-
1
-
-
83955162216
-
Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism
-
C. Qin, C. Chang, and P. Chen Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism Signal Processing 92 2012 1137 1150
-
(2012)
Signal Processing
, vol.92
, pp. 1137-1150
-
-
Qin, C.1
Chang, C.2
Chen, P.3
-
2
-
-
0034444578
-
Robust image hashing
-
R. Venkatesan, S.-M. Koon, M.H. Jakubowski, P. Moulin, Robust image hashing, in: Proceedings of the IEEE International Conference on Image Processing, 2000, pp.664-666.
-
(2000)
Proceedings of the IEEE International Conference on Image Processing
, pp. 664-666
-
-
Venkatesan, R.1
Koon, S.-M.2
Jakubowski, M.H.3
Moulin, P.4
-
4
-
-
84960919414
-
RASH: Radon soft hash algorithm
-
F. Lefebvre, B. Macq, J.-D. Legat, RASH: radon soft hash algorithm, in: Proceedings of European Signal Processing Conference, 2002, pp. 299-302.
-
(2002)
Proceedings of European Signal Processing Conference
, pp. 299-302
-
-
Lefebvre, F.1
Macq, B.2
Legat, J.-D.3
-
7
-
-
20444500587
-
Robust perceptual image hashing via matrix invariants
-
S.S. Kozat, R. Venkatesan, M.K. Mihcak, Robust perceptual image hashing via matrix invariants, in: Proceedings of the IEEE International Conference on Image Processing, 2004, pp. 3443-3446.
-
(2004)
Proceedings of the IEEE International Conference on Image Processing
, pp. 3443-3446
-
-
Kozat, S.S.1
Venkatesan, R.2
Mihcak, M.K.3
-
9
-
-
70350221685
-
Robust image hashing for tamper detection using non-negative matrix factorization
-
Z. Tang, S. Wang, X. Zhang, W. Wei, and S. Su Robust image hashing for tamper detection using non-negative matrix factorization Journal of Ubiquitous Convergence and Technology 2 2008 18 26
-
(2008)
Journal of Ubiquitous Convergence and Technology
, vol.2
, pp. 18-26
-
-
Tang, Z.1
Wang, S.2
Zhang, X.3
Wei, W.4
Su, S.5
-
11
-
-
75249099043
-
A secure and robust hash-based scheme for image authentication
-
F. Ahmed, M.Y. Siyal, and V.U. Abbas A secure and robust hash-based scheme for image authentication Signal Processing 90 2010 1456 1470
-
(2010)
Signal Processing
, vol.90
, pp. 1456-1470
-
-
Ahmed, F.1
Siyal, M.Y.2
Abbas, V.U.3
-
12
-
-
79951589603
-
Structural feature-based image hashing and similarity metric for tampering detection
-
Z. Tang, S. Wang, X. Zhang, and W. Wei Structural feature-based image hashing and similarity metric for tampering detection Fundamenta Informaticae 106 2011 75 91
-
(2011)
Fundamenta Informaticae
, vol.106
, pp. 75-91
-
-
Tang, Z.1
Wang, S.2
Zhang, X.3
Wei, W.4
-
14
-
-
84862288424
-
Point pattern matching algorithm for planar point sets under Euclidean transform
-
10.1155/2012/139014 Article ID 139014
-
X. Wang, and X. Zhang Point pattern matching algorithm for planar point sets under Euclidean transform Journal of Applied Mathematics 2012 2012 10.1155/2012/139014 Article ID 139014
-
(2012)
Journal of Applied Mathematics
, vol.2012
-
-
Wang, X.1
Zhang, X.2
-
15
-
-
84856043672
-
A mathematical theory of communication
-
623-656
-
C.E. Shannon A mathematical theory of communication Bell System Technical Journal 27 1948 379 423, 623-656
-
(1948)
Bell System Technical Journal
, vol.27
, pp. 379-423
-
-
Shannon, C.E.1
-
17
-
-
84875891488
-
-
USC-SIPI Image Database [online]
-
USC-SIPI Image Database [online]. Available 〈http://sipi.usc.edu/ database/〉.
-
-
-
-
18
-
-
84875905375
-
-
Ground Truth Database [online]
-
Ground Truth Database [online]. Available 〈http://www.cs.washington. edu/research/imagedatabase/groundtruth/〉.
-
-
-
-
19
-
-
33646023117
-
An introduction to ROC analysis
-
T. Fawcett An introduction to ROC analysis Pattern Recognition Letters 27 2006 861 874
-
(2006)
Pattern Recognition Letters
, vol.27
, pp. 861-874
-
-
Fawcett, T.1
|