-
1
-
-
77952166354
-
Classification-based image watermarking using wavelet DC components
-
Yoo, K. S. and Lee, W. H. Classification-based image watermarking using wavelet DC components. Imag. Sci. J., 2010, 58, 105-111.
-
(2010)
Imag. Sci. J.
, vol.58
, pp. 105-111
-
-
Yoo, K.S.1
Lee, W.H.2
-
2
-
-
0034444578
-
Robust image hashing
-
Vancouver, BC, Canada, September, IEEE Computer Society
-
Venkatesan, R., Koon, S.-M., Jakubowski, M. H. and Moulin, P. Robust image hashing, Proc. IEEE Int. Conf. on Image processing: ICIP 2000, Vancouver, BC, Canada, September 2000, IEEE Computer Society, pp. 664-666.
-
(2000)
Proc. IEEE Int. Conf. on Image processing: ICIP 2000
, pp. 664-666
-
-
Venkatesan, R.1
Koon, S.-M.2
Jakubowski, M.H.3
Moulin, P.4
-
3
-
-
84962762130
-
Robust hash functions for digital watermarking
-
Las Vergas, NV, USA, March, IEEE Computer Society
-
Fridrich, J. and Goljan, M. Robust hash functions for digital watermarking, Proc. IEEE Int. Conf. on Information technology: coding and computing: ITCC 2000, Las Vergas, NV, USA, March 2000, IEEE Computer Society, pp. 178-183.
-
(2000)
Proc. IEEE Int. Conf. on Information technology: Coding and computing: ITCC 2000
, pp. 178-183
-
-
Fridrich, J.1
Goljan, M.2
-
4
-
-
0035248504
-
A robust image authentication system distinguishing JPEG compression from malicious manipulation
-
Lin, C. Y. and Chang, S. F. A robust image authentication system distinguishing JPEG compression from malicious manipulation. IEEE Trans. Circuits Syst. Video Technol., 2001, 11, 153-168.
-
(2001)
IEEE Trans. Circuits Syst. Video Technol.
, vol.11
, pp. 153-168
-
-
Lin, C.Y.1
Chang, S.F.2
-
5
-
-
84960919414
-
RASH: Radon soft hash algorithm
-
The organiser of the conference5 is European Association for Signal Processing (EURASIP)., Toulouse, France, September, EURASIP
-
Lefebvre, F., Macq, B. and Legat, J.-D. RASH: radon soft hash algorithm, Proc. Eur. Signal Processing Conf.: EUSIPCO 2002, Toulouse, France, September 2002 EURASIP, pp. 299-302 The organiser of the conference5 is European Association for Signal Processing (EURASIP).
-
(2002)
Proc. Eur. Signal Processing Conf.: EUSIPCO 2002
, pp. 299-302
-
-
Lefebvre, F.1
Macq, B.2
Legat, J.-D.3
-
6
-
-
27844535360
-
Robust video hashing based on radial projections of key frames
-
Roover, C. D., Vleeschouwer, C. D., Lefebvre, F. and Macq, B. Robust video hashing based on radial projections of key frames. IEEE Trans. Signal Process., 2005, 53, 4020-4036.
-
(2005)
IEEE Trans. Signal Process.
, vol.53
, pp. 4020-4036
-
-
Roover, C.D.1
Vleeschouwer, C.D.2
Lefebvre, F.3
Macq, B.4
-
7
-
-
33744764278
-
Robust and secure image hashing
-
Swaminathan, A., Mao, Y. and Wu, M. Robust and secure image hashing. IEEE Trans. Inf. Forensics Secur., 2006, 1, 215-230.
-
(2006)
IEEE Trans. Inf. Forensics Secur.
, vol.1
, pp. 215-230
-
-
Swaminathan, A.1
Mao, Y.2
Wu, M.3
-
8
-
-
33750344108
-
Perceptual image hashing via feature points: Performance evaluation and tradeoffs
-
Monga, V. and Evans, B. L. Perceptual image hashing via feature points: performance evaluation and tradeoffs. IEEE Trans. Image Process., 2006, 15, 3452-3465.
-
(2006)
IEEE Trans. Image Process.
, vol.15
, pp. 3452-3465
-
-
Monga, V.1
Evans, B.L.2
-
9
-
-
33645004781
-
A clustering based approach to perceptual image hashing
-
Monga, V., Banerjee, A. and Evans, B. L. A clustering based approach to perceptual image hashing. IEEE Trans. Inf. Forensics Secur., 2006, 1, 68-79.
-
(2006)
IEEE Trans. Inf. Forensics Secur.
, vol.1
, pp. 68-79
-
-
Monga, V.1
Banerjee, A.2
Evans, B.L.3
-
10
-
-
20444500587
-
Robust perceptual image hashing via matrix invariants
-
Singapore, October, IEEE
-
Kozat, S. S., Venkatesan, R. and Mihcak, M. K. Robust perceptual image hashing via matrix invariants, Proc. IEEE Int. Conf. on Image processing: ICIP 2004, Singapore, October 2004, IEEE, pp. 3443-3446.
-
(2004)
Proc. IEEE Int. Conf. on Image processing: ICIP 2004
, pp. 3443-3446
-
-
Kozat, S.S.1
Venkatesan, R.2
Mihcak, M.K.3
-
11
-
-
34548085689
-
Robust and secure image hashing via non-negative matrix factorizations
-
Monga, V. and Mihcak, M. K. Robust and secure image hashing via non-negative matrix factorizations. IEEE Trans. Inf. Forensics Secur., 2007, 2, 376-390.
-
(2007)
IEEE Trans. Inf. Forensics Secur.
, vol.2
, pp. 376-390
-
-
Monga, V.1
Mihcak, M.K.2
-
12
-
-
70350221685
-
Robust image hashing for tamper detection using non-negative matrix factorization
-
Tang, Z., Wang, S., Zhang, X., Wei, W. and Su, S. Robust image hashing for tamper detection using non-negative matrix factorization. J. Ubiquitous Converg. Technol., 2008, 2, 18-26.
-
(2008)
J. Ubiquitous Converg. Technol.
, vol.2
, pp. 18-26
-
-
Tang, Z.1
Wang, S.2
Zhang, X.3
Wei, W.4
Su, S.5
-
13
-
-
67651097643
-
A novel image hash algorithm resistant to print-scan
-
Wu, D., Zhou, X. and Niu, X. A novel image hash algorithm resistant to print-scan. Signal Process., 2009, 89, 2415-2424.
-
(2009)
Signal Process.
, vol.89
, pp. 2415-2424
-
-
Wu, D.1
Zhou, X.2
Niu, X.3
-
14
-
-
75249099043
-
A secure and robust hash-based scheme for image authentication
-
Ahmed, F., Siyal, M. Y. and Abbas, V. U. A secure and robust hash-based scheme for image authentication. Signal Process., 2010, 90, 1456-1470.
-
(2010)
Signal Process.
, vol.90
, pp. 1456-1470
-
-
Ahmed, F.1
Siyal, M.Y.2
Abbas, V.U.3
-
15
-
-
79953024813
-
Lexicographical framework for image hashing with implementation based on DCT and NMF
-
Tang, Z., Wang, S., Zhang, X., Wei, W. and Zhao, Y. Lexicographical framework for image hashing with implementation based on DCT and NMF. Multimed. Tools Appl., 2011, 52, 325-345.
-
(2011)
Multimed. Tools Appl.
, vol.52
, pp. 325-345
-
-
Tang, Z.1
Wang, S.2
Zhang, X.3
Wei, W.4
Zhao, Y.5
-
16
-
-
79951589603
-
Structural feature-based image hashing and similarity metric for tampering detection
-
Tang, Z., Wang, S., Zhang, X. and Wei, W. Structural feature-based image hashing and similarity metric for tampering detection. Fundam. Inf., 2011, 106, 75-91.
-
(2011)
Fundam. Inf.
, vol.106
, pp. 75-91
-
-
Tang, Z.1
Wang, S.2
Zhang, X.3
Wei, W.4
-
17
-
-
84856043672
-
A mathematical theory of communication
-
Shannon, C. E. A mathematical theory of communication. Bell Syst. Tech. J., 1948, 27, 379-423, 623-656.
-
(1948)
Bell Syst. Tech. J.
, vol.27
-
-
Shannon, C.E.1
-
19
-
-
84871204650
-
-
[accessed 8 May 2008]. Available at
-
Ground Truth Database. [accessed 8 May 2008]. Available at:, http://www.cs.washington.edu/research/ imagedatabase/groundtruth/.
-
Ground Truth Database
-
-
-
20
-
-
33646023117
-
An introduction to ROC analysis
-
Fawcett, T. An introduction to ROC analysis. Patt. Recog. Lett., 2006, 27, 861-874.
-
(2006)
Patt. Recog. Lett.
, vol.27
, pp. 861-874
-
-
Fawcett, T.1
-
21
-
-
33747744974
-
-
[accessed 12 January 2007]. Available at
-
USC-SIPI Image Database. [accessed 12 January 2007]. Available at:, http://sipi.usc.edu/services/database/ database.html.
-
USC-SIPI Image Database
-
-
|