128
Views
18
CrossRef citations to date
0
Altmetric
Original Article

Perceptual image hashing using local entropies and DWT

, , &
Pages 241-251 | Accepted 15 Jul 2011, Published online: 12 Nov 2013

REFERENCES

  • Yoo KS, Lee WH. Classification-based image watermarking using wavelet DC components. Imag. Sci. J., 2010, 58, 105–111.
  • Venkatesan R, Koon S.-M, Jakubowski MH, Moulin P. Robust image hashing, Proc. IEEE Int. Conf. on Image processing: ICIP 2000, Vancouver, BC, Canada, September 2000, IEEE Computer Society, pp. 664–666.
  • Fridrich J, Goljan M. Robust hash functions for digital watermarking, Proc. IEEE Int. Conf. on Information technology: coding and computing: ITCC 2000, Las Vergas, NV, USA, March 2000, IEEE Computer Society, pp. 178–183.
  • Lin CY, Chang SF. A robust image authentication system distinguishing JPEG compression from malicious manipulation. IEEE Trans. Circuits Syst. Video Technol., 2001, 11, 153–168.
  • Lefebvre F, Macq B, Legat J.-D. RASH: radon soft hash algorithm, Proc. Eur. Signal Processing Conf.Toulouse, France, September 2002 EURASIP, pp. 299–302 The organiser of the conference5 is European Association for Signal Processing (EURASIP).
  • Roover CD, Vleeschouwer CD, Lefebvre F, Macq B. Robust video hashing based on radial projections of key frames. IEEE Trans. Signal Process., 2005, 53, 4020–4036.
  • Swaminathan A, Mao Y, Wu M. Robust and secure image hashing. IEEE Trans. Inf. Forensics Secur., 2006, 1, 215–230.
  • Monga V, Evans BL. Perceptual image hashing via feature points: performance evaluation and tradeoffs. IEEE Trans. Image Process., 2006, 15, 3452–3465.
  • Monga V, Banerjee A, Evans BL. A clustering based approach to perceptual image hashing. IEEE Trans. Inf. Forensics Secur., 2006, 1, 68–79.
  • Kozat SS, Venkatesan R, Mihcak MK. Robust perceptual image hashing via matrix invariants, Proc. IEEE Int. Conf. on Image processing: ICIP 2004, Singapore,October 2004, IEEE, pp. 3443–3446.
  • Monga V, Mihcak MK. Robust and secure image hashing via non-negative matrix factorizations. IEEE Trans. Inf. Forensics Secur., 2007, 2, 376–390.
  • Tang Z, Wang S, Zhang X, Wei W, Su S. Robust image hashing for tamper detection using non-negative matrix factorization. J. Ubiquitous Converg. Technol., 2008, 2, 18–26.
  • Wu D, Zhou X, Niu X. A novel image hash algorithm resistant to print–scan. Signal Process., 2009, 89, 2415–2424.
  • Ahmed F, Siyal MY, Abbas VU. A secure and robust hash-based scheme for image authentication. Signal Process., 2010, 90, 1456–1470.
  • Tang Z, Wang S, Zhang X, Wei W, Zhao Y. Lexicographical framework for image hashing with implementation based on DCT and NMF. Multimed. Tools Appl., 2011, 52, 325–345.
  • Tang Z, Wang S, Zhang X, Wei W. Structural feature-based image hashing and similarity metric for tampering detection. Fundam. Inf., 2011, 106, 75–91.
  • Shannon CE. A mathematical theory of communication. Bell Syst. Tech. J., 1948, 27, 379–423, 623–656.
  • Petitcolas FAP. Watermarking schemes evaluation. IEEE Signal Process. Mag., 2000, 17, 58–64.
  • Ground Truth Database. [accessed 8 May 2008]. Available at: <http://www.cs.washington.edu/research/imagedatabase/groundtruth/>
  • Fawcett T. An introduction to ROC analysis. Patt. Recog. Lett., 2006, 27, 861–874.
  • USC-SIPI Image Database. [accessed 12 January 2007]. Available at: <http://sipi.usc.edu/services/database/database.html>

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.