메뉴 건너뛰기




Volumn 12, Issue 4s, 2016, Pages

Robust hashing based on quaternion zernike moments for image authentication

Author keywords

Image forensics; Multimedia authentication; Quaternion Zernike moments; Robust image hashing

Indexed keywords

AUTHENTICATION; COLOR; COLOR IMAGE PROCESSING; DIGITAL WATERMARKING; IMAGE RETRIEVAL; IMAGE WATERMARKING;

EID: 84989311682     PISSN: 15516857     EISSN: 15516865     Source Type: Journal    
DOI: 10.1145/2978572     Document Type: Article
Times cited : (42)

References (37)
  • 3
    • 80054750388 scopus 로고    scopus 로고
    • Quaternion zernike moments and their invariants for color image analysis and object recognition
    • B. Chen and H. Shu. 2012. Quaternion Zernike moments and their invariants for color image analysis and object recognition. Signal Proc. 92, 2, 308-318.
    • (2012) Signal Proc , vol.92 , Issue.2 , pp. 308-318
    • Chen, B.1    Shu, H.2
  • 5
    • 33646023117 scopus 로고    scopus 로고
    • An introduction to roc analysis
    • T. Fawcett. 2006. An introduction to ROC analysis. Pattern Recog. Lett. 27, 8, 861-874.
    • (2006) Pattern Recog. Lett , vol.27 , Issue.8 , pp. 861-874
    • Fawcett, T.1
  • 8
    • 84933675630 scopus 로고    scopus 로고
    • A novel approach to detecting duplicate images using multiple hash tables
    • S. Hsieh, C. C. Chen, and C. R. Chen. 2015. A novel approach to detecting duplicate images using multiple hash tables. Multimedia Tool Appl. 74, 13, 4947-4964.
    • (2015) Multimedia Tool Appl , vol.74 , Issue.13 , pp. 4947-4964
    • Hsieh, S.1    Chen, C.C.2    Chen, C.R.3
  • 9
    • 84925695989 scopus 로고    scopus 로고
    • Security and privacy protocols for perceptual image hashing
    • D. Hu, B. Su, and S. Zheng. 2015. Security and privacy protocols for perceptual image hashing. Int. J. Sensor Netw. 17, 3, 146-162.
    • (2015) Int. J. Sensor Netw , vol.17 , Issue.3 , pp. 146-162
    • Hu, D.1    Su, B.2    Zheng, S.3
  • 10
  • 11
    • 79957996038 scopus 로고    scopus 로고
    • Robust image hash in radon transform domain for authentication
    • Y. Lei and Y. Wang. 2011. Robust image hash in radon transform domain for authentication'. Signal Proc. Image Comm. 26, 6, 280-288.
    • (2011) Signal Proc. Image Comm , vol.26 , Issue.6 , pp. 280-288
    • Lei, Y.1    Wang, Y.2
  • 12
    • 84930628204 scopus 로고    scopus 로고
    • Multiview alignment hashing for efficient image search
    • L. Liu, M. Yu, and L. Shao. 2015. Multiview alignment hashing for efficient image search. IEEE Trans. Image Proc. 24, 3, 956-966.
    • (2015) IEEE Trans. Image Proc , vol.24 , Issue.3 , pp. 956-966
    • Liu, L.1    Yu, M.2    Shao, L.3
  • 13
    • 84893976012 scopus 로고    scopus 로고
    • Mixed image-keyword query adaptive hashing over multilabel images
    • X. Liu, Y. Mu, and B. Lang. 2014. Mixed image-keyword query adaptive hashing over multilabel images. ACM Trans. Multimedia Comput. Comm. Appl. 12, 4s, 22:1-22:21.
    • (2014) ACM Trans. Multimedia Comput. Comm. Appl , vol.12 , Issue.4 S , pp. 221-2221
    • Liu, X.1    Mu, Y.2    Lang, B.3
  • 14
    • 84866599725 scopus 로고    scopus 로고
    • Spline regression hashing for fast image search
    • Y. Liu and F. Wu. 2012. Spline regression hashing for fast image search. IEEE Trans. Image Process. 21, 10, 4480-4491.
    • (2012) IEEE Trans. Image Process , vol.21 , Issue.10 , pp. 4480-4491
    • Liu, Y.1    Wu, F.2
  • 16
    • 84937205958 scopus 로고    scopus 로고
    • Asymmetric cyclical hashing for large scale image retrieval
    • Y. Lv, W. Wing, and Z. Zeng. 2015. Asymmetric cyclical hashing for large scale image retrieval. IEEE Trans. Multimedia. 17, 8, 1225-1235.
    • (2015) IEEE Trans. Multimedia , vol.17 , Issue.8 , pp. 1225-1235
    • Lv, Y.1    Wing, W.2    Zeng, Z.3
  • 18
    • 84870292657 scopus 로고    scopus 로고
    • A segmentation-free method for image classification based on pixel-wise matching
    • J. Ma, L. Zheng, M. Dong, X. He, M. Guo, Y. Yaguchi, and R. Oka. 2013. A segmentation-free method for image classification based on pixel-wise matching. J. Comput. Syst. 79, 2, 256-268.
    • (2013) J. Comput. Syst , vol.79 , Issue.2 , pp. 256-268
    • Ma, J.1    Zheng, L.2    Dong, M.3    He, X.4    Guo, M.5    Yaguchi, Y.6    Oka, R.7
  • 19
    • 34548085689 scopus 로고    scopus 로고
    • Robust and secure image hashing via non-negative matrix factorizations
    • V. Monga and M. Mhcak. 2007. Robust and secure image hashing via non-negative matrix factorizations. IEEE Trans. Inf. Forensics Security. 1, 1, 376-390.
    • (2007) IEEE Trans. Inf. Forensics Security , vol.1 , Issue.1 , pp. 376-390
    • Monga, V.1    Mhcak, M.2
  • 20
    • 84891752464 scopus 로고    scopus 로고
    • Content-based copy detection through multimodal feature representation and temporal pyramid matching
    • L. Mou, T. Huang, and Y. Tian. 2013. Content-based copy detection through multimodal feature representation and temporal pyramid matching. ACM Trans. Multimedia Comput. Comm. Appl. 10, 1, 5:1-5:20.
    • (2013) ACM Trans. Multimedia Comput. Comm. Appl , vol.10 , Issue.1 , pp. 51-520
    • Mou, L.1    Huang, T.2    Tian, Y.3
  • 21
    • 84929281389 scopus 로고    scopus 로고
    • Robust hashing for image authentication using quaternion discrete fourier transform and log-polar transform
    • J. L. Ouyang, G. Coatrieux, and H. Z. Shu. 2015. Robust hashing for image authentication using quaternion discrete Fourier transform and log-polar transform'. Digital Signal Process. 41, 1, 98-109.
    • (2015) Digital Signal Process , vol.41 , Issue.1 , pp. 98-109
    • Ouyang, J.L.1    Coatrieux, G.2    Shu, H.Z.3
  • 22
    • 84871425533 scopus 로고    scopus 로고
    • Robust image hashing using non-uniform sampling in discrete fourier domain
    • C. Qin and C. Chang. 2012. Robust image hashing using non-uniform sampling in discrete fourier domain. Digital Signal Proc. 23, 2, 578-585.
    • (2012) Digital Signal Proc , vol.23 , Issue.2 , pp. 578-585
    • Qin, C.1    Chang, C.2
  • 23
    • 27844535360 scopus 로고    scopus 로고
    • Robust video hashing based on radial projections of key frames
    • C. Roover and C. Vleeschouwer. 2005. Robust video hashing based on radial projections of key frames. IEEE Trans. Signal Process, 53, 10, 4020-4037.
    • (2005) IEEE Trans. Signal Process , vol.53 , Issue.10 , pp. 4020-4037
    • Roover, C.1    Vleeschouwer, C.2
  • 24
    • 0030260155 scopus 로고    scopus 로고
    • Fourier transforms of colour images using quaternion or hypercomplex, numbers
    • S. Sangwine. 1996. Fourier transforms of colour images using quaternion or hypercomplex, numbers. Electron. Lett. 32, 21, 1979-1980.
    • (1996) Electron. Lett , vol.32 , Issue.21 , pp. 1979-1980
    • Sangwine, S.1
  • 25
    • 20444455326 scopus 로고    scopus 로고
    • Ucid: An uncompressed color image database
    • G. Schaefer and M. Stich. 2004. UCID: An uncompressed color image database. Electron. Imaging. 11, 2, 472-480.
    • (2004) Electron. Imaging , vol.11 , Issue.2 , pp. 472-480
    • Schaefer, G.1    Stich, M.2
  • 26
    • 84930965536 scopus 로고    scopus 로고
    • Neighborhood discriminant hashing for large-scale image retrieval
    • J. Tang, Z. Li, and M. Wang. 2015. Neighborhood discriminant hashing for large-scale image retrieval. IEEE Trans. Image Proc. 24, 9, 2827-2840.
    • (2015) IEEE Trans. Image Proc , vol.24 , Issue.9 , pp. 2827-2840
    • Tang, J.1    Li, Z.2    Wang, M.3
  • 27
    • 84896693973 scopus 로고    scopus 로고
    • Perceptual hashing for color images using invariant moments
    • Z. Tang and Y. Dai. 2012. Perceptual hashing for color images using invariant moments. Appl. Math. 6, 2, 643-650.
    • (2012) Appl. Math , vol.6 , Issue.2 , pp. 643-650
    • Tang, Z.1    Dai, Y.2
  • 28
    • 84989290568 scopus 로고    scopus 로고
    • Robust perceptual image hashing based on ring partition and nmf
    • Z. Tang and X. Zhang. 2013. Robust perceptual image hashing based on ring partition and NMF. IEEE Trans. Knowl. Data Eng. 1, 1, 376-390.
    • (2013) IEEE Trans. Knowl. Data Eng , vol.1 , Issue.1 , pp. 376-390
    • Tang, Z.1    Zhang, X.2
  • 31
    • 84989305987 scopus 로고    scopus 로고
    • A visualmodel-based perceptual image hash for content authentication
    • X.Wang, K. Pang, and X. Zhou. 2013. A visualmodel-based perceptual image hash for content authentication. IEEE Trans. Inf. Forensics Security. 74, 13, 4947-4964.
    • (2013) IEEE Trans. Inf. Forensics Security , vol.74 , Issue.13 , pp. 4947-4964
    • Wang, X.1    Pang, K.2    Zhou, X.3
  • 32
    • 84899639233 scopus 로고    scopus 로고
    • Fast indexing strategies for robust image hashes
    • C. Winter, M. Steinebach, and Y. Yannikos. 2014. Fast indexing strategies for robust image hashes. Digital Investigation. 11, 1, 27-35.
    • (2014) Digital Investigation , vol.11 , Issue.1 , pp. 27-35
    • Winter, C.1    Steinebach, M.2    Yannikos, Y.3
  • 33
    • 38849134763 scopus 로고    scopus 로고
    • Histogram-based image hashing scheme robust against geometric deformations
    • S. Xiang and H. Kim. 2007. Histogram-based image hashing scheme robust against geometric deformations. In Proc. ACM Multimedia & Security Workshop. 121-128.
    • (2007) Proc. ACM Multimedia & Security Workshop , pp. 121-128
    • Xiang, S.1    Kim, H.2
  • 34
    • 84930983460 scopus 로고    scopus 로고
    • Feature fusion based hashing for large scale image copy detection
    • L. Yan, H. Ling, and D. Ye. 2015. Feature fusion based hashing for large scale image copy detection. Int. J. Comput. Intell. Syst. 8, 4, 725-734.
    • (2015) Int. J. Comput. Intell. Syst , vol.8 , Issue.4 , pp. 725-734
    • Yan, L.1    Ling, H.2    Ye, D.3
  • 36
    • 84878612787 scopus 로고    scopus 로고
    • Sparse hashing for fast multimedia search
    • X. Zhu and Z. Huang. 2013. Sparse hashing for fast multimedia search. ACM Trans. Inf. Syst. 31, 2, 1-24.
    • (2013) ACM Trans. Inf. Syst , vol.31 , Issue.2 , pp. 1-24
    • Zhu, X.1    Huang, Z.2
  • 37
    • 84875404566 scopus 로고    scopus 로고
    • Nonnegative sparse coding induced hashing for image copy detection
    • F. Zou, H. Feng, and H. Ling. 2013. Nonnegative sparse coding induced hashing for image copy detection. Neurocomputing 105, 1, 81-89.
    • (2013) Neurocomputing , vol.105 , Issue.1 , pp. 81-89
    • Zou, F.1    Feng, H.2    Ling, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.