Extraction of shape feature for image authentication
暂无分享,去创建一个
[1] Xinpeng Zhang,et al. Robust Image Hashing for Tamper Detection Using Non-Negative Matrix Factorization , 2008 .
[2] Fouad Khelifi,et al. Analysis of the Security of Perceptual Image Hashing Based on Non-Negative Matrix Factorization , 2010, IEEE Signal Processing Letters.
[3] Vishal Monga,et al. Robust and Secure Image Hashing via Non-Negative Matrix Factorizations , 2007, IEEE Transactions on Information Forensics and Security.
[4] Ramarathnam Venkatesan,et al. Robust perceptual image hashing via matrix invariants , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[5] Shan Li,et al. Complex Zernike Moments Features for Shape-Based Image Retrieval , 2009, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[6] Di Wu,et al. A novel image hash algorithm resistant to print-scan , 2009, Signal Process..
[7] Chandan Singh,et al. Computation of Zernike moments in improved polar configuration , 2009, IET Image Process..
[8] Guorui Feng,et al. A Robust Image Hashing Method Based on Zernike Moments , 2010 .
[9] Fabien A. P. Petitcolas,et al. Watermarking schemes evaluation , 2000, IEEE Signal Process. Mag..
[10] Stefano Tubaro,et al. Hash-Based Identification of Sparse Image Tampering , 2009, IEEE Transactions on Image Processing.
[11] Mohammed Yakoob Siyal,et al. A secure and robust hash-based scheme for image authentication , 2010, Signal Process..