Efficient Image Hashing with Geometric Invariant Vector Distance for Copy Detection
暂无分享,去创建一个
[1] Mohammed Yakoob Siyal,et al. A secure and robust hash-based scheme for image authentication , 2010, Signal Process..
[2] Svetlana Lazebnik,et al. Asymmetric Distances for Binary Embeddings , 2011, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[3] Kien A. Hua,et al. Learning Label Preserving Binary Codes for Multimedia Retrieval , 2018, ACM Trans. Multim. Comput. Commun. Appl..
[4] Bir Bhanu,et al. Feature synthesized EM algorithm for image retrieval , 2008, TOMCCAP.
[5] Kai Liu,et al. Robust image hashing via DCT and LLE , 2016, Comput. Secur..
[6] Fabien A. P. Petitcolas,et al. Watermarking schemes evaluation , 2000, IEEE Signal Process. Mag..
[7] Meng Wang,et al. Self-Supervised Video Hashing With Hierarchical Binary Auto-Encoder , 2018, IEEE Transactions on Image Processing.
[8] Zhenjun Tang,et al. Robust image hashing with dominant DCT coefficients , 2014 .
[9] Xianglong Liu,et al. Distributed Adaptive Binary Quantization for Fast Nearest Neighbor Search , 2017, IEEE Transactions on Image Processing.
[10] Zhenjun Tang,et al. Robust image hashing based on color vector angle and Canny operator , 2016 .
[11] Stéphane Manuel,et al. Classification and generation of disturbance vectors for collision attacks against SHA-1 , 2011, Des. Codes Cryptogr..
[12] Z. Jane Wang,et al. An Extended Image Hashing Concept: Content-Based Fingerprinting Using FJLT , 2009, EURASIP J. Inf. Secur..
[13] Harald Kosch,et al. Image Database , 2009, Encyclopedia of Database Systems.
[14] K. Rhee,et al. A key-dependent secure image hashing scheme by using Radon transform , 2009, 2009 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS).
[15] Guojiang Xin,et al. Robust Image Hashing Using Radon Transform and Invariant Features , 2016 .
[16] Bart Preneel,et al. Radon Transform-Based Secure Image Hashing , 2011, Communications and Multimedia Security.
[17] Heng Tao Shen,et al. Beyond Frame-level CNN: Saliency-Aware 3-D CNN With LSTM for Video Action Recognition , 2017, IEEE Signal Processing Letters.
[18] Min Wu,et al. Robust and secure image hashing , 2006, IEEE Transactions on Information Forensics and Security.
[19] Xiamu Niu,et al. Robust Image Hashing Based on Random Gabor Filtering and Dithered Lattice Vector Quantization , 2012, IEEE Transactions on Image Processing.
[20] Fouad Khelifi,et al. Perceptual Image Hashing Based on Virtual Watermark Detection , 2010, IEEE Transactions on Image Processing.
[21] Xinpeng Zhang,et al. Perceptual image hashing via dual-cross pattern encoding and salient structure detection , 2018, Inf. Sci..
[22] Yang Yang,et al. Deep Asymmetric Pairwise Hashing , 2017, ACM Multimedia.
[23] Zhenjun Tang,et al. Robust image hashing with multidimensional scaling , 2017, Signal Process..
[24] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[25] Ming-Syan Chen,et al. A New Approach to Image Copy Detection Based on Extended Feature Sets , 2007, IEEE Transactions on Image Processing.
[26] Xinpeng Zhang,et al. Robust Hashing for Image Authentication Using Zernike Moments and Local Features , 2013, IEEE Transactions on Information Forensics and Security.
[27] Z. Jane Wang,et al. Perceptual Image Hashing Based on Shape Contexts and Local Feature Points , 2012, IEEE Transactions on Information Forensics and Security.
[28] Gang Wang,et al. A Robust Image Hashing with Enhanced Randomness by Using Random Walk on Zigzag Blocking , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.
[29] Chi-Man Pun,et al. Quaternion-Based Image Hashing for Adaptive Tampering Localization , 2016, IEEE Transactions on Information Forensics and Security.
[30] Xiaoshuai Sun,et al. Two-Stream 3-D convNet Fusion for Action Recognition in Videos With Arbitrary Size and Length , 2018, IEEE Transactions on Multimedia.
[31] Fan Yang,et al. Robust image hashing via colour vector angles and discrete wavelet transform , 2014, IET Image Process..
[32] Cordelia Schmid,et al. Aggregating Local Image Descriptors into Compact Codes , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[33] Shichao Zhang,et al. Robust Perceptual Image Hashing Based on Ring Partition and NMF , 2014, IEEE Transactions on Knowledge and Data Engineering.
[34] Edward J. Delp,et al. Digital watermarking: algorithms and applications , 2001, IEEE Signal Process. Mag..
[35] Xinbo Gao,et al. Triplet-Based Deep Hashing Network for Cross-Modal Retrieval , 2018, IEEE Transactions on Image Processing.
[36] Wei Liu,et al. Asymmetric Binary Coding for Image Search , 2017, IEEE Transactions on Multimedia.
[37] Vishal Monga,et al. Robust and Secure Image Hashing via Non-Negative Matrix Factorizations , 2007, IEEE Transactions on Information Forensics and Security.
[38] Xian-Sheng Hua,et al. A unified context model for web image retrieval , 2012, TOMCCAP.
[39] Shijun Xiang. Histogram-Based Perceptual Image Hashing in the DWT Domain , 2010, 2010 International Conference on Multimedia Information Networking and Security.
[40] Saeed Mozaffari,et al. Perceptual image hashing using center-symmetric local binary patterns , 2015, Multimedia Tools and Applications.
[41] Hefei Ling,et al. Efficient Image Copy Detection Using Multiscale Fingerprints , 2012, IEEE MultiMedia.
[42] Xuelong Li,et al. Graph PCA Hashing for Similarity Search , 2017, IEEE Transactions on Multimedia.
[43] Changick Kim,et al. Content-based image copy detection , 2003, Signal Process. Image Commun..
[44] Chuan Qin,et al. Robust image hashing with embedding vector variance of LLE , 2015, Digit. Signal Process..
[45] Nicu Sebe,et al. Quantization-based hashing: a general framework for scalable image and video retrieval , 2018, Pattern Recognit..
[46] Xingming Sun,et al. Effective and Efficient Global Context Verification for Image Copy Detection , 2017, IEEE Transactions on Information Forensics and Security.
[47] Zhenjun Tang,et al. Colour Space Selection in Image Hashing: An Experimental Study , 2017 .
[48] Jean-Didier Legat,et al. RASH: RAdon soft hash algorithm , 2002, 2002 11th European Signal Processing Conference.
[49] Shih-Fu Chang,et al. A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..
[50] C. De Vleeschouwer,et al. Robust video hashing based on radial projections of key frames , 2005, IEEE Transactions on Signal Processing.
[51] Shichao Zhang,et al. Robust Image Hashing with Tensor Decomposition , 2019, IEEE Transactions on Knowledge and Data Engineering.
[52] James Ze Wang,et al. Content-based image indexing and searching using Daubechies' wavelets , 1998, International Journal on Digital Libraries.
[53] Shichao Zhang,et al. Robust Image Hashing With Ring Partition and Invariant Vector Distance , 2016, IEEE Transactions on Information Forensics and Security.
[54] Jianru Xue,et al. A Visual Model-Based Perceptual Image Hash for Content Authentication , 2015, IEEE Transactions on Information Forensics and Security.
[55] Ming-Kuei Hu,et al. Visual pattern recognition by moment invariants , 1962, IRE Trans. Inf. Theory.
[56] George Wolberg,et al. Robust image registration using log-polar transform , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[57] Neil J. Hurley,et al. Performance Analysis of Robust Audio Hashing , 2007, IEEE Transactions on Information Forensics and Security.
[58] Falk Scholer,et al. User performance versus precision measures for simple search tasks , 2006, SIGIR.
[59] Xuelong Li,et al. Image hashing with color vector angle , 2018, Neurocomputing.
[60] Zhi-Hua Zhou,et al. Column Sampling Based Discrete Supervised Hashing , 2016, AAAI.
[61] Chi-Man Pun,et al. Multi-scale image hashing using adaptive local feature extraction for robust tampering detection , 2016, Signal Process..
[62] Ramarathnam Venkatesan,et al. Robust perceptual image hashing via matrix invariants , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..