Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A secured distributed detection system based on IPFS and blockchain for industrial image and video data security
Copyright infringement adversely affects the interest of copyright holders of images and
videos which are uploaded to different websites and peer-to-peer image sharing systems …
videos which are uploaded to different websites and peer-to-peer image sharing systems …
Perceptual hashing for image authentication: A survey
Perceptual hashing is used for multimedia content identification and authentication through
perception digests based on the understanding of multimedia content. This paper presents a …
perception digests based on the understanding of multimedia content. This paper presents a …
RETRACTED ARTICLE: A review of hashing based image authentication techniques
In the recent digitization era, image hashing is a key technology, including image
recognition, authentication and manipulation detection, among many multimedia security …
recognition, authentication and manipulation detection, among many multimedia security …
Robust image hashing with tensor decomposition
Z Tang, L Chen, X Zhang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
This paper presents a new image hashing that is designed with tensor decomposition (TD),
referred to as TD hashing, where image hash generation is viewed as deriving a compact …
referred to as TD hashing, where image hash generation is viewed as deriving a compact …
An efficient coding scheme for reversible data hiding in encrypted image with redundancy transfer
Recently, reversible data hiding in encrypted image (RDHEI) has attracted extensive
attention, which can be used in secure cloud computing and privacy protection effectively. In …
attention, which can be used in secure cloud computing and privacy protection effectively. In …
Perceptual image hashing for content authentication based on convolutional neural network with multiple constraints
In this paper, a novel perceptual image hashing scheme based on convolutional neural
network (CNN) with multiple constraints is proposed, in which our deep hashing network …
network (CNN) with multiple constraints is proposed, in which our deep hashing network …
Efficient hashing method using 2D-2D PCA for image copy detection
Image copy detection is an important technology of copyright protection. This paper
proposes an efficient hashing method for image copy detection using 2D-2D (two-directional …
proposes an efficient hashing method for image copy detection using 2D-2D (two-directional …
Fractal coding-based robust and alignment-free fingerprint image hashing
SM Abdullahi, H Wang, T Li - IEEE Transactions on Information …, 2020 - ieeexplore.ieee.org
Biometric image hashing techniques have been widely studied and seen progressive
advancements. However, only a handful of available solutions provide two-factor …
advancements. However, only a handful of available solutions provide two-factor …
Reversible data hiding in encrypted image with separable capability and high embedding capacity
C Qin, Z He, X Luo, J Dong - Information Sciences, 2018 - Elsevier
In this paper, a high-capacity reversible data hiding scheme in encrypted image with
separable capability is proposed. In order to mask image contents, original image is first …
separable capability is proposed. In order to mask image contents, original image is first …
Unified performance evaluation method for perceptual image hashing
In recent decades, a large number of perceptual image hashing schemes have been
designed to secure the authenticity and integrity of digital images. However, the feasible …
designed to secure the authenticity and integrity of digital images. However, the feasible …