Robust image hashing with tampering recovery capability via low-rank and sparse representation
暂无分享,去创建一个
[1] Andreas Uhl,et al. Key-Dependent JPEG2000-Based Robust Hashing for Secure Image Authentication , 2008, EURASIP J. Inf. Secur..
[2] Ramarathnam Venkatesan,et al. Robust image hashing , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[3] Aswin C. Sankaranarayanan,et al. Compressive Sensing , 2008, Computer Vision, A Reference Guide.
[4] Jianhua Wu,et al. Novel hybrid image compression–encryption algorithm based on compressive sensing , 2014 .
[5] David L Donoho,et al. Compressed sensing , 2006, IEEE Transactions on Information Theory.
[6] Y. Rachlin,et al. The secrecy of compressed sensing measurements , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.
[7] Mário A. T. Figueiredo,et al. Gradient Projection for Sparse Reconstruction: Application to Compressed Sensing and Other Inverse Problems , 2007, IEEE Journal of Selected Topics in Signal Processing.
[8] Ton Kalker,et al. A robust image fingerprinting system using the Radon transform , 2004, Signal Process. Image Commun..
[9] Massimo Fornasier,et al. Compressive Sensing , 2015, Handbook of Mathematical Methods in Imaging.
[10] Li-Hua Gong,et al. Novel image compression–encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing , 2014 .
[11] Z. Jane Wang,et al. Perceptual Image Hashing Based on Shape Contexts and Local Feature Points , 2012, IEEE Transactions on Information Forensics and Security.
[12] Ramarathnam Venkatesan,et al. Robust perceptual image hashing via matrix invariants , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[13] Shuicheng Yan,et al. Active Subspace: Toward Scalable Low-Rank Learning , 2012, Neural Computation.
[14] C. Kailasanathan,et al. Image Authentication Surviving Acceptable Modications Using Statistical Measures and K-mean Segmentation , 2001 .
[15] Di Xiao,et al. A reversible image authentication scheme based on compressive sensing , 2014, Multimedia Tools and Applications.
[16] Ingemar J. Cox,et al. Digital Watermarking , 2003, Lecture Notes in Computer Science.
[17] Yong Yu,et al. Robust Recovery of Subspace Structures by Low-Rank Representation , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[18] Stefano Tubaro,et al. Hash-Based Identification of Sparse Image Tampering , 2009, IEEE Transactions on Image Processing.
[19] Emmanuel J. Candès,et al. Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information , 2004, IEEE Transactions on Information Theory.
[20] Min Wu,et al. Robust and secure image hashing , 2006, IEEE Transactions on Information Forensics and Security.
[21] E.J. Candes,et al. An Introduction To Compressive Sampling , 2008, IEEE Signal Processing Magazine.
[22] Vishal Monga,et al. Robust and Secure Image Hashing via Non-Negative Matrix Factorizations , 2007, IEEE Transactions on Information Forensics and Security.
[23] Yong Yu,et al. Robust Subspace Segmentation by Low-Rank Representation , 2010, ICML.
[24] Rui Sun,et al. Secure and robust image hashing via compressive sensing , 2012, Multimedia Tools and Applications.
[25] Michael B. Wakin,et al. An Introduction To Compressive Sampling [A sensing/sampling paradigm that goes against the common knowledge in data acquisition] , 2008 .
[26] Philip Ogunbona,et al. Compression tolerant DCT based image hash , 2003, 23rd International Conference on Distributed Computing Systems Workshops, 2003. Proceedings..