Publisher
Springer Science and Business Media LLC
Subject
Artificial Intelligence,Software
Reference43 articles.
1. Mishra M, Adhikary MC (2013) Digital image tamper detection techniques: a comprehensive study. Int J Comput Sci Bus Inf Math 2(1):1–12
2. Yong-Xia Z, Ge Z (2010) “MD5 Research. In: IEEE Second International Conference on Multimedia and Information Technology, pp. 271–273
3. Gueron S, Johnson S, Walker J (2011) “SHA-512/256. In: IEEE Eighth International Conference on Information Technology: New Generations, pp. 354–358
4. Wang J, Liu W, Kumar S, Chang SF (2015) Learning to hash for indexing big data—a survey. Proc IEEE 104(1):34–57
5. Wang J, Zhang T, Sebe N, Shen HT (2017) A survey on learning to hash. IEEE Trans Pattern Anal Mach Intell 40(4):769–790
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献