4.6 Article

Image hash generation method using hierarchical histogram

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Theory & Methods

Robust and secure image hashing

Ashwin Swaminathan et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2006)

Article Computer Science, Artificial Intelligence

Distinctive image features from scale-invariant keypoints

DG Lowe

INTERNATIONAL JOURNAL OF COMPUTER VISION (2004)

Article Computer Science, Artificial Intelligence

Shape matching and object recognition using shape contexts

S Belongie et al.

IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2002)

Article Engineering, Electrical & Electronic

A robust image authentication method distinguishing JPEG compression from malicious manipulation

CY Lin et al.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY (2001)