SAH Tabatabaei, O Ur-Rehman… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
A novel two-phase robust content-based image authentication scheme is introduced. The proposed scheme is constructed based on a combination of hard and soft authentication …
M Li, V Monga - IEEE transactions on information forensics and …, 2013 - ieeexplore.ieee.org
Much previous work in video fingerprinting has focused on robustness and security issues, but the compactness requirement, ie, the hash should be of a short length with acceptable …
In order to defend neural networks against malicious attacks, recent approaches propose the use of secret keys in the training or inference pipelines of learning systems. While this …
In this paper, we study adaptive evaluation techniques for querying XML-based electronic catalogs, and show, by means of experiments performed on real-world catalogs, that our …
D Hu, B Su, S Zheng, Z Zhang - 2013 Ninth International …, 2013 - ieeexplore.ieee.org
This paper proposes a new architecture for the secure application of robust perceptual hashing. Protocols based on architecture of four parties are designed to ensure that no party …
J Zhou, OC Au - 2011 IEEE International Conference on …, 2011 - ieeexplore.ieee.org
This paper evaluates the security of a recently proposed perceptual image hashing scheme based on virtual watermark detection. Under the known-hash attack where the attacker has …
J Shin, C Ruland - Robust Image Authentication in the Presence of Noise, 2015 - Springer
Due to the advances in wireless networking and mobile computing techniques, multimedia data are often distributed through unreliable wireless channels where packet losses or …
The discrete-binary conversion stage, which plays the role of converting quantized hash vectors into binary hash strings by encoding, is one of the most important parts of …