-
1
-
-
43049174575
-
Speeded-up robust features (SURF)
-
Bay H, Ess A, Tuytelaars T, Van Gool L (2008) Speeded-up robust features (SURF). Comput Vis Image Underst 110(3):346–359
-
(2008)
Comput Vis Image Underst
, vol.110
, Issue.3
, pp. 346-359
-
-
Bay, H.1
Ess, A.2
Tuytelaars, T.3
Van Gool, L.4
-
2
-
-
18844374135
-
Robust content-based image searches for copyright protection. In: Proceedings of the First ACM International Workshop on Multimedia Databases (MMDB’03), pp 70–77
-
Berrani SA, Amsaleg L, Gros P (2003) Robust content-based image searches for copyright protection. In: Proceedings of the First ACM International Workshop on Multimedia Databases (MMDB’03), pp 70–77. doi:10.1145/951676.951690
-
(2003)
doi:10.1145/951676.951690
-
-
Berrani, S.A.1
Amsaleg, L.2
Gros, P.3
-
3
-
-
85047758769
-
Duplicate image detection in large scale databases
-
Tools and Applications: World Scientific Publishing Company
-
Ghosh P, Gelasca ED, Ramakrisnan KR, Manjunath BS (2007) Duplicate image detection in large scale databases. In: Chandra B, Murthy CA (ed) Advances in Intelligent Information Processing: Tools and Applications, World Scientific Publishing Company, pp 149–166
-
(2007)
Advances in Intelligent Information Processing
, pp. 149-166
-
-
Ghosh, P.1
Gelasca, E.D.2
Ramakrisnan, K.R.3
Manjunath, B.S.4
Chandra, B.5
Murthy, C.A.6
-
4
-
-
84933685444
-
-
Hash function, Wikipedia. Accessed 12 September 2013
-
Hash function, Wikipedia. http://en.wikipedia.org/wiki/Hash_function. Accessed 12 September 2013
-
-
-
-
5
-
-
79953028038
-
An image authentication scheme based on digital watermarking and image secret sharing
-
Hsieh SL, Tsai IJ, Yeh CP, Chang CM (2011) An image authentication scheme based on digital watermarking and image secret sharing. Multimedia Tools Appl 52(2–3):597–619
-
(2011)
Multimedia Tools Appl
, vol.52
, Issue.2-3
, pp. 597-619
-
-
Hsieh, S.L.1
Tsai, I.J.2
Yeh, C.P.3
Chang, C.M.4
-
6
-
-
77951948653
-
Secure image hashing via minimum distortion estimation. In: Proceedings of the 16th IEEE International Conference on Image Processing (ICIP), pp 1281–1284
-
Hsu CY, Lu CS, Pei SC (2009) Secure image hashing via minimum distortion estimation. In: Proceedings of the 16th IEEE International Conference on Image Processing (ICIP), pp 1281–1284. doi:10.1109/ICIP.2009.5413600
-
(2009)
doi:10.1109/ICIP.2009.5413600
-
-
Hsu, C.Y.1
Lu, C.S.2
Pei, S.C.3
-
7
-
-
77957955786
-
A comparison of SIFT, PCA-SIFT, and SURF
-
Juan L, Gwun O (2009) A comparison of SIFT, PCA-SIFT, and SURF. Int J Image Process (IJIP) 3(4):143–152
-
(2009)
Int J Image Process (IJIP)
, vol.3
, Issue.4
, pp. 143-152
-
-
Juan, L.1
Gwun, O.2
-
10
-
-
84856647875
-
BRISK: Binary robust invariant scalable keypoints, In: Proceedings of 2011 IEEE International Conference on Computer Vision, pp 2548–2555
-
Leutenegger S, Chli M, Siegwar RY (2011) BRISK: Binary robust invariant scalable keypoints, In: Proceedings of 2011 IEEE International Conference on Computer Vision, pp 2548–2555. doi:10.1109/ICCV.2011.6126542
-
(2011)
doi:10.1109/ICCV.2011.6126542
-
-
Leutenegger, S.1
Chli, M.2
Siegwar, R.Y.3
-
11
-
-
79953029604
-
Fine-search for image copy detection based on local affine-invariant descriptor and spatial dependent matching
-
Ling H, Wang L, Zou F, Yan W (2011) Fine-search for image copy detection based on local affine-invariant descriptor and spatial dependent matching. Multimedia Tools Appl 52(2–3):551–568
-
(2011)
Multimedia Tools Appl
, vol.52
, Issue.2-3
, pp. 551-568
-
-
Ling, H.1
Wang, L.2
Zou, F.3
Yan, W.4
-
12
-
-
3042535216
-
Distinctive image features from scale-invariant keypoints
-
Lowe DG (2004) Distinctive image features from scale-invariant keypoints. Int J Comput Vis 60(2):91–110
-
(2004)
Int J Comput Vis
, vol.60
, Issue.2
, pp. 91-110
-
-
Lowe, D.G.1
-
13
-
-
84933685447
-
-
Low resolution web-crawledmisc database used in WBIIS, test database used in SIMPLIcity paper. Accessed 20 September 2013
-
Low resolution web-crawledmisc database used in WBIIS, test database used in SIMPLIcity paper. http://wang.ist.psu.edu/docs/related/. Accessed 20 September 2013
-
-
-
-
14
-
-
30744471653
-
Geometric distortion-resilient image hashing scheme and its applications on copy detection and authentication
-
Lu CS, Hsu CY (2005) Geometric distortion-resilient image hashing scheme and its applications on copy detection and authentication. Multimedia Syst 11(2):159–173
-
(2005)
Multimedia Syst
, vol.11
, Issue.2
, pp. 159-173
-
-
Lu, C.S.1
Hsu, C.Y.2
-
17
-
-
80052275017
-
Binary SIFT: fast image retrieval using binary quantized SIFT features, In: Proceedings of the Ninth International Workshop on Content-Based Multimedia Indexing (CBMI), pp 217–222
-
Peker KA (2011) Binary SIFT: fast image retrieval using binary quantized SIFT features, In: Proceedings of the Ninth International Workshop on Content-Based Multimedia Indexing (CBMI), pp 217–222. doi:10.1109/CBMI.2011.5972548
-
(2011)
doi:10.1109/CBMI.2011.5972548
-
-
Peker, K.A.1
-
18
-
-
84933685449
-
-
Polar coordinate system, Wikipedia. Accessed 12 September 2013
-
Polar coordinate system, Wikipedia. http://en.wikipedia.org/wiki/Polar_Coordinates. Accessed 12 September 2013
-
-
-
-
19
-
-
1542529865
-
A robust image fingerprinting system using the Radon transform
-
Seo JS, Haitsma J, Kalker T, Yoo CD (2004) A robust image fingerprinting system using the Radon transform. Signal Process Image Commun 19(4):325–339
-
(2004)
Signal Process Image Commun
, vol.19
, Issue.4
, pp. 325-339
-
-
Seo, J.S.1
Haitsma, J.2
Kalker, T.3
Yoo, C.D.4
-
20
-
-
79953024813
-
Lexicographical framework for image hashing with implementation based on DCT and NMF
-
Tang Z, Wang S, Zhang X, Wei W, Zhao Y (2011) Lexicographical framework for image hashing with implementation based on DCT and NMF. Multimedia Tools Appl 52(2–3):325–345
-
(2011)
Multimedia Tools Appl
, vol.52
, Issue.2-3
, pp. 325-345
-
-
Tang, Z.1
Wang, S.2
Zhang, X.3
Wei, W.4
Zhao, Y.5
-
21
-
-
84933685450
-
-
The INRIA Copydays dataset. Accessed 20 September 2013
-
The INRIA Copydays dataset. http://lear.inrialpes.fr/people/jegou/data.php#copydays. Accessed 20 September 2013
-
-
-
-
22
-
-
84933685451
-
-
The USC-SIPI Image Database. Accessed 20 September 2013
-
The USC-SIPI Image Database. http://sipi.usc.edu/database/. Accessed 20 September 2013
-
-
-
-
24
-
-
57649225610
-
A survey of the image copy detection. In: Proceedings of IEEE Conference on Cybernetics and Intelligent Systems, pp 738–743
-
Wan YH, Yuan QL, Ji SM, He LM, Wang YL (2008) A survey of the image copy detection. In: Proceedings of IEEE Conference on Cybernetics and Intelligent Systems, pp 738–743. doi:10.1109/ICCIS.2008.4670942
-
(2008)
doi:10.1109/ICCIS.2008.4670942
-
-
Wan, Y.H.1
Yuan, Q.L.2
Ji, S.M.3
He, L.M.4
Wang, Y.L.5
-
25
-
-
34548069995
-
Recent development of perceptual image hashing
-
Wang SZ, Zhang XP (2007) Recent development of perceptual image hashing. J Shanghai Univ 11:323–331
-
(2007)
J Shanghai Univ
, vol.11
, pp. 323-331
-
-
Wang, S.Z.1
Zhang, X.P.2
-
26
-
-
33646832581
-
Image copy detection with rotating tolerance. In: Proceedings of International Conference on Computational Intelligence and Security • Lecture Notes in Computer Science. vol 3801. Springer, Heidelberg, pp 464–469
-
Wu M, Lin C, Chang C (2005) Image copy detection with rotating tolerance. In: Proceedings of International Conference on Computational Intelligence and Security • Lecture Notes in Computer Science. vol 3801. Springer, Heidelberg, pp 464–469. doi:10.1007/11596448_68
-
(2005)
doi:10.1007/11596448_68
-
-
Wu, M.1
Lin, C.2
Chang, C.3
-
27
-
-
83655192961
-
Copy image detection based on local keypoints, In: Proceedings of 2011 International Conference of Soft Computing and Pattern Recognition (SoCPaR), pp 258–262
-
Yao J, Wang X, Wang R (2011) Copy image detection based on local keypoints, In: Proceedings of 2011 International Conference of Soft Computing and Pattern Recognition (SoCPaR), pp 258–262. doi:10.1109/SoCPaR.2011.6089117
-
(2011)
doi:10.1109/SoCPaR.2011.6089117
-
-
Yao, J.1
Wang, X.2
Wang, R.3
-
28
-
-
67449123343
-
Robust image hashing for image authentication based on DCT-DWT composite domain
-
Zhan RX, Chau KY, Lu ZM, Liu BB, Ip WH (2008) Robust image hashing for image authentication based on DCT-DWT composite domain, In: Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications (ISDA'08), vol 2. pp 119–122. doi:10.1109/ISDA.2008.66
-
(2008)
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications (ISDA'08)
, vol.2
, pp. 119-122
-
-
Zhan, R.X.1
Chau, K.Y.2
Lu, Z.M.3
Liu, B.B.4
Ip, W.H.5
-
29
-
-
62449218032
-
Scale-rotation invariant pattern entropy for keypoint-based near-duplicate detection
-
Zhao W, Ngo CW (2009) Scale-rotation invariant pattern entropy for keypoint-based near-duplicate detection. IEEE Trans Image Process 18(2):412–423
-
(2009)
IEEE Trans Image Process
, vol.18
, Issue.2
, pp. 412-423
-
-
Zhao, W.1
Ngo, C.W.2
-
30
-
-
77956953420
-
A robust image hashing method based on Zernike moments
-
Zhao Y, Wang S, Feng G, Tang Z (2010) A robust image hashing method based on Zernike moments. J Comput Inf Syst 6(3):717–725
-
(2010)
J Comput Inf Syst
, vol.6
, Issue.3
, pp. 717-725
-
-
Zhao, Y.1
Wang, S.2
Feng, G.3
Tang, Z.4
|