[1]
|
Z. Tang, Z. Huang, X. Q. Zhang, et al., Robust image hashing with multidimensional scaling, Signal Process., 137(2017), 240–250.
|
[2]
|
C. Qin, X. Chen, D. Ye, et al., A novel image hashing scheme with perceptual robustness using block truncation coding, Inform. Sci., 361(2016), 84–99.
|
[3]
|
Z. Tang, L. Chen, X. Q. Zhang, et al., Robust image hashing with tensor decomposition, IEEE Trans. Knowl. Data En., 31(2019), 549–560.
|
[4]
|
Z. Tang, S. Wang, X. P. Zhang, et al., Lexicographical framework for image hashing with implementation based on DCT and NMF, Multimed. Tools Appl., 52(2011), 325–345.
|
[5]
|
F. Lefebvre, B. Macq and J. D. Legat, RASH: Radon soft hash algorithm, In: Proc. of European Signal Processing Conference, Toulouse, France, Sep. 3−6, 2002, pp.299–302.
|
[6]
|
A. Swaminathan, Y. Mao and M. Wu, Robust and secure image hashing, IEEE Trans. Inf. Foren. Secur., 1(2006), 215–230.
|
[7]
|
V. Monga and B. L. Evans, Perceptual image hashing via feature points: performance evaluation and trade-offs, IEEE Trans. Image Process., 15(2006), 3453–3466.
|
[8]
|
Y. Ou and K. H. Rhee, A key-dependent secure image hashing scheme by using Radon transform, In: Proc. of the IEEE International Symposium on Intelligent Signal Processing and Communication Systems, pp.595–598, 2009.
|
[9]
|
Z. Tang, S. Wang, X. P. Zhang, et al., Structural feature-based image hashing and similarity metric for tampering detection, Fundam. Inf., 106(2011), 75–91.
|
[10]
|
C. Qin, C. C. Chang and P. L. Tsou, Robust image hashing using non-uniform sampling in discrete Fourier domain, Digit. Signal Process., 23(2013), 578–585.
|
[11]
|
Z. Tang, X. Q. Zhang, L. Huang, et al., Robust image hashing using ring-based entropies, Signal Process., 93(2013), 2061–2069.
|
[12]
|
Z. Tang, Y. Dai, X. Q. Zhang, et al., Robust image hashing via colour vector angles and discrete wavelet transform, IET Image Process., 8(2014), 142–149.
|
[13]
|
L. Ghouti, Robust perceptual color image hashing using quaternion singular value decomposition, In: Proc. of IEEE International Conference on Acoustic, Speech and Signal Processing (ICASSP 2014), pp.3794–3798, 2014.
|
[14]
|
C. Yan, C. Pun and X. Yuan, Quaternion-based image hashing for adaptive tampering localization, IEEE Trans. Inf. Foren. Secur., 11(2016), 2664–2677.
|
[15]
|
C. Qin, X. Chen, J. Dong, et al., Perceptual image hashing with selective sampling for salient structure features, Displays, 45(2016), 26–37.
|
[16]
|
Z. Tang, X. Q. Zhang, X. Li, et al., Robust image hashing with ring partition and invariant vector distance, IEEE Trans. Inf. Foren. Secur., 11(2016), 200–214.
|
[17]
|
R. K. Karsh, R. H. Laskar and B. B. Richhariya, Robust image hashing using ring partition-PGNMF and local features, SpringerPlus, 5(2016), 1–20.
|
[18]
|
R. K. Karsh, R. H. Laskar and Aditi, Robust image hashing through DWT-SVD and spectral residual method, EURASIP J. Image Vide., 2017(2017), 1–17.
|
[19]
|
R. Davarzani, S. Mozaffariand and K. Yaghmaie, Perceptual image hashing using center-symmetric local binary patterns, Multimed. Tools Appl., 75(2016), 4639–4667.
|
[20]
|
X. Huang, X. Liu, G. Wang, et al., A robust image hashing with enhanced randomness by using random walk on zigzag blocking, In: Proc. IEEE Trustcom/BigDataSE/ISPA, pp.23–26, 2016.
|
[21]
|
R. K. Karsh, A. Saikia and R. H. Laskar, Image authentication based on robust image hashing with geometric correction, Multimed. Tools Appl., 77(2018), 25409–25429.
|
[22]
|
C. Qin, M. Sun and C.-C. Chang, Perceptual hashing for color images based on hybrid extraction of structural features, Signal Process., 142(2018), 194–205.
|
[23]
|
Z. Tang, Z. Huang, H. Yao, et al., Perceptual image hashing with weighted DWT features for reduced-reference image quality assessment, Comput. J., 61 (2018), 1695–1709.
|
[24]
|
L. Itti, C. Koch and E. Niebur, A model of saliency based visual attention for rapid scene analysis, IEEE Trans. Patt. Anal. Mac. Intell., 20(1998), 1254–1259.
|
[25]
|
D. Walther and C. Koch, Modeling attention to salient proto-objects, Neural Networks, 19(2006), 1395–1407.
|
[26]
|
X. Hou and L. Zhang, Saliency detection: A spectral residual approach, In: Proc. IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp.1–8, 2007.
|
[27]
|
C. Guo, Q. Ma and L. Zhang, Spatio-temporal saliency detection using phase spectrum of quaternion Fourier transform, In: Proc. IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp.1–8, 2008.
|
[28]
|
Z. Tang, X. Q. Zhang and S. Zhang, Robust perceptual image hashing based on ring partition and NMF, IEEE Trans. Knowl. Data En., 26(2014), 711–724.
|
[29]
|
Z. Tang, L. Huang, X. Q. Zhang, et al., Robust image hashing based on color vector angle and canny operator, AEÜ-Int. J. Electron. Commun., 70(2016), 833–841.
|
[30]
|
Kodak Lossless True Color Image Suite. Available online: http://r0k.us/graphics/kodak/.
|
[31]
|
F. A. P. Petitcolas, Watermarking schemes evaluation, IEEE Signal Process. Mag., 17(2000), 58–64.
|
[32]
|
Z. Wang, A. C. Bovik, H. R. Sheikh, et al., Image quality assessment: from error visibility to structural similarity, IEEE Trans. Image Process., 13(2004), 600–612.
|
[33]
|
Ground Truth Database. Available online: http://www.cs.washington.edu/research/imagedatabase/groundtruth/.
|
[34]
|
T. Fawcett, An introduction to ROC analysis, Patt. Recog. Lett., 27(2006), 861–874.
|
[35]
|
IEEE Std754–2008, IEEE Standard for Floating-Point Arithmetic, pp.1–70, 2008.
|
[36]
|
G. Schaefer and M. Stich, UCID-an uncompressed color image database, Proc. SPIE, Storage and Retrieval Methods and Applications for Multimedia, pp.472–480, 2004.
|