Optics and Precision Engineering, Volume. 16, Issue 3, 551(2008)

A novel perceptual image Hash algorithm

[in Chinese]... [in Chinese], [in Chinese] and [in Chinese] |Show fewer author(s)
Author Affiliations
  • [in Chinese]
  • show less
    References(12)

    [1] [1] VANSTONE S A,MENEZES A J,OORSCHOT P C.1996 Handbook of Applied Cryptography[M].New York:CRC Press,1996.

    [2] [2] FRIDRICH J,GOLJAN M.Robust hash functions for digital watermarking[C].IEEE Proceedings International Conference on Information Technology:Coding and Computing,2000:178-183.

    [3] [3] VENKATESAN R,KOON S M,JAKUBOWSKI M H,et al..Robust image hashing[C].IEEE International Conference on Image Processing,2000,3:664-666.

    [4] [4] MIHCAK K,VENKATESAN R.New iterative geometric technique for robust image hashing[C].Proceedings of ACM Workshop on Security and Privacy in Digital Rights Management,2001:13-21.

    [5] [5] LEFEBVRE F,MACQ B,LEGAT J D.RASH:radon soft hash algorithm[C].In the proceedings of European Signal Processing Conference,2002:27216.

    [6] [6] LEFEBVRE F,CQVZ J,MACQ B.A robust soft hash algorithm for digital image signature[C].IEEE International Conference on Image Processing,2003,3:Ⅱ-495-8.

    [7] [7] MONGA V,EVANS B L.Perceptual image hashing via feature points.,performance evaluation and trade-offs[J].IEEE Transactions on Image Processing,2006,15(11):3453-3466.

    [8] [8] MONGA V,MIHCAK M K.Robust image hashing via non-negative matrix factorizations[C].IEEE International Conference on Acoustics,Speech,and Signal Processing,2006:Ⅱ-225-228.

    [9] [9] SWAMINATHAN A,MAO Y,MU M.Robust and secure image hashing[J].IEEE Transactions on Information Forensicsand Security,2006,1(2):215-230.

    [11] [11] DEVERNAY F,FAUGERAS O.Straight lines have to be straight:automatic calibration and removal of distortion from scenes of structured environments[J].Machine Vision and Applications,2001,13(1):14-21.

    [12] [12] LEE C B-Radial undistortion and calibration on an image array[D].Cambridge:Massachusetts Institute of Technology,2000.

    [16] [16] SWAMINATHAN A,MAO Y,WU M.Robust and secure image hashing[J].IEEE Tran.on Information Forensics and Security,2006,1(12):215-230.

    CLP Journals

    [1] WANG Jun-wen, LIU Guang-jie, ZHANG-Zhan, DAI Yue-wei, WANG Zhi-quan. Robust forensics for image regional duplication and forgery based on DWT and Zernike moment[J]. Optics and Precision Engineering, 2009, 17(7): 1686

    Tools

    Get Citation

    Copy Citation Text

    [in Chinese], [in Chinese], [in Chinese], [in Chinese]. A novel perceptual image Hash algorithm[J]. Optics and Precision Engineering, 2008, 16(3): 551

    Download Citation

    EndNote(RIS)BibTexPlain Text
    Save article for my favorites
    Paper Information

    Category:

    Received: Sep. 23, 2007

    Accepted: --

    Published Online: Jul. 8, 2008

    The Author Email:

    DOI:

    Topics