Journal of Guangxi Normal University(Natural Science Edition) ›› 2016, Vol. 34 ›› Issue (4): 9-18.doi: 10.16088/j.issn.1001-6600.2016.04.002
Previous Articles Next Articles
TANG Zhenjun1,2, YANG Fan1,2, HUANG Ziqing1,2, LAO Huan1,2
CLC Number:
[1] 唐振军,戴玉敏,张显全,等.基于DCT特征点的感知图像Hash函数 [J]. 广西师范大学学报(自然科学版), 2012, 30(3):135-141.DOI:10.16088/j.issn.1001-6600.2012.03.010. [2] TANG Zhenjun,WANG Shuozhong,ZHANG Xinpeng,et al.Robust image hashing for tamper detection using non-negative matrix factorization [J]. Journal of Ubiquitous Convergence and Technology, 2008, 2(1):18-26. [3] VENKATESAN R,KOON S M,JAKUBOWSKI M H,et al.Robust image hashing[C]//Proceedings of 2000 International Conference on Image Processing.Piscataway,NJ:IEEE Press,2000:664-666.DOI:10.1109/ICIP.2000. 899541. [4] 刘凯,唐振军,张显全,等.联合压缩感知和颜色向量角的彩色图像哈希方法[J].应用科学学报,2015,33(6):595-603. DOI:10.3969/j.issn.0255-8297.2015.06.003. [5] MONGA V,EVANS B L.Perceptual image hashing via feature points: performance evaluation and tradeoffs[J]. IEEE Transactions on Image Processing,2006,15(11):3453-3466. DOI:10.1109/TIP.2006.881948. [6] AHMED F,SIYAL M Y,ABBAS V U.A secure and robust hash-based scheme for image authentication[J]. Signal Processing,2010,90(5):1456-1470. DOI:10.1016/j.sigpro.2009.05.024. [7] LIN C Y,CHANG S F.A robust image authentication method distinguishing JPEG compression from malicious manipulation[J]. IEEE Transactions on Circuits and Systems for Video Technology,2001,11(2):153-168. DOI:10.1109/76.905982. [8] 秦川,张真诚,郭成.基于秘密共享的感知鲁棒图像Hash算法[J].计算机研究与发展,2012,49(8):1690-1698. [9] TANG Zhenjun,YANG Fan,HUANG Liyan,et al.Robust image hashing with dominant DCT coefficients[J]. Optik-International Journal for Light and Electron Optics,2014,125(18):5102-5107.DOI:10.1016/j.ijleo.2014.05.015. [10] LEFEBVRE F,MACQ B,LEGAT J D.RASH:Radon soft hash algorithm[C]//Proceedings of 11th European Signal Processing Conference. Piscataway, NJ:IEEE Press, 2002:299-302. [11] LEI Yanqiang, WANG Yuangen, HUANG Jiwu.Robust image hash in Radon transform domain for authentication [J].Signal Processing:Image Communication,2011,26(6):280-288. DOI:10.1016/j.image.2011.04.007. [12] OU Yang,RHEE K H.A key-dependent secure image hashing scheme by using Radon transform[C]//Proceedings of the 2009 International Symposium on Intelligent Signal Processing and Communication Systems. Piscataway, NJ:IEEE Press,2009:595-598. DOI:10.1109/ISPACS.2009.5383770. [13] TANG Zhenjun, HUANG Liyan, YANG Fan,et al.Robust image hashing based on fan-beam transform[J]. ICIC Express Letters,2014,8(8):2365-2372. [14] SWAMINATHAN A,MAO Yinian,WU Min.Robust and secure image hashing[J].IEEE Transactions on Information Forensics and Security,2006,1(2):215-230. DOI:10.1109/TIFS.2006.873601. [15] WU Di,ZHOU Xuebing,NIU Xiamu.A novel image hash algorithm resistant to print-scan[J].Signal Processing, 2009,89(12):2415-2424. DOI:10.1016/j.sigpro.2009.05.016. [16] QIN Chuan,CHANG Chinchen,TSOU Peiling.Robust image hashing using non-uniform sampling in discrete Fourier domain[J].Digital Signal Processing,2013,23(2):578-585.DOI:10.1016/j.dsp.2012.11.002. [17] KOZAT S S,VENKATESAN R, MIHCAK M K.Robust perceptual image hashing via matrix invariants[C]// Proceedings of 2004 International Conference on Image Processing.Piscataway,NJ:IEEE Press,2004:3443-3446. DOI:10.1109/ICIP.2004.1421855. [18] MONGA V,MIHCAK M K.Robust and secure image hashing via non-negative matrix factorizations[J].IEEE Transactions on Information Forensics and Security,2007,2(3):376-390.DOI:10.1109/TIFS.2007.902670. [19] TANG Zhenjun,WANG Shuozhong,ZHANG Xinpeng,et al.Lexicographical framework for image hashing with implementation based on DCT and NMF[J].Multimedia Tools and Applications,2011,52(2/3):325-345.DOI: 10.1007/s11042-009-0437-y. [20] TANG Zhenjun,ZHANG Xianquan,ZHANG Shichao.Robust perceptual image hashing based on ring partition and NMF[J].IEEE Transactions on Knowledge and Data Engineering,2014,26(3):711-724. DOI:10.1109/TKDE. 2013.45. [21] GHOUTI L.Robust perceptual color image hashing using quaternion singular value decomposition[C]// Proceedings of 2014 IEEE International Conference on Acoustic, Speech and Signal Processing. Piscataway,NJ: IEEE Press,2014:3794-3798.DOI:10.1109/ICASSP.2014.6854311. [22] LI Yuenan, LU Zheming, ZHU Ce, et al.Robust image hashing based on random Gabor filtering and dithered lattice vector quantization[J].IEEE Transactions on Image Processing,2012,21(4):1963-1980.DOI:10.1109/TIP.2011.2171698. [23] TANG Zhenjun,DAI Yumin,ZHANG Xianquan,et al.Robust image hashing via colour vector angles and discrete wavelet transform[J].IET Image Processing,2014,8(3):142-149. DOI:10.1049/iet-ipr.2013.0332. [24] ZHAO Yan,WANG Shuozhong,ZHANG Xinpeng,et al.Robust hashing for image authentication using Zernike moments and local features[J].IEEE Transactions on Information Forensics and Security,2013,8(1):55-63.DOI: 10.1109/TIFS.2012.2223680. [25] PETITCOLAS F A P.Watermarking schemes evaluation[J].IEEE Signal Processing Magazine,2000,17(5):58-64. DOI:10.1109/79.879339. [26] FAWCETT T. An introduction to ROC analysis[J].Pattern Recognition Letters,2006,27(8):861-874.DOI:10.1016/ j.patrec.2005.10.010. |
[1] | MA Yuan-yuan, LÜ Kang, XU Jiu-cheng. Image Retrieval of Multi-level Similarity Based on Granular Computing [J]. Journal of Guangxi Normal University(Natural Science Edition), 2013, 31(3): 127-131. |
[2] | LI Zhi-xin, CHEN Hong-chao, WU Jing-li, ZHOU Sheng-ming. Semantic Learning and Retrieval of Images Based on Probabilistic Topic Modeling [J]. Journal of Guangxi Normal University(Natural Science Edition), 2012, 30(3): 125-134. |
[3] | TANG Zhen-jun, DAI Yu-min, ZHANG Xian-quan, ZHANG Shi-chao. Perceptual Image Hash Function Using DCT-Based Feature Points [J]. Journal of Guangxi Normal University(Natural Science Edition), 2012, 30(3): 135-141. |
[4] | LI Shuang-qun, XU Jiu-cheng, ZHANG Ling-jun, LI Xiao-yan. Color Image Retrieval Based on Tolerance Granules [J]. Journal of Guangxi Normal University(Natural Science Edition), 2011, 29(3): 173-178. |
|