Author:
Soman Gayathri,John Jyothish K.
Reference13 articles.
1. Monga V, Banerjee A, Evans BL (2006) A clustering based approach to perceptual image hashing. IEEE Trans Inf Forensic Secur 1(1):68–79
2. Xiang S (2007) Histogram based image hashing scheme robust against geometric deformations. In: Proceedings of the ACM multimedia and security workshop, New York, pp 121–128, 2007
3. Tang Z, Wang S, Zhang X, Wei W, Su S (2008) Robust image hashing for tamper detection using non-negative matrix factorization. J Ubiquitious Convergenge Technol 2(1):18–26
4. Swaminathan A, Mao Y, Wu M (2006) Robust and secure image hash. IEEE Trans Inf Forensic Security 1(2):215–230
5. Lei Y, Wanga Y, Huang J (2011) Robust image hash in Randomn transform domain for authentication. Signal Process: Image Commun 26(6):280–288
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Detection and Localization of Content deduplication using 64-bit architecture of SHA-256;2021 IEEE 6th International Conference on Computing, Communication and Automation (ICCCA);2021-12-17
2. A Fast Copy-Move Forgery Detection Using Global and Local Features;2019 5th International Conference On Computing, Communication, Control And Automation (ICCUBEA);2019-09
3. Global similarity preserving hashing;Soft Computing;2017-07-07