Image authentication based on perceptual hash using Gabor filters
暂无分享,去创建一个
Shiguo Lian | Lina Wang | Donghui Hu | Dengpan Ye | Xiaqiu Jiang | Donghui Hu | Lina Wang | Dengpan Ye | Shiguo Lian | Xiaqiu Jiang
[1] Tiago Rosa Maria Paula Queluz. Towards robust, content based techniques for image authentication , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).
[2] Hou Qi. Robust Image Authentication Method Combing SVD and PKI , 2004 .
[3] Shih-Fu Chang,et al. A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[4] Chin-Chen Chang,et al. Novel image copy detection with rotating tolerance , 2007, J. Syst. Softw..
[5] Shiguo Lian,et al. Secure hash function based on neural network , 2006, Neurocomputing.
[6] Pierre Vandergheynst,et al. End-stopped wavelets for detecting low-level features , 1999, Optics & Photonics.
[7] Ramarathnam Venkatesan,et al. Robust perceptual image hashing via matrix invariants , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[8] Ralf Steinmetz,et al. Content-based digital signature for motion pictures authentication and content-fragile watermarking , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.
[9] Chun-Shien Lu,et al. Structural digital signature for image authentication: an incidental distortion resistant scheme , 2003, IEEE Trans. Multim..
[10] Shiguo Lian. IMAGE AUTHENTICATION BASED ON FRACTAL FEATURES , 2008 .
[11] Walter F. Tichy,et al. Thematic Role Based Generation of UML Models from Real World Requirements , 2007 .
[12] Unusual choroid pigment distribution in the retina of a south american frog , 1980, Vision Research.
[13] Chao-Hsien Chu,et al. Content-based Image Authentication: Current Status, Issues, and Challenges , 2007 .
[14] Yuewei Dai,et al. Secure multimedia watermarking authentication in wavelet domain , 2008, J. Electronic Imaging.
[15] Bian Yang,et al. Block Mean Value Based Image Perceptual Hashing , 2006, 2006 International Conference on Intelligent Information Hiding and Multimedia.
[16] Zhang Xin-peng,et al. Recent development of perceptual image hashing , 2007 .
[17] Dimitris Kanellopoulos,et al. Recent Advances in Multimedia Information System Security , 2009, Informatica.
[18] 王朔中,et al. Recent development of perceptual image hashing , 2007 .
[19] Shiguo Lian,et al. On the analysis and design of secure multimedia authentication scheme , 2008, 2008 Third International Conference on Communications and Networking in China.
[20] Jiri Fridrich,et al. Robust hash functions for digital watermarking , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).
[21] J. P. Jones,et al. An evaluation of the two-dimensional Gabor filter model of simple receptive fields in cat striate cortex. , 1987, Journal of neurophysiology.
[22] Pedro Cano,et al. A review of algorithms for audio fingerprinting , 2002, 2002 IEEE Workshop on Multimedia Signal Processing..
[23] Rita Noumeir,et al. Methods for image authentication: a survey , 2008, Multimedia Tools and Applications.
[24] Min Wu,et al. Robust and secure image hashing , 2006, IEEE Transactions on Information Forensics and Security.
[25] Changick Kim,et al. Content-based image copy detection , 2003, Signal Process. Image Commun..
[26] Vishal Monga,et al. Robust perceptual image hashing using feature points , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[27] Chien-Chang Chen,et al. Robust image authentication method surviving JPEG lossy compression , 1997, Electronic Imaging.
[28] D. G. Albrecht,et al. Spatial frequency selectivity of cells in macaque visual cortex , 1982, Vision Research.
[29] J. Daugman. Two-dimensional spectral analysis of cortical receptive field profiles , 1980, Vision Research.
[30] Vishal Monga,et al. Perceptual Image Hashing Via Feature Points: Performance Evaluation and Tradeoffs , 2006, IEEE Transactions on Image Processing.
[31] Vishal Monga,et al. Robust and Secure Image Hashing via Non-Negative Matrix Factorizations , 2007, IEEE Transactions on Information Forensics and Security.
[32] Ramarathnam Venkatesan,et al. Robust image hashing , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).