Wave atom transform generated strong image hashing scheme
暂无分享,去创建一个
Fang Liu | Lee-Ming Cheng | Qi-Kai Fu | Hon-Yin Leung | Lee-Ming Cheng | H. Leung | Fang Liu | Qi-Kai Fu
[1] Vishal Monga,et al. Perceptual Image Hashing Via Feature Points: Performance Evaluation and Tradeoffs , 2006, IEEE Transactions on Image Processing.
[2] Jean-Pierre Antoine,et al. Two-dimensional directional wavelets and the scale-angle representation , 1996, Signal Process..
[3] Deepa Kundur,et al. Statistical invisibility for collusion-resistant digital video watermarking , 2005, IEEE Transactions on Multimedia.
[4] Chun-Shien Lu,et al. Structural digital signature for image authentication: an incidental distortion resistant scheme , 2003, IEEE Trans. Multim..
[5] Robert W. Doran,et al. The Gray Code , 2007, J. Univers. Comput. Sci..
[6] Benoit M. Macq,et al. Image watermarking: an evolution to content based approaches , 2002, Pattern Recognit..
[7] B. N. Chatterji,et al. An FFT-based technique for translation, rotation, and scale-invariant image registration , 1996, IEEE Trans. Image Process..
[8] Vishal Monga,et al. A clustering based approach to perceptual image hashing , 2006, IEEE Transactions on Information Forensics and Security.
[9] Shu-Fen Tu,et al. Probability-based tampering detection scheme for digital images , 2010 .
[10] N. Memon,et al. Confusion/Diffusion Capabilities of Some Robust Hash Functions , 2006, 2006 40th Annual Conference on Information Sciences and Systems.
[11] Mohammed Yakoob Siyal,et al. A secure and robust hash-based scheme for image authentication , 2010, Signal Process..
[12] S. Mallat. A wavelet tour of signal processing , 1998 .
[13] Shuihua Han,et al. Content-based image authentication: current status, issues, and challenges , 2009, International Journal of Information Security.
[14] Vincent Rijmen,et al. Analysis of the Hash Function Design Strategy Called SMASH , 2008, IEEE Transactions on Information Theory.
[15] L. Demanet,et al. Wave atoms and sparsity of oscillatory patterns , 2007 .
[16] Shih-Fu Chang,et al. A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..
[17] Shih-Fu Chang,et al. A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[18] Nick Cercone,et al. Applying the extended mass-constraint EM algorithm to image retrieval , 2008, Comput. Math. Appl..
[19] Siwei Luo,et al. Computers and Mathematics with Applications Fuzzy Aesthetic Semantics Description and Extraction for Art Image Retrieval , 2022 .
[20] Jiwu Huang,et al. Fragility Analysis of Adaptive Quantization-Based Image Hashing , 2010, IEEE Transactions on Information Forensics and Security.
[21] Massimo Alioto,et al. A Class of Maximum-Period Nonlinear Congruential Generators Derived From the Rényi Chaotic Map , 2007, IEEE Transactions on Circuits and Systems I: Regular Papers.
[22] Edward M. Reingold,et al. Efficient generation of the binary reflected gray code and its applications , 1976, CACM.
[23] Min Wu,et al. Robust and secure image hashing , 2006, IEEE Transactions on Information Forensics and Security.
[24] Fouad Khelifi,et al. Perceptual Image Hashing Based on Virtual Watermark Detection , 2010, IEEE Transactions on Image Processing.
[25] Ramarathnam Venkatesan,et al. Robust image hashing , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[26] V. Aslantaş,et al. Improving the performance of DCT-based fragile watermarking using intelligent optimization algorithms , 2009 .
[27] Vishal Monga,et al. Robust and Secure Image Hashing via Non-Negative Matrix Factorizations , 2007, IEEE Transactions on Information Forensics and Security.
[28] Vishal Monga,et al. Image Authentication Under Geometric Attacks Via Structure Matching , 2005, 2005 IEEE International Conference on Multimedia and Expo.