Author:
Shaik Abdul Subhani,Karsh Ram Kumar,Suresh Merugu,Gunjan Vinit Kumar
Reference32 articles.
1. Mishra M, Adhikary MC (2013) Digital image tamper detection techniques: a comprehensive study. Int J Comput Sci Bus Inf 2(1):112
2. Tang Z, Zhang X, Li X, Zhang S (2016) Robust image hashing with ring partition and invariant vector distance. IEEE Trans Inf Forensics Secur 11(1):200–214
3. Venkatesan R, Koon SM, Jakubowski MH, Moulin P (2000) Robust image hashing. In: International conference on image processing, vol 3, pp 664666
4. Roy S, Sun Q (2007) Robust hash for detecting and localizing image tampering. In: International conference on image processing (ICIP), pp VI-117–VI-120
5. Ahmed F, Siyal MY, Abbas VU (2010) A secure and robust hash based scheme for image authentication. Signal Process 90(5):14561470
Cited by
19 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献