Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Perceptual hashing for image authentication: A survey
Perceptual hashing is used for multimedia content identification and authentication through
perception digests based on the understanding of multimedia content. This paper presents a …
perception digests based on the understanding of multimedia content. This paper presents a …
Robust image hashing with ring partition and invariant vector distance
Robustness and discrimination are two of the most important objectives in image hashing.
We incorporate ring partition and invariant vector distance to image hashing algorithm for …
We incorporate ring partition and invariant vector distance to image hashing algorithm for …
RETRACTED ARTICLE: A review of hashing based image authentication techniques
In the recent digitization era, image hashing is a key technology, including image
recognition, authentication and manipulation detection, among many multimedia security …
recognition, authentication and manipulation detection, among many multimedia security …
Perceptual image hashing for content authentication based on convolutional neural network with multiple constraints
In this paper, a novel perceptual image hashing scheme based on convolutional neural
network (CNN) with multiple constraints is proposed, in which our deep hashing network …
network (CNN) with multiple constraints is proposed, in which our deep hashing network …
Image encryption with double spiral scans and chaotic maps
Image encryption is a useful technique of image content protection. In this paper, we
propose a novel image encryption algorithm by jointly exploiting random overlap** block …
propose a novel image encryption algorithm by jointly exploiting random overlap** block …
Efficient hashing method using 2D-2D PCA for image copy detection
Image copy detection is an important technology of copyright protection. This paper
proposes an efficient hashing method for image copy detection using 2D-2D (two-directional …
proposes an efficient hashing method for image copy detection using 2D-2D (two-directional …
Fractal coding-based robust and alignment-free fingerprint image hashing
SM Abdullahi, H Wang, T Li - IEEE Transactions on Information …, 2020 - ieeexplore.ieee.org
Biometric image hashing techniques have been widely studied and seen progressive
advancements. However, only a handful of available solutions provide two-factor …
advancements. However, only a handful of available solutions provide two-factor …
Robust image hashing with multidimensional scaling
Multidimensional scaling (MDS) is an efficient technique for data analysis, and has been
successfully applied in data visualization, object retrieval, data clustering, and so on …
successfully applied in data visualization, object retrieval, data clustering, and so on …
Robust zero-watermarking algorithm based on polar complex exponential transform and logistic map**
C Wang, X Wang, X Chen, C Zhang - Multimedia Tools and Applications, 2017 - Springer
This paper introduces a new zero-watermarking algorithm based on polar complex
exponential transform (PCET) and logistic map**. This algorithm takes advantage of the …
exponential transform (PCET) and logistic map**. This algorithm takes advantage of the …
Unified performance evaluation method for perceptual image hashing
In recent decades, a large number of perceptual image hashing schemes have been
designed to secure the authenticity and integrity of digital images. However, the feasible …
designed to secure the authenticity and integrity of digital images. However, the feasible …