2002
DOI: 10.1007/3-540-47870-1_2
|View full text |Cite
|
Sign up to set email alerts
|

New Iterative Geometric Methods for Robust Perceptual Image Hashing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
43
0

Year Published

2005
2005
2012
2012

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 97 publications
(43 citation statements)
references
References 3 publications
0
43
0
Order By: Relevance
“…• Coarse-representation-based schemes (Fridrich & Goljan, 2000;Kozat et al, 2004;Mihçak & R.Venkatesan, 2001;Swaminathan et al, 2006): In this category of methods, the perceptual hashes are calculated by making use of coarse information of the whole image, such as the spatial distribution of significant wavelet coefficients, the low-frequency coefficients of Fourier transform, and so on.…”
Section: Perceptual Image Hashing Methods Classificationmentioning
confidence: 99%
See 2 more Smart Citations
“…• Coarse-representation-based schemes (Fridrich & Goljan, 2000;Kozat et al, 2004;Mihçak & R.Venkatesan, 2001;Swaminathan et al, 2006): In this category of methods, the perceptual hashes are calculated by making use of coarse information of the whole image, such as the spatial distribution of significant wavelet coefficients, the low-frequency coefficients of Fourier transform, and so on.…”
Section: Perceptual Image Hashing Methods Classificationmentioning
confidence: 99%
“…Finally, the binary perceptual hash string is compressed and encrypted into a short and a final perceptual hash in the Compression and Encryption stage (Figure 1). (Mihçak & R.Venkatesan, 2001) is another quantization type which is is the most famous quantization scheme in the field of image hashing. The difference between the two quantization schemes is that the partition of uniform quantization is based on the interval length of the hash values, whereas the partition of adaptive quantization is based on the probability density function (pdf) of the hash values.…”
Section: Perceptual Image Hashing Frameworkmentioning
confidence: 99%
See 1 more Smart Citation
“…The common preprocessing operations include image downsampling [7], low-pass filtering for reducing high frequency signals [8], resizing for image rescaling, order statistic filtering for denoising [9], and Gaussian blurring [10]. As such, all above operations serve for the next essential attributes extraction stage.…”
Section: General Framework Of Image Hashingmentioning
confidence: 99%
“…In order to efficiently identify digital images, perceptual hash techniques have been used [1][2][3]. A hash value, typically a short binary string, is generated to act as a unique identifier of the corresponding image.…”
Section: Introductionmentioning
confidence: 99%