Challenging the Security of CBIR Systems
暂无分享,去创建一个
[1] Edward Y. Chang,et al. Clustering for Approximate Similarity Search in High-Dimensional Spaces , 2002, IEEE Trans. Knowl. Data Eng..
[2] Fernando Pérez-González,et al. Worst-case additive attack against quantization-based data-hiding methods , 2005, IS&T/SPIE Electronic Imaging.
[3] G LoweDavid,et al. Distinctive Image Features from Scale-Invariant Keypoints , 2004 .
[4] Divyakant Agrawal,et al. Approximate nearest neighbor searching in multimedia databases , 2001, Proceedings 17th International Conference on Data Engineering.
[5] Hanan Samet,et al. Foundations of multidimensional and metric data structures , 2006, Morgan Kaufmann series in data management systems.
[6] Christopher Hunt,et al. Notes on the OpenSURF Library , 2009 .
[7] Ramarathnam Venkatesan,et al. Robust perceptual image hashing via matrix invariants , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[8] Li Chen,et al. Video copy detection: a comparative study , 2007, CIVR '07.
[9] Andrew Zisserman,et al. Video Google: a text retrieval approach to object matching in videos , 2003, Proceedings Ninth IEEE International Conference on Computer Vision.
[10] Fernando Pérez-González,et al. The blind Newton sensitivity attack , 2006, Electronic Imaging.
[11] C. Fontaine,et al. Watermarking security: theory and practice , 2005, IEEE Transactions on Signal Processing.
[12] Min Wu,et al. Robust and secure image hashing , 2006, IEEE Transactions on Information Forensics and Security.
[13] Cordelia Schmid,et al. A performance evaluation of local descriptors , 2005, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[14] Trevor Darrell,et al. Locality-Sensitive Hashing Using Stable Distributions , 2006 .
[15] Olivier Buisson,et al. Scalable mining of large video databases using copy detection , 2008, ACM Multimedia.
[16] Laurent Amsaleg,et al. Scalability of local image descriptors: a comparative study , 2006, MM '06.
[17] Jiri Matas,et al. Robust wide-baseline stereo from maximally stable extremal regions , 2004, Image Vis. Comput..
[18] John W. Earl. Tangential sensitivity analysis of watermarks using prior information , 2007, Electronic Imaging.
[19] Min Wu,et al. Unicity Distance of Robust Image Hashing , 2007, IEEE Transactions on Information Forensics and Security.
[20] Pierre Moulin,et al. On the fundamental tradeoff between watermark detection performance and robustness against sensitivity analysis attacks , 2006, Electronic Imaging.
[21] Kannan Ramchandran,et al. Dither-based secure image hashing using distributed coding , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).
[22] Ramarathnam Venkatesan,et al. The randlet transform: Applications to universal perceptual hash- ing and image identi¯cation , 2004 .