Information-theoretic analysis of desynchronization invariant object identification
暂无分享,去创建一个
[1] Boris Skoric,et al. Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting , 2007 .
[2] Jaap A. Haitsma,et al. Robust Audio Hashing for Content Identification , 2001 .
[3] Sviatoslav Voloshynovskiy,et al. Information-theoretical analysis of private content identification , 2010, 2010 IEEE Information Theory Workshop.
[4] Min Wu,et al. A decision theoretic framework for analyzing binary hash-based content identification systems , 2008, DRM '08.
[5] Thierry Pun,et al. Robust perceptual hashing as classification problem: decision-theoretic and practical considerations , 2007, 2007 IEEE 9th Workshop on Multimedia Signal Processing.
[6] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[7] Jean-Didier Legat,et al. RASH: RAdon soft hash algorithm , 2002, 2002 11th European Signal Processing Conference.
[8] Boris Skoric. Security with Noisy Data - (Extended Abstract of Invited Talk) , 2010, Information Hiding.
[9] Thierry Pun,et al. Decision-theoretic consideration of robust perceptual hashing: link to practical algorithms , 2007 .
[10] Ton Kalker,et al. On the capacity of a biometrical identification system , 2003, IEEE International Symposium on Information Theory, 2003. Proceedings..