[1] Venkatesan R, Koon S M, Jakubowski M H,Moulin P. Robust image hashing [C]//The IEEE International Conference on Image Processing (ICIP), 2000: 664-666.
[2] 闫允一,姜帅,郭宝龙.结合稳定兴趣点和Gabor小波的图像检索[J].西安电子科技大学学报,2014, 41(5): 118-123. Yan Y Y, Jiang S, Guo B L. Image retrieval using stable interest points and Gabor wavelet[J]. Journal of Xidian University, 2014, 41(5): 118-123. (in Chinese)
[3] Kozat S S, Venkatesan R, Mihcak M K. Robust perceptual image hashing via matrix invariants[C]//The IEEE International Conference Image Processing (ICIP), 2004: 3443-3446.
[4] Monga V, Mihcak M K. Robust and secure image hashing via nonnegative matrix factorizations
[J]. IEEE Transactions on Information and Forensics Security, 2007, 2(3): 376-390.
[5] Monga V, Evans B L. Perceptual image hashing via feature points: performance evaluation and tradeoffs [J]. IEEE Transaction on Image Processing, 2006, 15(11): 3452-3465.
[6] 刘兆庆,李琼,刘景瑞. 一种基于SIFT的图像哈希算法[J]. 仪器仪表学报,2011, 32(9): 2024-2028. Liu Z Q, Li Q, Liu J R. SIFT based image hashing algorithm [J]. Chinese Journal of Scientific Instrument, 2011, 32(9): 2024-2028. (in Chinese)
[7] 孙锐,闫晓星,高隽. 基于SIFT和PCA的图像感知哈希方法[J]. 电路与系统学报,2013, 18(1): 274-228. Sun R, Yan X X, Gao J. A perceptual image hashing method via SIFT and PCA [J]. Journal of Circuits and Systems, 2013, 18(1): 274-228. (in Chinese)
[8] Ling H F, Yan L Y, Zou F H, Liu C, Feng H. Fast image copy detection approach based on local fingerprint defined visual words [J]. Signal Processing, 2013, 93: 2328-2338.
[9] 林莹,杨扬,凌康. 多特征综合的视频拷贝检测[J]. 计算机辅助设计与图形学学报,2013, 18(5): 591-599. Lin Y, Yang Y, Ling K. Video copy detection based on multiple visual features synthesizing [J]. Journal of Image and Graphics, 2013, 18(5): 591-599. (in Chinese)
[10] Lü X D, Wang Z J. Perceptual image hashing based on shape contexts and local feature points [J]. IEEE Transactions on Information and Forensics Security, 2012, 7(3): 1081-1093.
[11] Li Y N, Lu Z M, Zhu C, Niu X M. Robust image hashing based on random Gabor filtering and dithered lattice vector quantization [J]. IEEE Transactions on Information and Forensics Security, 2012, 21(4): 1963-1980.
[12] Zhao Y, Wang S Z, Zhang X P, Yao H. Robust hashing for image authentication using Zernike moments and local features [J]. IEEE Transactions on Information and Forensics Security, 2013, 8(1): 55-63.
[13] Tang Z J, Zhang X Q, Zhang S C. Robust perceptual image hashing based on ring partition and NMF [J]. IEEE Transactions on Knowledge and Data Engineering, 2014, 26(3): 711-724.
[14] Tang Z J, Zhang X Q, Li X X, Zhang S C. Robust image hashing with ring partition and invariant vector distance [J]. IEEE Transactions on Information and Forensics Security, 2016, 11(1): 200-214.
[15] 师文,朱学芳. 基于轮廓重构和特征点弦长的图像检索[J]. 软件学报,2014, 25(7): 1557-1567. Shi W, Zhu X F. Image retrieval based on contour reconstruction and feature point chord length [J]. Journal of Software, 2014, 25(7): 1557-1567. (in Chinese)
[16] Liu C, Wechsler H. Gabor feature based classification using the enhanced fisher linear discriminant model for face recognition [J]. IEEE Transactions on Image Processing, 2002, 11 (4): 467-476.
[17] 刘帅师,田彦涛,万川. 基于Gabor多方向特征融合与分块直方图的人脸表情识别方法[J]. 自动化学报,2011, 37(12): 1455-1463. Liu S S, Tian Y T, Wan C. Facial expression recognition method based on Gabor multiorientation features fusion and block histogram [J]. Acta Automatic Sinica, 2011, 37(12): 1455-1463. (in Chinese)
[18] http://wang.ist.psu.edu/docs/related.shtml |