[1] Zhao Y, Wang S, Zhang X, et al. Robust hashing for image authentication using zernike moments and local features[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(1):55-63. [2] Tang Z, Zhang X, Dai X. Robust image hash function using local color features[J]. AEUInternational Journal of Electronics and Communications, 2013, 67(8):717-722. [3] Davarzani R, Mozaffari S, Yaghmaie K. Perceptual image hashing using center-symmetric local binary patterns[J]. Multimedia Tools and Applications, 2016, 75(8):4639-4667. [4] Tang Z, Huang L, Zhang X. Robust image hashing based on color vector angle and Canny operator[J]. AEU-International Journal of Electronics and Communications, 2016, 70(6):833-841. [5] Qin C, Chen X, Dong J. Perceptual image hashing with selective sampling for salient structure features[J]. Displays, 2016, 45:26-37. [6] Tang Z, Zhang X, Li X. Robust image hashing with ring partition and invariant vector distance[J]. IEEE Transactions on Information Forensics and Security, 2016, 11(1):200-214. [7] Tang Z, Chen L, Zhang X. Robust image hashing with tensor decomposition[J]. IEEE Transactions on Knowledge and Data Engineering, 2019, 31(3):549-560. [8] Tang Z, Lao H, Zhang X. Robust image hashing via DCT and LLE[J]. Computers & Security, 2016, 62:133-148. [9] Tang Z, Ruan L, Qin C. Robust image hashing with embedding vector variance of LLE[J]. Digital Signal Processing, 2015, 43:17-27. [10] Tang Z, Huang Z, Zhang X. Robust image hashing with multidimensional scaling[J]. Signal Processing, 2017, 137:240-250. [11] 沈麒,赵琰. 基于小波分解的统计特征哈希[J]. 应用科学学报,2018, 3(2):247-254. Shen Q, Zhao Y. Statistical feature hashing based on wavelet decomposition[J]. Journal of Applied Sciences, 2018, 36(02):247-254. [12] Tang Z, Zhang X, Dai Y. Perceptual image hashing using local entropies and DWT[J]. Journal of Photographic Science, 2013, 61(2):241-251. [13] 沈麒,赵琰. 面向拷贝检测的图像哈希算法[J]. 计算机应用研究,2019, 36(2):611-614+620. Shen Q, Zhao Y. Image hash algorithm for copy detection[J]. Application Research of Computers, 2019, 36(2):611-614+620. [14] Srivastava M, Siddiqui J, Ali M A. Robust image hashing based on statistical features for copy detection[C]//IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics Engineering. IEEE, 2017:490-495. [15] Qin C, Chen X, Luo X. Perceptual image hashing bis dual-cross pattern encoding and salient structure detection[J]. Information Sciences, 2018, 423:284-302. [16] Engel S, Zhang X, Wandell B. Colour tuning in human visual cortex measured with functional magnetic resonance imaging[J]. Nature, 1997, 388(6637):68-71. [17] Yan C, Pun C, Yuan X. Quaternion-based image hashing for adaptive tampering localization[J]. IEEE Transactions on Information Forensics and Security, 2016, 11(12):2664-2677. [18] Ma Y F, Hua X S, Lu L. A generic framework of user attention model and its application in video summarization[J]. IEEE Transactions on Multimedia, 2005, 7(5):907-919. [19] Qin C, Chen X, Dong J. Perceptual image hashing with selective sampling for salient structure features[J]. Displays, 2016, 45:26-37. [20] 赵琰,魏为民. 用于图像认证和窜改检测的稳健图像摘要[J]. 计算机应用研究,2011, 28(5):1929-1931+1939. Zhao Y, Wei W. Robust image hashing for image authentication and tampering detection[J]. Application Research of Computers, 2011, 28(5):1929-1931+1939. [21] Fawcett T. An introduction to ROC analysis[J]. Pattern Recognition Letters, 2006, 27(8):861-874. [22] Redmon J. Pascal VOC dataset mirror[EB/OL]. (2012)[2017-10-07]. https://pjreddie.com/projects/pascal-voc-dataset-mirror/. |