Applications of perceptual hash algorithm in agriculture images
暂无分享,去创建一个
Xin Liu | Qian Zhang | Feng Yu | RuPeng Luan
[1] Wen-Nung Lie,et al. Data hiding in images with adaptive numbers of least significant bits based on the human visual system , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).
[2] Fernando Pérez-González,et al. Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis , 2005, Information Hiding.
[3] Bian Yang,et al. Block Mean Value Based Image Perceptual Hashing , 2006, 2006 International Conference on Intelligent Information Hiding and Multimedia.
[4] Minh N. Do,et al. Nonsubsampled contourlet transform: construction and application in enhancement , 2005, IEEE International Conference on Image Processing 2005.
[5] Edward J. Delp,et al. A watermark for digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[6] Min Wu,et al. Robust and secure image hashing , 2006, IEEE Transactions on Information Forensics and Security.
[7] Di Wu,et al. A Robust Contourlet Based Image Hash Algorithm , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[8] Jiri Fridrich,et al. Robust bit extraction from images , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.
[9] K. Rhee,et al. A key-dependent secure image hashing scheme by using Radon transform , 2009, 2009 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS).
[10] Andrew W. H. Ip,et al. Robust Image Hashing for Image Authentication Based on DCT-DWT Composite Domain , 2008, 2008 Eighth International Conference on Intelligent Systems Design and Applications.
[11] Zhang Xinpeng,et al. Image block feature vectors based on a singular-value information metric and color-texture description , 2007 .
[12] Ping Li,et al. Robust image copy detection using multi-resolution histogram , 2010, MIR '10.
[13] Zhihua He,et al. Color texture retrieval through contourlet-based hidden Markov model , 2005, IEEE International Conference on Image Processing 2005.
[14] Ingemar J. Cox,et al. Rotation, scale, and translation resilient watermarking for images , 2001, IEEE Trans. Image Process..
[15] Jong Hyuk Park,et al. Image hash generation method using hierarchical histogram , 2010, Multimedia Tools and Applications.
[16] Chun-Shien Lu,et al. Structural digital signature for image authentication: an incidental distortion resistant scheme , 2000, MULTIMEDIA '00.
[17] Hui Zhang,et al. A Cyclic Coding Based Perceptual Hashing Algorithm , 2008, 2008 Eighth International Conference on Intelligent Systems Design and Applications.
[18] Vishal Monga,et al. Perceptual Image Hashing Via Feature Points: Performance Evaluation and Tradeoffs , 2006, IEEE Transactions on Image Processing.
[19] Fouad Khelifi,et al. Analysis of the Security of Perceptual Image Hashing Based on Non-Negative Matrix Factorization , 2010, IEEE Signal Processing Letters.
[20] Vishal Monga,et al. Robust and Secure Image Hashing via Non-Negative Matrix Factorizations , 2007, IEEE Transactions on Information Forensics and Security.
[21] Jiwu Huang,et al. Histogram-based image hashing scheme robust against geometric deformations , 2007, MM&Sec.
[22] Ton Kalker,et al. A robust image fingerprinting system using the Radon transform , 2004, Signal Process. Image Commun..
[23] Jean-Didier Legat,et al. RASH: RAdon soft hash algorithm , 2002, 2002 11th European Signal Processing Conference.