Widerperson: A diverse dataset for dense pedestrian detection in the wild
Pedestrian detection has achieved significant progress with the availability of existing
benchmark datasets. However, there is a gap in the diversity and density between real world …
benchmark datasets. However, there is a gap in the diversity and density between real world …
Perceptual hashing for image authentication: A survey
Perceptual hashing is used for multimedia content identification and authentication through
perception digests based on the understanding of multimedia content. This paper presents a …
perception digests based on the understanding of multimedia content. This paper presents a …
Robust and secure image hashing
A Swaminathan, Y Mao, M Wu - IEEE Transactions on …, 2006 - ieeexplore.ieee.org
Image hash functions find extensive applications in content authentication, database search,
and watermarking. This paper develops a novel algorithm for generating an image hash …
and watermarking. This paper develops a novel algorithm for generating an image hash …
Perceptual image hashing via feature points: performance evaluation and tradeoffs
We propose an image hashing paradigm using visually significant feature points. The
feature points should be largely invariant under perceptually insignificant distortions. To …
feature points should be largely invariant under perceptually insignificant distortions. To …
[PDF][PDF] Implementation and benchmarking of perceptual image hash functions
C Zauner - 2010 - phash.org
Due to the ever increasing digitalization, the authentication of multimedia content is
becoming more and more important. Authentication in general means deciding whether an …
becoming more and more important. Authentication in general means deciding whether an …
Robust perceptual image hashing via matrix invariants
SS Kozat, R Venkatesan… - … Conference on Image …, 2004 - ieeexplore.ieee.org
In this paper we suggest viewing images (as well as attacks on them) as a sequence of
linear operators and propose novel hashing algorithms employing transforms that are based …
linear operators and propose novel hashing algorithms employing transforms that are based …
Robust and Secure Image Hashing via Non-Negative Matrix Factorizations.
In this paper, we propose the use of non-negative matrix factorization (NMF) for image
hashing. In particular, we view images as matrices and the goal of hashing as a randomized …
hashing. In particular, we view images as matrices and the goal of hashing as a randomized …
Spatio–temporal transform based video hashing
Identification and verification of a video clip via its fingerprint find applications in video
browsing, database search and security. For this purpose, the video sequence must be …
browsing, database search and security. For this purpose, the video sequence must be …
A visual model-based perceptual image hash for content authentication
X Wang, K Pang, X Zhou, Y Zhou… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Perceptual image hash has been widely investigated in an attempt to solve the problems of
image content authentication and content-based image retrieval. In this paper, we combine …
image content authentication and content-based image retrieval. In this paper, we combine …