-
1
-
-
85032771294
-
Locality-sensitive hashing for finding nearest neighbors
-
Mar.
-
M. Slaney and M. Casey, "Locality-Sensitive Hashing for Finding Nearest Neighbors," IEEE Signal Processing Magazine, vol. 25, no. 2, pp.128-131, Mar. 2008.
-
(2008)
IEEE Signal Processing Magazine
, vol.25
, Issue.2
, pp. 128-131
-
-
Slaney, M.1
Casey, M.2
-
2
-
-
34248561901
-
Novel image copy detection with rotating tolerance
-
M.N. Wu, C.C. Lin, and C.C. Chang, "Novel Image Copy Detection with Rotating Tolerance," J. Systems and Software, vol. 80, no. 7, pp. 1057-1069, 2007.
-
(2007)
J. Systems and Software
, vol.80
, Issue.7
, pp. 1057-1069
-
-
Wu, M.N.1
Lin, C.C.2
Chang, C.C.3
-
3
-
-
34548069995
-
Recent development of perceptual image hashing
-
S. Wang and X. Zhang, "Recent Development of Perceptual Image Hashing," J. Shanghai Univ. (English ed.), vol. 11, no. 4, pp. 323-331, 2007.
-
(2007)
J. Shanghai Univ. (English Ed.)
, vol.11
, Issue.4
, pp. 323-331
-
-
Wang, S.1
Zhang, X.2
-
4
-
-
75249099043
-
A secure and robust hash-based scheme for image authentication
-
F. Ahmed, M.Y. Siyal, and V.U. Abbas, "A Secure and Robust Hash-Based Scheme for Image Authentication," Signal Processing, vol. 90, no. 5, pp. 1456-1470, 2010.
-
(2010)
Signal Processing
, vol.90
, Issue.5
, pp. 1456-1470
-
-
Ahmed, F.1
Siyal, M.Y.2
Abbas, V.U.3
-
5
-
-
83955162216
-
Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism
-
C. Qin, C.C. Chang, and P.Y. Chen, "Self-Embedding Fragile Watermarking with Restoration Capability Based on Adaptive Bit Allocation Mechanism," Signal Processing, vol. 92, no. 4, pp. 1137-1150, 2012.
-
(2012)
Signal Processing
, vol.92
, Issue.4
, pp. 1137-1150
-
-
Qin, C.1
Chang, C.C.2
Chen, P.Y.3
-
6
-
-
11244351627
-
Robust mesh-based hashing for copy detection and tracing of images
-
C.S. Lu, C.Y. Hsu, S.W. Sun, and P.C. Chang, "Robust Mesh-Based Hashing for Copy Detection and Tracing of Images," Proc. IEEE Int'l Conf. Multimedia and Expo, vol. 1, pp. 731-734, 2004.
-
(2004)
Proc. IEEE Int'l Conf. Multimedia and Expo
, vol.1
, pp. 731-734
-
-
Lu, C.S.1
Hsu, C.Y.2
Sun, S.W.3
Chang, P.C.4
-
7
-
-
70350221685
-
Robust image hashing for tamper detection using non-negative matrix factorization
-
Z. Tang, S. Wang, X. Zhang, W. Wei, and S. Su, "Robust Image Hashing for Tamper Detection Using Non-Negative Matrix Factorization," J. Ubiquitous Convergence and Technology, vol. 2, no. 1, pp. 18-26, 2008.
-
(2008)
J. Ubiquitous Convergence and Technology
, vol.2
, Issue.1
, pp. 18-26
-
-
Tang, Z.1
Wang, S.2
Zhang, X.3
Wei, W.4
Su, S.5
-
8
-
-
84864130926
-
Feature combination in kernel space for distance based image hashing
-
Aug.
-
E. Hassan, S. Chaudhury, and M. Gopal, "Feature Combination in Kernel Space for Distance Based Image Hashing," IEEE Trans. Multimedia, vol. 14, no. 4, pp. 1179-1195, Aug. 2012.
-
(2012)
IEEE Trans. Multimedia
, vol.14
, Issue.4
, pp. 1179-1195
-
-
Hassan, E.1
Chaudhury, S.2
Gopal, M.3
-
10
-
-
77951971972
-
Reduced-reference image quality assessment based on perceptual image hashing
-
X. Lv and Z.J. Wang, "Reduced-Reference Image Quality Assessment Based on Perceptual Image Hashing," Proc. IEEE Int'l Conf. Image Processing, pp. 4361-4364, 2009.
-
(2009)
Proc. IEEE Int'l Conf. Image Processing
, pp. 4361-4364
-
-
Lv, X.1
Wang, Z.J.2
-
11
-
-
0034444578
-
Robust image hashing
-
R. Venkatesan, S.-M. Koon, M.H. Jakubowski, and P. Moulin, "Robust Image Hashing," Proc. IEEE Int'l Conf. Image Processing, pp. 664-666, 2000.
-
(2000)
Proc. IEEE Int'l Conf. Image Processing
, pp. 664-666
-
-
Venkatesan, R.1
Koon, S.-M.2
Jakubowski, M.H.3
Moulin, P.4
-
13
-
-
0035248504
-
A robust image authentication system distinguishing jpeg compression from malicious manipulation
-
Feb.
-
C.Y. Lin and S.F. Chang, "A Robust Image Authentication System Distinguishing JPEG Compression from Malicious Manipulation," IEEE Trans. Circuits System and Video Technology, vol. 11, no. 2, pp. 153-168, Feb. 2001.
-
(2001)
IEEE Trans. Circuits System and Video Technology
, vol.11
, Issue.2
, pp. 153-168
-
-
Lin, C.Y.1
Chang, S.F.2
-
14
-
-
67651097643
-
A novel image hash algorithm resistant to print-scan
-
D. Wu, X. Zhou, and X. Niu, "A Novel Image Hash Algorithm Resistant to Print-Scan," Signal Processing, vol. 89, no. 12, pp. 2415-2424, 2009.
-
(2009)
Signal Processing
, vol.89
, Issue.12
, pp. 2415-2424
-
-
Wu, D.1
Zhou, X.2
Niu, X.3
-
15
-
-
79953024813
-
Lexicographical framework for image hashing with implementation based on dct and nmf
-
Z. Tang, S. Wang, X. Zhang, W. Wei, and Y. Zhao, "Lexicographical Framework for Image Hashing with Implementation Based on DCT and NMF," Multimedia Tools and Applications, vol. 52, no. 2/3, pp. 325-345, 2011.
-
(2011)
Multimedia Tools and Applications
, vol.52
, Issue.2-3
, pp. 325-345
-
-
Tang, Z.1
Wang, S.2
Zhang, X.3
Wei, W.4
Zhao, Y.5
-
16
-
-
84960919414
-
Rash: Radon soft hash algorithm
-
F. Lefebvre, B. Macq, and J.-D. Legat, "RASH: Radon Soft Hash Algorithm," Proc. European Signal Processing Conf., pp. 299-302, 2002.
-
(2002)
Proc. European Signal Processing Conf.
, pp. 299-302
-
-
Lefebvre, F.1
Macq, B.2
Legat, J.-D.3
-
17
-
-
20444500587
-
Robust perceptual image hashing via matrix invariants
-
2004 International Conference on Image Processing, ICIP 2004
-
S.S. Kozat, R. Venkatesan, and M.K. Mihcak, "Robust Perceptual Image Hashing via Matrix Invariants," Proc. IEEE Int'l Conf. Image Processing, pp. 3443-3446, 2004. (Pubitemid 40820815)
-
(2004)
Proceedings - International Conference on Image Processing, ICIP
, vol.2
, pp. 3443-3446
-
-
Kozat, S.S.1
Venkatesan, R.2
Mihcak, M.K.3
-
18
-
-
27844535360
-
Robust video hashing based on radial projections of key frames
-
Oct.
-
C.D. Roover, C.D. Vleeschouwer, F. Lefebvre, and B. Macq, "Robust Video Hashing Based on Radial Projections of Key Frames," IEEE Trans. Signal Processing, vol. 53, no. 10, pp. 4020-4036, Oct. 2005.
-
(2005)
IEEE Trans. Signal Processing
, vol.53
, Issue.10
, pp. 4020-4036
-
-
Roover, C.D.1
Vleeschouwer, C.D.2
Lefebvre, F.3
Macq, B.4
-
19
-
-
33744764278
-
Robust and secure image hashing
-
DOI 10.1109/TIFS.2006.873601
-
A. Swaminathan, Y. Mao, and M. Wu, "Robust and Secure Image Hashing," IEEE Trans. Information Forensics and Security, vol. 1, no. 2, pp. 215-230, June 2006. (Pubitemid 43824632)
-
(2006)
IEEE Transactions on Information Forensics and Security
, vol.1
, Issue.2
, pp. 215-230
-
-
Swaminathan, A.1
Mao, Y.2
Wu, M.3
-
20
-
-
34548085689
-
Robust and secure image hashing via non-negative matrix factorizations
-
DOI 10.1109/TIFS.2007.902670
-
V. Monga and M.K. Mihcak, "Robust and Secure Image Hashing via Non-Negative Matrix Factorizations," IEEE Trans. Information Forensics and Security, vol. 2, no. 3, pp. 376-390, Sept. 2007. (Pubitemid 47290573)
-
(2007)
IEEE Transactions on Information Forensics and Security
, vol.2
, Issue.3
, pp. 376-390
-
-
Monga, V.1
Mihcak, M.K.2
-
21
-
-
79957996038
-
Robust image hash in radon transform domain for authentication
-
Y. Lei, Y. Wang, and J. Huang, "Robust Image Hash in Radon Transform Domain for Authentication," Signal Processing: Image Comm., vol. 26, no. 6, pp. 280-288, 2011.
-
(2011)
Signal Processing: Image Comm.
, vol.26
, Issue.6
, pp. 280-288
-
-
Lei, Y.1
Wang, Y.2
Huang, J.3
-
22
-
-
84894445967
-
-
Feb.
-
USC-SIPI Image Database, http://sipi.usc.edu/database/, Feb. 2007.
-
(2007)
-
-
-
23
-
-
84894456881
-
-
Accessed 8 May
-
Ground Truth Database, http://www.cs.washington.edu/research/ imagedatabase/groundtruth/, Accessed 8 May 2008.
-
(2008)
-
-
-
24
-
-
0030409375
-
A robust content based digital signature for image authentication
-
M. Schneider and S.F. Chang, "A Robust Content Based Digital Signature for Image Authentication," Proc. IEEE Int'l Conf. Image Processing, vol. 3, pp. 227-230, 1996.
-
(1996)
Proc. IEEE Int'l Conf. Image Processing
, vol.3
, pp. 227-230
-
-
Schneider, M.1
Chang, S.F.2
-
25
-
-
33750344108
-
Perceptual image hashing via feature points: Performance evaluation and tradeoffs
-
DOI 10.1109/TIP.2006.881948
-
V. Monga and B.L. Evans, "Perceptual Image Hashing via Feature Points: Performance Evaluation and Tradeoffs," IEEE Trans. Image Processing, vol. 15, no. 11, pp. 3452-3465, Nov. 2006. (Pubitemid 44615140)
-
(2006)
IEEE Transactions on Image Processing
, vol.15
, Issue.11
, pp. 3452-3465
-
-
Monga, V.1
Evans, B.L.2
-
26
-
-
33645004781
-
A clustering based approach to perceptual image hashing
-
Mar.
-
V. Monga, A. Banerjee, and B.L. Evans, "A Clustering Based Approach to Perceptual Image Hashing," IEEE Trans. Information Forensics and Security, vol. 1, no. 1, pp. 68-79, Mar. 2006.
-
(2006)
IEEE Trans. Information Forensics and Security
, vol.1
, Issue.1
, pp. 68-79
-
-
Monga, V.1
Banerjee, A.2
Evans, B.L.3
-
27
-
-
1542529865
-
A robust image fingerprinting system using the radon transform
-
J.S. Seo, J. Haitsma, T. Kalker, and C.D. Yoo, "A Robust Image Fingerprinting System Using the Radon Transform," Signal Processing: Image Comm., vol. 19, no. 4, pp. 325-339, 2004.
-
(2004)
Signal Processing: Image Comm.
, vol.19
, Issue.4
, pp. 325-339
-
-
Seo, J.S.1
Haitsma, J.2
Kalker, T.3
Yoo, C.D.4
-
28
-
-
34548104101
-
Unicity distance of robust image hashing
-
DOI 10.1109/TIFS.2007.902260
-
Y. Mao and M. Wu, "Unicity Distance of Robust Image Hashing," IEEE Trans. Information Forensics and Security, vol. 2, no. 3, pp. 462-467, Sept. 2007. (Pubitemid 47290580)
-
(2007)
IEEE Transactions on Information Forensics and Security
, vol.2
, Issue.3
, pp. 462-467
-
-
Mao, Y.1
Wu, M.2
-
29
-
-
77949696748
-
Perceptual image hashing based on virtual watermark detection
-
Apr.
-
F. Khelifi and J. Jiang, "Perceptual Image Hashing Based on Virtual Watermark Detection," IEEE Trans. Image Processing, vol. 19, no. 4, pp. 981-994, Apr. 2010.
-
(2010)
IEEE Trans. Image Processing
, vol.19
, Issue.4
, pp. 981-994
-
-
Khelifi, F.1
Jiang, J.2
-
30
-
-
79951589603
-
Structural feature-based image hashing and similarity metric for tampering detection
-
Z. Tang, S. Wang, X. Zhang, and W. Wei, "Structural Feature-Based Image Hashing and Similarity Metric for Tampering Detection," Fundamenta Informaticae, vol. 106, no. 1, pp. 75-91, 2011.
-
(2011)
Fundamenta Informaticae
, vol.106
, Issue.1
, pp. 75-91
-
-
Tang, Z.1
Wang, S.2
Zhang, X.3
Wei, W.4
-
31
-
-
84861117192
-
Perceptual image hashing based on shape contexts and local feature points
-
June
-
X. Lv and Z.J. Wang, "Perceptual Image Hashing Based on Shape Contexts and Local Feature Points," IEEE Trans. Information Forensics and Security, vol. 7, no. 3, pp. 1081-1093, June 2012.
-
(2012)
IEEE Trans. Information Forensics and Security
, vol.7
, Issue.3
, pp. 1081-1093
-
-
Lv, X.1
Wang, Z.J.2
-
32
-
-
84896693973
-
Perceptual hashing for color images using invariant moments
-
Z. Tang, Y. Dai, and X. Zhang, "Perceptual Hashing for Color Images Using Invariant Moments," Applied Math. and Information Sciences, vol. 6, no. 2S, pp. 643-650, 2012.
-
(2012)
Applied Math. and Information Sciences
, vol.6
, Issue.2 S
, pp. 643-650
-
-
Tang, Z.1
Dai, Y.2
Zhang, X.3
-
33
-
-
84937655864
-
Visual pattern recognition by moment invariants
-
M.K. Hu, "Visual Pattern Recognition by Moment Invariants," IRE Trans. Information Theory, vol. 8, no. 2, pp. 179-187, 1962.
-
(1962)
IRE Trans. Information Theory
, vol.8
, Issue.2
, pp. 179-187
-
-
Hu, M.K.1
-
34
-
-
84859010887
-
Robust image hashing based on random gabor filtering and dithered lattice vector quantization
-
Apr.
-
Y. Li, Z. Lu, C. Zhu, and X. Niu, "Robust Image Hashing Based on Random Gabor Filtering and Dithered Lattice Vector Quantization," IEEE Trans. Image Processing, vol. 21, no. 4, pp. 1963-1980, Apr. 2012.
-
(2012)
IEEE Trans. Image Processing
, vol.21
, Issue.4
, pp. 1963-1980
-
-
Li, Y.1
Lu, Z.2
Zhu, C.3
Niu, X.4
-
35
-
-
84870337010
-
Perceptual image hashing with histogram of color vector angles
-
Z. Tang, Y. Dai, X. Zhang, and S. Zhang, "Perceptual Image Hashing with Histogram of Color Vector Angles," Proc. Eight Int'l Conf. Active Media Technology (AMT '12), pp. 237-246, 2012.
-
(2012)
Proc. Eight Int'l Conf. Active Media Technology (AMT '12)
, pp. 237-246
-
-
Tang, Z.1
Dai, Y.2
Zhang, X.3
Zhang, S.4
-
36
-
-
84872026878
-
Robust hashing for image authentication using zernike moments and local features
-
Jan.
-
Y. Zhao, S. Wang, X. Zhang, and H. Yao, "Robust Hashing for Image Authentication Using Zernike Moments and Local Features," IEEE Trans. Information Forensics and Security, vol. 8, no. 1, pp. 55-63, Jan. 2013.
-
(2013)
IEEE Trans. Information Forensics and Security
, vol.8
, Issue.1
, pp. 55-63
-
-
Zhao, Y.1
Wang, S.2
Zhang, X.3
Yao, H.4
-
37
-
-
0033592606
-
Learning the parts of objects by non-negative matrix factorization
-
D.D. Lee and H.S. Seung, "Learning the Parts of Objects by Non-Negative Matrix Factorization," Nature, vol. 401, pp. 788-791, 1999.
-
(1999)
Nature
, vol.401
, pp. 788-791
-
-
Lee, D.D.1
Seung, H.S.2
-
38
-
-
80052600921
-
Large margin based nonnegative matrix factorization and partial least squares regression for face recognition
-
J. Pan and J. Zhang, "Large Margin Based Nonnegative Matrix Factorization and Partial Least Squares Regression for Face Recognition," Pattern Recognition Letters, vol. 32, no. 14, pp. 1822-1835, 2011.
-
(2011)
Pattern Recognition Letters
, vol.32
, Issue.14
, pp. 1822-1835
-
-
Pan, J.1
Zhang, J.2
-
39
-
-
33748582900
-
NMF, LNMF, and DNMF modeling of neural receptive fields involved in human facial expression perception
-
DOI 10.1016/j.jvcir.2006.06.001, PII S104732030600040X
-
I. Buciu and I. Pitas, "NMF, LNMF, and DNMF Modeling of Neural Receptive Fields Involved in Human Facial Expression Perception," J. Visual Comm. and Image Representation, vol. 17, no. 5, pp. 958-969, 2006. (Pubitemid 44380387)
-
(2006)
Journal of Visual Communication and Image Representation
, vol.17
, Issue.5
, pp. 958-969
-
-
Buciu, I.1
Pitas, I.2
-
40
-
-
79959533573
-
Nonnegative matrix factorization with earth mover's distance metric for image analysis
-
Aug.
-
R. Sandler and M. Lindenbaum, "Nonnegative Matrix Factorization with Earth Mover's Distance Metric for Image Analysis," IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 33, no. 8, pp. 1590-1602, Aug. 2011.
-
(2011)
IEEE Trans. Pattern Analysis and Machine Intelligence
, vol.33
, Issue.8
, pp. 1590-1602
-
-
Sandler, R.1
Lindenbaum, M.2
-
41
-
-
54749116029
-
Nonnegative matrix factorization applied to nonlinear speech and image cryptosystems
-
Sept.
-
S. Xie, Z. Yang, and Y. Fu, "Nonnegative Matrix Factorization Applied to Nonlinear Speech and Image Cryptosystems," IEEE Trans. Circuits and Systems I: Regular Papers, vol. 55, no. 8, pp. 2356-2367, Sept. 2008.
-
(2008)
IEEE Trans. Circuits and Systems I: Regular Papers
, vol.55
, Issue.8
, pp. 2356-2367
-
-
Xie, S.1
Yang, Z.2
Fu, Y.3
-
42
-
-
77956014774
-
Non-negative matrix factorization for semisupervised heterogeneous data coclustering
-
Oct.
-
Y. Chen, L. Wang, and M. Dong, "Non-Negative Matrix Factorization for Semisupervised Heterogeneous Data Coclustering," IEEE Trans. Knowledge and Data Eng., vol. 22, no. 10, pp. 1459-1474, Oct. 2010.
-
(2010)
IEEE Trans. Knowledge and Data Eng.
, vol.22
, Issue.10
, pp. 1459-1474
-
-
Chen, Y.1
Wang, L.2
Dong, M.3
-
44
-
-
34548062342
-
Novel discriminant non-negative matrix factorization algorithm with applications to facial image characterization problems
-
DOI 10.1109/TIFS.2007.902017
-
I. Kotsia, S. Zafeiriou, and I. Pitas, "A Novel Discriminant Non-Negative Matrix Factorization Algorithm with Applications to Facial Image Characterization Problems," IEEE Trans. Information Forensics and Security, vol. 2, no. 3, pp. 588-595, Sept. 2007. (Pubitemid 47290591)
-
(2007)
IEEE Transactions on Information Forensics and Security
, vol.2
, Issue.3
, pp. 588-595
-
-
Kotsia, I.1
Zafeiriou, S.2
Pitas, I.3
-
45
-
-
85032751954
-
Watermarking schemes evaluation
-
Sept.
-
F.A.P. Petitcolas, "Watermarking Schemes Evaluation," IEEE Signal Processing Magazine, vol. 17, no. 5, pp. 58-64, Sept. 2000.
-
(2000)
IEEE Signal Processing Magazine
, vol.17
, Issue.5
, pp. 58-64
-
-
Petitcolas, F.A.P.1
-
46
-
-
33646023117
-
An introduction to roc analysis
-
T. Fawcett, "An Introduction to ROC Analysis," Pattern Recognition Letters, vol. 27, no. 8, pp. 861-874, 2006.
-
(2006)
Pattern Recognition Letters
, vol.27
, Issue.8
, pp. 861-874
-
-
Fawcett, T.1
|