A. Fawad, M. Y. Siyal, and V. U. , Abbas, A secure and robust hash-based scheme for image authentication, Signal Processing, vol.90, pp.1456-1470, 2010.

S. Z. Wang and X. P. Zhang, Recent development of perceptual image hashing, Journal of Shanghai University, vol.11, pp.323-331, 2007.

R. L. Rivest, The MD5 message-digest algorithm, Internet Engineering Task Force (IETF), 1992.
DOI : 10.17487/rfc1321

N. Fips and . Pub, Secure Hash Standard (SHS), Publication 180-3, Federal Information Processing Standard (FIPS), pp.180-183, 2008.

M. K. Mihc-ak and R. Venkatesan, A perceptual audio hashing algorithm: a tool for robust audio identification and information hiding, Proceedings of the 4th International Workshop on Information Hiding, IHW '01, pp.51-65, 2001.

M. K. Mihc-ak and R. Venkatesan, New iterative geometric methods for robust perceptual image hashing, Digital Rights Management Workshop, pp.13-21, 2001.

V. Monga, Perceptually Based Methods for Robust Image Hashing, 2005.

G. Zhu, J. Huang, S. Kwong, and J. Yang, Fragility analysis of adaptive quantization-based image hashing, IEEE Transactions on Information Forensics and Security, vol.5, pp.133-147, 2010.

S. H. Han and C. H. Chu, Content-based image authentication: current status, issues, and challenges, International Journal of Information Security, vol.7, issue.4, pp.19-32, 2010.
DOI : 10.1007/s10207-009-0093-2

F. Khelifi and J. Jiang, Perceptual Image Hashing Based on Virtual Watermark Detection, IEEE Transactions on Image Processing, vol.19, issue.4, pp.981-994, 2010.
DOI : 10.1109/TIP.2009.2038637

M. Schneider and S. F. Chang, A robust content based digital signature for image authentication, Proceedings of 3rd IEEE International Conference on Image Processing, pp.227-230, 1996.
DOI : 10.1109/ICIP.1996.560425

R. Venkatesan, S. M. Koon, M. H. Jakubowski, and P. Moulin, Robust image hashing, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101), pp.664-666, 2000.
DOI : 10.1109/ICIP.2000.899541

C. Y. Lin and S. F. Chang, A robust image authentication method distinguishing jpeg compression from malicious manipulation, IEEE Transactions on Circuits and Systems for Video Technology, vol.11, issue.2, pp.153-168, 2001.

C. S. Lu and H. Y. Liao, Structural digital signature for image authentication, Proceedings of the 2000 ACM workshops on Multimedia , MULTIMEDIA '00, pp.161-173, 2003.
DOI : 10.1145/357744.357893

J. Fridrich and M. Goljan, Robust hash functions for digital watermarking, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540), pp.178-183, 2000.
DOI : 10.1109/ITCC.2000.844203

S. S. Kozat, R. Venkatesan, and M. K. , Mihc -ak, Robust perceptual image hashing via matrix invariants, Proceedings of the IEEE International Conference on Image Processing, pp.3443-3446, 2004.
DOI : 10.1109/icip.2004.1421855

A. Swaminathan, Y. Mao, and M. Wu, Robust and Secure Image Hashing, IEEE Transactions on Information Forensics and Security, vol.1, issue.2, pp.215-230, 2006.
DOI : 10.1109/TIFS.2006.873601

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.416.8613

V. Monga and B. L. Evans, Perceptual Image Hashing Via Feature Points: Performance Evaluation and Tradeoffs, IEEE Transactions on Image Processing, vol.15, issue.11, pp.3452-3465, 2006.
DOI : 10.1109/TIP.2006.881948

S. K. Bhattacharjee and M. Kutter, Compression tolerant image authentication, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269), pp.435-439, 1998.
DOI : 10.1109/ICIP.1998.723518

J. Fridrich, Visual hash for oblivious watermarking, in: SPIE Photonic West Electronic Imaging, Security and Watermarking of Multimedia Contents, pp.286-294, 2000.

Y. Lei, Y. Wang, and J. Huang, Robust image hash in Radon transform domain for authentication, Signal Processing: Image Communication, vol.26, issue.6, pp.280-288, 2011.
DOI : 10.1016/j.image.2011.04.007

F. Lefebvre, B. Macq, and J. D. Legat, Rash: radon soft hash algorithm, Proceedings of the European Signal Processing Conference (EUSIPCO'02), 2002.

J. S. Seo, J. Haitsma, T. Kalker, and C. D. Yoo, A robust image fingerprinting system using the Radon transform, Signal Processing: Image Communication, vol.19, issue.4, pp.325-339, 2004.
DOI : 10.1016/j.image.2003.12.001

X. C. Guo and D. Hatzinakos, Content Based Image Hashing Via Wavelet and Radon Transform, Proceedings of the Multimedia 8th Pacific Rim Conference on Advances in Multimedia Information Processing, PCM'07, pp.755-764, 2007.
DOI : 10.1007/978-3-540-77255-2_91

F. Liu and L. Cheng, Perceptual Image Hashing via Wave Atom Transform, 10th International Workshop on Digital-forensics and Watermarking (IWDW11), 2011.
DOI : 10.1007/978-3-642-32205-1_37

S. Xiang, H. Kim, and J. Huang, Histogram-based image hashing scheme robust against geometric deformations, Proceedings of the 9th workshop on Multimedia & security , MM&Sec '07, pp.121-128, 2007.
DOI : 10.1145/1288869.1288886

Y. Ou, C. Sur, and K. H. Rhee, An improved histogram-based image hashing scheme using k-means segmentation, in: The Fourth Joint Workshop on Information Security, 2009.

S. Xiang and H. Kim, Histogram-Based Image Hashing for Searching Content-Preserving Copies, Transactions on Data Hiding and Multimedia Security, vol.6, pp.83-108, 2011.
DOI : 10.1007/978-3-642-24556-5_5

A. Hadmi, W. Puech, B. Aitessaid, and A. Aitouahman, Analysis of the robustness of wavelet-based perceptual signatures, 2010 2nd International Conference on Image Processing Theory, Tools and Applications, pp.112-117, 2010.
DOI : 10.1109/IPTA.2010.5586764

Q. Sun and S. F. Chang, A Robust and Secure Media Signature Scheme for JPEG Images, Journal of VLSI signal processing systems for signal, image and video technology, vol.3971, issue.2, pp.305-317, 2005.
DOI : 10.1007/s11265-005-4154-0

A. Hadmi, W. Puech, B. Aitessaid, and A. Aitouahman, Statistical analysis of the quantization stage of robust perceptual image hashing, 3rd European Workshop on Visual Information Processing, pp.274-279, 2011.
DOI : 10.1109/EuVIP.2011.6045509

Z. Wang, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli, Image Quality Assessment: From Error Visibility to Structural Similarity, IEEE Transactions on Image Processing, vol.13, issue.4, pp.600-612, 2004.
DOI : 10.1109/TIP.2003.819861