Z Tang, X Zhang, X Li, S Zhang - IEEE transactions on …, 2015 - ieeexplore.ieee.org
Robustness and discrimination are two of the most important objectives in image hashing. We incorporate ring partition and invariant vector distance to image hashing algorithm for …
L Du, ATS Ho, R Cong - Signal Processing: Image Communication, 2020 - Elsevier
Perceptual hashing is used for multimedia content identification and authentication through perception digests based on the understanding of multimedia content. This paper presents a …
C Qin, E Liu, G Feng, X Zhang - IEEE Transactions on Circuits …, 2020 - ieeexplore.ieee.org
In this paper, a novel perceptual image hashing scheme based on convolutional neural network (CNN) with multiple constraints is proposed, in which our deep hashing network …
Z Tang, Y Yang, S Xu, C Yu… - Security and …, 2019 - Wiley Online Library
Image encryption is a useful technique of image content protection. In this paper, we propose a novel image encryption algorithm by jointly exploiting random overlapping block …
X Liang, Z Tang, Z Huang, X Zhang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Image copy detection is an important technology of copyright protection. This paper proposes an efficient hashing method for image copy detection using 2D-2D (two-directional …
SM Abdullahi, H Wang, T Li - IEEE Transactions on Information …, 2020 - ieeexplore.ieee.org
Biometric image hashing techniques have been widely studied and seen progressive advancements. However, only a handful of available solutions provide two-factor …
Z Tang, Z Huang, X Zhang, H Lao - Signal processing, 2017 - Elsevier
Multidimensional scaling (MDS) is an efficient technique for data analysis, and has been successfully applied in data visualization, object retrieval, data clustering, and so on …
C Wang, X Wang, X Chen, C Zhang - Multimedia Tools and Applications, 2017 - Springer
This paper introduces a new zero-watermarking algorithm based on polar complex exponential transform (PCET) and logistic mapping. This algorithm takes advantage of the …
In recent decades, a large number of perceptual image hashing schemes have been designed to secure the authenticity and integrity of digital images. However, the feasible …