Abbas, A secure and robust hash-based scheme for image authentication, Signal Processing, vol.90, pp.1456-1470, 2010. ,
Recent development of perceptual image hashing, Journal of Shanghai University, vol.11, pp.323-331, 2007. ,
The MD5 message-digest algorithm, Internet Engineering Task Force (IETF), 1992. ,
DOI : 10.17487/rfc1321
Secure Hash Standard (SHS), Publication 180-3, Federal Information Processing Standard (FIPS), pp.180-183, 2008. ,
A perceptual audio hashing algorithm: a tool for robust audio identification and information hiding, Proceedings of the 4th International Workshop on Information Hiding, IHW '01, pp.51-65, 2001. ,
New iterative geometric methods for robust perceptual image hashing, Digital Rights Management Workshop, pp.13-21, 2001. ,
Perceptually Based Methods for Robust Image Hashing, 2005. ,
Fragility analysis of adaptive quantization-based image hashing, IEEE Transactions on Information Forensics and Security, vol.5, pp.133-147, 2010. ,
Content-based image authentication: current status, issues, and challenges, International Journal of Information Security, vol.7, issue.4, pp.19-32, 2010. ,
DOI : 10.1007/s10207-009-0093-2
Perceptual Image Hashing Based on Virtual Watermark Detection, IEEE Transactions on Image Processing, vol.19, issue.4, pp.981-994, 2010. ,
DOI : 10.1109/TIP.2009.2038637
A robust content based digital signature for image authentication, Proceedings of 3rd IEEE International Conference on Image Processing, pp.227-230, 1996. ,
DOI : 10.1109/ICIP.1996.560425
Robust image hashing, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101), pp.664-666, 2000. ,
DOI : 10.1109/ICIP.2000.899541
A robust image authentication method distinguishing jpeg compression from malicious manipulation, IEEE Transactions on Circuits and Systems for Video Technology, vol.11, issue.2, pp.153-168, 2001. ,
Structural digital signature for image authentication, Proceedings of the 2000 ACM workshops on Multimedia , MULTIMEDIA '00, pp.161-173, 2003. ,
DOI : 10.1145/357744.357893
Robust hash functions for digital watermarking, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540), pp.178-183, 2000. ,
DOI : 10.1109/ITCC.2000.844203
Mihc -ak, Robust perceptual image hashing via matrix invariants, Proceedings of the IEEE International Conference on Image Processing, pp.3443-3446, 2004. ,
DOI : 10.1109/icip.2004.1421855
Robust and Secure Image Hashing, IEEE Transactions on Information Forensics and Security, vol.1, issue.2, pp.215-230, 2006. ,
DOI : 10.1109/TIFS.2006.873601
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.416.8613
Perceptual Image Hashing Via Feature Points: Performance Evaluation and Tradeoffs, IEEE Transactions on Image Processing, vol.15, issue.11, pp.3452-3465, 2006. ,
DOI : 10.1109/TIP.2006.881948
Compression tolerant image authentication, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269), pp.435-439, 1998. ,
DOI : 10.1109/ICIP.1998.723518
Visual hash for oblivious watermarking, in: SPIE Photonic West Electronic Imaging, Security and Watermarking of Multimedia Contents, pp.286-294, 2000. ,
Robust image hash in Radon transform domain for authentication, Signal Processing: Image Communication, vol.26, issue.6, pp.280-288, 2011. ,
DOI : 10.1016/j.image.2011.04.007
Rash: radon soft hash algorithm, Proceedings of the European Signal Processing Conference (EUSIPCO'02), 2002. ,
A robust image fingerprinting system using the Radon transform, Signal Processing: Image Communication, vol.19, issue.4, pp.325-339, 2004. ,
DOI : 10.1016/j.image.2003.12.001
Content Based Image Hashing Via Wavelet and Radon Transform, Proceedings of the Multimedia 8th Pacific Rim Conference on Advances in Multimedia Information Processing, PCM'07, pp.755-764, 2007. ,
DOI : 10.1007/978-3-540-77255-2_91
Perceptual Image Hashing via Wave Atom Transform, 10th International Workshop on Digital-forensics and Watermarking (IWDW11), 2011. ,
DOI : 10.1007/978-3-642-32205-1_37
Histogram-based image hashing scheme robust against geometric deformations, Proceedings of the 9th workshop on Multimedia & security , MM&Sec '07, pp.121-128, 2007. ,
DOI : 10.1145/1288869.1288886
An improved histogram-based image hashing scheme using k-means segmentation, in: The Fourth Joint Workshop on Information Security, 2009. ,
Histogram-Based Image Hashing for Searching Content-Preserving Copies, Transactions on Data Hiding and Multimedia Security, vol.6, pp.83-108, 2011. ,
DOI : 10.1007/978-3-642-24556-5_5
Analysis of the robustness of wavelet-based perceptual signatures, 2010 2nd International Conference on Image Processing Theory, Tools and Applications, pp.112-117, 2010. ,
DOI : 10.1109/IPTA.2010.5586764
A Robust and Secure Media Signature Scheme for JPEG Images, Journal of VLSI signal processing systems for signal, image and video technology, vol.3971, issue.2, pp.305-317, 2005. ,
DOI : 10.1007/s11265-005-4154-0
Statistical analysis of the quantization stage of robust perceptual image hashing, 3rd European Workshop on Visual Information Processing, pp.274-279, 2011. ,
DOI : 10.1109/EuVIP.2011.6045509
Image Quality Assessment: From Error Visibility to Structural Similarity, IEEE Transactions on Image Processing, vol.13, issue.4, pp.600-612, 2004. ,
DOI : 10.1109/TIP.2003.819861