-
2
-
-
33750344108
-
Perceptual image hashing via feature points: performance evaluation and trade-offs
-
V. Monga and B. L. Evans, Perceptual image hashing via feature points: performance evaluation and trade-offs. IEEE Transactions on Image Processing. (2006), 15(11), 3453-3466.
-
(2006)
IEEE Transactions on Image Processing.
, vol.15
, Issue.11
, pp. 3453-3466
-
-
Monga, V.1
Evans, B.L.2
-
3
-
-
75249099043
-
A secure and robust hash-based scheme for image authentication
-
F. Ahmed, M.Y. Siyal and V.U. Abbas, A secure and robust hash-based scheme for image authentication. Signal Processing. (2010), 90(5), 1456-1470.
-
(2010)
Signal Processing
, vol.90
, Issue.5
, pp. 1456-1470
-
-
Ahmed, F.1
Siyal, M.Y.2
Abbas, V.U.3
-
5
-
-
0035248504
-
A robust image authentication system distinguishing JPEG compression from malicious manipulation
-
C. Y. Lin and S. F. Chang, A robust image authentication system distinguishing JPEG compression from malicious manipulation. IEEE Transactions on Circuits System and Video Technology. (2001), 11(2), 153-168.
-
(2001)
IEEE Transactions on Circuits System and Video Technology.
, vol.11
, Issue.2
, pp. 153-168
-
-
Lin, C.Y.1
Chang, S.F.2
-
7
-
-
67651097643
-
A novel image hash algorithm resistant to print-scan
-
D. Wu, X. Zhou and X. Niu, A novel image hash algorithm resistant to print-scan. Signal Processing. (2009), 89(12), 2415-2424.
-
(2009)
Signal Processing
, vol.89
, Issue.12
, pp. 2415-2424
-
-
Wu, D.1
Zhou, X.2
Niu, X.3
-
8
-
-
33744764278
-
Robust and secure image hashing
-
A. Swaminathan, Y. Mao and M. Wu, Robust and secure image hashing. IEEE Transactions on Information Forensics and Security. (2006), 1(2), 215-230.
-
(2006)
IEEE Transactions on Information Forensics and Security
, vol.1
, Issue.2
, pp. 215-230
-
-
Swaminathan, A.1
Mao, Y.2
Wu, M.3
-
10
-
-
70350221685
-
Robust image hashing for tamper detection using non-negative matrix factorization
-
Z. Tang, S. Wang, X. Zhang, W. Wei and S. Su, Robust image hashing for tamper detection using non-negative matrix factorization. Journal of Ubiquitous Convergence and Technology. (2008), 2(1), 18-26.
-
(2008)
Journal of Ubiquitous Convergence and Technology
, vol.2
, Issue.1
, pp. 18-26
-
-
Tang, Z.1
Wang, S.2
Zhang, X.3
Wei, W.4
Su, S.5
-
11
-
-
79953024813
-
Lexicographical framework for image hashing with implementation based on DCT and NMF
-
Z. Tang, S. Wang, X. Zhang, W. Wei and Y. Zhao, Lexicographical framework for image hashing with implementation based on DCT and NMF. Multimedia Tools and Applications. (2011), 52(2-3), 325-345.
-
(2011)
Multimedia Tools and Applications
, vol.52
, Issue.2-3
, pp. 325-345
-
-
Tang, Z.1
Wang, S.2
Zhang, X.3
Wei, W.4
Zhao, Y.5
-
12
-
-
84937655864
-
Visual pattern recognition by moment invariants
-
M. K. Hu, Visual pattern recognition by moment invariants. IRE Transaction on Information Theory. (1962), IT-8,179-187.
-
(1962)
IRE Transaction on Information Theory
, vol.IT-8
, pp. 179-187
-
-
Hu, M.K.1
-
13
-
-
0019728639
-
A note on invariant moments in image processing
-
Man, and Cybernetics
-
T. C. HSIA, A note on invariant moments in image processing. IEEE Transactions on Systems, Man, and Cybernetics. (1981), SMC-11(12), 831-834.
-
(1981)
IEEE Transactions on Systems
, vol.SMC-11
, Issue.12
, pp. 831-834
-
-
Hsia, T.C.1
-
16
-
-
33646023117
-
An introduction to ROC analysis
-
T. Fawcett, An introduction to ROC analysis. Pattern Recognition Letters. (2006), 27(8), 861-874.
-
(2006)
Pattern Recognition Letters
, vol.27
, Issue.8
, pp. 861-874
-
-
Fawcett, T.1
|