M Li, V Monga - IEEE transactions on image processing, 2012 - ieeexplore.ieee.org
The goal of video hashing is to design hash functions that summarize videos by short fingerprints or hashes. While traditional applications of video hashing lie in database …
Z Chen, J Lu, J Feng, J Zhou - IEEE Transactions on Circuits …, 2017 - ieeexplore.ieee.org
In this paper, we propose a nonlinear structural hashing approach to learn compact binary codes for scalable video search. Unlike most existing video hashing methods which …
F Khelifi, A Bouridane - … on Circuits and Systems for Video …, 2017 - ieeexplore.ieee.org
Perceptual hashing has been broadly used in the literature to identify similar contents for video copy detection. It has also been adopted to detect malicious manipulations for video …
Z Tang, X Zhang, X Li, S Zhang - IEEE transactions on …, 2015 - ieeexplore.ieee.org
Robustness and discrimination are two of the most important objectives in image hashing. We incorporate ring partition and invariant vector distance to image hashing algorithm for …
Recently, learning based hashing methods have become popular for indexing large-scale media data. Hashing methods map high-dimensional features to compact binary codes that …
JC Oostveen, T Kalker… - Applications of digital …, 2001 - spiedigitallibrary.org
This paper present the concept of robust video hashing as a tool for video identification. We present considerations and a technique for (i) extracting essential perceptual features from a …
Z Tang, X Zhang, L Huang, Y Dai - Signal Processing, 2013 - Elsevier
Image hashing is an emerging technology in multimedia security for applications such as image authentication, digital watermarking, and image copy detection. In this paper, we …
S Liu, Z Huang - ACM Transactions on Multimedia Computing …, 2019 - dl.acm.org
Hashing method is an efficient technique of multimedia security for content protection. It maps an image into a content-based compact code for denoting the image itself. While most …
M Sajjad, IU Haq, J Lloret, W Ding… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Due to large volume and high variability of editing tools, protecting multimedia contents, and ensuring their privacy and authenticity has become an increasingly important issue in cyber …