Clustering algorithms for perceptual image hashing
暂无分享,去创建一个
[1] Gary Friedman,et al. The trustworthy digital camera: restoring credibility to the photographic image , 1993 .
[2] Allen Gersho,et al. Vector quantization and signal compression , 1991, The Kluwer international series in engineering and computer science.
[3] J.L. Massey,et al. Theory and practice of error control codes , 1986, Proceedings of the IEEE.
[4] Xiaolin Wu. Adaptive binary vector quantization using Hamming codes , 1995, Proceedings., International Conference on Image Processing.
[5] Jiri Fridrich,et al. Robust hash functions for digital watermarking , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).
[6] Vishal Monga,et al. Robust perceptual image hashing using feature points , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[7] Ramarathnam Venkatesan,et al. Robust image hashing , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[8] LuChun-Shien,et al. Structural digital signature for image authentication , 2003 .
[9] Kannan Ramchandran,et al. Dither-based secure image hashing using distributed coding , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).
[10] Ross J. Anderson,et al. Evaluation of copyright marking systems , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.
[11] Pasi Fränti,et al. Binary vector quantizer design using soft centroids , 1999, Signal Process. Image Commun..
[12] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[13] Chai Wah Wu,et al. On the design of content-based multimedia authentication systems , 2002, IEEE Trans. Multim..
[14] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .