Perceptual hashing with complementary color wavelet transform and compressed sensing for reduced-reference image quality assessment
Image quality assessment (IQA) is an important task of image processing and has diverse
applications, such as image super-resolution reconstruction, image transmission and …
applications, such as image super-resolution reconstruction, image transmission and …
Spatio–temporal transform based video hashing
Identification and verification of a video clip via its fingerprint find applications in video
browsing, database search and security. For this purpose, the video sequence must be …
browsing, database search and security. For this purpose, the video sequence must be …
Incremental subspace learning via non-negative matrix factorization
In this paper we introduce an incremental non-negative matrix factorization (INMF) scheme
in order to overcome the difficulties that conventional NMF has in online processing of large …
in order to overcome the difficulties that conventional NMF has in online processing of large …
Perceptual image hashing based on virtual watermark detection
This paper proposes a new robust and secure perceptual image hashing technique based
on virtual watermark detection. The idea is justified by the fact that the watermark detector …
on virtual watermark detection. The idea is justified by the fact that the watermark detector …
Watermarking is not cryptography
A number of analogies to cryptographic concepts have been made about watermarking. In
this paper, we argue that these analogies are misleading or incorrect, and highlight several …
this paper, we argue that these analogies are misleading or incorrect, and highlight several …
Using grid for accelerating density-based clustering
Clustering analysis is a primary method for data mining. The ever increasing volumes of
data in different applications forces clustering algorithms to cope with it. DBSCAN is a well …
data in different applications forces clustering algorithms to cope with it. DBSCAN is a well …
Hashing the mAR coefficients from EEG data for person authentication
C He, X Lv, ZJ Wang - 2009 IEEE International Conference on …, 2009 - ieeexplore.ieee.org
Electroencephalogram (EEG) recordings of brain waves have been shown to have unique
pattern for each individual and thus have potential for biometric applications. In this paper …
pattern for each individual and thus have potential for biometric applications. In this paper …
Image authentication using distributed source coding
We present a novel approach using distributed source coding for image authentication. The
key idea is to provide a Slepian-Wolf encoded quantized image projection as authentication …
key idea is to provide a Slepian-Wolf encoded quantized image projection as authentication …
Hash-based authentication of digital images in noisy channels
The advancement in digital technology has provided us with a number of software tools that
can be used to tamper digital media contents, for example, images. This creates several …
can be used to tamper digital media contents, for example, images. This creates several …
Recent development of perceptual image hashing
W Shuo-zhong, Z Xin-peng - Journal of Shanghai University (English …, 2007 - Springer
The easy generation, storage, transmission and reproduction of digital images have caused
serious abuse and security problems. Assurance of the rightful ownership, integrity, and …
serious abuse and security problems. Assurance of the rightful ownership, integrity, and …