2004 International Conference on Image Processing, 2004. ICIP '04.
DOI: 10.1109/icip.2004.1421855
|View full text |Cite
|
Sign up to set email alerts
|

Robust perceptual image hashing via matrix invariants

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
127
0

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 181 publications
(128 citation statements)
references
References 3 publications
1
127
0
Order By: Relevance
“…It can be observed that there is no perfect scheme that satisfies all desirable requirements. A high robustness may couple with some other sacrifices, such as the high complexity in [12], [41], [42], low discrimination to CCOs [8], [10]. Accordingly, in some cases [8], [10], [46], the discrim- ination to CCOs seems to be conflicted with robustness.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…It can be observed that there is no perfect scheme that satisfies all desirable requirements. A high robustness may couple with some other sacrifices, such as the high complexity in [12], [41], [42], low discrimination to CCOs [8], [10]. Accordingly, in some cases [8], [10], [46], the discrim- ination to CCOs seems to be conflicted with robustness.…”
Section: Discussionmentioning
confidence: 99%
“…Motivated by [41], Monga et al [12] propose to use Non-negative Matrix Factorization (NMF) for image hashing because of its non-negativity constraints. The NMF is also applied twice on the image, in conjunction with pseudorandomization to generate the secure hash sequence.…”
Section: Approaches Based On Dimension Reductionmentioning
confidence: 99%
See 1 more Smart Citation
“…• Coarse-representation-based schemes (Fridrich & Goljan, 2000;Kozat et al, 2004;Mihçak & R.Venkatesan, 2001;Swaminathan et al, 2006): In this category of methods, the perceptual hashes are calculated by making use of coarse information of the whole image, such as the spatial distribution of significant wavelet coefficients, the low-frequency coefficients of Fourier transform, and so on.…”
Section: Perceptual Image Hashing Methods Classificationmentioning
confidence: 99%
“…In [11], the feature extraction consists of a random tiling of the DWT subbands of the image; the mean (or variance) of the pixel values in each random rectangle are used to form the feature vector, which is randomly quantized and compressed to generate the hash. The authors of [12] compute SVD from random blocks in the image, and use the obtained intermediate features to produce a robust and secure image hash. Swaminathan et.…”
Section: A Related Workmentioning
confidence: 99%