-
1
-
-
80053982202
-
Perceptual text image hashing based on shape recognition
-
Lina Tan, Xingming Sun, Zhili Zhou and Wei Zhang, "Perceptual text image hashing based on shape recognition, " AISS: Advances in Information Sciences and Service Sciences, vol. 3, no. 8, pp. 1-7, 2011.
-
(2011)
AISS: Advances in Information Sciences and Service Sciences
, vol.3
, Issue.8
, pp. 1-7
-
-
Tan, L.1
Sun, X.2
Zhou, Z.3
Zhang, W.4
-
2
-
-
84863143172
-
Detecting phishing web pages based on image perceptual hashing technology
-
Weifeng Zhang, Guofu Zhou and Xiantao Tian, "Detecting phishing web pages based on image perceptual hashing technology, " IJACT: International Journal of Advancements in Computing Technology, vol. 4, no. 2, pp. 139-145, 2012.
-
(2012)
IJACT: International Journal of Advancements in Computing Technology
, vol.4
, Issue.2
, pp. 139-145
-
-
Zhang, W.1
Zhou, G.2
Tian, X.3
-
3
-
-
0030409375
-
A robust content based digital signature for image authentication
-
Laussane, Switzerland, Sept. 16-19
-
Marc Schneider and Shih-Fu Chang, "A robust content based digital signature for image authentication, " In Proceedings of the IEEE International Conference on Image Processing, vol. 3, pp. 227-230, Laussane, Switzerland, Sept. 16-19, 1996.
-
(1996)
In Proceedings of the IEEE International Conference on Image Processing
, vol.3
, pp. 227-230
-
-
Schneider, M.1
Chang, S.-F.2
-
4
-
-
0034444578
-
Robust image hashing
-
In, Vancouver, BC, Canada, Sept. 10-13
-
Remarathnam Venkatesan, S.-M. Koon, Mariusz H. Jakubowski and Pierre Moulin, "Robust image hashing, " In Proceedings of the IEEE International Conference on Image Processing, pp. 664-666, Vancouver, BC, Canada, Sept. 10-13, 2000.
-
(2000)
Proceedings of the IEEE International Conference on Image Processing
, pp. 664-666
-
-
Venkatesan, R.1
Koon, S.-M.2
Jakubowski, M.H.3
Moulin, P.4
-
5
-
-
84962762130
-
Robust hash functions for digital watermarking
-
Las Vergas, USA, Mar. 27-29
-
Jiri Fridrich and Miroslav Goljan, "Robust hash functions for digital watermarking, " In: Proceedings of the IEEE International Conference on Information Technology: Coding and Computing, pp. 178-183, Las Vergas, USA, Mar. 27-29, 2000.
-
(2000)
In: Proceedings of the IEEE International Conference on Information Technology: Coding and Computing
, pp. 178-183
-
-
Fridrich, J.1
Goljan, M.2
-
6
-
-
0035248504
-
A robust image authentication system distinguishing JPEG compression from malicious manipulation
-
Ching-Yung Lin and Shih-Fu Chang, "A robust image authentication system distinguishing JPEG compression from malicious manipulation, " IEEE Transactions on Circuits System and Video Technology, vol. 11, no. 2, pp. 153-168, 2001.
-
(2001)
IEEE Transactions on Circuits System and Video Technology
, vol.11
, Issue.2
, pp. 153-168
-
-
Lin, C.-Y.1
Chang, S.-F.2
-
7
-
-
33750344108
-
Perceptual image hashing via feature points: Performance evaluation and trade-offs
-
Vishal Monga and Brian L. Evans, "Perceptual image hashing via feature points: performance evaluation and trade-offs, " IEEE Transactions on Image Processing, vol. 15, no. 11, pp. 3453-3466, 2006.
-
(2006)
IEEE Transactions on Image Processing
, vol.15
, Issue.11
, pp. 3453-3466
-
-
Monga, V.1
Evans, B.L.2
-
8
-
-
70350221685
-
Robust image hashing for tamper detection using non-negative matrix factorization
-
Zhenjun Tang, Shuozhong Wang, Xinpeng Zhang, Weimin Wei and Shengjun Su, "Robust image hashing for tamper detection using non-negative matrix factorization, " Journal of Ubiquitous Convergence and Technology, vol. 2, no. 1, pp. 18-26, 2008.
-
(2008)
Journal of Ubiquitous Convergence and Technology
, vol.2
, Issue.1
, pp. 18-26
-
-
Tang, Z.1
Wang, S.2
Zhang, X.3
Wei, W.4
Su, S.5
-
9
-
-
77949909560
-
A key-dependent secure image hashing scheme by using Radon transform
-
In, Kanazawa, Japan, Dec. 7-9
-
Yang Ou and Kyung Hyune Rhee, "A key-dependent secure image hashing scheme by using Radon transform, " In Proceedings of the IEEE International Symposium on Intelligent Signal Processing and Communication Systems, pp. 595-598, Kanazawa, Japan, Dec. 7-9, 2009.
-
(2009)
Proceedings of the IEEE International Symposium on Intelligent Signal Processing and Communication Systems
, pp. 595-598
-
-
Ou, Y.1
Rhee, K.H.2
-
10
-
-
79953024813
-
Lexicographical framework for image hashing with implementation based on DCT and NMF
-
Zhenjun Tang, Shuozhong Wang, Xinpeng Zhang, Weimin Wei and Yan Zhao, "Lexicographical framework for image hashing with implementation based on DCT and NMF, " Multimedia Tools and Applications, vol. 52, no. 2-3, pp. 325-345, 2011.
-
(2011)
Multimedia Tools and Applications
, vol.52
, Issue.2-3
, pp. 325-345
-
-
Tang, Z.1
Wang, S.2
Zhang, X.3
Wei, W.4
Zhao, Y.5
-
11
-
-
84874784902
-
Perceptual image hashing using local entropies and DWT
-
DOI:10. 1179/1743131X11Y. 0000000039, Available
-
Zhenjun Tang, Xianquan Zhang, Yumin Dai and Weiwei Lan, "Perceptual image hashing using local entropies and DWT, " Imaging Science Journal, DOI:10. 1179/1743131X11Y. 0000000039, Available: http://dx. doi. org/10. 1179/1743131X11Y. 0000000039.
-
Imaging Science Journal
-
-
Tang, Z.1
Zhang, X.2
Dai, Y.3
Lan, W.4
-
12
-
-
84960919414
-
RASH: Radon soft hash algorithm
-
In, Toulouse, France, Sep. 3-6
-
Frédéric Lefèbvre, Benoit Macq and Jean-Didier Legat, "RASH: Radon soft hash algorithm, " In Proceedings of European Signal Processing Conference, pp. 299-302, Toulouse, France, Sep. 3-6, 2002.
-
(2002)
Proceedings of European Signal Processing Conference
, pp. 299-302
-
-
Lefèbvre, F.1
Macq, B.2
Legat, J.-D.3
-
13
-
-
27844535360
-
Robust video hashing based on radial projections of key frames
-
Cédric De Roover, Christophe De Vleeschouwer, Frédéric Lefèbvre and Benoit Macq, "Robust video hashing based on radial projections of key frames, " IEEE Transactions on Signal Processing, vol. 53, no. 10, pp. 4020-4036, 2005.
-
(2005)
IEEE Transactions on Signal Processing
, vol.53
, Issue.10
, pp. 4020-4036
-
-
Roover, C.D.1
Vleeschouwer, C.D.2
Lefèbvre, F.3
Macq, B.4
-
14
-
-
20444500587
-
Robust perceptual image hashing via matrix invariants
-
In, Singapore, Oct. 24-27
-
Suleyman S. Kozat, Remarathnam Venkatesan and M. Ki{dotless}vanç Mihçak, "Robust perceptual image hashing via matrix invariants, " In Proceedings of the IEEE International Conference on Image Processing, pp. 3443-3446, Singapore, Oct. 24-27, 2004.
-
(2004)
Proceedings of the IEEE International Conference on Image Processing
, pp. 3443-3446
-
-
Kozat, S.S.1
Venkatesan, R.2
Mihçak, M.K.3
-
15
-
-
34548085689
-
Robust and secure image hashing via non-negative matrix factorizations
-
Vishal Monga and M. Ki{dotless}vanç Mihçak, "Robust and secure image hashing via non-negative matrix factorizations, " IEEE Transactions on Information Forensics and Security, vol. 2, no. 3, pp. 376-390, 2007.
-
(2007)
IEEE Transactions on Information Forensics and Security
, vol.2
, Issue.3
, pp. 376-390
-
-
Monga, V.1
Mihçak, M.K.2
-
16
-
-
85032751954
-
Watermarking schemes evaluation
-
Fabien A. P. Petitcolas, "Watermarking schemes evaluation, " IEEE Signal Processing Magazine, vol. 17, no. 5, pp. 58-64, 2000.
-
(2000)
IEEE Signal Processing Magazine
, vol.17
, Issue.5
, pp. 58-64
-
-
Petitcolas, F.A.P.1
-
17
-
-
84871204650
-
-
Available, Accessed 8 May 2008
-
Ground Truth Database. Available: http://www. cs. washington. edu/research/imagedatabase/groundtruth/, Accessed 8 May 2008.
-
Ground Truth Database
-
-
-
18
-
-
33646023117
-
An introduction to ROC analysis
-
Tom Fawcett, "An introduction to ROC analysis, " Pattern Recognition Letters, vol. 27, no. 8, pp. 861-874, 2006.
-
(2006)
Pattern Recognition Letters
, vol.27
, Issue.8
, pp. 861-874
-
-
Fawcett, T.1
|