Perceptual hashing for color images
暂无分享,去创建一个
[1] Fan Yang,et al. Robust image hashing via colour vector angles and discrete wavelet transform , 2014, IET Image Process..
[2] Chin-Chen Chang,et al. Protecting the content integrity of digital imagery with fidelity preservation , 2011, TOMCCAP.
[3] Li Fei-Fei,et al. ImageNet: A large-scale hierarchical image database , 2009, CVPR.
[4] Jian Ji,et al. Histogram-based perceptual hash algorithm for synthetic aperture radar image segmentation , 2018, J. Electronic Imaging.
[5] Cuiling Jiang,et al. Perceptual image hashing based on a deep convolution neural network for content authentication , 2018, J. Electronic Imaging.
[6] Chi-Man Pun,et al. Quaternion-Based Image Hashing for Adaptive Tampering Localization , 2016, IEEE Transactions on Information Forensics and Security.
[7] Ram Kumar Karsh,et al. Robust color image hashing using convolutional stacked denoising auto-encoders for image authentication , 2021, Neural Computing and Applications.
[8] Shichao Zhang,et al. Robust Image Hashing with Tensor Decomposition , 2019, IEEE Transactions on Knowledge and Data Engineering.
[9] Vishal Monga,et al. Robust and Secure Image Hashing via Non-Negative Matrix Factorizations , 2007, IEEE Transactions on Information Forensics and Security.
[10] Xingming Sun,et al. A novel image hashing scheme with perceptual robustness using block truncation coding , 2016, Inf. Sci..
[11] Xinpeng Zhang,et al. Perceptual image hashing via dual-cross pattern encoding and salient structure detection , 2018, Inf. Sci..
[12] Xiaoming Xi,et al. Robust Image Fingerprinting Based on Feature Point Relationship Mining , 2018, IEEE Transactions on Information Forensics and Security.
[13] Khalid M. Hosny,et al. Robust image hashing using exact Gaussian-Hermite moments , 2018, IET Image Process..
[14] Zhenjun Tang,et al. Robust image hashing with multidimensional scaling , 2017, Signal Process..
[15] Jaime Lloret,et al. Robust Image Hashing Based Efficient Authentication for Smart Industrial Environment , 2019, IEEE Transactions on Industrial Informatics.
[16] Shichao Zhang,et al. Robust Image Hashing With Ring Partition and Invariant Vector Distance , 2016, IEEE Transactions on Information Forensics and Security.
[17] Rabul Hussain Laskar,et al. Image authentication based on robust image hashing with geometric correction , 2018, Multimedia Tools and Applications.
[18] Aditi,et al. Robust image hashing through DWT-SVD and spectral residual method , 2017, EURASIP Journal on Image and Video Processing.
[19] Chuan Qin,et al. Perceptual Image Hashing for Content Authentication Based on Convolutional Neural Network With Multiple Constraints , 2020, IEEE Transactions on Circuits and Systems for Video Technology.
[20] Zhenjun Tang,et al. Robust image hashing with dominant DCT coefficients , 2014 .
[21] Jia Deng,et al. A large-scale hierarchical image database , 2009, CVPR 2009.
[22] Qi Shen,et al. Perceptual hashing for color image based on color opponent component and quadtree structure , 2020, Signal Process..
[23] Zhenjun Tang,et al. Robust image hashing using ring-based entropies , 2013, Signal Process..
[24] Jun Wu,et al. Perceptual uniform descriptor and ranking on manifold for image retrieval , 2018, Inf. Sci..
[25] Ram Kumar Karsh,et al. Robust image hashing using ring partition-PGNMF and local features , 2016, SpringerPlus.
[26] Min-Chun Hu,et al. Local Binary Pattern Circuit Generator With Adjustable Parameters for Feature Extraction , 2018, IEEE Transactions on Intelligent Transportation Systems.
[27] Shichao Zhang,et al. Robust Perceptual Image Hashing Based on Ring Partition and NMF , 2014, IEEE Transactions on Knowledge and Data Engineering.
[28] Xiuyang Zhao,et al. Deep multiscale divergence hashing for image retrieval , 2021, J. Electronic Imaging.
[29] Babak Mahdian,et al. IMD2020: A Large-Scale Annotated Dataset Tailored for Detecting Manipulated Images , 2020, 2020 IEEE Winter Applications of Computer Vision Workshops (WACVW).
[30] Pietro Perona,et al. Microsoft COCO: Common Objects in Context , 2014, ECCV.
[31] Kai Liu,et al. Robust image hashing via DCT and LLE , 2016, Comput. Secur..
[32] Ram Kumar Karsh,et al. Image Authentication Using Image Hashing Based on Ring Partition with Corner Inclusion , 2018, 2018 International Conference on Communication and Signal Processing (ICCSP).
[33] Jianru Xue,et al. A Visual Model-Based Perceptual Image Hash for Content Authentication , 2015, IEEE Transactions on Information Forensics and Security.
[34] Jinjun Chen,et al. Robust Hashing Based on Quaternion Zernike Moments for Image Authentication , 2016, ACM Trans. Multim. Comput. Commun. Appl..
[35] Min Wu,et al. Robust and secure image hashing , 2006, IEEE Transactions on Information Forensics and Security.
[36] Jawad Ahmad,et al. Robust Image Hashing Scheme using Laplacian Pyramids , 2020, Comput. Electr. Eng..
[37] DavarzaniReza,et al. Perceptual image hashing using center-symmetric local binary patterns , 2016 .
[38] Shiguang Liu,et al. Efficient Image Hashing with Geometric Invariant Vector Distance for Copy Detection , 2019, ACM Trans. Multim. Comput. Commun. Appl..
[39] Chin-Chen Chang,et al. Perceptual hashing for color images based on hybrid extraction of structural features , 2018, Signal Process..
[40] Tong Li,et al. Temporal error concealment using quad-tree prediction and coherency sensitive hashing for HEVC , 2018, J. Electronic Imaging.
[41] Gerald Schaefer,et al. UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.
[42] Dongdong Wang,et al. Robust and Secure Image Fingerprinting Learned by Neural Network , 2020, IEEE Transactions on Circuits and Systems for Video Technology.
[43] Chuan Qin,et al. Robust image hashing with embedding vector variance of LLE , 2015, Digit. Signal Process..
[44] Xinpeng Zhang,et al. Robust Hashing for Image Authentication Using Zernike Moments and Local Features , 2013, IEEE Transactions on Information Forensics and Security.
[45] Chuan Qin,et al. Perceptual Image Hashing Based on Weber Local Binary Pattern and Color Angle Representation , 2019, IEEE Access.