo, C.D.2
-
27
-
-
77949696748
-
Perceptual image hashing based on virtual watermark detection
-
Apr.
-
F. Khelifi and J. M. Jiang, "Perceptual image hashing based on virtual watermark detection," IEEE Trans. Image Process., vol. 19, no. 4, pp. 981-994, Apr. 2010.
-
(2010)
IEEE Trans. Image Process.
, vol.19
, Issue.4
, pp. 981-994
-
-
Khelifi, F.1
Jiang, J.M.2
-
28
-
-
70350582578
-
Hash-based identification of sparse image tampering
-
Nov.
-
M. Tagliasacchi, G. Valenzise, and S. Tubaro, "Hash-based identification of sparse image tampering," IEEE Trans. Image Process., vol. 18, no. 11, pp. 2491-2504, Nov. 2009.
-
(2009)
IEEE Trans. Image Process.
, vol.18
, Issue.11
, pp. 2491-2504
-
-
Tagliasacchi, M.1
Valenzise, G.2
Tubaro, S.3
-
29
-
-
84948670484
-
Noise tolerant object recognition using Gabor filtering
-
Jul.
-
J. K. Kamarainen, V. Kyrki, and H. Kälviäinen, "Noise tolerant object recognition using Gabor filtering," in Proc. Conf. Digit. Signal Process., Jul. 2002, vol. 2, pp. 1349-1352.
-
(2002)
Proc. Conf. Digit. Signal Process.
, vol.2
, pp. 1349-1352
-
-
Kamarainen, J.K.1
Kyrki, V.2
Kälviäinen, H.3
-
30
-
-
0022098435
-
Uncertainty relation for resolution in space, spatial frequency, and orientation optimized by two-dimensional visual cortical filters
-
Jul.
-
J. G. Daugman, "Uncertainty relation for resolution in space, spatial frequency, and orientation optimized by two-dimensional visual cortical filters," J. Opt. Soc. Amer. A, vol. 2, no. 7, pp. 1160-1169, Jul. 1985.
-
(1985)
J. Opt. Soc. Amer. A
, vol.2
, Issue.7
, pp. 1160-1169
-
-
Daugman, J.G.1
-
31
-
-
0031152925
-
Robust rotation-invariant texture classification: Wavelet, Gabor filter and GMRF based schemes
-
R. Porter and N. Canagarajah, "Robust rotation-invariant texture classification: wavelet, Gabor filter and GMRF based schemes," Proc. Inst. Elect. Eng.-Vis. Image Signal Process., vol. 144, no. 3, pp. 180-188, Jun. 1997. (Pubitemid 127754936)
-
(1997)
IEE Proceedings: Vision, Image and Signal Processing
, vol.144
, Issue.3
, pp. 180-188
-
-
Porter, R.1
Canagarajah, N.2
-
33
-
-
0020098639
-
On the structure of vector quantizers
-
Mar.
-
A. Gersho, "On the structure of vector quantizers," IEEE Trans. Inf. Theory, vol. IT-28, no. 2, pp. 157-166, Mar. 1982.
-
(1982)
IEEE Trans. Inf. Theory
, Issue.2 IT28
, pp. 157-166
-
-
Gersho, A.1
-
34
-
-
16344391551
-
Results on lattice vector quantization with dithering
-
PII S1057713096076380
-
A. Kirac and P. P. Vaidyanathan, "Results on lattice vector quantization with dithering," IEEE Trans. Circuits Syst. II, Analog Digit. Signal Process., vol. 43, no. 12, pp. 811-826, Dec. 1996. (Pubitemid 126777631)
-
(1996)
IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing
, vol.43
, Issue.12
, pp. 811-826
-
-
Kirac, A.1
Vaidyanathan, P.P.2
-
35
-
-
0020102220
-
Fast quantizing and decoding algorithms for lattice quantizers and codes
-
J. H. Conway and N. J. A. Sloane, "Fast quantizing and decoding algorithms for lattice quantizers and codes," IEEE Trans. Inf. Theory, vol. IT-28, no. 2, pp. 227-232, Mar. 1982. (Pubitemid 12499773)
-
(1982)
IEEE Transactions on Information Theory
, vol.IT-28
, Issue.2
, pp. 227-232
-
-
Conway, J.H.1
Sloane, N.J.A.2
-
36
-
-
24344459752
-
-
Online]. Available:
-
J. Li, "Photography Image Database." [Online]. Available: http://www.stat.psu.edu/jiali/index.download.html
-
Photography Image Database
-
-
Li, J.1
-
37
-
-
85198028989
-
ImageNet: A large-scale hierarchical image database
-
Jun.
-
J. Deng, W. Dong, R. Socher, L. J. Li, K. Li, and F. F. Li, "ImageNet: a large-scale hierarchical image database," in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., Jun. 2009, pp. 248-255.
-
(2009)
Proc. IEEE Conf. Comput. Vis. Pattern Recognit.
, pp. 248-255
-
-
Deng, J.1
Dong, W.2
Socher, R.3
Li, L.J.4
Li, K.5
Li, F.F.6
-
39
-
-
77951955891
-
Compressive sensing-based image hashing
-
Nov.
-
L. W. Kang, C. S. Lu, and C. Y. Hsu, "Compressive sensing-based image hashing," in Proc. IEEE Conf. Image Process., Nov. 2009, pp. 1285-1288.
-
(2009)
Proc. IEEE Conf. Image Process.
, pp. 1285-1288
-
-
Kang, L.W.1
Lu, C.S.2
Hsu, C.Y.3
-
40
-
-
67651097643
-
A novel image hash algorithm resistant to print-scan
-
Dec.
-
D. Wu, X. B. Zhou, and X. M. Niu, "A novel image hash algorithm resistant to print-scan," Signal Process., vol. 89, no. 12, pp. 2415-2424, Dec. 2009.
-
(2009)
Signal Process.
, vol.89
, Issue.12
, pp. 2415-2424
-
-
Wu, D.1
Zhou, X.B.2
Niu, X.M.3
-
41
-
-
44049106873
-
Confusion/diffusion capabilities of some robust hash functions
-
Mar.
-
B. Coskun and N. Memon, "Confusion/diffusion capabilities of some robust hash functions," in Proc. Conf. Inf. Sci. Syst., Mar. 2006, pp. 1188-1193.
-
(2006)
Proc. Conf. Inf. Sci. Syst.
, pp. 1188-1193
-
-
Coskun, B.1
Memon, N.2
|