Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Data deduplication techniques for efficient cloud storage management: a systematic review
The exponential growth of digital data in cloud storage systems is a critical issue presently
as a large amount of duplicate data in the storage systems exerts an extra load on it …
as a large amount of duplicate data in the storage systems exerts an extra load on it …
Perceptual hashing for image authentication: A survey
Perceptual hashing is used for multimedia content identification and authentication through
perception digests based on the understanding of multimedia content. This paper presents a …
perception digests based on the understanding of multimedia content. This paper presents a …
Perceptual image hashing for content authentication based on convolutional neural network with multiple constraints
In this paper, a novel perceptual image hashing scheme based on convolutional neural
network (CNN) with multiple constraints is proposed, in which our deep hashing network …
network (CNN) with multiple constraints is proposed, in which our deep hashing network …
A secure and robust hash-based scheme for image authentication
F Ahmed, MY Siyal, VU Abbas - Signal Processing, 2010 - Elsevier
To authenticate an image using a hash function is a challenging task since several core
issues like tamper detection, security and robustness needs to be addressed. In this paper …
issues like tamper detection, security and robustness needs to be addressed. In this paper …
A visual model-based perceptual image hash for content authentication
X Wang, K Pang, X Zhou, Y Zhou… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Perceptual image hash has been widely investigated in an attempt to solve the problems of
image content authentication and content-based image retrieval. In this paper, we combine …
image content authentication and content-based image retrieval. In this paper, we combine …
Effective and efficient image copy detection with resistance to arbitrary rotation
For detecting the image copies of a given original image generated by arbitrary rotation, the
existing image copy detection methods can not simultaneously achieve desirable …
existing image copy detection methods can not simultaneously achieve desirable …
Robust image hash in Radon transform domain for authentication
Image authentication has become an emergency issue in the digital world as it can be easily
tampered with the image editing techniques. In this paper, a novel robust hashing method …
tampered with the image editing techniques. In this paper, a novel robust hashing method …
A novel image hashing scheme with perceptual robustness using block truncation coding
In this paper, we propose a novel perceptual image hashing scheme based on block
truncation coding (BTC). In the proposed scheme, the pre-processing is first applied on …
truncation coding (BTC). In the proposed scheme, the pre-processing is first applied on …
Perceptual hashing for color images based on hybrid extraction of structural features
In this paper, a novel perceptual hashing scheme for color images is proposed with the
hybrid feature extraction mechanism. During the stage of pre-processing, image …
hybrid feature extraction mechanism. During the stage of pre-processing, image …
Histogram-based image hashing scheme robust against geometric deformations
S **ang, HJ Kim, J Huang - Proceedings of the 9th Workshop on …, 2007 - dl.acm.org
In this paper, we propose a robust image hash algorithm by using the invariance of the
image histogram shape to geometric deformations. Robustness and uniqueness of the …
image histogram shape to geometric deformations. Robustness and uniqueness of the …