Constraint-optimized keypoint inhibition/insertion attack: security threat to scale-space image feature extraction
暂无分享,去创建一个
[1] Chun-Shien Lu,et al. Structural digital signature for image authentication: an incidental distortion resistant scheme , 2003, IEEE Trans. Multim..
[2] Dimitri P. Bertsekas,et al. Nonlinear Programming , 1997 .
[3] Jun Jie Foo,et al. Pruning SIFT for Scalable Near-duplicate Image Matching , 2007, ADC.
[4] K. Schittkowski,et al. NONLINEAR PROGRAMMING , 2022 .
[5] Soo-Chang Pei,et al. Secure and robust SIFT , 2009, ACM Multimedia.
[6] Laurent Amsaleg,et al. Understanding the security and robustness of SIFT , 2010, ACM Multimedia.
[7] Chun-Shien Lu. Wireless multimedia error resilience via a data hiding technique , 2002, 2002 IEEE Workshop on Multimedia Signal Processing..
[8] W. Karush. Minima of Functions of Several Variables with Inequalities as Side Conditions , 2014 .
[9] Shuicheng Yan,et al. Near-duplicate keyframe retrieval by nonrigid image matching , 2008, ACM Multimedia.
[10] Trevor Darrell,et al. Efficient image matching with distributions of local invariant features , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).
[11] Chun-Shien Lu,et al. Geometric distortion-resilient image hashing scheme and its applications on copy detection and authentication , 2005, Multimedia Systems.
[12] Xuelong Li,et al. Geometric Distortion Insensitive Image Watermarking in Affine Covariant Regions , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[13] Chun-Shien Lu,et al. Media hash-dependent image watermarking resilient against both geometric attacks and estimation attacks based on false positive-oriented detection , 2006, IEEE Transactions on Multimedia.
[14] Yan Ke,et al. Efficient Near-duplicate Detection and Sub-image Retrieval , 2004 .
[15] Laurent Amsaleg,et al. Deluding image recognition in sift-based cbir systems , 2010, MiFor '10.
[16] Matthijs C. Dorst. Distinctive Image Features from Scale-Invariant Keypoints , 2011 .
[17] Laurent Amsaleg,et al. Challenging the Security of CBIR Systems , 2009 .
[18] Soo-Chang Pei,et al. Feature-Based Sparse Representation for Image Similarity Assessment , 2011, IEEE Transactions on Multimedia.
[19] Luc Van Gool,et al. Speeded-Up Robust Features (SURF) , 2008, Comput. Vis. Image Underst..
[20] Markus G. Kuhn,et al. Attacks on Copyright Marking Systems , 1998, Information Hiding.
[21] Hefei Ling,et al. Efficient Image Copy Detection Using Multiscale Fingerprints , 2012, IEEE MultiMedia.
[22] Justin Zobel,et al. Detection of near-duplicate images for web search , 2007, CIVR '07.
[23] Yan Ke,et al. An efficient parts-based near-duplicate and sub-image retrieval system , 2004, MULTIMEDIA '04.
[24] Zhu Li,et al. Video based mobile location search with large set of SIFT points in cloud , 2010, MCMC '10.
[25] Laurent Amsaleg,et al. Enlarging hacker's toolbox: Deluding image recognition by attacking keypoint orientations , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[26] Luc Van Gool,et al. SURF: Speeded Up Robust Features , 2006, ECCV.
[27] Vitomir Struc,et al. Adaptation of SIFT Features for Robust Face Recognition , 2010, ICIAR.
[28] Sharath Pankanti,et al. Fingerprint verification using SIFT features , 2008, SPIE Defense + Commercial Sensing.