-
1
-
-
85032771294
-
Locality-sensitive hashing for finding nearest neighbors[Lecture Notes]
-
Mar.
-
M. Slaney and M. Casey, "Locality-sensitive hashing for finding nearest neighbors [Lecture Notes]," IEEE Signal Process. Mag., vol. 25, no. 2, pp. 128-131, Mar. 2008.
-
(2008)
IEEE Signal Process. Mag.
, vol.25
, Issue.2
, pp. 128-131
-
-
Slaney, M.1
Casey, M.2
-
2
-
-
75249099043
-
A secure and robust hashbased scheme for image authentication
-
F. Ahmed, M. Y. Siyal, V. U. Abbas, "A secure and robust hashbased scheme for image authentication," Signal Process., vol. 90, no. 5, pp. 1456-1470, 2010.
-
(2010)
Signal Process.
, vol.90
, Issue.5
, pp. 1456-1470
-
-
Ahmed, F.1
Siyal, M.Y.2
Abbas, V.U.3
-
3
-
-
83955162216
-
Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism
-
C. Qin, C.-C. Chang, P.-Y. Chen, "Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism," Signal Process., vol. 92, no. 4, pp. 1137-1150, 2012.
-
(2012)
Signal Process.
, vol.92
, Issue.4
, pp. 1137-1150
-
-
Qin, C.1
Chang, C.-C.2
Chen, P.-Y.3
-
4
-
-
11244351627
-
Robust mesh-based hashing for copy detection and tracing of images
-
Jun.
-
C.-S. Lu, C. Y. Hsu, S.-W. Sun, P.-C. Chang, "Robust mesh-based hashing for copy detection and tracing of images," in Proc. IEEE Int. Conf. Multimedia Expo, Jun. 2004, pp. 731-734.
-
(2004)
Proc IEEE Int. Conf. Multimedia Expo
, pp. 731-734
-
-
Lu, C.-S.1
Hsu, C.Y.2
Sun, S.-W.3
Chang, P.-C.4
-
5
-
-
84864130926
-
Feature combination in kernel space for distance based image hashing
-
Aug.
-
E. Hassan, S. Chaudhury, M. Gopal, "Feature combination in kernel space for distance based image hashing," IEEE Trans. Multimedia, vol. 14, no. 4, pp. 1179-1195, Aug. 2012.
-
(2012)
IEEE Trans. Multimedia
, vol.14
, Issue.4
, pp. 1179-1195
-
-
Hassan, E.1
Chaudhury, S.2
Gopal, M.3
-
6
-
-
77951971972
-
Reduced-reference image quality assessment based on perceptual image hashing
-
Nov.
-
X. Lv and Z. J. Wang, "Reduced-reference image quality assessment based on perceptual image hashing," in Proc. IEEE Int. Conf. Image Process., Nov. 2009, pp. 4361-4364.
-
(2009)
Proc IEEE Int. Conf. Image Process.
, pp. 4361-4364
-
-
Lv, X.1
Wang, Z.J.2
-
7
-
-
78651096334
-
Multimedia forensic hash based on visual words
-
Sep.
-
W. Lu and M. Wu, "Multimedia forensic hash based on visual words," in Proc. IEEE Int. Conf. Image Process., Sep. 2010, pp. 989-992.
-
(2010)
Proc IEEE Int. Conf. Image Process.
, pp. 989-992
-
-
Lu, W.1
Wu, M.2
-
8
-
-
0034444578
-
Robust image hashing
-
Sep.
-
R. Venkatesan, S.-M. Koon, M. H. Jakubowski, P. Moulin, "Robust image hashing," in Proc. IEEE Int. Conf. Image Process., Sep. 2000, pp. 664-666.
-
(2000)
Proc IEEE Int. Conf. Image Process.
, pp. 664-666
-
-
Venkatesan, R.1
Koon, S.-M.2
Jakubowski, M.H.3
Moulin, P.4
-
9
-
-
84894472419
-
Robust perceptual image hashing based on ring partition and NMF
-
Mar.
-
Z. Tang, X. Zhang, S. Zhang, "Robust perceptual image hashing based on ring partition and NMF," IEEE Trans. Knowl. Data Eng., vol. 26, no. 3, pp. 711-724, Mar. 2014.
-
(2014)
IEEE Trans. Knowl. Data Eng.
, vol.26
, Issue.3
, pp. 711-724
-
-
Tang, Z.1
Zhang, X.2
Zhang, S.3
-
10
-
-
70350221685
-
Robust image hashing for tamper detection using non-negative matrix factorization
-
Z. Tang, S. Wang, X. Zhang, W. Wei, S. Su, "Robust image hashing for tamper detection using non-negative matrix factorization," J. Ubiquitous Converg. Technol., vol. 2, no. 1, pp. 18-26, 2008.
-
(2008)
J. Ubiquitous Converg. Technol.
, vol.2
, Issue.1
, pp. 18-26
-
-
Tang, Z.1
Wang, S.2
Zhang, X.3
Wei, W.4
Su, S.5
-
12
-
-
0035248504
-
A robust image authentication method distinguishing JPEG compression from malicious manipulation
-
Feb.
-
C.-Y. Lin and S.-F. Chang, "A robust image authentication method distinguishing JPEG compression from malicious manipulation," IEEE Trans. Circuits Syst. Video Technol., vol. 11, no. 2, pp. 153-168, Feb. 2001.
-
(2001)
IEEE Trans. Circuits Syst. Video Technol.
, vol.11
, Issue.2
, pp. 153-168
-
-
Lin, C.-Y.1
Chang, S.-F.2
-
13
-
-
79953024813
-
Lexicographical framework for image hashing with implementation based on DCT and NMF
-
Z. Tang, S. Wang, X. Zhang, W. Wei, Y. Zhao, "Lexicographical framework for image hashing with implementation based on DCT and NMF," Multimedia Tools Appl., vol. 52, nos. 2-3, pp. 325-345, 2011.
-
(2011)
Multimedia Tools Appl.
, vol.52
, Issue.2-3
, pp. 325-345
-
-
Tang, Z.1
Wang, S.2
Zhang, X.3
Wei, W.4
Zhao, Y.5
-
14
-
-
20444500587
-
Robust perceptual image hashing via matrix invariants
-
Oct.
-
S. S. Kozat, R. Venkatesan, M. K. Mihcak, "Robust perceptual image hashing via matrix invariants," in Proc. IEEE Int. Conf. Image Process., Oct. 2004, pp. 3443-3446.
-
(2004)
Proc IEEE Int. Conf. Image Process.
, pp. 3443-3446
-
-
Kozat, S.S.1
Venkatesan, R.2
Mihcak, M.K.3
-
15
-
-
84960919414
-
RASH: Radon soft hash algorithm
-
Sep.
-
F. Lefebvre, B. Macq, J.-D. Legat, "RASH: Radon soft hash algorithm," in Proc. 11th Eur. Signal Process. Conf., Sep. 2002, pp. 299-302.
-
(2002)
Proc. 11th Eur. Signal Process. Conf
, pp. 299-302
-
-
Lefebvre, F.1
MacQ, B.2
Legat, J.-D.3
-
17
-
-
84859010887
-
Robust image hashing based on random Gabor filtering and dithered lattice vector quantization
-
Apr.
-
Y. Li, Z. Lu, C. Zhu, X. Niu, "Robust image hashing based on random Gabor filtering and dithered lattice vector quantization," IEEE Trans. Image Process., vol. 21, no. 4, pp. 1963-1980, Apr. 2012.
-
(2012)
IEEE Trans. Image Process.
, vol.21
, Issue.4
, pp. 1963-1980
-
-
Li, Y.1
Lu, Z.2
Zhu, C.3
Niu, X.4
-
18
-
-
84875880417
-
Robust image hashing using ring-based entropies
-
Z. Tang, X. Zhang, L. Huang, Y. Dai, "Robust image hashing using ring-based entropies," Signal Process., vol. 93, no. 7, pp. 2061-2069, 2013.
-
(2013)
Signal Process.
, vol.93
, Issue.7
, pp. 2061-2069
-
-
Tang, Z.1
Zhang, X.2
Huang, L.3
Dai, Y.4
-
19
-
-
1542529865
-
A robust image fingerprinting system using the Radon transform
-
J. S. Seo, J. Haitsma, T. Kalker, C. D. Yoo, "A robust image fingerprinting system using the Radon transform," Signal Process., Image Commun., vol. 19, no. 4, pp. 325-339, 2004.
-
(2004)
Signal Process., Image Commun.
, vol.19
, Issue.4
, pp. 325-339
-
-
Seo, J.S.1
Haitsma, J.2
Kalker, T.3
Yoo, C.D.4
-
20
-
-
27844535360
-
Robust video hashing based on radial projections of key frames
-
Oct.
-
C. De Roover, C. De Vleeschouwer, F. Lefebvre, B. Macq, "Robust video hashing based on radial projections of key frames," IEEE Trans. Signal Process., vol. 53, no. 10, pp. 4020-4037, Oct. 2005.
-
(2005)
IEEE Trans. Signal Process.
, vol.53
, Issue.10
, pp. 4020-4037
-
-
De Roover, C.1
De Vleeschouwer, C.2
Lefebvre, F.3
MacQ, B.4
-
21
-
-
67651097643
-
A novel image hash algorithm resistant to print-scan
-
D. Wu, X. Zhou, X. Niu, "A novel image hash algorithm resistant to print-scan," Signal Process., vol. 89, no. 12, pp. 2415-2424, 2009.
-
(2009)
Signal Process.
, vol.89
, Issue.12
, pp. 2415-2424
-
-
Wu, D.1
Zhou, X.2
Niu, X.3
-
22
-
-
33744764278
-
Robust and secure image hashing
-
Jun.
-
A. Swaminathan, Y. Mao, M. Wu, "Robust and secure image hashing," IEEE Trans. Inf. Forensics Security, vol. 1, no. 2, pp. 215-230, Jun. 2006.
-
(2006)
IEEE Trans. Inf. Forensics Security
, vol.1
, Issue.2
, pp. 215-230
-
-
Swaminathan, A.1
Mao, Y.2
Wu, M.3
-
23
-
-
33750344108
-
Perceptual image hashing via feature points: Performance evaluation and tradeoffs
-
Nov.
-
V. Monga and B. L. Evans, "Perceptual image hashing via feature points: Performance evaluation and tradeoffs," IEEE Trans. Image Process., vol. 15, no. 11, pp. 3452-3465, Nov. 2006.
-
(2006)
IEEE Trans. Image Process.
, vol.15
, Issue.11
, pp. 3452-3465
-
-
Monga, V.1
Evans, B.L.2
-
24
-
-
33645004781
-
A clustering based approach to perceptual image hashing
-
Mar.
-
V. Monga, A. Banerjee, B. L. Evans, "A clustering based approach to perceptual image hashing," IEEE Trans. Inf. Forensics Security, vol. 1, no. 1, pp. 68-79, Mar. 2006.
-
(2006)
IEEE Trans. Inf. Forensics Security
, vol.1
, Issue.1
, pp. 68-79
-
-
Monga, V.1
Banerjee, A.2
Evans, B.L.3
-
25
-
-
34548085689
-
Robust and secure image hashing via non-negative matrix factorizations
-
Sep.
-
V. Monga and M. K. Mihcąk, "Robust and secure image hashing via non-negative matrix factorizations," IEEE Trans. Inf. Forensics Security, vol. 2, no. 3, pp. 376-390, Sep. 2007.
-
(2007)
IEEE Trans. Inf. Forensics Security
, vol.2
, Issue.3
, pp. 376-390
-
-
Monga, V.1
Mihcąk, M.K.2
-
26
-
-
77951955891
-
Compressive sensing-based image hashing
-
Nov.
-
L.-W. Kang, C.-S. Lu, C.-Y. Hsu, "Compressive sensing-based image hashing," in Proc. IEEE Int. Conf. Image Process., Nov. 2009, pp. 1285-1288.
-
(2009)
Proc IEEE Int. Conf. Image Process.
, pp. 1285-1288
-
-
Kang, L.-W.1
Lu, C.-S.2
Hsu, C.-Y.3
-
27
-
-
77949696748
-
Perceptual image hashing based on virtual watermark detection
-
Apr.
-
F. Khelifi and J. Jiang, "Perceptual image hashing based on virtual watermark detection," IEEE Trans. Image Process., vol. 19, no. 4, pp. 981-994, Apr. 2010.
-
(2010)
IEEE Trans. Image Process.
, vol.19
, Issue.4
, pp. 981-994
-
-
Khelifi, F.1
Jiang, J.2
-
28
-
-
79951589603
-
Structural feature-based image hashing and similarity metric for tampering detection
-
Z. Tang, S. Wang, X. Zhang, W. Wei, "Structural feature-based image hashing and similarity metric for tampering detection," Fundam. Inf., vol. 106, no. 1, pp. 75-91, 2011.
-
(2011)
Fundam. Inf.
, vol.106
, Issue.1
, pp. 75-91
-
-
Tang, Z.1
Wang, S.2
Zhang, X.3
Wei, W.4
-
29
-
-
79957996038
-
Robust image hash in Radon transform domain for authentication
-
Y. Lei, Y. Wang, J. Huang, "Robust image hash in Radon transform domain for authentication," Signal Process., Image Commun., vol. 26, no. 6, pp. 280-288, 2011.
-
(2011)
Signal Process., Image Commun.
, vol.26
, Issue.6
, pp. 280-288
-
-
Lei, Y.1
Wang, Y.2
Huang, J.3
-
30
-
-
38849134763
-
Histogram-based image hashing scheme robust against geometric deformations
-
S. Xiang, H.-J. Kim, J. Huang, "Histogram-based image hashing scheme robust against geometric deformations," in Proc. ACM Workshop Multimedia Secur., 2007, pp. 121-128.
-
(2007)
Proc. ACM Workshop Multimedia Secur.
, pp. 121-128
-
-
Xiang, S.1
Kim, H.-J.2
Huang, J.3
-
31
-
-
84861117192
-
Perceptual image hashing based on shape contexts and local feature points
-
Jun.
-
X. Lv and Z. J. Wang, "Perceptual image hashing based on shape contexts and local feature points," IEEE Trans. Inf. Forensics Security, vol. 7, no. 3, pp. 1081-1093, Jun. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.3
, pp. 1081-1093
-
-
Lv, X.1
Wang, Z.J.2
-
32
-
-
84896693973
-
Perceptual hashing for color images using invariant moments
-
Z. Tang, Y. Dai, X. Zhang, "Perceptual hashing for color images using invariant moments," Appl. Math. Inf. Sci., vol. 6, no. 2S, pp. 643S-650S, 2012.
-
(2012)
Appl. Math. Inf. Sci.
, vol.6
, Issue.S2
, pp. 643S-650S
-
-
Tang, Z.1
Dai, Y.2
Zhang, X.3
-
33
-
-
84937655864
-
Visual pattern recognition by moment invariants
-
Feb.
-
M.-K. Hu, "Visual pattern recognition by moment invariants," IRE Trans. Inf. Theory, vol. 8, no. 2, pp. 179-187, Feb. 1962.
-
(1962)
IRE Trans. Inf. Theory
, vol.8
, Issue.2
, pp. 179-187
-
-
Hu, M.-K.1
-
34
-
-
84872026878
-
Robust hashing for image authentication using Zernike moments and local features
-
Jan.
-
Y. Zhao, S. Wang, X. Zhang, H. Yao, "Robust hashing for image authentication using Zernike moments and local features," IEEE Trans. Inf. Forensics Security, vol. 8, no. 1, pp. 55-63, Jan. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.1
, pp. 55-63
-
-
Zhao, Y.1
Wang, S.2
Zhang, X.3
Yao, H.4
-
36
-
-
0003626435
-
-
Englewood Cliffs, NJ, USA: Prentice-Hall
-
R. C. Gonzalez and R. E. Woods, Digital Image Processing, 3rd ed. Englewood Cliffs, NJ, USA: Prentice-Hall, 2007.
-
(2007)
Digital Image Processing, 3rd Ed
-
-
Gonzalez, R.C.1
Woods, R.E.2
-
37
-
-
85032751954
-
Watermarking schemes evaluation
-
Sep.
-
F. A. P. Petitcolas, "Watermarking schemes evaluation," IEEE Signal Process. Mag., vol. 17, no. 5, pp. 58-64, Sep. 2000.
-
(2000)
IEEE Signal Process. Mag.
, vol.17
, Issue.5
, pp. 58-64
-
-
Petitcolas, F.A.P.1
-
38
-
-
84964815356
-
-
USC-SIPI Image Database. [Online]. Available
-
(2007). USC-SIPI Image Database. [Online]. Available: http://sipi.usc. edu/database/
-
(2007)
-
-
-
39
-
-
84964852414
-
-
Ground Truth Database. [Online]. Available
-
(2008). Ground Truth Database. [Online]. Available: http://www.cs. washington.edu/research/imagedatabase/groundtruth/
-
(2008)
-
-
-
40
-
-
0004143760
-
-
New York, NY, USA, Springer-Verlag
-
E. L. Lehmann and J. P. Romano, Testing Statistical Hypotheses, 3rd ed. New York, NY, USA, Springer-Verlag, 2005, pp. 590-599.
-
(2005)
Testing Statistical Hypotheses, 3rd Ed
, pp. 590-599
-
-
Lehmann, E.L.1
Romano, J.P.2
-
41
-
-
33646023117
-
An introduction to ROC analysis
-
T. Fawcett, "An introduction to ROC analysis," Pattern Recognit. Lett., vol. 27, no. 8, pp. 861-874, 2006.
-
(2006)
Pattern Recognit. Lett.
, vol.27
, Issue.8
, pp. 861-874
-
-
Fawcett, T.1
|