2016
DOI: 10.1109/tifs.2015.2485163
|View full text |Cite
|
Sign up to set email alerts
|

Robust Image Hashing With Ring Partition and Invariant Vector Distance

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

1
124
0
1

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 216 publications
(126 citation statements)
references
References 33 publications
1
124
0
1
Order By: Relevance
“…On the other hand, the positions of zero values do not provide any visible information, compared to the features used in [10], [11], [14]- [16]. Besides, the proposed scheme can identify images under various coding conditions, although schemes which Moreover, several image-hashing schemes have been proposed for image retrieval [18]- [20]. However, they can not guarantee that there are not any false negative matches as shown later, although the proposed scheme guarantees it in principle.…”
Section: A Feature Extraction Processmentioning
confidence: 99%
See 3 more Smart Citations
“…On the other hand, the positions of zero values do not provide any visible information, compared to the features used in [10], [11], [14]- [16]. Besides, the proposed scheme can identify images under various coding conditions, although schemes which Moreover, several image-hashing schemes have been proposed for image retrieval [18]- [20]. However, they can not guarantee that there are not any false negative matches as shown later, although the proposed scheme guarantees it in principle.…”
Section: A Feature Extraction Processmentioning
confidence: 99%
“…So far, several identification schemes and image hash functions have been developed for compressed images [6]- [20]. They can be broadly classified into two types according to a difference in extracted features: compression method-depended type, to which the proposed scheme corresponds, and compression method-independent type.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…So far, several identification schemes and image hash functions have been developed for authenticating images [3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][20]. They can be broadly classified into two types according to a difference in extracted features: compression method-depended type, to which the proposed scheme corresponds, and compression methodindependent type.…”
Section: Introductionmentioning
confidence: 99%