The design and implementation of a wireless video surveillance system
Internet-enabled cameras pervade daily life, generating a huge amount of data, but most of
the video they generate is transmitted over wires and analyzed offline with a human in the …
the video they generate is transmitted over wires and analyzed offline with a human in the …
Robust image hashing with ring partition and invariant vector distance
Robustness and discrimination are two of the most important objectives in image hashing.
We incorporate ring partition and invariant vector distance to image hashing algorithm for …
We incorporate ring partition and invariant vector distance to image hashing algorithm for …
Perceptual hashing for image authentication: A survey
Perceptual hashing is used for multimedia content identification and authentication through
perception digests based on the understanding of multimedia content. This paper presents a …
perception digests based on the understanding of multimedia content. This paper presents a …
Robust and secure image hashing
A Swaminathan, Y Mao, M Wu - IEEE Transactions on …, 2006 - ieeexplore.ieee.org
Image hash functions find extensive applications in content authentication, database search,
and watermarking. This paper develops a novel algorithm for generating an image hash …
and watermarking. This paper develops a novel algorithm for generating an image hash …
An enhanced hybrid image watermarking scheme for security of medical and non-medical images based on DWT and 2-D SVD
TK Araghi, A Abd Manaf - Future Generation Computer Systems, 2019 - Elsevier
In this paper, we proposed a blind image watermarking scheme to enhance the
effectiveness of hybrid Discrete Wavelet Transform (DWT) and Singular Value …
effectiveness of hybrid Discrete Wavelet Transform (DWT) and Singular Value …
Perceptual image hashing via feature points: performance evaluation and tradeoffs
We propose an image hashing paradigm using visually significant feature points. The
feature points should be largely invariant under perceptually insignificant distortions. To …
feature points should be largely invariant under perceptually insignificant distortions. To …
A scalable and privacy-aware IoT service for live video analytics
We present OpenFace, our new open-source face recognition system that approaches state-
of-the-art accuracy. Integrating OpenFace with inter-frame tracking, we build RTFace, a …
of-the-art accuracy. Integrating OpenFace with inter-frame tracking, we build RTFace, a …
Robust image hashing with tensor decomposition
Z Tang, L Chen, X Zhang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
This paper presents a new image hashing that is designed with tensor decomposition (TD),
referred to as TD hashing, where image hash generation is viewed as deriving a compact …
referred to as TD hashing, where image hash generation is viewed as deriving a compact …
Robust perceptual image hashing based on ring partition and NMF
This paper designs an efficient image hashing with a ring partition and a nonnegative matrix
factorization (NMF), which has both the rotation robustness and good discriminative …
factorization (NMF), which has both the rotation robustness and good discriminative …
Robust and Secure Image Hashing via Non-Negative Matrix Factorizations.
In this paper, we propose the use of non-negative matrix factorization (NMF) for image
hashing. In particular, we view images as matrices and the goal of hashing as a randomized …
hashing. In particular, we view images as matrices and the goal of hashing as a randomized …