Image authentication based on robust image hashing with geometric correction
暂无分享,去创建一个
[1] Ram Kumar Karsh,et al. Perceptual robust and secure image hashing using ring partition-PGNMF , 2015, TENCON 2015 - 2015 IEEE Region 10 Conference.
[2] Jun Zhong,et al. Towards unsupervised physical activity recognition using smartphone accelerometers , 2016, Multimedia Tools and Applications.
[3] Ming Zhu,et al. Quaternion Fourier-Mellin moments for color images , 2011, Pattern Recognit..
[4] Chi-Man Pun,et al. Multi-scale image hashing using adaptive local feature extraction for robust tampering detection , 2016, Signal Process..
[5] Li Liu,et al. Recognizing Complex Activities by a Probabilistic Interval-Based Model , 2016, AAAI.
[6] Tom Fawcett,et al. An introduction to ROC analysis , 2006, Pattern Recognit. Lett..
[7] Ramarathnam Venkatesan,et al. Robust perceptual image hashing via matrix invariants , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[8] Zhenjun Tang,et al. Robust image hashing using ring-based entropies , 2013, Signal Process..
[9] Min Wu,et al. Multimedia forensic hash based on visual words , 2010, 2010 IEEE International Conference on Image Processing.
[10] Pascal Fua,et al. SLIC Superpixels Compared to State-of-the-Art Superpixel Methods , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[11] Chi-Man Pun,et al. Quaternion-Based Image Hashing for Adaptive Tampering Localization , 2016, IEEE Transactions on Information Forensics and Security.
[12] A. S. Solodovnikov,et al. Hypercomplex Numbers: An Elementary Introduction to Algebras , 1989 .
[13] Xinpeng Zhang,et al. Robust Hashing for Image Authentication Using Zernike Moments and Local Features , 2013, IEEE Transactions on Information Forensics and Security.
[14] Z. Jane Wang,et al. Perceptual Image Hashing Based on Shape Contexts and Local Feature Points , 2012, IEEE Transactions on Information Forensics and Security.
[15] M. C. Adhikary,et al. Digital Image Tamper Detection Techniques - A Comprehensive Study , 2013, ArXiv.
[16] Xinpeng Zhang,et al. Robust Image Hashing for Tamper Detection Using Non-Negative Matrix Factorization , 2008 .
[17] Hongbin Zha,et al. Fusion of low-and high-dimensional approaches by trackers sampling for generic human motion tracking , 2012, Proceedings of the 21st International Conference on Pattern Recognition (ICPR2012).
[18] David S. Rosenblum,et al. From action to activity: Sensor-based activity recognition , 2016, Neurocomputing.
[19] Giovanni Maria Farinella,et al. Robust Image Alignment for Tampering Detection , 2012, IEEE Transactions on Information Forensics and Security.
[20] Aditi,et al. Robust image hashing through DWT-SVD and spectral residual method , 2017, EURASIP Journal on Image and Video Processing.
[21] Ramarathnam Venkatesan,et al. Robust image hashing , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[22] Yanqiang Lei,et al. Robust image hash in Radon transform domain for authentication , 2011, Signal Process. Image Commun..
[23] Shichao Zhang,et al. Robust Image Hashing With Ring Partition and Invariant Vector Distance , 2016, IEEE Transactions on Information Forensics and Security.
[24] Jianru Xue,et al. A Visual Model-Based Perceptual Image Hash for Content Authentication , 2015, IEEE Transactions on Information Forensics and Security.
[25] Luming Zhang,et al. Action2Activity: Recognizing Complex Activities from Sensor Data , 2015, IJCAI.
[26] Mohammed Yakoob Siyal,et al. A secure and robust hash-based scheme for image authentication , 2010, Signal Process..
[27] Min Wu,et al. Forensic hash for multimedia information , 2010, Electronic Imaging.
[28] Vishal Monga,et al. Robust and Secure Image Hashing via Non-Negative Matrix Factorizations , 2007, IEEE Transactions on Information Forensics and Security.
[29] Lyle H. Ungar,et al. Beyond Binary Labels: Political Ideology Prediction of Twitter Users , 2017, ACL.
[30] Hongbin Zha,et al. Tracking Generic Human Motion via Fusion of Low- and High-Dimensional Approaches , 2013, IEEE Trans. Syst. Man Cybern. Syst..
[31] Fabien A. P. Petitcolas,et al. Watermarking schemes evaluation , 2000, IEEE Signal Process. Mag..
[32] Yu Zheng,et al. Urban Water Quality Prediction Based on Multi-Task Multi-View Learning , 2016, IJCAI.
[33] Luming Zhang,et al. Fortune Teller: Predicting Your Career Path , 2016, AAAI.
[34] Huazhong Shu,et al. Robust hashing for image authentication using SIFT feature and quaternion Zernike moments , 2015, Multimedia Tools and Applications.
[35] Huchuan Lu,et al. Saliency Region Detection Based on Markov Absorption Probabilities , 2015, IEEE Transactions on Image Processing.
[36] Ram Kumar Karsh,et al. Robust image hashing using ring partition-PGNMF and local features , 2016, SpringerPlus.
[37] Shichao Zhang,et al. Robust Perceptual Image Hashing Based on Ring Partition and NMF , 2014, IEEE Transactions on Knowledge and Data Engineering.