Journal of Guangxi Normal University(Natural Science Edition) ›› 2012, Vol. 30 ›› Issue (3): 135-141.
Previous Articles Next Articles
TANG Zhen-jun, DAI Yu-min, ZHANG Xian-quan, ZHANG Shi-chao
CLC Number:
[1] VENKATESAN R,KOON S,JAKUBOWSKI M,et al.Robust image hashing[C]//Proceedings of IEEE International Conference on Image Processing.Los Alamitos,CA:IEEE Computer Society,2000:664-666. [2] LIN Ching-yung,CHANG Shih-fu.A robust image authentication method distinguishing JPEG compression from malicious manipulation[J].IEEE Transactions on Circuits and Systems for Video Technology,2001,11(2):153-168. [3] LEFEBVRE F,MACQ B,LEGA J D.RASH:Radon Soft Hash algorithm[C]//Proceedings of European Signal Processing Conference.Toulouse,France:TESA,2002:299-302. [4] De ROOVER C,De VLEESCHOUWER C,LEFEBVRE F,et al.Robust video hashing basedon radial projections of key frames[J].IEEE Transactions On Signal Processing,2005,53(10):4020-4037. [5] KOZAT S S,VENKATESAN R,MIHCAK K.Robust perceptual image hashingvia matrixinvariants[C]//Proceedings of IEEE International Conference on Image Processing.Los Alamitos,CA:IEEE Computer Society,2004:3443-3446. [6] MONGA V,MIHCAK M K.Robust and secure image hashing via non-negative matrixfactorizations[J].IEEE Transactions on Information Forensics and Security,2007,2(3):376-390. [7] TANG Zhen-jun,WANG Shuo-zhong,ZHANG Xin-peng,et al.Robust imagehashing fortamper detection using non-negative matrix factorization[J].Journal of Ubiquitous Convergence and Technology,2008,2(1):18-26. [8] OU Yang,RHEE K H.A key-dependent secure image hashing scheme by using Radontransform[C]//Proceedings of the IEEE International Symposium on IntelligentSignal Processing and Communication Systems.Los Alamitos,CA:IEEE Computer Society,2009:595-598. [9] 唐振军,魏为民,张新鹏,等.用于图像检索的稳健Hash[J].东南大学学报:自然科学版,2007,37(S1):105-108. [10] 唐振军,王朔中,魏为民,等.用于图像Hash的视觉相似度客观评价测度[J].中国图象图形学报,2008,13(10):2040-2043. [11] TANG Zhen-jun,WANG Shuo-zhong,ZHANG Xin-peng,et al.Structuralfeature-basedimage hashing and similarity metric for tampering detection[J].Fundamenta Informaticae,2011,106(1):75-91. [12] PETITCOLAS F A P.Watermarking schemes evaluation[J].IEEE SignalProcessing Magazine,2000,17(5):58-64. [13] FAWCETT T.An introduction to ROC analysis[J].Pattern Recognition Lettrs,2006,27(8):861-874. |
[1] | TANG Zhenjun. Image Hashing Algorithm Based on PCA Feature Distance [J]. Journal of Guangxi Normal University(Natural Science Edition), 2016, 34(4): 9-18. |
[2] | MA Yuan-yuan, LÜ Kang, XU Jiu-cheng. Image Retrieval of Multi-level Similarity Based on Granular Computing [J]. Journal of Guangxi Normal University(Natural Science Edition), 2013, 31(3): 127-131. |
[3] | LI Zhi-xin, CHEN Hong-chao, WU Jing-li, ZHOU Sheng-ming. Semantic Learning and Retrieval of Images Based on Probabilistic Topic Modeling [J]. Journal of Guangxi Normal University(Natural Science Edition), 2012, 30(3): 125-134. |
[4] | LI Shuang-qun, XU Jiu-cheng, ZHANG Ling-jun, LI Xiao-yan. Color Image Retrieval Based on Tolerance Granules [J]. Journal of Guangxi Normal University(Natural Science Edition), 2011, 29(3): 173-178. |
|