Perceptual image hashing via dual-cross pattern encoding and salient structure detection
暂无分享,去创建一个
Xinpeng Zhang | Xingming Sun | Chuan Qin | Xiangyang Luo | Xueqin Chen | Xiangyang Luo | Xinpeng Zhang | Xingming Sun | Chuan Qin | Xueqin Chen
[1] Pawel Korus,et al. Towards Practical Self-Embedding for JPEG-Compressed Digital Images , 2015, IEEE Transactions on Multimedia.
[2] C. De Vleeschouwer,et al. Robust video hashing based on radial projections of key frames , 2005, IEEE Transactions on Signal Processing.
[3] Chin-Chen Chang,et al. Robust image hashing using non-uniform sampling in discrete Fourier domain , 2013, Digit. Signal Process..
[4] Ramarathnam Venkatesan,et al. Robust perceptual image hashing via matrix invariants , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[5] H. Farid,et al. Image forgery detection , 2009, IEEE Signal Processing Magazine.
[6] Gerald Schaefer,et al. UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.
[7] Chuan Qin,et al. Robust image hashing with embedding vector variance of LLE , 2015, Digit. Signal Process..
[8] Min Wu,et al. Robust and secure image hashing , 2006, IEEE Transactions on Information Forensics and Security.
[9] Xingming Sun,et al. Segmentation-Based Image Copy-Move Forgery Detection Scheme , 2015, IEEE Transactions on Information Forensics and Security.
[10] Ramarathnam Venkatesan,et al. Robust image hashing , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[11] Xingming Sun,et al. Effective and Efficient Image Copy Detection with Resistance to Arbitrary Rotation , 2016, IEICE Trans. Inf. Syst..
[12] Shiguo Lian,et al. Forensics feature analysis in quaternion wavelet domain for distinguishing photographic images and computer graphics , 2017, Multimedia Tools and Applications.
[13] Marko Heikkilä,et al. Description of interest regions with local binary patterns , 2009, Pattern Recognit..
[14] Shih-Fu Chang,et al. A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[15] Jonghyun Choi,et al. Multi-Directional Multi-Level Dual-Cross Patterns for Robust Face Recognition , 2014, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[16] Nicu Sebe,et al. Compact Image Fingerprint Via Multiple Kernel Hashing , 2015, IEEE Transactions on Multimedia.
[17] Christopher G. Harris,et al. A Combined Corner and Edge Detector , 1988, Alvey Vision Conference.
[18] William Puech,et al. Perceptual Image Hashing , 2012 .
[19] Mohammed Yakoob Siyal,et al. A secure and robust hash-based scheme for image authentication , 2010, Signal Process..
[20] Zhenjun Tang,et al. Perceptual image hashing using local entropies and DWT , 2013 .
[21] Jean-Didier Legat,et al. RASH: RAdon soft hash algorithm , 2002, 2002 11th European Signal Processing Conference.
[22] Xinpeng Zhang,et al. Effective reversible data hiding in encrypted image with privacy protection for image content , 2015, J. Vis. Commun. Image Represent..
[23] Xinpeng Zhang,et al. Self-embedding fragile watermarking based on reference-data interleaving and adaptive selection of embedding mode , 2016, Inf. Sci..
[24] Pod Hyb. Extended Set of Local Binary Patterns for Rapid Object Detection , 2010 .
[25] Xinpeng Zhang,et al. Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy , 2017, Signal Process..
[26] Xingming Sun,et al. A novel image hashing scheme with perceptual robustness using block truncation coding , 2016, Inf. Sci..
[27] Saeed Mozaffari,et al. Perceptual image hashing using center-symmetric local binary patterns , 2015, Multimedia Tools and Applications.
[28] Vishal Monga,et al. Robust and Secure Image Hashing via Non-Negative Matrix Factorizations , 2007, IEEE Transactions on Information Forensics and Security.