Access the full text.
Sign up today, get DeepDyve free for 14 days.
F. Petitcolas (2000)
Watermarking schemes evaluationIEEE Signal Process. Mag., 17
J. Fridrich (2000)
Robust hash functions for digital watermarkingProceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540)
Ching-Yung Lin, Shih-Fu Chang (2001)
A robust image authentication method distinguishing JPEG compression from malicious manipulationIEEE Trans. Circuits Syst. Video Technol., 11
(2004)
He is currently a Ph.D. student in Shanghai University His research interests include image processing, digital forensics and data mining
Wan Xiao-qiang, Z. Jianping, Zhu Wei-de, Shi Li-yi (2007)
Preparation and properties of nano-TiO2 modified interior wall paintJournal of Shanghai University (english Edition), 11
A. Swaminathan, Yinian Mao, Min Wu (2006)
Robust and secure image hashingIEEE Transactions on Information Forensics and Security, 1
Multimed Tools Appl
王朔中, 路兴, 苏胜君, 张新鹏 (2007)
Image block feature vectors based on a singular-value information metric and color-texture description
王朔中, 张新鹏 (2007)
Recent development of perceptual image hashing, 11
V. Monga, M. Mihçak (2007)
Robust and Secure Image Hashing via Non-Negative Matrix FactorizationsIEEE Transactions on Information Forensics and Security, 2
(1982)
Currently, he is a Professor of Shanghai University. His research interests include image processing, audio processing, and information hiding
(2005)
She is currently a Ph.D. student in Shanghai University and a lecturer of Shanghai University of Electric Power. Her research interests include mobile communication and image processing
EL Lehmann, JP Romano (2005)
Testing statistical hypotheses
Wang Shuo-zhong, Lujing Xing, Su Sheng-jun, Zhang Xinpeng (2007)
Image block feature vectors based on a singular-value information metric and color-texture descriptionJournal of Shanghai University (english Edition), 11
V. Monga, B. Evans (2006)
Perceptual Image Hashing Via Feature Points: Performance Evaluation and TradeoffsIEEE Transactions on Image Processing, 15
Zhenjun Tang, Shuozhong Wang, Xinpeng Zhang, Weimin Wei (2009)
Perceptual Similarity Metric Resilient to Rotation for Application in Robust Image Hashing2009 Third International Conference on Multimedia and Ubiquitous Engineering
Zhenjun Tang, Shuozhong Wang, Xinpeng Zhang, Weimin Wei, Sheng-jun Su (2008)
Robust Image Hashing for Tamper Detection Using Non-Negative Matrix Factorization, 2
F. Lefèbvre, B. Macq, J. Legat (2002)
RASH: RAdon soft hash algorithm2002 11th European Signal Processing Conference
C. Roover, C. Vleeschouwer, F. Lefèbvre, B. Macq (2005)
Robust video hashing based on radial projections of key framesIEEE Transactions on Signal Processing, 53
Wang Shuo-zhong, Zhang Xin-peng (2007)
Recent development of perceptual image hashingJournal of Shanghai University (English Edition), 11
Zhou Wang, A. Bovik, H. Sheikh, Eero Simoncelli (2004)
Image quality assessment: from error visibility to structural similarityIEEE Transactions on Image Processing, 13
(2005)
Testing statistical hypotheses, 3rd edn
S. Kozat, R. Venkatesan, M. Mihçak (2004)
Robust perceptual image hashing via matrix invariants2004 International Conference on Image Processing, 2004. ICIP '04., 5
1966 and the Ph
Yinian Mao, Min Wu (2007)
Unicity Distance of Robust Image HashingIEEE Transactions on Information Forensics and Security, 2
R. Venkatesan, S. Koon, Mariusz Jakubowski, P. Moulin (2000)
Robust image hashingProceedings 2000 International Conference on Image Processing (Cat. No.00CH37101), 3
Image hash is a content-based compact representation of an image for applications such as image copy detection, digital watermarking, and image authentication. This paper proposes a lexicographical-structured framework to generate image hashes. The system consists of two parts: dictionary construction and maintenance, and hash generation. The dictionary is a large collection of feature vectors called words, representing characteristics of various image blocks. It is composed of a number of sub-dictionaries, and each sub-dictionary contains many features, the number of which grows as the number of training images increase. The dictionary is used to provide basic building blocks, namely, the words, to form the hash. In the hash generation, blocks of the input image are represented by features associated to the sub-dictionaries. This is achieved by using a similarity metric to find the most similar feature among the selective features of each sub-dictionary. The corresponding features are combined to produce an intermediate hash. The final hash is obtained by encoding the intermediate hash. Under the proposed framework, we have implemented a hashing scheme using discrete cosine transform (DCT) and non-negative matrix factorization (NMF). Experimental results show that the proposed scheme is resistant to normal content-preserving manipulations, and has a very low collision probability.
Multimedia Tools and Applications – Springer Journals
Published: Jan 13, 2010
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.