Compact and Robust Image Hashing
暂无分享,去创建一个
[1] Fabien A. P. Petitcolas,et al. Watermarking schemes evaluation , 2000, IEEE Signal Process. Mag..
[2] Ramarathnam Venkatesan,et al. Robust image hashing , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[3] Jiaoying Shi,et al. Digital watermarking systems with chaotic sequences , 1999, Electronic Imaging.
[4] C. Kailasanathan,et al. Image Authentication Surviving Acceptable Modications Using Statistical Measures and K-mean Segmentation , 2001 .
[5] Jean-Didier Legat,et al. RASH: RAdon soft hash algorithm , 2002, 2002 11th European Signal Processing Conference.
[6] Shih-Fu Chang,et al. A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..
[7] Shih-Fu Chang,et al. A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[8] Der-Chyuan Lou,et al. Fault resilient and compression tolerant digital signature for image authentication , 2000, IEEE Trans. Consumer Electron..
[9] J. Edward Jackson,et al. A User's Guide to Principal Components: Jackson/User's Guide to Principal Components , 2004 .
[10] Shih-Fu Chang,et al. Robust digital signature for multimedia authentication , 2003 .
[11] Chun-Shien Lu,et al. Geometric distortion-resilient image hashing system and its application scalability , 2004, MM&Sec '04.
[12] Ton Kalker,et al. A robust image fingerprinting system using the Radon transform , 2004, Signal Process. Image Commun..
[13] Ralf Steinmetz,et al. Content-based digital signature for motion pictures authentication and content-fragile watermarking , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.
[14] Nasir M. Rajpoot,et al. Radon/ridgelet signature for image authentication , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[15] Tiago Rosa Maria Paula Queluz. Authentication of digital images and video: Generic models and a new contribution , 2001, Signal processing. Image communication.
[16] Benoit M. Macq,et al. A robust soft hash algorithm for digital image signature , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).
[17] J. Edward Jackson,et al. A User's Guide to Principal Components. , 1991 .
[18] A.H. Tewfik,et al. When seeing isn't believing [multimedia authentication technologies] , 2004, IEEE Signal Processing Magazine.
[19] Sushil K. Bhattacharjee,et al. Compression tolerant image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[20] V. Monga,et al. Clustering algorithms for perceptual image hashing , 2004, 3rd IEEE Signal Processing Education Workshop. 2004 IEEE 11th Digital Signal Processing Workshop, 2004..
[21] Chun-Shien Lu,et al. Structural digital signature for image authentication: an incidental distortion resistant scheme , 2003, IEEE Trans. Multim..
[22] Jiri Fridrich,et al. Robust hash functions for digital watermarking , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).
[23] Vishal Monga,et al. Robust perceptual image hashing using feature points , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[24] Ramarathnam Venkatesan,et al. New Iterative Geometric Methods for Robust Perceptual Image Hashing , 2001, Digital Rights Management Workshop.
[25] J. E. Jackson. A User's Guide to Principal Components , 1991 .
[26] Ingemar J. Cox,et al. Digital Watermarking , 2003, Lecture Notes in Computer Science.