共 49 条
[1]
Ma B, Shi Y Q., A reversible data hiding scheme based on code division multiplexing, IEEE Transactions on Information Forensics and Security, 11, 9, pp. 1914-1927, (2016)
[2]
Ma B, Chang L, Wang C, Et al., Robust image watermarking using invariant accurate polar harmonic Fourier moments and chaotic mapping, Signal Processing, 172, (2020)
[3]
Srivastava M, Siddiqui J, Ali M A., Local binary pattern based technique for content based image copy detection, Proceedings of the International Conference on Power Electronics & IoT Applications in Renewable Energy and its Control (PARC), pp. 374-377, (2020)
[4]
Qin C, Liu E, Feng G, Et al., Perceptual image hashing for content authentication based on convolutional neural network with multiple constraints, IEEE Transactions on Circuits and Systems for Video Technology, 31, 11, pp. 4523-4537, (2020)
[5]
Donahue J, Krahenbuhl P, Darrell T., Adversarial feature learning, (2016)
[6]
Schneider M, Chang S F., A robust content based digital signature for image authentication, Proceedings of the 3rd IEEE International Conference on Image Processing, pp. 227-230, (1996)
[7]
Tang Z, Dai Y, Zhang X, Et al., Perceptual image hashing with histogram of color vector angles, Proceedings of the International Conference on Active Media Technology, pp. 237-246, (2012)
[8]
Zhao Y, Wang S, Zhang X, Et al., Robust hashing for image authentication using Zernike moments and local features, IEEE Transactions on Information Forensics and Security, 8, 1, pp. 55-63, (2012)
[9]
Chen Y, Yu W, Feng J., Robust image hashing using invariants of Tchebichef moments, International Journal for Light and Electron Optics, 125, 19, pp. 5582-5587, (2014)
[10]
Tang Z, Zhang X, Li X, Et al., Robust image hashing with ring partition and invariant vector distance, IEEE Transactions on Information Forensics and Security, 11, 1, pp. 200-214, (2015)