A Short Survey on Perceptual Hash Function
暂无分享,去创建一个
[1] Shih-Fu Chang,et al. A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..
[2] Vishal Monga,et al. Robust and Secure Image Hashing via Non-Negative Matrix Factorizations , 2007, IEEE Transactions on Information Forensics and Security.
[3] Dimitrios Hatzinakos,et al. Content Based Image Hashing Via Wavelet and Radon Transform , 2007, PCM.
[4] Ramarathnam Venkatesan,et al. Robust perceptual image hashing via matrix invariants , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[5] Jean-Didier Legat,et al. RASH: RAdon soft hash algorithm , 2002, 2002 11th European Signal Processing Conference.
[6] William Stallings,et al. Cryptography and network security , 1998 .
[7] Shih-Fu Chang,et al. A Robust and Secure Media Signature Scheme for JPEG Images , 2005, J. VLSI Signal Process..
[8] Di Wu,et al. A novel image hash algorithm resistant to print-scan , 2009, Signal Process..
[9] William Puech,et al. A robust and secure perceptual hashing system based on a quantization step analysis , 2013, Signal Process. Image Commun..
[10] Ramarathnam Venkatesan,et al. New Iterative Geometric Methods for Robust Perceptual Image Hashing , 2001, Digital Rights Management Workshop.
[11] Brian M. Kurkoski,et al. Robust image hashing using image normalization and SVD decomposition , 2011, 2011 IEEE 54th International Midwest Symposium on Circuits and Systems (MWSCAS).
[12] Min Wu,et al. Image hashing resilient to geometric and filtering operations , 2004, IEEE 6th Workshop on Multimedia Signal Processing, 2004..
[13] Jong Hyuk Park,et al. Image hash generation method using hierarchical histogram , 2010, Multimedia Tools and Applications.
[14] Mohammed Yakoob Siyal,et al. A secure and robust hash-based scheme for image authentication , 2010, Signal Process..
[15] Zhenjun Tang,et al. Robust image hashing using ring-based entropies , 2013, Signal Process..
[16] William Stallings,et al. Cryptography and Network Security (4th Edition) , 2005 .
[17] Benoit M. Macq,et al. A robust soft hash algorithm for digital image signature , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).
[18] Ramarathnam Venkatesan,et al. Robust image hashing , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[19] Vishal Monga,et al. Perceptual Image Hashing Via Feature Points: Performance Evaluation and Tradeoffs , 2006, IEEE Transactions on Image Processing.
[20] Min Wu,et al. Robust and secure image hashing , 2006, IEEE Transactions on Information Forensics and Security.
[21] Yanqiang Lei,et al. Robust image hash in Radon transform domain for authentication , 2011, Signal Process. Image Commun..
[22] Zhenjun Tang,et al. Robust image hash function using local color features , 2013 .
[23] Jiri Fridrich,et al. Robust hash functions for digital watermarking , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).
[24] Fang Liu,et al. Perceptual Image Hashing via Wave Atom Transform , 2011, IWDW.
[25] Zhenjun Tang,et al. Perceptual Hashing for Color Images Using Invariant Moments , 2012 .
[26] Jiwu Huang,et al. Histogram-based image hashing scheme robust against geometric deformations , 2007, MM&Sec.
[27] Xinpeng Zhang,et al. Robust Image Hashing for Tamper Detection Using Non-Negative Matrix Factorization , 2008 .