[1] |
SCHNEIDER M , CHANG S F . A robust content based digital signature for image authentication[A]. Proceedings of Inter ional Conference on Image Processing[C]. Lausanne,Switzerland, 1996.227230.
|
[2] |
VENKATESAN R , KOON S M , JAKUBOWSKI M H . Robust image hashing[A]. Proceedings of International Conference on Image Processing[C]. Vancouver,BC,Canada, 2000. 664-666.
|
[3] |
FRIDRICH J , GOLJAN M . Robust hash functions for digital watermarking[A]. Proceedings of International Conference on Information Technology:Coding and Computing[C]. Las Vegas,USA, 2000.178183.
|
[4] |
LIN C Y , CHANG S F . A robust image authentication method distinguishing JPEG compression from malicious manipulation[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2001,11(2): 153-168.
|
[5] |
MIHCAK K , VENKATESAN R . New iterative geometric methods for robust perceptual image hashing[A]. Proceedings of ACM Workshop on Security and Privacy in Digital Rights Management[C]. Philadelphia,PA,USA, 2001. 13-21.
|
[6] |
LU C S , LIAO H Y M . Structural digital signature for i ge authentication:an incidental distortion resistant scheme[J]. EEE Transactions on Multimedia, 2003,5(2): 161-173.
|
[7] |
KOZAT S S , VENKATESAN R , M K MIHCAK . Robust perceptual image hashing via matrix invariants[A]. Proceedings of International Conference on Image Processing[C]. Singapore, 2004. 3443-3446.
|
[8] |
MONGA V , EVANS B L . Perceptual image hashing via feature points:performance evaluation and trade-offs[J]. IEEE Transactions on Image Processing, 2006,15(11): 3453-3466.
|
[9] |
MONGA V , BANERJEE A , EVANS B L . A clustering based approach to perceptual image hashing[J]. IEEE Transactions on Information Forensics and Security, 2006,15(11): 3453-3466.
|
[10] |
SWAMINATHAN A , MAO Y , WU M . Robust and secure image hashing[J]. IEEE Transactions on Information Forensics and Security, 2006,1(1): 68-79.
|
[11] |
MONGA V , MIHCAK M K . Robust and secure image hashing v non-negative matrix factorizations[J]. IEEE Transactions on Information Forensics and Security, 2007,2(3): 376-390.
|
[12] |
TANG Z J , WANG S Z , ZHANG X P . Robust image hashing for tamper detection using non-negative matrix factorization[J]. Journal of Ubiquitous Convergence Technology, 2008,2(1): 18-26.
|
[13] |
TANG Z J , WANG S Z , ZHANG X P . Structural feature-based image hashing and similarity metric for tampering detection[J]. Fundamenta Informaticae, 2011,106(1): 75-91.
|
[14] |
KHELIFI F , JIANG J M . Perceptual image hashing based on virtual watermark detection[J]. IEEE Transactions on Image Processing, 2010,19(4): 981-994.
|
[15] |
LEI Y Q , WANG Y G , HUANG J W . Robust image hash in Radon transform domain for authentication[J]. Signal Processing:Image Communication, 2011,26(6): 280-288.
|
[16] |
WANG S Z , LU X , SU S J . Image block feature vectors based on a singular-value information metric and color-texture description[J]. Journal of Shanghai University, 2007,11(3): 205-209.
|
[17] |
DAEMEN J , RIJMEN V . The Design of Rijndael:AES-the Advanced Encryption Standard[M]. Berlin: Springer-VerlagPress, 2002.
|
[18] |
SCHAEFER G , STICH M . UCID-an uncompressed color image database[A]. Proceedings of the SPIE,Storage and Retrieval Methods and Applications for Multimedia[C]. San Jose,USA, 2004. 472-480.
|
[19] |
OLMOS A , KINGDOM F A A . McGill calibrated color image database[EB/OL]. .
|
[20] |
PETITCOLAS F A P . Watermarking schemes evaluation[J]. E Signal Processing Magazine, 2000,17(5): 58-64.
|