메뉴 건너뛰기




Volumn 11, Issue 1, 2016, Pages 200-214

Robust Image Hashing with Ring Partition and Invariant Vector Distance

Author keywords

a; b; CIE L; color space; Image hashing; image rotation; invariant distance; ring partition

Indexed keywords

ARSENIC; BORON; ROTATION;

EID: 84964888387     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2015.2485163     Document Type: Article
Times cited : (230)

References (41)
  • 1
    • 85032771294 scopus 로고    scopus 로고
    • Locality-sensitive hashing for finding nearest neighbors[Lecture Notes]
    • Mar.
    • M. Slaney and M. Casey, "Locality-sensitive hashing for finding nearest neighbors [Lecture Notes]," IEEE Signal Process. Mag., vol. 25, no. 2, pp. 128-131, Mar. 2008.
    • (2008) IEEE Signal Process. Mag. , vol.25 , Issue.2 , pp. 128-131
    • Slaney, M.1    Casey, M.2
  • 2
    • 75249099043 scopus 로고    scopus 로고
    • A secure and robust hashbased scheme for image authentication
    • F. Ahmed, M. Y. Siyal, V. U. Abbas, "A secure and robust hashbased scheme for image authentication," Signal Process., vol. 90, no. 5, pp. 1456-1470, 2010.
    • (2010) Signal Process. , vol.90 , Issue.5 , pp. 1456-1470
    • Ahmed, F.1    Siyal, M.Y.2    Abbas, V.U.3
  • 3
    • 83955162216 scopus 로고    scopus 로고
    • Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism
    • C. Qin, C.-C. Chang, P.-Y. Chen, "Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism," Signal Process., vol. 92, no. 4, pp. 1137-1150, 2012.
    • (2012) Signal Process. , vol.92 , Issue.4 , pp. 1137-1150
    • Qin, C.1    Chang, C.-C.2    Chen, P.-Y.3
  • 5
    • 84864130926 scopus 로고    scopus 로고
    • Feature combination in kernel space for distance based image hashing
    • Aug.
    • E. Hassan, S. Chaudhury, M. Gopal, "Feature combination in kernel space for distance based image hashing," IEEE Trans. Multimedia, vol. 14, no. 4, pp. 1179-1195, Aug. 2012.
    • (2012) IEEE Trans. Multimedia , vol.14 , Issue.4 , pp. 1179-1195
    • Hassan, E.1    Chaudhury, S.2    Gopal, M.3
  • 6
    • 77951971972 scopus 로고    scopus 로고
    • Reduced-reference image quality assessment based on perceptual image hashing
    • Nov.
    • X. Lv and Z. J. Wang, "Reduced-reference image quality assessment based on perceptual image hashing," in Proc. IEEE Int. Conf. Image Process., Nov. 2009, pp. 4361-4364.
    • (2009) Proc IEEE Int. Conf. Image Process. , pp. 4361-4364
    • Lv, X.1    Wang, Z.J.2
  • 7
    • 78651096334 scopus 로고    scopus 로고
    • Multimedia forensic hash based on visual words
    • Sep.
    • W. Lu and M. Wu, "Multimedia forensic hash based on visual words," in Proc. IEEE Int. Conf. Image Process., Sep. 2010, pp. 989-992.
    • (2010) Proc IEEE Int. Conf. Image Process. , pp. 989-992
    • Lu, W.1    Wu, M.2
  • 9
    • 84894472419 scopus 로고    scopus 로고
    • Robust perceptual image hashing based on ring partition and NMF
    • Mar.
    • Z. Tang, X. Zhang, S. Zhang, "Robust perceptual image hashing based on ring partition and NMF," IEEE Trans. Knowl. Data Eng., vol. 26, no. 3, pp. 711-724, Mar. 2014.
    • (2014) IEEE Trans. Knowl. Data Eng. , vol.26 , Issue.3 , pp. 711-724
    • Tang, Z.1    Zhang, X.2    Zhang, S.3
  • 10
    • 70350221685 scopus 로고    scopus 로고
    • Robust image hashing for tamper detection using non-negative matrix factorization
    • Z. Tang, S. Wang, X. Zhang, W. Wei, S. Su, "Robust image hashing for tamper detection using non-negative matrix factorization," J. Ubiquitous Converg. Technol., vol. 2, no. 1, pp. 18-26, 2008.
    • (2008) J. Ubiquitous Converg. Technol. , vol.2 , Issue.1 , pp. 18-26
    • Tang, Z.1    Wang, S.2    Zhang, X.3    Wei, W.4    Su, S.5
  • 12
    • 0035248504 scopus 로고    scopus 로고
    • A robust image authentication method distinguishing JPEG compression from malicious manipulation
    • Feb.
    • C.-Y. Lin and S.-F. Chang, "A robust image authentication method distinguishing JPEG compression from malicious manipulation," IEEE Trans. Circuits Syst. Video Technol., vol. 11, no. 2, pp. 153-168, Feb. 2001.
    • (2001) IEEE Trans. Circuits Syst. Video Technol. , vol.11 , Issue.2 , pp. 153-168
    • Lin, C.-Y.1    Chang, S.-F.2
  • 13
    • 79953024813 scopus 로고    scopus 로고
    • Lexicographical framework for image hashing with implementation based on DCT and NMF
    • Z. Tang, S. Wang, X. Zhang, W. Wei, Y. Zhao, "Lexicographical framework for image hashing with implementation based on DCT and NMF," Multimedia Tools Appl., vol. 52, nos. 2-3, pp. 325-345, 2011.
    • (2011) Multimedia Tools Appl. , vol.52 , Issue.2-3 , pp. 325-345
    • Tang, Z.1    Wang, S.2    Zhang, X.3    Wei, W.4    Zhao, Y.5
  • 17
    • 84859010887 scopus 로고    scopus 로고
    • Robust image hashing based on random Gabor filtering and dithered lattice vector quantization
    • Apr.
    • Y. Li, Z. Lu, C. Zhu, X. Niu, "Robust image hashing based on random Gabor filtering and dithered lattice vector quantization," IEEE Trans. Image Process., vol. 21, no. 4, pp. 1963-1980, Apr. 2012.
    • (2012) IEEE Trans. Image Process. , vol.21 , Issue.4 , pp. 1963-1980
    • Li, Y.1    Lu, Z.2    Zhu, C.3    Niu, X.4
  • 18
    • 84875880417 scopus 로고    scopus 로고
    • Robust image hashing using ring-based entropies
    • Z. Tang, X. Zhang, L. Huang, Y. Dai, "Robust image hashing using ring-based entropies," Signal Process., vol. 93, no. 7, pp. 2061-2069, 2013.
    • (2013) Signal Process. , vol.93 , Issue.7 , pp. 2061-2069
    • Tang, Z.1    Zhang, X.2    Huang, L.3    Dai, Y.4
  • 19
    • 1542529865 scopus 로고    scopus 로고
    • A robust image fingerprinting system using the Radon transform
    • J. S. Seo, J. Haitsma, T. Kalker, C. D. Yoo, "A robust image fingerprinting system using the Radon transform," Signal Process., Image Commun., vol. 19, no. 4, pp. 325-339, 2004.
    • (2004) Signal Process., Image Commun. , vol.19 , Issue.4 , pp. 325-339
    • Seo, J.S.1    Haitsma, J.2    Kalker, T.3    Yoo, C.D.4
  • 20
    • 27844535360 scopus 로고    scopus 로고
    • Robust video hashing based on radial projections of key frames
    • Oct.
    • C. De Roover, C. De Vleeschouwer, F. Lefebvre, B. Macq, "Robust video hashing based on radial projections of key frames," IEEE Trans. Signal Process., vol. 53, no. 10, pp. 4020-4037, Oct. 2005.
    • (2005) IEEE Trans. Signal Process. , vol.53 , Issue.10 , pp. 4020-4037
    • De Roover, C.1    De Vleeschouwer, C.2    Lefebvre, F.3    MacQ, B.4
  • 21
    • 67651097643 scopus 로고    scopus 로고
    • A novel image hash algorithm resistant to print-scan
    • D. Wu, X. Zhou, X. Niu, "A novel image hash algorithm resistant to print-scan," Signal Process., vol. 89, no. 12, pp. 2415-2424, 2009.
    • (2009) Signal Process. , vol.89 , Issue.12 , pp. 2415-2424
    • Wu, D.1    Zhou, X.2    Niu, X.3
  • 23
    • 33750344108 scopus 로고    scopus 로고
    • Perceptual image hashing via feature points: Performance evaluation and tradeoffs
    • Nov.
    • V. Monga and B. L. Evans, "Perceptual image hashing via feature points: Performance evaluation and tradeoffs," IEEE Trans. Image Process., vol. 15, no. 11, pp. 3452-3465, Nov. 2006.
    • (2006) IEEE Trans. Image Process. , vol.15 , Issue.11 , pp. 3452-3465
    • Monga, V.1    Evans, B.L.2
  • 24
    • 33645004781 scopus 로고    scopus 로고
    • A clustering based approach to perceptual image hashing
    • Mar.
    • V. Monga, A. Banerjee, B. L. Evans, "A clustering based approach to perceptual image hashing," IEEE Trans. Inf. Forensics Security, vol. 1, no. 1, pp. 68-79, Mar. 2006.
    • (2006) IEEE Trans. Inf. Forensics Security , vol.1 , Issue.1 , pp. 68-79
    • Monga, V.1    Banerjee, A.2    Evans, B.L.3
  • 25
    • 34548085689 scopus 로고    scopus 로고
    • Robust and secure image hashing via non-negative matrix factorizations
    • Sep.
    • V. Monga and M. K. Mihcąk, "Robust and secure image hashing via non-negative matrix factorizations," IEEE Trans. Inf. Forensics Security, vol. 2, no. 3, pp. 376-390, Sep. 2007.
    • (2007) IEEE Trans. Inf. Forensics Security , vol.2 , Issue.3 , pp. 376-390
    • Monga, V.1    Mihcąk, M.K.2
  • 27
    • 77949696748 scopus 로고    scopus 로고
    • Perceptual image hashing based on virtual watermark detection
    • Apr.
    • F. Khelifi and J. Jiang, "Perceptual image hashing based on virtual watermark detection," IEEE Trans. Image Process., vol. 19, no. 4, pp. 981-994, Apr. 2010.
    • (2010) IEEE Trans. Image Process. , vol.19 , Issue.4 , pp. 981-994
    • Khelifi, F.1    Jiang, J.2
  • 28
    • 79951589603 scopus 로고    scopus 로고
    • Structural feature-based image hashing and similarity metric for tampering detection
    • Z. Tang, S. Wang, X. Zhang, W. Wei, "Structural feature-based image hashing and similarity metric for tampering detection," Fundam. Inf., vol. 106, no. 1, pp. 75-91, 2011.
    • (2011) Fundam. Inf. , vol.106 , Issue.1 , pp. 75-91
    • Tang, Z.1    Wang, S.2    Zhang, X.3    Wei, W.4
  • 29
    • 79957996038 scopus 로고    scopus 로고
    • Robust image hash in Radon transform domain for authentication
    • Y. Lei, Y. Wang, J. Huang, "Robust image hash in Radon transform domain for authentication," Signal Process., Image Commun., vol. 26, no. 6, pp. 280-288, 2011.
    • (2011) Signal Process., Image Commun. , vol.26 , Issue.6 , pp. 280-288
    • Lei, Y.1    Wang, Y.2    Huang, J.3
  • 30
    • 38849134763 scopus 로고    scopus 로고
    • Histogram-based image hashing scheme robust against geometric deformations
    • S. Xiang, H.-J. Kim, J. Huang, "Histogram-based image hashing scheme robust against geometric deformations," in Proc. ACM Workshop Multimedia Secur., 2007, pp. 121-128.
    • (2007) Proc. ACM Workshop Multimedia Secur. , pp. 121-128
    • Xiang, S.1    Kim, H.-J.2    Huang, J.3
  • 31
    • 84861117192 scopus 로고    scopus 로고
    • Perceptual image hashing based on shape contexts and local feature points
    • Jun.
    • X. Lv and Z. J. Wang, "Perceptual image hashing based on shape contexts and local feature points," IEEE Trans. Inf. Forensics Security, vol. 7, no. 3, pp. 1081-1093, Jun. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.3 , pp. 1081-1093
    • Lv, X.1    Wang, Z.J.2
  • 32
    • 84896693973 scopus 로고    scopus 로고
    • Perceptual hashing for color images using invariant moments
    • Z. Tang, Y. Dai, X. Zhang, "Perceptual hashing for color images using invariant moments," Appl. Math. Inf. Sci., vol. 6, no. 2S, pp. 643S-650S, 2012.
    • (2012) Appl. Math. Inf. Sci. , vol.6 , Issue.S2 , pp. 643S-650S
    • Tang, Z.1    Dai, Y.2    Zhang, X.3
  • 33
    • 84937655864 scopus 로고
    • Visual pattern recognition by moment invariants
    • Feb.
    • M.-K. Hu, "Visual pattern recognition by moment invariants," IRE Trans. Inf. Theory, vol. 8, no. 2, pp. 179-187, Feb. 1962.
    • (1962) IRE Trans. Inf. Theory , vol.8 , Issue.2 , pp. 179-187
    • Hu, M.-K.1
  • 34
    • 84872026878 scopus 로고    scopus 로고
    • Robust hashing for image authentication using Zernike moments and local features
    • Jan.
    • Y. Zhao, S. Wang, X. Zhang, H. Yao, "Robust hashing for image authentication using Zernike moments and local features," IEEE Trans. Inf. Forensics Security, vol. 8, no. 1, pp. 55-63, Jan. 2013.
    • (2013) IEEE Trans. Inf. Forensics Security , vol.8 , Issue.1 , pp. 55-63
    • Zhao, Y.1    Wang, S.2    Zhang, X.3    Yao, H.4
  • 37
    • 85032751954 scopus 로고    scopus 로고
    • Watermarking schemes evaluation
    • Sep.
    • F. A. P. Petitcolas, "Watermarking schemes evaluation," IEEE Signal Process. Mag., vol. 17, no. 5, pp. 58-64, Sep. 2000.
    • (2000) IEEE Signal Process. Mag. , vol.17 , Issue.5 , pp. 58-64
    • Petitcolas, F.A.P.1
  • 38
    • 84964815356 scopus 로고    scopus 로고
    • USC-SIPI Image Database. [Online]. Available
    • (2007). USC-SIPI Image Database. [Online]. Available: http://sipi.usc. edu/database/
    • (2007)
  • 39
    • 84964852414 scopus 로고    scopus 로고
    • Ground Truth Database. [Online]. Available
    • (2008). Ground Truth Database. [Online]. Available: http://www.cs. washington.edu/research/imagedatabase/groundtruth/
    • (2008)
  • 41
    • 33646023117 scopus 로고    scopus 로고
    • An introduction to ROC analysis
    • T. Fawcett, "An introduction to ROC analysis," Pattern Recognit. Lett., vol. 27, no. 8, pp. 861-874, 2006.
    • (2006) Pattern Recognit. Lett. , vol.27 , Issue.8 , pp. 861-874
    • Fawcett, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.