[1]
Shijun X., Hyoung-JJoong K., Jiwu H. Histogram-Based Image Hashing Scheme Robust Against Geometric Deformations,. Proceedings of the ACM workshop on multimedia and security, pp.121-128, (2007).
DOI: 10.1145/1288869.1288886
Google Scholar
[2]
Yong Soo C., Jong Hyuk P. Image Hash generation method using hierarchical histogram,. Multimedia tools and applications, pp.181-194, (2012).
DOI: 10.1007/s11042-010-0724-7
Google Scholar
[3]
Ching-Yung L., Shih-Fu C. Robust Digital Signature for Multimedia authentication,. IEEE Circuits and Systems Magazine, vol. 3, pp.23-26, (2003).
DOI: 10.1109/mcas.2003.1267067
Google Scholar
[4]
Rui-Xin Z., Chau K. Y., Zhe-Ming L., Bei-Bei L., Ip W. H. Robust Image Hashing for Image Authentication Based on DCT-DWT Composite Domain,. International Conference on Intelligent Systems Design and Applications, vol. 2, pp.119-122, (2008).
DOI: 10.1109/isda.2008.66
Google Scholar
[5]
Swaminathan A., Mao Y., Wu M. Robust and Secure Image Hashing,. IEEE transactions on Information Forensics and Security, vol. 1, pp.215-230, (2006).
DOI: 10.1109/tifs.2006.873601
Google Scholar
[6]
Yangqiang L., Yuangen W., Jiwu H. Robust image hash in Radon transform domain for authentication,. Signal Processing: Image Communication, vol. 26, pp.280-288, (2011).
DOI: 10.1016/j.image.2011.04.007
Google Scholar
[7]
Ramirez-Gutierrez, K., Nakano-Miyatake, M., Perez-Meana, H. Improvement of Radon-based Image Hashing using Image Normalization,. IEEE Electronics, Robotics and Automotive Mechanics Conference, pp.173-177, (2011).
DOI: 10.1109/cerma.2011.34
Google Scholar
[8]
Hernandez, R. A. P., Miyatake, M. N., Kurkoski, B. M. Robust Image Hashing Using Image Normalization and SVD Decomposition, IEEE International Midwest Symposium on Circuits and Systems, pp.1-4, (2011).
DOI: 10.1109/mwscas.2011.6026372
Google Scholar
[9]
Monga V., Mihcak M. K. Robust and Secure Image Hashing via Non-Negtive Matrix Factorizations,. IEEE transactions on Information Forensics and Security, vol. 2, pp.376-390, (2007).
DOI: 10.1109/tifs.2007.902670
Google Scholar
[10]
Monga V., Evans B. L. Perceptual Image Hashing via Feature Points: Performance Evaluation and Tradeoffs,. IEEE transactions on Image Processing, vol. 15, pp.3453-3466, (2006).
DOI: 10.1109/tip.2006.881948
Google Scholar
[11]
O'Ruanaidh, J.J.K., Pun, T. Rotation, Scale and Translation Invariant Digital Image Watermarking,. International Conference on Image Processing, vol. 1, pp.536-539, (1997).
DOI: 10.1109/icip.1997.647968
Google Scholar
[12]
http: /www. cs. washington. edu/research/imagedatabase/groundtruth/_tars. for. download.
Google Scholar