Quaternion-Based Image Hashing for Adaptive Tampering Localization
暂无分享,去创建一个
[1] Vishal Monga,et al. Robust and Secure Image Hashing via Non-Negative Matrix Factorizations , 2007, IEEE Transactions on Information Forensics and Security.
[2] Giovanni Maria Farinella,et al. Robust Image Alignment for Tampering Detection , 2012, IEEE Transactions on Information Forensics and Security.
[3] Qibin Sun,et al. Robust Hash for Detecting and Localizing Image Tampering , 2007, 2007 IEEE International Conference on Image Processing.
[4] Frédo Durand,et al. A Fast Approximation of the Bilateral Filter Using a Signal Processing Approach , 2006, International Journal of Computer Vision.
[5] Vishal Monga,et al. Image Authentication Under Geometric Attacks Via Structure Matching , 2005, 2005 IEEE International Conference on Multimedia and Expo.
[6] Min Wu,et al. Forensic hash for multimedia information , 2010, Electronic Imaging.
[7] H. Arsenault,et al. Experiments on pattern recognition using invariant Fourier-Mellin descriptors. , 1986, Journal of the Optical Society of America. A, Optics and image science.
[8] Liming Zhang,et al. Spatio-temporal Saliency detection using phase spectrum of quaternion fourier transform , 2008, 2008 IEEE Conference on Computer Vision and Pattern Recognition.
[9] Roberto Manduchi,et al. Bilateral filtering for gray and color images , 1998, Sixth International Conference on Computer Vision (IEEE Cat. No.98CH36271).
[10] Chi-Man Pun,et al. Multi-scale image hashing using adaptive local feature extraction for robust tampering detection , 2016, Signal Process..
[11] Jintao Li,et al. Binary feature from intensity quantization and weakly spatial contextual coding for image search , 2015, Inf. Sci..
[12] Ramarathnam Venkatesan,et al. Robust perceptual image hashing via matrix invariants , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[13] Sajal K. Das,et al. Fast track article: Secure data aggregation in wireless sensor networks: A watermark based authentication supportive approach , 2008 .
[14] M. C. Adhikary,et al. Digital Image Tamper Detection Techniques - A Comprehensive Study , 2013, ArXiv.
[15] Xinpeng Zhang,et al. Robust Image Hashing for Tamper Detection Using Non-Negative Matrix Factorization , 2008 .
[16] Alexei A. Efros,et al. Fast bilateral filtering for the display of high-dynamic-range images , 2002 .
[17] Xinpeng Zhang,et al. Robust Hashing for Image Authentication Using Zernike Moments and Local Features , 2013, IEEE Transactions on Information Forensics and Security.
[18] Z. Jane Wang,et al. Perceptual Image Hashing Based on Shape Contexts and Local Feature Points , 2012, IEEE Transactions on Information Forensics and Security.
[19] Ming Zhu,et al. Quaternion Fourier-Mellin moments for color images , 2011, Pattern Recognit..
[20] Martin D. Levine,et al. Visual Saliency Based on Scale-Space Analysis in the Frequency Domain , 2013, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[21] Ramarathnam Venkatesan,et al. Robust image hashing , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[22] Min Wu,et al. Multimedia forensic hash based on visual words , 2010, 2010 IEEE International Conference on Image Processing.
[23] Jianru Xue,et al. A Visual Model-Based Perceptual Image Hash for Content Authentication , 2015, IEEE Transactions on Information Forensics and Security.
[24] Ming Zhu,et al. Quaternion moment and its invariants for color object classification , 2014, Inf. Sci..
[25] Mohammed Yakoob Siyal,et al. A secure and robust hash-based scheme for image authentication , 2010, Signal Process..
[26] Hefei Ling,et al. Nonnegative sparse locality preserving hashing , 2014, Inf. Sci..
[27] Stephen J. Sangwine,et al. Hypercomplex Fourier Transforms of Color Images , 2001, IEEE Transactions on Image Processing.