A novel approach to detecting duplicate images using multiple hash tables
暂无分享,去创建一个
[1] Chin-Chen Chang,et al. Image Copy Detection with Rotating Tolerance , 2005, CIS.
[2] Patrick Gros,et al. Robust content-based image searches for copyright protection , 2003, MMDB '03.
[3] Zhang Xin-peng,et al. Recent development of perceptual image hashing , 2007 .
[4] Guorui Feng,et al. A Robust Image Hashing Method Based on Zernike Moments , 2010 .
[5] Cordelia Schmid,et al. A performance evaluation of local descriptors , 2005, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[6] Hefei Ling,et al. Fine-search for image copy detection based on local affine-invariant descriptor and spatial dependent matching , 2009, Multimedia Tools and Applications.
[7] G LoweDavid,et al. Distinctive Image Features from Scale-Invariant Keypoints , 2004 .
[8] Luc Van Gool,et al. Speeded-Up Robust Features (SURF) , 2008, Comput. Vis. Image Underst..
[9] Luo Juan,et al. A comparison of SIFT, PCA-SIFT and SURF , 2009 .
[10] Kadir A. Peker,et al. Binary SIFT: Fast image retrieval using binary quantized SIFT features , 2011, 2011 9th International Workshop on Content-Based Multimedia Indexing (CBMI).
[11] S. Govindarajulu,et al. A Comparison of SIFT, PCA-SIFT and SURF , 2012 .
[12] Andrew W. H. Ip,et al. Robust Image Hashing for Image Authentication Based on DCT-DWT Composite Domain , 2008, 2008 Eighth International Conference on Intelligent Systems Design and Applications.
[13] Shang-Lin Hsieh,et al. An image authentication scheme based on digital watermarking and image secret sharing , 2010, Multimedia Tools and Applications.
[14] Ioannis Pitas,et al. Still Image and Video Fingerprinting , 2009, 2009 Seventh International Conference on Advances in Pattern Recognition.
[15] Ton Kalker,et al. A robust image fingerprinting system using the Radon transform , 2004, Signal Process. Image Commun..
[16] Sudeep D. Thepade,et al. PERFORMANCE COMPARISON OF IMAGE RETRIEVAL TECHNIQUES USING WAVELET PYRAMIDS OF WALSH, HAAR AND KEKRE TRANSFORMS , 2010 .
[17] 王朔中,et al. Recent development of perceptual image hashing , 2007 .
[18] B. S. Manjunath,et al. Duplicate Image Detection in Large Scale Databases , 2007 .
[19] Ioannis Pitas,et al. Applications of toral automorphisms in image watermarking , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[20] S.M. Ji,et al. A survey of the image copy detection , 2008, 2008 IEEE Conference on Cybernetics and Intelligent Systems.
[21] Chong-Wah Ngo,et al. Scale-Rotation Invariant Pattern Entropy for Keypoint-Based Near-Duplicate Detection , 2009, IEEE Transactions on Image Processing.
[22] Chun-Shien Lu,et al. Geometric distortion-resilient image hashing scheme and its applications on copy detection and authentication , 2005, Multimedia Systems.
[23] Xinpeng Zhang,et al. Lexicographical framework for image hashing with implementation based on DCT and NMF , 2009, Multimedia Tools and Applications.
[24] Wang Rongbo,et al. Copy image detection based on local keypoints , 2011, 2011 International Conference of Soft Computing and Pattern Recognition (SoCPaR).
[25] Roland Siegwart,et al. BRISK: Binary Robust invariant scalable keypoints , 2011, 2011 International Conference on Computer Vision.
[26] Soo-Chang Pei,et al. Secure image hashing via minimum distortion estimation , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).
[27] Geoff Wyvill,et al. SIFT and SURF Performance Evaluation against Various Image Deformations on Benchmark Dataset , 2011, 2011 International Conference on Digital Image Computing: Techniques and Applications.