4.2 Article

SSL: A Novel Image Hashing Technique Using SIFT Keypoints with Saliency Detection and LBP Feature Extraction against Combinatorial Manipulations

Related references

Note: Only part of the references are listed.
Article Computer Science, Hardware & Architecture

Perceptual Image Hashing with Weighted DWT Features for Reduced-Reference Image Quality Assessment

Zhenjun Tang et al.

COMPUTER JOURNAL (2018)

Article Computer Science, Information Systems

Perceptual image hashing via dual-cross pattern encoding and salient structure detection

Chuan Qin et al.

INFORMATION SCIENCES (2018)

Article Computer Science, Information Systems

Image authentication based on robust image hashing with geometric correction

Ram Kumar Karsh et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2018)

Article Computer Science, Information Systems

Robust hashing for image authentication using SIFT feature and quaternion Zernike moments

Junlin Ouyang et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2017)

Article Engineering, Electrical & Electronic

Robust image hashing with multidimensional scaling

Zhenjun Tang et al.

SIGNAL PROCESSING (2017)

Article Engineering, Electrical & Electronic

Robust image hashing through DWT-SVD and spectral residual method

Ram Kumar Karsh et al.

EURASIP JOURNAL ON IMAGE AND VIDEO PROCESSING (2017)

Article Computer Science, Information Systems

Perceptual image hashing using center-symmetric local binary patterns

Reza Davarzani et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2016)

Article Computer Science, Artificial Intelligence

Multichannel Decoded Local Binary Patterns for Content-Based Image Retrieval

Shiv Ram Dubey et al.

IEEE TRANSACTIONS ON IMAGE PROCESSING (2016)

Article Computer Science, Theory & Methods

Robust Image Hashing With Ring Partition and Invariant Vector Distance

Zhenjun Tang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Article Computer Science, Artificial Intelligence

Multi-Directional Multi-Level Dual-Cross Patterns for Robust Face Recognition

Changxing Ding et al.

IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2016)

Article Computer Science, Information Systems

A novel image hashing scheme with perceptual robustness using block truncation coding

Chuan Qin et al.

INFORMATION SCIENCES (2016)

Article Multidisciplinary Sciences

Robust image hashing using ring partition-PGNMF and local features

Ram Kumar Karsh et al.

SPRINGERPLUS (2016)

Article Computer Science, Artificial Intelligence

Multi-task Pose-Invariant Face Recognition

Changxing Ding et al.

IEEE TRANSACTIONS ON IMAGE PROCESSING (2015)

Article Computer Science, Theory & Methods

A Visual Model-Based Perceptual Image Hash for Content Authentication

Xiaofeng Wang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Artificial Intelligence

Robust Perceptual Image Hashing Based on Ring Partition and NMF

Zhenjun Tang et al.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2014)

Article Computer Science, Theory & Methods

Robust Hashing for Image Authentication Using Zernike Moments and Local Features

Yan Zhao et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2013)

Article Computer Science, Information Systems

Effective Multiple Feature Hashing for Large-Scale Near-Duplicate Video Retrieval

Jingkuan Song et al.

IEEE TRANSACTIONS ON MULTIMEDIA (2013)

Article Computer Science, Artificial Intelligence

Robust Image Hashing Based on Random Gabor Filtering and Dithered Lattice Vector Quantization

Yuenan Li et al.

IEEE TRANSACTIONS ON IMAGE PROCESSING (2012)

Article Computer Science, Theory & Methods

Robust Image Alignment for Tampering Detection

Sebastiano Battiato et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2012)

Article Computer Science, Theory & Methods

Perceptual Image Hashing Based on Shape Contexts and Local Feature Points

Xudong Lv et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2012)

Article Computer Science, Information Systems

Keyed hash function based on a chaotic map

A. Kanso et al.

INFORMATION SCIENCES (2012)

Article Computer Science, Information Systems

Lexicographical framework for image hashing with implementation based on DCT and NMF

Zhenjun Tang et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2011)

Article Engineering, Electrical & Electronic

Robust image hash in Radon transform domain for authentication

Yanqiang Lei et al.

SIGNAL PROCESSING-IMAGE COMMUNICATION (2011)

Article Computer Science, Artificial Intelligence

Hash-Based Identification of Sparse Image Tampering

Marco Tagliasacchi et al.

IEEE TRANSACTIONS ON IMAGE PROCESSING (2009)

Article Computer Science, Artificial Intelligence

Description of interest regions with local binary patterns

Marko Heikkila et al.

PATTERN RECOGNITION (2009)

Editorial Material Engineering, Electrical & Electronic

Locality-sensitive hashing for finding nearest neighbors

Malcolm Slaney et al.

IEEE SIGNAL PROCESSING MAGAZINE (2008)

Article Computer Science, Information Systems

Content-based copy retrieval using distortion-based probabilistic similarity search

Alexis Joly et al.

IEEE TRANSACTIONS ON MULTIMEDIA (2007)

Article Computer Science, Artificial Intelligence

Perceptual image hashing via feature points: Performance evaluation and tradeoffs

Vishal Monga et al.

IEEE TRANSACTIONS ON IMAGE PROCESSING (2006)

Article Computer Science, Theory & Methods

Robust and secure image hashing

Ashwin Swaminathan et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2006)

Article Computer Science, Artificial Intelligence

Distinctive image features from scale-invariant keypoints

DG Lowe

INTERNATIONAL JOURNAL OF COMPUTER VISION (2004)

Article Engineering, Electrical & Electronic

Watermarking scheme evaluation - Algorithms need common benchmarks

FAP Petitcolas

IEEE SIGNAL PROCESSING MAGAZINE (2000)