Geometric distortion-resilient image hashing system and its application scalability
暂无分享,去创建一个
[1] Shih-Fu Chang,et al. A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..
[2] Edward Y. Chang,et al. Image copy detection using dynamic partial function , 2003, IS&T/SPIE Electronic Imaging.
[3] Benoit M. Macq,et al. A robust soft hash algorithm for digital image signature , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).
[4] Ramarathnam Venkatesan,et al. Robust image hashing , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[5] Chun-Shien Lu,et al. Structural digital signature for image authentication: an incidental distortion resistant scheme , 2000, MULTIMEDIA '00.
[6] Chun-Shien Lu,et al. Robust mesh-based hashing for copy detection and tracing of images , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).
[7] Baitao Li Chang,et al. DPF - a perceptual distance function for image retrieval , 2002, Proceedings. International Conference on Image Processing.
[8] Ramarathnam Venkatesan,et al. New Iterative Geometric Methods for Robust Perceptual Image Hashing , 2001, Digital Rights Management Workshop.
[9] Chun-Shien Lu. On the security of structural information extraction/embedding for images , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).
[10] Jiri Fridrich,et al. Robust hash functions for digital watermarking , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).
[11] Ton Kalker,et al. A robust image fingerprinting system using the Radon transform , 2004, Signal Process. Image Commun..
[12] Edward Y. Chang,et al. RIME: a replicated image detector for the World Wide Web , 1998, Other Conferences.
[13] Edward Y. Chang,et al. Searching near-replicas of images via clustering , 1999, Optics East.
[14] Benoit M. Macq,et al. Geometrically invariant watermarking using feature points , 2002, IEEE Trans. Image Process..
[15] Jean-Didier Legat,et al. RASH: RAdon soft hash algorithm , 2002, 2002 11th European Signal Processing Conference.
[16] Jessica J. Fridrich. Visual hash for oblivious watermarking , 2000, Electronic Imaging.
[17] Markus G. Kuhn,et al. Attacks on Copyright Marking Systems , 1998, Information Hiding.
[18] Ralf Steinmetz,et al. Content-based digital signature for motion pictures authentication and content-fragile watermarking , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.
[19] Changick Kim,et al. Content-based image copy detection , 2003, Signal Process. Image Commun..
[20] Shih-Fu Chang,et al. Generating Robust Digital Signature for Image/Video Authentication , 1998 .
[21] Fabien A. P. Petitcolas,et al. Watermarking schemes evaluation , 2000, IEEE Signal Process. Mag..
[22] Stéphane Mallat,et al. Characterization of Signals from Multiscale Edges , 2011, IEEE Trans. Pattern Anal. Mach. Intell..
[23] Eero P. Simoncelli,et al. Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.