相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Robust and secure image hashing
Ashwin Swaminathan et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2006)
Distinctive image features from scale-invariant keypoints
DG Lowe
INTERNATIONAL JOURNAL OF COMPUTER VISION (2004)
Shape matching and object recognition using shape contexts
S Belongie et al.
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2002)
A robust image authentication method distinguishing JPEG compression from malicious manipulation
CY Lin et al.
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY (2001)