[1] Lin C Y and Chang S F. A robust image authentication system distinguishing JPEG compression from malicious manipulation [J].IEEE Transactions on Circuits and Systems for Video Technology.2001, 11(2):153-168 [2] Venkatesan R, Koon S M, Jakubowski M H, and Moulin P. Robust image hashing[C]. IEEE Conference on Image Processing, Vancouver, Canada. September 2000: 664-666. [3] 张维克, 孔祥维, 尤新刚. 安全鲁棒的图像感知哈希技术[J]. 东南大学学报(自然科学版), 2007, 37(增刊(I)): 188-192. [4] Zhang Wei-ke, Kong Xiang-wei, and You Xin-gang. Secure and robust image perceptual hashing [J]. Journal of Southeast University (Natural Science Edition), 2007, 37(Sup.(I)): 188-192. [5] 秦川, 王朔中, 张新鹏. 一种基于视觉特性的图像摘要算法 [J].中国图象图形学报.2006, 11(11):1678-1681 Qin Chuan, Wang Shuo-zhong, and Zhang Xin-peng. Image hashing based on Human visual system [J]. Journal of Image and Graphics, 2006, 11(11): 1678-1681. [6] 邹建成, 周红丽, 邓欢军. 一种安全鲁棒的图像哈希方法 [J]. 计算机应用研究, 2009, 26(6): 2122-2124. [7] Zou Jian-cheng, Zhou Hong-li, and Deng Huan-jun. Secure and robust image hashing scheme [J]. Application Research of Computers, 26(6): 2122-2124. [8] 王阿川,陈海涛. 基于离散余弦变换的鲁棒感知图像哈希技术 [J]. 中国安全科学学报, 2009, 19(4): 91-96. Wang A-chuan and Chen Hai-tao. Robust image perceptual hashing technology based on discrete cosine transform [J]. China Safety Science Journal, 2009, 19(4): 91-96. [9] Xiang Shi-jun, Kim Hyoung-joong, and Huang Ji-wu, Histogram-based image hashing scheme robust against geometric deformations [C]. The 9th ACM Multimedia and Security Workshop, New York, USA. September 2007: 121-128. [10] Swaminathan A, Mao Y, and Wu M. Robust and secure image hashing [J].IEEE Transactions on Information Forensics Security.2006, 1(2):215-230 [11] Kozat S S, Venkatesan R, and Mihcak M K. Robust perceptual image hashing via matrix invariants [C]. IEEE Conference on Image Processing, Singapore, 2004: 3443-3446. [12] 何妙谊. 稳健及安全的数字图像签名的研究[D]. [硕士论文], 中山大学, 2007. [13] He Miao-yi. Robust and secure image hashing [D]. [MA. dissertation], Sun Yat-sen University, 2007. [14] Lee D D and Seung H S. Algorithms for non-negative matrix factorization [C]. Neural Information Processing Systems 13, Cambridge, MA: MIT Press, 2000: 556-562. [15] Kivanc M M. Robust and secure image Hashing via non-negative matrix factorizations [J].IEEE Transactions on Information Forensics and Security.2007, 2(3):376-390 [16] 孙锐, 高隽. 组合NMF 和PCA 的图像哈希方法 [J]. 电子测量与仪器学报, 2009, 23(5): 52-57. Sun Rui and Gao Jun. Image Hashing method via combination of NMF and PCA [J]. Journal of Electronic Measurement and Instrument, 2009, 23(5): 52-57.
|