X Liang, Z Tang, Z Huang, X Zhang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Image copy detection is an important technology of copyright protection. This paper proposes an efficient hashing method for image copy detection using 2D-2D (two-directional …
S Unar, X Wang, C Wang, Y Wang - Knowledge-Based Systems, 2019 - Elsevier
Image content analysis plays a dynamic role in various computer vision applications. These contents can be either visual (ie color, shape, texture) or the textual (ie text appearing within …
Z Huang, S Liu - IEEE Transactions on Circuits and Systems for …, 2020 - ieeexplore.ieee.org
Numerous screen content images (SCIs) have been produced to meet the needs of virtual desktop and remote display, which put forward a very urgent requirement for security and …
Z Huang, Z Tang, X Zhang, L Ruan… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Perceptual image hashing is an effective and efficient way to identify images in large-scale databases, where two major performances are robustness and discrimination. A better …
X Liang, Z Tang, J Wu, Z Li… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Compression technology for representing image is on demand for efficiently processing images in the Big Data era. Image hashing is an effective compression technology for …
S Unar, Y Su, P Liu, L Teng, Y Wang, X Fu - Sensors, 2023 - mdpi.com
The current technological world is growing rapidly and each aspect of life is being transformed toward automation for human comfort and reliability. With autonomous vehicle …
M Sajjad, IU Haq, J Lloret, W Ding… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Due to large volume and high variability of editing tools, protecting multimedia contents, and ensuring their privacy and authenticity has become an increasingly important issue in cyber …
The rise of multimedia content has increased many folds in the last decade and is expanding exponentially. And with the growing medium of technology, transmission and …
H Xing, H Che, Q Wu, H Wang - Journal of Real-Time Image Processing, 2023 - Springer
Image perceptual hashing has been widely used in image content authentication. In order to extract hashing sequences that are more consistent with the subjective feeling of human's …