Recent development of perceptual image hashing
暂无分享,去创建一个
[1] Ramarathnam Venkatesan,et al. Robust image hashing , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[2] Krishnan Seetharaman. The CORBA connection , 1998, CACM.
[3] Vishal Monga,et al. Perceptual Image Hashing Via Feature Points: Performance Evaluation and Tradeoffs , 2006, IEEE Transactions on Image Processing.
[4] Rosa Lancini,et al. A novel hashing algorithm for video sequences , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[5] Jean-Didier Legat,et al. RASH: RAdon soft hash algorithm , 2002, 2002 11th European Signal Processing Conference.
[6] Lothar Fritsch,et al. Personal Rights Management - Taming Camera-Phones for Individual Privacy Enforcement , 2006, Privacy Enhancing Technologies.
[7] Chun-Shien Lu,et al. Robust mesh-based hashing for copy detection and tracing of images , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).
[8] Vishal Monga,et al. A clustering based approach to perceptual image hashing , 2006, IEEE Transactions on Information Forensics and Security.
[9] Nasir D. Memon,et al. Perceptual Audio Hashing Functions , 2005, EURASIP J. Adv. Signal Process..
[10] Huaiqing Wang,et al. Cyber warfare: steganography vs. steganalysis , 2004, CACM.
[11] Shih-Fu Chang,et al. New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization , 2006, IEEE Transactions on Multimedia.
[12] Martin Schmucker,et al. The need of perceptual hashing techniques for music scores , 2003, Proceedings Third International Conference on WEB Delivering of Music.
[13] Nasir D. Memon,et al. Protecting digital media content , 1998, CACM.
[14] LuChun-Shien,et al. Structural digital signature for image authentication , 2003 .
[15] Christophe De Vleeschouwer,et al. Robust image hashing based on radial variance of pixels , 2005, IEEE International Conference on Image Processing 2005.
[16] Shih-Hsuan Yang,et al. Robust image hashing based on SPIHT , 2005, ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005..
[17] Chun-Shien Lu,et al. Structural digital signature for image authentication: an incidental distortion resistant scheme , 2003, IEEE Trans. Multim..
[18] H. Sebastian Seung,et al. Algorithms for Non-negative Matrix Factorization , 2000, NIPS.
[19] Min Wu,et al. Robust and secure image hashing , 2006, IEEE Transactions on Information Forensics and Security.
[20] Jiwu Huang,et al. Image fragile watermarking based on fusion of multi-resolution tamper detection , 2002 .
[21] Zhang Xinpeng. Robust Image Hashing Based on Harris Corners , 2008 .
[22] Christopher G. Harris,et al. A Combined Corner and Edge Detector , 1988, Alvey Vision Conference.
[23] Andreas Uhl,et al. Robustness and security of a wavelet-based CBIR hashing algorithm , 2006, MM&Sec '06.
[24] Pierre Vandergheynst,et al. End-stopped wavelets for detecting low-level features , 1999, Optics & Photonics.
[25] Jiri Matas,et al. Robust wide-baseline stereo from maximally stable extremal regions , 2004, Image Vis. Comput..
[26] Vishal Monga,et al. Perceptually based methods for robust image hashing , 2005 .
[27] Cordelia Schmid,et al. Scale & Affine Invariant Interest Point Detectors , 2004, International Journal of Computer Vision.
[28] Min Wu,et al. Image hashing resilient to geometric and filtering operations , 2004, IEEE 6th Workshop on Multimedia Signal Processing, 2004..
[29] Zhang Xinpeng,et al. Image block feature vectors based on a singular-value information metric and color-texture description , 2007 .
[30] Shih-Fu Chang,et al. A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[31] Rosa Lancini,et al. Audio content identification by using perceptual hashing , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).
[32] Vishal Monga,et al. Robust Image Hashing Via Non-Negative Matrix Factorizations , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.
[33] Ramarathnam Venkatesan,et al. Robust perceptual image hashing via matrix invariants , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[34] Shu Lin,et al. An Extendible Hash for Multi-Precision Similarity Querying of Image Databases , 2001, VLDB.
[35] Jiri Fridrich,et al. Robust hash functions for digital watermarking , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).
[36] Chien-Chang Chen,et al. Robust image authentication method surviving JPEG lossy compression , 1997, Electronic Imaging.
[37] Shih-Fu Chang,et al. New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization , 2006, IEEE Trans. Multim..
[38] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[39] Zhang Xinpeng. Image Hashing Based on Human Visual System , 2006 .
[40] Ramarathnam Venkatesan,et al. New Iterative Geometric Methods for Robust Perceptual Image Hashing , 2001, Digital Rights Management Workshop.
[41] Chun-Shien Lu,et al. Geometric distortion-resilient image hashing scheme and its applications on copy detection and authentication , 2005, Multimedia Systems.
[42] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998 .