[1] Ahmed F, Siyal M Y, Abbas V U. A secure and robust Hash-based scheme for image authentication[J]. Signal Processing, 2010, 90(5): 1456-1470.
[2] Monga V, Evans B L. Perceptual image Hashing via feature points: performance evaluation and trade-offs [J]. IEEE Transactions on Image Processing, 2006, 15(11): 3452-3465.
[3] Sumalatha L, Krishna V V, Kumar V V. Local content based image authentication for tamper localization [J]. International Journal of Image, Graphics and Signal Processing, 2012, 4(9): 30-36.
[4] Zhao Y, Wang S, Zhang X, Yao H. Robust Hashing for image authentication using Zernike moments and local features [J]. IEEE Transactions on Information Forensics and Security, 2013, 8(1): 55-63.
[5] Swaminathan A, Mao Y, Wu M. Robust and secure image hashing [J]. IEEE Transactions on Information Forensics Security, 2006, 1(2): 215-230.
[6] 张敏. 基于图像内容认证的感知哈希算法的研究[D]. 长沙:湖南大学,2010.
[7] 胡聪. 安全图像哈希认证算法的研究[D]. 广州:中山大学,2009.
[8] Monga V, Kivanc M. Robust and secure image Hashing via non-negative matrix factorizations[J]. IEEE Transactions on Information Forensics and Security, 2007, 2(3): 376-390.
[9] Tang Z J, Zhang X Q, Zhang S C. Robust perceptual image Hashing based on ring partition and NMF [J]. IEEE Transactions on Knowledge and Data Engineering, 2014, 26(3): 711-724.
[10] Wang X F, Pang K M, Zhou X R, Zhou Y, Li L, Xue J R. A visual model based perceptual image Hash for content authentication [J]. IEEE Transactions on Information Forensics and Security, 2015, 10(7): 1336-1349.
[11] 刘凯,唐振军,张显全,俞春强. 联合压缩感知和颜色向量角的彩色图像哈希方法[J]. 应用科学学 报,2015, 33(6): 595-603. Liu K, Tang Z J, Zhang X Q, Yu C Q. Color image Hashing with compressive sensing and color vector angle [J]. Journal of Applied Sciences, 2015, 33(6): 595-603. (in Chinese)
[12] 王德明,王莉,张广明. 基于遗传BP 神经网络的短期风速预测模型[J]. 浙江大学学报:工学 版,2012, 46(5): 837-841. Wang D M, Wang L, Zhang G M. Man-machine function allocation for cockpit based on genetic BP neural network [J]. Journal of Zhejiang University: Engineering Science, 2012, 46(5): 837-841. (in Chinese) |