2007 IEEE International Conference on Image Processing 2007
DOI: 10.1109/icip.2007.4379134
|View full text |Cite
|
Sign up to set email alerts
|

Fast Method for Joint Retrieval and Identification of JPEG Coded Images Based on DCT Sign

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2010
2010
2017
2017

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 9 publications
0
6
0
Order By: Relevance
“…The DCT coefficients have been widely used for compressed domain retrieval and it is known that the DC component and first two AC coefficients contain the main structural information of the image [32][33][34]. In this work, the DCT coefficients are employed as a relevance metric for feature selection.…”
Section: Dct Coefficients Of a Local Patch Around A Keypointmentioning
confidence: 99%
“…The DCT coefficients have been widely used for compressed domain retrieval and it is known that the DC component and first two AC coefficients contain the main structural information of the image [32][33][34]. In this work, the DCT coefficients are employed as a relevance metric for feature selection.…”
Section: Dct Coefficients Of a Local Patch Around A Keypointmentioning
confidence: 99%
“…Such methods were applicable for duplicated image retrieval. However, they have not achieved high matching accuracy under optical and geometric distortion [6]- [9]. To improve retrieval rate and matching accuracy, low level feature extraction based on DCT and wavelet coefficients in spatial domain were proposed.…”
Section: Introductionmentioning
confidence: 99%
“…Most of these schemes not only are robust against a difference in compressed levels but also do not produce false negative matches in any compression level. However, the conventional schemes [3][4][5][6][7][9][10][11] do not consider to identify images securely, since it is impossible to avoid the effect caused by a difference in compression levels.…”
Section: Introductionmentioning
confidence: 99%
“…So far, several identification schemes and image hash functions have been developed for authenticating images [3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][20]. They can be broadly classified into two types according to a difference in extracted features: compression method-depended type, to which the proposed scheme corresponds, and compression methodindependent type.…”
Section: Introductionmentioning
confidence: 99%