The design and implementation of a wireless video surveillance system

T Zhang, A Chowdhery, P Bahl, K Jamieson… - Proceedings of the 21st …, 2015 - dl.acm.org
Internet-enabled cameras pervade daily life, generating a huge amount of data, but most of
the video they generate is transmitted over wires and analyzed offline with a human in the …

Robust image hashing with ring partition and invariant vector distance

Z Tang, X Zhang, X Li, S Zhang - IEEE transactions on …, 2015 - ieeexplore.ieee.org
Robustness and discrimination are two of the most important objectives in image hashing.
We incorporate ring partition and invariant vector distance to image hashing algorithm for …

Perceptual hashing for image authentication: A survey

L Du, ATS Ho, R Cong - Signal Processing: Image Communication, 2020 - Elsevier
Perceptual hashing is used for multimedia content identification and authentication through
perception digests based on the understanding of multimedia content. This paper presents a …

Robust and secure image hashing

A Swaminathan, Y Mao, M Wu - IEEE Transactions on …, 2006 - ieeexplore.ieee.org
Image hash functions find extensive applications in content authentication, database search,
and watermarking. This paper develops a novel algorithm for generating an image hash …

An enhanced hybrid image watermarking scheme for security of medical and non-medical images based on DWT and 2-D SVD

TK Araghi, A Abd Manaf - Future Generation Computer Systems, 2019 - Elsevier
In this paper, we proposed a blind image watermarking scheme to enhance the
effectiveness of hybrid Discrete Wavelet Transform (DWT) and Singular Value …

Perceptual image hashing via feature points: performance evaluation and tradeoffs

V Monga, BL Evans - IEEE transactions on Image Processing, 2006 - ieeexplore.ieee.org
We propose an image hashing paradigm using visually significant feature points. The
feature points should be largely invariant under perceptually insignificant distortions. To …

A scalable and privacy-aware IoT service for live video analytics

J Wang, B Amos, A Das, P Pillai, N Sadeh… - Proceedings of the 8th …, 2017 - dl.acm.org
We present OpenFace, our new open-source face recognition system that approaches state-
of-the-art accuracy. Integrating OpenFace with inter-frame tracking, we build RTFace, a …

Robust image hashing with tensor decomposition

Z Tang, L Chen, X Zhang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
This paper presents a new image hashing that is designed with tensor decomposition (TD),
referred to as TD hashing, where image hash generation is viewed as deriving a compact …

Robust perceptual image hashing based on ring partition and NMF

Z Tang, X Zhang, S Zhang - IEEE transactions on knowledge …, 2013 - ieeexplore.ieee.org
This paper designs an efficient image hashing with a ring partition and a nonnegative matrix
factorization (NMF), which has both the rotation robustness and good discriminative …

Robust and Secure Image Hashing via Non-Negative Matrix Factorizations.

V Monga, MK Mihçak - IEEE Trans. Inf. Forensics Secur., 2007 - ieeexplore.ieee.org
In this paper, we propose the use of non-negative matrix factorization (NMF) for image
hashing. In particular, we view images as matrices and the goal of hashing as a randomized …