Wave Atom-Based Perceptual Image Hashing Against Content-Preserving and Content-Altering Attacks
暂无分享,去创建一个
[1] Shih-Fu Chang,et al. A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..
[2] C. De Vleeschouwer,et al. Robust video hashing based on radial projections of key frames , 2005, IEEE Transactions on Signal Processing.
[3] Vishal Monga,et al. Robust and Secure Image Hashing via Non-Negative Matrix Factorizations , 2007, IEEE Transactions on Information Forensics and Security.
[4] Chun-Shien Lu,et al. Structural digital signature for image authentication: an incidental distortion resistant scheme , 2003, IEEE Trans. Multim..
[5] Ramarathnam Venkatesan,et al. Robust image hashing , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[6] Ton Kalker,et al. A robust image fingerprinting system using the Radon transform , 2004, Signal Process. Image Commun..
[7] Fang Liu,et al. Perceptual Image Hashing via Wave Atom Transform , 2011, IWDW.
[8] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[9] Jean-Didier Legat,et al. RASH: RAdon soft hash algorithm , 2002, 2002 11th European Signal Processing Conference.
[10] Sushil K. Bhattacharjee,et al. Compression tolerant image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[11] Min Wu,et al. Robust and secure image hashing , 2006, IEEE Transactions on Information Forensics and Security.
[12] B. N. Chatterji,et al. An FFT-based technique for translation, rotation, and scale-invariant image registration , 1996, IEEE Trans. Image Process..
[13] Xinpeng Zhang,et al. Robust Hashing for Image Authentication Using Zernike Moments and Local Features , 2013, IEEE Transactions on Information Forensics and Security.
[14] Z. Jane Wang,et al. Perceptual Image Hashing Based on Shape Contexts and Local Feature Points , 2012, IEEE Transactions on Information Forensics and Security.
[15] Vishal Monga,et al. Perceptual Image Hashing Via Feature Points: Performance Evaluation and Tradeoffs , 2006, IEEE Transactions on Image Processing.
[16] Jean-Pierre Antoine,et al. Two-dimensional directional wavelets and the scale-angle representation , 1996, Signal Process..
[17] Mohammed Yakoob Siyal,et al. A secure and robust hash-based scheme for image authentication , 2010, Signal Process..
[18] Xinpeng Zhang,et al. Robust Image Hashing for Tamper Detection Using Non-Negative Matrix Factorization , 2008 .
[19] S. Mallat. A wavelet tour of signal processing , 1998 .
[20] Min Wu,et al. Multimedia forensic hash based on visual words , 2010, 2010 IEEE International Conference on Image Processing.
[21] Di Wu,et al. A novel image hash algorithm resistant to print-scan , 2009, Signal Process..
[22] Dimitrios Hatzinakos,et al. Content Based Image Hashing Via Wavelet and Radon Transform , 2007, PCM.
[23] Yanqiang Lei,et al. Robust image hash in Radon transform domain for authentication , 2011, Signal Process. Image Commun..
[24] Fouad Khelifi,et al. Perceptual Image Hashing Based on Virtual Watermark Detection , 2010, IEEE Transactions on Image Processing.
[25] L. Demanet,et al. Wave atoms and sparsity of oscillatory patterns , 2007 .
[26] Ramarathnam Venkatesan,et al. Robust perceptual image hashing via matrix invariants , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[27] Jiri Fridrich,et al. Robust hash functions for digital watermarking , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).
[28] Vishal Monga,et al. Robust perceptual image hashing using feature points , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..