A Review of Hashing based Image Copy Detection Techniques
暂无分享,去创建一个
Mayank Srivastava | Jamshed Siddiqui | Mohammad Athar Ali | Jamshed Siddiqui | Mayank Srivastava | M. A. Ali
[1] Shih-Fu Chang,et al. A Robust and Secure Media Signature Scheme for JPEG Images , 2005, J. VLSI Signal Process..
[2] Zhenjun Tang,et al. Robust image hashing based on color vector angle and Canny operator , 2016 .
[3] Z. Jane Wang,et al. An Extended Image Hashing Concept: Content-Based Fingerprinting Using FJLT , 2009, EURASIP J. Inf. Secur..
[4] Ramarathnam Venkatesan,et al. Robust perceptual image hashing via matrix invariants , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[5] Chun-Shien Lu,et al. Robust mesh-based hashing for copy detection and tracing of images , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).
[6] Yanqiang Lei,et al. An image copy detection scheme based on radon transform , 2010, 2010 IEEE International Conference on Image Processing.
[7] Ramarathnam Venkatesan,et al. Robust image hashing , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[8] K. Rhee,et al. A key-dependent secure image hashing scheme by using Radon transform , 2009, 2009 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS).
[9] Bian Yang,et al. Block Mean Value Based Image Perceptual Hashing , 2006, 2006 International Conference on Intelligent Information Hiding and Multimedia.
[10] Fouad Khelifi,et al. Perceptual Image Hashing Based on Virtual Watermark Detection , 2010, IEEE Transactions on Image Processing.
[11] Andreas Uhl,et al. Robustness and security of a wavelet-based CBIR hashing algorithm , 2006, MM&Sec '06.
[12] Shiguo Lian,et al. A passive image authentication scheme for detecting region-duplication forgery with rotation , 2011, J. Netw. Comput. Appl..
[13] Fan Yang,et al. Robust image hashing via colour vector angles and discrete wavelet transform , 2014, IET Image Process..
[14] Chun-Shien Lu,et al. Geometric distortion-resilient image hashing scheme and its applications on copy detection and authentication , 2005, Multimedia Systems.
[15] Xinpeng Zhang,et al. Lexicographical framework for image hashing with implementation based on DCT and NMF , 2009, Multimedia Tools and Applications.
[16] C. De Vleeschouwer,et al. Robust video hashing based on radial projections of key frames , 2005, IEEE Transactions on Signal Processing.
[17] Ramarathnam Venkatesan,et al. A Perceptual Audio Hashing Algorithm: A Tool for Robust Audio Identification and Information Hiding , 2001, Information Hiding.
[18] Shih-Hsuan Yang,et al. Robust image hashing based on SPIHT , 2005, ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005..
[19] Dimitris Kanellopoulos,et al. Recent Advances in Multimedia Information System Security , 2009, Informatica.
[20] Aditi,et al. Robust image hashing through DWT-SVD and spectral residual method , 2017, EURASIP Journal on Image and Video Processing.
[21] Ramarathnam Venkatesan,et al. The randlet transform: Applications to universal perceptual hash- ing and image identi¯cation , 2004 .
[22] Weimin Wei,et al. Perceptual image hash for tampering detection using Zernike moments , 2010, 2010 IEEE International Conference on Progress in Informatics and Computing.
[23] Ping Li,et al. Nonnegative sparse coding induced hashing for image copy detection , 2013, Neurocomputing.
[24] Jiri Fridrich,et al. Robust hash functions for digital watermarking , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).
[25] Vishal Monga,et al. Robust perceptual image hashing using feature points , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[26] Jean-Luc Dugelay,et al. A Survey of Watermarking Algorithms for Image Authentication , 2002, EURASIP J. Adv. Signal Process..
[27] William Puech,et al. A robust and secure perceptual hashing system based on a quantization step analysis , 2013, Signal Process. Image Commun..
[28] Mohamed Deriche,et al. A bibliography of pixel-based blind image forgery detection techniques , 2015, Signal Process. Image Commun..
[29] Ramarathnam Venkatesan,et al. New Iterative Geometric Methods for Robust Perceptual Image Hashing , 2001, Digital Rights Management Workshop.
[30] Fan Yang,et al. Robust Image Hashing Based on Multiple Histograms , 2012 .
[31] Fang Liu,et al. Wave atom transform generated strong image hashing scheme , 2012 .
[32] Vishal Monga,et al. Perceptual Image Hashing Via Feature Points: Performance Evaluation and Tradeoffs , 2006, IEEE Transactions on Image Processing.
[33] Shih-Fu Chang. Blind Passive Media Forensics: Motivation and Opportunity , 2007, MCAM.
[34] Jingbing Li,et al. A New Zero-Watermarking Algorithm Resisting Attacks Based on Differences Hashing , 2016 .
[35] Ming-Syan Chen,et al. A New Approach to Image Copy Detection Based on Extended Feature Sets , 2007, IEEE Transactions on Image Processing.
[36] Judith Redi,et al. Digital image forensics: a booklet for beginners , 2010, Multimedia Tools and Applications.
[37] Jiwu Huang,et al. Histogram-based image hashing scheme robust against geometric deformations , 2007, MM&Sec.
[38] Ram Kumar Karsh,et al. Robust image hashing using ring partition-PGNMF and local features , 2016, SpringerPlus.
[39] Brian M. Kurkoski,et al. Robust image hashing using image normalization and SVD decomposition , 2011, 2011 IEEE 54th International Midwest Symposium on Circuits and Systems (MWSCAS).
[40] Rui Sun,et al. Robust image hashing using locally linear embedding , 2011, 2011 International Conference on Computer Science and Service System (CSSS).
[41] Huazhong Shu,et al. Robust hashing for image authentication using quaternion discrete Fourier transform and log-polar transform , 2015, Digit. Signal Process..
[42] Chuan Qin,et al. Robust image hashing with embedding vector variance of LLE , 2015, Digit. Signal Process..
[43] A. El-Attar,et al. New Proposed Fusion between DCT for Feature Extraction and NSVC for Face Classification , 2018 .
[44] Sheng-He Sun,et al. Image Robust Hashing Based on DCT Sign , 2006, 2006 International Conference on Intelligent Information Hiding and Multimedia.
[45] Chin-Chen Chang,et al. Novel image copy detection with rotating tolerance , 2007, J. Syst. Softw..
[46] Kannan Ramchandran,et al. Dither-based secure image hashing using distributed coding , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).
[47] Di Wu,et al. A novel image hash algorithm resistant to print-scan , 2009, Signal Process..
[48] Gábor Szűcs,et al. Content-Based Image Retrieval for Multiple Objects Search , 2017 .
[49] Philip Ogunbona,et al. Compression tolerant DCT based image hash , 2003, 23rd International Conference on Distributed Computing Systems Workshops, 2003. Proceedings..
[50] Vishal Monga,et al. Robust and Secure Image Hashing via Non-Negative Matrix Factorizations , 2007, IEEE Transactions on Information Forensics and Security.
[51] Lahouari Ghouti,et al. Perceptual hashing of color images using hypercomplex representations , 2013, 2013 IEEE International Conference on Image Processing.
[52] Vishal Monga,et al. Image Authentication Under Geometric Attacks Via Structure Matching , 2005, 2005 IEEE International Conference on Multimedia and Expo.
[53] Zhenjun Tang,et al. Robust image hashing with dominant DCT coefficients , 2014 .
[54] Min Wu,et al. Image hashing resilient to geometric and filtering operations , 2004, IEEE 6th Workshop on Multimedia Signal Processing, 2004..
[55] Shang-Lin Hsieh,et al. Using binarization and hashing for efficient SIFT matching , 2015, J. Vis. Commun. Image Represent..
[56] Benoit M. Macq,et al. A robust soft hash algorithm for digital image signature , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).
[57] Andreas Uhl,et al. Robust Hash Functions for Visual Data: An Experimental Comparison , 2003, IbPRIA.
[58] Andreas Uhl,et al. Key-Dependent JPEG2000-Based Robust Hashing for Secure Image Authentication , 2008, EURASIP J. Inf. Secur..
[59] Xiamu Niu,et al. Robust Image Hashing Based on Random Gabor Filtering and Dithered Lattice Vector Quantization , 2012, IEEE Transactions on Image Processing.
[60] Xinpeng Zhang,et al. Robust Hashing for Image Authentication Using Zernike Moments and Local Features , 2013, IEEE Transactions on Information Forensics and Security.
[61] Z. Jane Wang,et al. Perceptual Image Hashing Based on Shape Contexts and Local Feature Points , 2012, IEEE Transactions on Information Forensics and Security.
[62] Shichao Zhang,et al. Perceptual Image Hashing with Histogram of Color Vector Angles , 2012, AMT.
[63] Shiguo Lian,et al. Robust Perceptual Image Hash Using Gabor Filters , 2009, 2009 International Conference on Multimedia Information Networking and Security.
[64] Changick Kim,et al. Content-based image copy detection , 2003, Signal Process. Image Commun..
[65] Yanqiang Lei,et al. Robust image hash in Radon transform domain for authentication , 2011, Signal Process. Image Commun..
[66] Z. Jane Wang,et al. Compressed Binary Image Hashes Based on Semisupervised Spectral Embedding , 2013, IEEE Transactions on Information Forensics and Security.
[67] Xinpeng Zhang,et al. Structural Feature-Based Image Hashing and Similarity Metric for Tampering Detection , 2011, Fundam. Informaticae.
[68] Y. L. Liu,et al. A Robust Image Hashing Algorithm Resistant Against Geometrical Attacks , 2013 .
[69] Zhenjun Tang,et al. Robust image hashing using ring-based entropies , 2013, Signal Process..
[70] Jiuchao Feng,et al. Robust image hashing using invariants of Tchebichef moments , 2014 .
[71] Giovanni Maria Farinella,et al. Robust Image Alignment for Tampering Detection , 2012, IEEE Transactions on Information Forensics and Security.
[72] Mohammed Yakoob Siyal,et al. A secure and robust hash-based scheme for image authentication , 2010, Signal Process..
[73] Zhenjun Tang,et al. Robust image hash function using local color features , 2013 .
[74] Min Wu,et al. Robust and secure image hashing , 2006, IEEE Transactions on Information Forensics and Security.
[75] Qi Tian,et al. A robust and secure media signature scheme for JPEG images , 2002, 2002 IEEE Workshop on Multimedia Signal Processing..
[76] Xinpeng Zhang,et al. Robust Image Hashing for Tamper Detection Using Non-Negative Matrix Factorization , 2008 .
[77] Dimitrios Hatzinakos,et al. Content Based Image Hashing Via Wavelet and Radon Transform , 2007, PCM.
[78] Shichao Zhang,et al. Robust Perceptual Image Hashing Based on Ring Partition and NMF , 2014, IEEE Transactions on Knowledge and Data Engineering.
[79] Chin-Chen Chang,et al. Robust image hashing using non-uniform sampling in discrete Fourier domain , 2013, Digit. Signal Process..
[80] Zhenjun Tang,et al. Perceptual Hashing for Color Images Using Invariant Moments , 2012 .
[81] Ton Kalker,et al. A robust image fingerprinting system using the Radon transform , 2004, Signal Process. Image Commun..
[82] XiaoBing Kang,et al. An efficient approach to still image copy detection based on SVD and block partition for digital forensics , 2009, 2009 IEEE International Conference on Intelligent Computing and Intelligent Systems.
[83] Jean-Didier Legat,et al. RASH: RAdon soft hash algorithm , 2002, 2002 11th European Signal Processing Conference.
[84] Osamah M. Al-Qershi,et al. Passive detection of copy-move forgery in digital images: state-of-the-art. , 2013, Forensic science international.
[85] Edward Y. Chang,et al. RIME: a replicated image detector for the World Wide Web , 1998, Other Conferences.
[86] Qibin Sun,et al. Robust Hash for Detecting and Localizing Image Tampering , 2007, 2007 IEEE International Conference on Image Processing.
[87] Hefei Ling,et al. Fast image copy detection approach based on local fingerprint defined visual words , 2013, Signal Process..
[88] Chun-Shien Lu,et al. Compressive sensing-based image hashing , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).
[89] Shichao Zhang,et al. Robust Image Hashing With Ring Partition and Invariant Vector Distance , 2016, IEEE Transactions on Information Forensics and Security.
[90] Jianru Xue,et al. A Visual Model-Based Perceptual Image Hash for Content Authentication , 2015, IEEE Transactions on Information Forensics and Security.