1 |
Suleyman S. Kozat, and R. Venkatesan, M. Kivanc Mihcak, "Robust Perceptual Image Hashing via Matrix Invariants," Proceedings of International Conference on Image Processing, pp.3443-3446, 2004.
|
2 |
A. Swaminathan, Y. Mao, and M. Wu, "Robust and secure image hashing," IEEE Transactions on Information Forensics and Security, Vol. 1, No. 2, pp. 215-230, June 2006.
DOI
ScienceOn
|
3 |
Z. J. Tang, S. Z. Wang, X. P. Zhang, W. M. Wei and S. J. Su, "Robust Image Hashing for Tamper Detection Using Non-Negative Matrix Factorization," Journal of Ubiquitous Convergence Technology, Vol.2 No.1, pp. 18-26, 2008.
|
4 |
E. Y. Chang, C. Li, J. Z. Wang, P. Mork, and G. Wiederhold, "Searching near replicas of images via clustering," SPIE Multimedia Storage and Archiving Systems VI, pp. 281-292, 1999.
|
5 |
Y. Ke, R. Sukthankar, and L. Huston, "An efficient parts-based near-duplicate and sub-image retrieval system," Proceedings of the ACM International Conference on Multimedia, pp. 869-876, 2004.
|
6 |
Li Chen and F. W. M. Stentiford, "Comparison of near-duplicate image matching," European Conference on Visual Media Production, pp. 38-42, 2006.
|
7 |
J. J. Foo, J. Zobel, R. Sinha, and S. M. M. Tahaghoghi, "Detection of near duplicate images versions for web search," Proceedings of the ACM International Conference on Image and Video Retrieval, 2007.
|
8 |
A. W. M. Smeulders, M. Worring, S. Santini, A. Gupta, and R. Jain, "Content based image retrieval at the end of the early years," IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 22, pp. 1349-1380, 2000.
DOI
ScienceOn
|
9 |
B. Wang, Z. Li, M. Li, and W.-Y. Ma, "Large-scale duplicate detection for Web image search," IEEE International Conference on Multimedia and Expo, pp. 353-356, 2006.
|
10 |
M. Yang, G. Qiu, J. Huang, and D. Elliman, "Near-duplicate image recognition and content- based image retrieval using adaptive hierarchical geometric centroids," International Conference on Pattern Recognition, pp. 958-961, 2006.
|
11 |
S. Xiang, H. J. Kim, and J. Huang, "Histogram-based image hashing scheme robust against geometric deformations," Proceedings of the ACM Multimedia and Security Workshop, pp. 121-128, 2007.
|
12 |
M. Johnson and K. Ramchandran, "Dither-Based Secure Image Hashing Using Distributed Coding," Proc. IEEE Int. Conf. Image Processing, September 2003.
|
13 |
K. Mikolajczyk and C. Schmid, "A performance evaluation of local descriptors," Proceedings of the Computer Vision and Pattern Recognition, pp. 257-263, 2003.
|
14 |
H. J. Kim, S. Y. Kim, and H. Kim, "A new image hash computation method," International Workshop on Ubiquitous Convergence Technology, 2007.
|
15 |
J. Fridrich, D. Soukal, and J. Lukas, "Detection of copymove forgery in digital images" Proceedings of Digital Forensic Research Workshop, 2003.
|
16 |
이석환, 권기룡, "키 기반 블록 표면 계수를 이용한 강인한 3D 모델 해싱," 전자공학회논문지, 제47권 CI편, 제 1호, 1-14쪽, 2010년.
|
17 |
V. Monga and M.K. Mhcak, "Robust and Secure Image Hashing via Non-Negative Matrix Factorizations," IEEE Transactions on Information Forensics and Security, Vol. 27, No. 3, pp. 379-391, 2005.
|
18 |
N. L. Johnson, S. Kotz, and N. Balakrishnan, "Continuous Uni-variate Distributions," John Wiley \& Sons Inc, vol 2, New York, 1995.
|