Perceptual hashing with complementary color wavelet transform and compressed sensing for reduced-reference image quality assessment

M Yu, Z Tang, X Zhang, B Zhong… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Image quality assessment (IQA) is an important task of image processing and has diverse
applications, such as image super-resolution reconstruction, image transmission and …

Spatio–temporal transform based video hashing

B Coskun, B Sankur, N Memon - ieee Transactions on …, 2006 - ieeexplore.ieee.org
Identification and verification of a video clip via its fingerprint find applications in video
browsing, database search and security. For this purpose, the video sequence must be …

Incremental subspace learning via non-negative matrix factorization

SS Bucak, B Gunsel - Pattern recognition, 2009 - Elsevier
In this paper we introduce an incremental non-negative matrix factorization (INMF) scheme
in order to overcome the difficulties that conventional NMF has in online processing of large …

Perceptual image hashing based on virtual watermark detection

F Khelifi, J Jiang - IEEE Transactions on Image Processing, 2009 - ieeexplore.ieee.org
This paper proposes a new robust and secure perceptual image hashing technique based
on virtual watermark detection. The idea is justified by the fact that the watermark detector …

Watermarking is not cryptography

IJ Cox, G Doërr, T Furon - International Workshop on Digital Watermarking, 2006 - Springer
A number of analogies to cryptographic concepts have been made about watermarking. In
this paper, we argue that these analogies are misleading or incorrect, and highlight several …

Using grid for accelerating density-based clustering

S Mahran, K Mahar - 2008 8th IEEE International Conference …, 2008 - ieeexplore.ieee.org
Clustering analysis is a primary method for data mining. The ever increasing volumes of
data in different applications forces clustering algorithms to cope with it. DBSCAN is a well …

Hashing the mAR coefficients from EEG data for person authentication

C He, X Lv, ZJ Wang - 2009 IEEE International Conference on …, 2009 - ieeexplore.ieee.org
Electroencephalogram (EEG) recordings of brain waves have been shown to have unique
pattern for each individual and thus have potential for biometric applications. In this paper …

Image authentication using distributed source coding

YC Lin, D Varodayan, B Girod - IEEE Transactions on Image …, 2011 - ieeexplore.ieee.org
We present a novel approach using distributed source coding for image authentication. The
key idea is to provide a Slepian-Wolf encoded quantized image projection as authentication …

Hash-based authentication of digital images in noisy channels

F Ahmed, A Anees - Robust image authentication in the presence of noise, 2015 - Springer
The advancement in digital technology has provided us with a number of software tools that
can be used to tamper digital media contents, for example, images. This creates several …

Recent development of perceptual image hashing

W Shuo-zhong, Z Xin-peng - Journal of Shanghai University (English …, 2007 - Springer
The easy generation, storage, transmission and reproduction of digital images have caused
serious abuse and security problems. Assurance of the rightful ownership, integrity, and …