Image authentication under geometric attacks via concentric square partition based image hashing
暂无分享,去创建一个
[1] Ramarathnam Venkatesan,et al. Robust perceptual image hashing via matrix invariants , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[2] Xinpeng Zhang,et al. Robust Hashing for Image Authentication Using Zernike Moments and Local Features , 2013, IEEE Transactions on Information Forensics and Security.
[3] Mark Stamp,et al. Information security - principles and practice , 2005 .
[4] Aditi,et al. Robust image hashing through DWT-SVD and spectral residual method , 2017, EURASIP Journal on Image and Video Processing.
[5] Yanqiang Lei,et al. Robust image hash in Radon transform domain for authentication , 2011, Signal Process. Image Commun..
[6] Fabien A. P. Petitcolas,et al. Watermarking schemes evaluation , 2000, IEEE Signal Process. Mag..
[7] Shichao Zhang,et al. Robust Image Hashing With Ring Partition and Invariant Vector Distance , 2016, IEEE Transactions on Information Forensics and Security.
[8] Ram Kumar Karsh,et al. Robust image hashing using ring partition-PGNMF and local features , 2016, SpringerPlus.
[9] Vishal Monga,et al. Robust and Secure Image Hashing via Non-Negative Matrix Factorizations , 2007, IEEE Transactions on Information Forensics and Security.
[10] Ram Kumar Karsh,et al. Perceptual robust and secure image hashing using ring partition-PGNMF , 2015, TENCON 2015 - 2015 IEEE Region 10 Conference.
[11] Ming Zhu,et al. Quaternion Fourier-Mellin moments for color images , 2011, Pattern Recognit..
[12] Huazhong Shu,et al. Robust hashing for image authentication using quaternion discrete Fourier transform and log-polar transform , 2015, Digit. Signal Process..
[13] Chi-Man Pun,et al. Quaternion-Based Image Hashing for Adaptive Tampering Localization , 2016, IEEE Transactions on Information Forensics and Security.
[14] M. C. Adhikary,et al. Digital Image Tamper Detection Techniques - A Comprehensive Study , 2013, ArXiv.
[15] Xinpeng Zhang,et al. Robust Image Hashing for Tamper Detection Using Non-Negative Matrix Factorization , 2008 .