[1. Lian, S., D. Kanellopoulos. Recent Advances in Multimedia Information Systems Security. – Informatica – An International Journal of Computing and Informatics, Vol. 33, 2009, pp. 3-24.]Search in Google Scholar
[2. Qureshi, M. A., M. Deriche. A Bibliography of Pixel-Based Blind Image Forgery Detection. – Signal Processing: Image Communication, Vol. 39, 2015, No A, pp. 46-74.10.1016/j.image.2015.08.008]Search in Google Scholar
[3. Liu, G., J. Wang, S. Lian, Z. Wang. A Passive Image Authentication Scheme for Detecting Region-Duplication Forgery with Rotation. – Journal of Network and Computer Applications, Vol. 34, 2011, No 5, pp. 1557-1565.10.1016/j.jnca.2010.09.001]Search in Google Scholar
[4. Qazi, T., K. Hayat, S. U. Khan, S. A. Madani, I. A. Khan, J. Kolodziej, H. Li, W. Lin, K. C. Yow, C. Z. Xu. Survey on Blind Image Forgery Detection. – IET Image Processing, Vol. 7, 2013, No 7, pp. 660-670.10.1049/iet-ipr.2012.0388]Search in Google Scholar
[5. Kang, X., S. Wei. An Efficient Approach to Still Image Copy Detection Based on SVD and Block Partition for Digital Forensics. – In: IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS), 2009, pp. 457-461.10.1109/ICICISYS.2009.5358149]Search in Google Scholar
[6. Battiato, S., G. M. Farinella, E. Messina, G. Puglisi. Robust Image Alignment for Tampering Detection. – IEEE Transactions on Information Technology Forensics and Security, Vol. 7, 2012, No 4, pp. 1105-1117.10.1109/TIFS.2012.2194285]Search in Google Scholar
[7. Redi, J. A., W. Taktak, J. A. Dugelay. Digital Image Forensics: A Booklet for Beginners. – Multimedia Tools and Applications, Vol. 51, 2011, No 1, pp. 133-162.10.1007/s11042-010-0620-1]Search in Google Scholar
[8. Han, B., J. Li. A New Zero-Watermarking Algorithm Resisting Attacks Based on Differences Hashing. – Cybernetics and Information Technologies, Vol. 16, No 2, 2016, pp. 135-147.10.1515/cait-2016-0026]Search in Google Scholar
[9. Wu, M. N., C. C. Lin, C. C. Chang. Novel Image Copy Detection with Rotating Tolerance. – Journal of Systems and Software, Vol. 80, 2007, No 7, pp. 1057-1069.10.1016/j.jss.2006.12.001]Search in Google Scholar
[10. Chang, E., J. Z. Wang, C. Li, G. Wiederhold. RIME: A Replicated Image Detector for the World-Wide Web. – In: Proc. in SPIE Multimedia Storage and Archiving Systems III, Vol. 3527, 1998.10.1117/12.325852]Search in Google Scholar
[11. Hsiao, J. H., C. S. Chen, L. F. Chien, M. S. Chen. A New Approach to Image Copy Detection Based on Extended Feature Sets. – IEEE Transactions on Image Processing, Vol. 16, 2007, No 8, pp. 2069-2079.10.1109/TIP.2007.90009917688212]Search in Google Scholar
[12. Szucs, G., D. Papp. Content-Based Image Retrieval for Multiple Objects Search. – Cybernetics and Information Technologies, Vol. 17, 2017, No 2, pp. 106-118.10.1515/cait-2017-0020]Search in Google Scholar
[13. Nassih, B., M. Ngadi, A. Amine, A. El-Attar. New Proposed Fusion between DCT for Feature Extraction and NSVC for Face Classification. – Cybernetics and Information Technologies, Vol. 18, 2018, No 2, pp. 89-97.10.2478/cait-2018-0030]Search in Google Scholar
[14. Arnia, F., Agustinus, K. Munandi, M. Fujiyoshi, H. Kiya. Content-Based Image Copy Detection Based on Sign of Wavelet Coefficients. – In: International Workshop on Advanced Image Technology, 2011.]Search in Google Scholar
[15. Wang, Y. G., Y. Lei, J. Huang. An Image Copy Detection Scheme Based on Radon Transform. – In: IEEE 17th International Conference on Image Processing, 2010, pp. 1009-1012.10.1109/ICIP.2010.5653456]Search in Google Scholar
[16. Kim, C. Content-Based Image Copy Detection. – Signal Processing: Image Communication, Vol. 18, 2003, No 3, pp. 169-184.10.1016/S0923-5965(02)00130-3]Search in Google Scholar
[17. Sebe, N., Y. Liu, Y. Zhuang, T. Huang, S. F. Chang. Blind Passive Media Forensics: Motivation and Opportunity. – In: International Conference on Multimedia Content Analysis and Mining, Vol. 4577, 2007, pp. 57-59.]Search in Google Scholar
[18. Tang, Z., F. Yang, L. Huang, X. Zhang. Robust Image Hashing with Dominant DCT Coefficients. – Optik, Vol. 125, 2014, No 18, pp. 5102-5107.10.1016/j.ijleo.2014.05.015]Search in Google Scholar
[19. Tang, Z., X. Zhang, X. Dai, J. Yang, T. Wu. Robust Image Hash Function Using Local Color Features. – International Journal of Electronics and Communications (AEU), Vol. 67, 2013, No 8, pp. 717-722.10.1016/j.aeue.2013.02.009]Search in Google Scholar
[20. Ouyang, J., G. Coatrieux, H. Shu. Robust Hashing or Image Authentication Using Quaternion Discrete Fourier Transform and Log-Polar Transform. – Digital Signal Processing, Vol. 41, 2015, pp. 98-109.10.1016/j.dsp.2015.03.006]Search in Google Scholar
[21. Tang, Z., Y. Dai, X. Zhang, L. Huang, F. Yang. Robust Image Hashing via Colour Vector Angles and Discrete Wavelet Transform. – IET Image Processing, Vol. 8, 2014, No 3, pp. 142-149.10.1049/iet-ipr.2013.0332]Search in Google Scholar
[22. Tang, Z., L. Ruan, C. Qin, X. Zhang, C. Yu. Robust Image Hashing with Embedding Vector Variance of LLE. – Digital Signal Processing, Vol. 43, 2015, pp. 17-27.10.1016/j.dsp.2015.05.002]Search in Google Scholar
[23. Lei, Y., Y. Wang, J. Huang. Robust Image Hash in Radon Transform Domain for Authentication. – Signal Processing: Image Communication, Vol. 26, 2011, No 6, pp. 280-288.10.1016/j.image.2011.04.007]Search in Google Scholar
[24. Tang, Z., X. Zhang, X. Li, S. Zhang. Robust Image Hashing with Ring Partition and Invariant Vector Distance. – IEEE Transactions on Information Forensics and Security, Vol. 11, 2016, No 1, pp. 200-214.10.1109/TIFS.2015.2485163]Search in Google Scholar
[25. Tang, Z., Z. Y. Dai, X. Zhang. Perceptual Hashing for Color Images Using Invariant Moments. – Applied Mathematics and Information Sciences, Vol. 6, 2012, No 2S, pp. 643S-650S.]Search in Google Scholar
[26. Al-Qershi, O. M., B. E. Khoo. Passive Detection of Copy-Move Forgery in Digital Images: State-of-the-art. – Forensic Science International, Vol. 231, 2013, No 1-3, pp. 284-295.10.1016/j.forsciint.2013.05.02723890651]Search in Google Scholar
[27. Kailasanathan, C., R. S. Naini, P. Ogunbona. Compression Tolerant DCT Based Image Hash. – In: Proc. of 23rd International Conference Distributed Computing Systems Workshop, 2003, pp. 562-567.]Search in Google Scholar
[28. Roover, C. D., C. D. Vleeschouwer, F. Lefebvre, B. Macq. Robust Video Hashing Based on Radial Projections of Keyframes. – IEEE Transactions on Signal Processing, Vol. 53, 2005, No 10, pp. 4020-4037.10.1109/TSP.2005.855414]Search in Google Scholar
[29. Tang, Z., S. Wan, X. Zhang. Lexicographical Framework for Image Hashing with Implementation Based on DCT and NMF. – Multimedia Tools and Applications, Vol. 52, 2010, No 2-3, pp. 325-345.10.1007/s11042-009-0437-y]Search in Google Scholar
[30. Yu, Y., S. Sun. Image Robust Hashing Based on DCT Sign. – In: Proc. of 2006 International Conference Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP’06), 2006.10.1109/IIH-MSP.2006.264971]Search in Google Scholar
[31. Qin, C., C. Chang. Robust Image Hashing Using Non-Uniform Sampling in Discrete Fourier Domain. – Digital Signal Processing, Vol. 23, 2013, No 2, pp. 578-585.10.1016/j.dsp.2012.11.002]Search in Google Scholar
[32. Swaminathan, A. Robust and Secure Image Hashing. – IEEE Transactions on Information Forensics and Security, Vol. 1, 2006, No 2, pp. 215-230.10.1109/TIFS.2006.873601]Search in Google Scholar
[33. Swaminathan, A., Y. Mao, M. Wu. Image Hashing Resilient to Geometric and Filtering Operations. – In: IEEE 6th Workshop on Multimedia Signal Processing, 2004, pp. 355-358.]Search in Google Scholar
[34. Ahmed, F., M. Y. Siyal, V. U. Abbas. A Secure and Robust Hash-Based Scheme for Image Authentication. – Signal Processing, Vol. 90, 2010, No 5, pp. 1456-1470.10.1016/j.sigpro.2009.05.024]Search in Google Scholar
[35. Lu, C. S., C. Y. Hsu. Geometric Distortion Resilient Image Hashing Scheme and Its Applications on Copy Detection and Authentication. – Multimedia Systems, Vol. 11, 2005, No 2, pp. 159-173.10.1007/s00530-005-0199-y]Search in Google Scholar
[36. Lu, C. S., C. Y. Hsu, S. W. Sun, P. C. Chang. Robust Mesh-Based Hashing for Copy Detection and Tracing of Images. – In: IEEE International Conference on Multimedia and Expo (ICME), 2004, pp. 731-734.]Search in Google Scholar
[37. Meixner, A., A. Uhl. Robustness and Security of a Wavelet-Based CBIR Hashing Algorithm. – In: Proc. of 8th Workshop on Multimedia and Security, 2006, pp. 140-145.10.1145/1161366.1161392]Search in Google Scholar
[38. Michak, M. K., R. Venkatesan. New Iterative Geometric Methods for Robust Perceptual Image Hashing. – ACM Workshop: Security and Privacy on Digital Rights Management DRM, 2001, pp. 13-21.10.1007/3-540-47870-1_2]Search in Google Scholar
[39. Monga, V., B. L. Evans. Perceptual Image Hashing via Feature Points: Performance Evaluation and Tradeoffs. – IEEE Transactions on Image Processing, Vol. 15, 2006, No 11, pp. 3453-3466.10.1109/TIP.2006.881948]Search in Google Scholar
[40. Venkatesan, R., S. M. Koon, M. H. Jakubowski, P. Moulin. Robust Image Hashing. – In: International Conference on Image Processing, 2000, pp. 664-666.]Search in Google Scholar
[41. Yang, S. H., C. F. Chen. Robust Image Hashing Based on SPIHT. – In: Proc. of IEEE International Conference Information Technology: Research & Education (IIH-MSP’06), 2006, pp. 110-114.]Search in Google Scholar
[42. Karsh, R. K., R. H. Laskar, Aditi. Robust Image Hashing through DWT-SVD and Spectral Residual Method. – EURASIP Journal on Image and Video Processing, Vol. 2017, 2017, No 31, pp. 1-17.10.1186/s13640-017-0179-0]Search in Google Scholar
[43. Lefebvre, F., J. Cryz, B. Macq. A Robust Soft Hash Algorithm for Digital Image Signature. – In: Proc. of IEEE International Conference Image Processing, 2003, pp. 495-498.]Search in Google Scholar
[44. Lefebvre, F., B. Macq, J. D. Legat. RASH: RAdon Soft Hash Algorithm. – In: 11th European Signal Processing Conference, 2002, pp. 1-4.]Search in Google Scholar
[45. Malkin, M. R. Venkatesan. The Randlet Transform: Applications to Universal Perceptual Hashing and Image Authentication. – In: Proc. of Allerton Conference, 2004.]Search in Google Scholar
[46. Seo, J. S., J. Haitsma, T. Kalker, C. D. Yoo. A Robust Image Fingerprinting System Using the Radon Transform. – Signal Processing: Image Communication, Vol. 19, 2006, No 4, pp. 325-339.10.1016/j.image.2003.12.001]Search in Google Scholar
[47. Wu, D., X. Zhou, X. Niu. A Novel Image Hash Algorithm Resistant to Print-Scan. – Signal Processing, Vol. 89, 2009, No 12, pp. 2415-2424.10.1016/j.sigpro.2009.05.016]Search in Google Scholar
[48. Chen, C. C., S. L. Hsieh. Using Binarization and Hashing for Efficient SIFT Matching. – Journal of Visual Communication & Image Representation, Vol. 30, 2015, pp. 86-93.10.1016/j.jvcir.2015.02.014]Search in Google Scholar
[49. Ling, H., L. Yan, F. Zou, C. Liu, H. Feng. Fast Image Copy Detection Approach Based on Local Fingerprint Defined Visual Words. – Signal Processing, Vol. 93, 2013, No 8, pp. 2328-2338.10.1016/j.sigpro.2012.08.011]Search in Google Scholar
[50. Lv, X., Z. J. Wang. Perceptual Image Hashing Based on Shape Contexts and Local Feature Points. – IEEE Transactions on Information Forensics and Security, Vol. 7, 2012, No 3, pp. 1081-1093.10.1109/TIFS.2012.2190594]Search in Google Scholar
[51. Li, Y., Z. Lu, C. Zhu, X. Niu. Robust Image Hashing Based on Random Gabor Filtering and Dithered Lattice Vector Quantization. – IEEE Transactions on Image Processing, Vol. 21, 2012, No 4, pp. 1963-1980.10.1109/TIP.2011.217169821997268]Search in Google Scholar
[52. Liu, F., L. Cheng, H. Leung, Q. Fu. Wave Atom Transform Generated Strong Image Hashing Scheme. – Optical Communications, Vol. 285, 2012, No 24, pp. 5008-5018.10.1016/j.optcom.2012.08.007]Search in Google Scholar
[53. Liu, Y. L., Y. Xiao. A Robust Image Hashing Algorithm Resistant against Geometrical Attacks. – Radio Engineering, Vol. 22, 2013, No 4, pp. 1072-1081.]Search in Google Scholar
[54. Wang, L., X. Jiang, D. Hu, D. Ye, S. Lian. Robust Perceptual Image Hash Using Gabor Filters. – In: International Conference on Multimedia Information Networking and Security, 2009, pp. 53-56.10.1109/MINES.2009.138]Search in Google Scholar
[55. Yang, B., F. Gu, X. Niu. Block Mean Value Based Image Perceptual Hashing. – In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2006, pp. 167-172.10.1109/IIH-MSP.2006.265125]Search in Google Scholar
[56. Hernandez, R. A. P., B. M. Kurkoski. Robust Image Hashing Using Image Normalization and SVD Decomposition. – In: IEEE 54th International Midwest Symposium on Circuits and Systems (MWSCAS), 2011, pp. 1-4.10.1109/MWSCAS.2011.6026372]Search in Google Scholar
[57. Kozat, S. S., R. Venkatesan, M. K. Michak. Robust Perceptual Image Hashing via Matrix Invariants. – IEEE International Conference on Image Processing (ICIP), 2004, pp. 3443-3446.]Search in Google Scholar
[58. Lv, X., Z. J. Wang. An Extended Image Hashing Concept: Content-Based Fingerprinting Using FJLT. – EURASIP Journal on Information Security, 2009, pp. 1-17.10.1186/1687-417X-2009-859859]Search in Google Scholar
[59. Monga, V., M. K. Michak. Robust and Secure Image Hashing via Non-Negative Matrix Factorizations. – IEEE Transactions on Information Forensics and Security, Vol. 2, 2007, No 3, pp. 376-390.10.1109/TIFS.2007.902670]Search in Google Scholar
[60. Tang, Z., S. Wang, X. Zhang, W. Wei, S. Su. Robust Image Hashing for Tamper Detection Using Non-Negative Matrix Factorization. – Journal of Ubiquitous Convergence and Technology, Vol. 2, 2008, No 1, pp. 18-26.]Search in Google Scholar
[61. Karsh, R. K., R. H., Laskar, B. B. Richhariya. Robust Image Hashing Using Ring Partition-PGNMF and Local Features. – SpringerPlus, Vol. 5, 2016, No 1, pp. 1-20.10.1186/s40064-016-3639-6511838127933251]Search in Google Scholar
[62. Monga, V., B. L. Evans. Robust Perceptual Image Hashing Using Feature Points. – In: IEEE International Conference on Image Processing, 2004, pp. 677-680.]Search in Google Scholar
[63. Roy, S., Q. Su. Robust Hashfor Detecting and Localizing Image Tampering. – In: IEEE International Conference on Image Processing, 2007, pp. 117-120.10.1109/ICIP.2007.4379535]Search in Google Scholar
[64. Tang, Z., S. Wang, X. Zhang, W. Wei. Structural Feature-Based Image Hashing and Similarity Metric for Tampering Detection. – Fundamenta Informaticae, Vol. 106, 2011, No 1, pp. 75-91.10.3233/FI-2011-377]Search in Google Scholar
[65. Xiaofeng, W., P. Kemu, Z. Xiaorui, Z. Wang, L. Lu, X. Jianru. A Visual Model Based Perceptual Image Hash for Content Authentication. – IEEE Transactions on Information Forensics Security, Vol. 10, 2015, No 7, pp. 1336-1349.10.1109/TIFS.2015.2407698]Search in Google Scholar
[66. Chen, Y., W. Yu, J. Feng. Robust Image Hashing Using Invariants of Tchebichef Moments. – Optik, Vol. 125, 2014, No 19, pp. 5582-5587.10.1016/j.ijleo.2014.07.006]Search in Google Scholar
[67. Zhao, Y., S. Wang, X. Zhang, H. Yao. Robust Hashing for Image Authentication Using Zernike Moments and Local Features. – IEEE Transactions on Information Forensics and Security, Vol. 8, 2013, No 1, pp. 55-63.10.1109/TIFS.2012.2223680]Search in Google Scholar
[68. Zhao, Y., W. Wei. Perceptual Image Hash for Tampering Detection Using Zernike Moments. – In: Proc. of IEEE International Conference on Progress in Informatics and Computing, 2010, pp. 738-742.]Search in Google Scholar
[69. Tang, Z., L. Huang, Y. Dai, F. Yang. Robust Image Hashing Based on Multiple Histograms. – International Journal of Digital Content Technology and its Applications (JDCTA), Vol. 6, 2013, No 23, pp. 39-47.10.4156/jdcta.vol6.issue23.5]Search in Google Scholar
[70. Tang, Z., X. Zhang, L. Huang, Y. Dai. Robust Image Hashing Using Ring-Based Entropies. – Signal Processing, Vol. 93, 2013, No 7, pp. 2061-2069.10.1016/j.sigpro.2013.01.008]Search in Google Scholar
[71. Tang, Z., X. Zhang, S. Zhang. Robust Perceptual Image Hashing Based on Ring Partition and NMF. – IEEE Transactions on Knowledge and Data Engineering, Vol. 26, 2014, No 3, pp. 711-724.10.1109/TKDE.2013.45]Search in Google Scholar
[72. Gerold, L., U. Andreas. Key-Dependent JPEG2000 Based Robust Hashing for Secure Image Authentication. – EURASIP Journal on Information Technology, Vol. 8, 2008, No 1, pp. 1-19.10.1155/2008/895174]Search in Google Scholar
[73. Hadmi, A., W. Puech, B. A. Es Said, A. A. Ouahman. A Robust and Secure Perceptual Hashing System Based on Quantization Step Analysis. – Signal Processing: Image Communications, Vol. 28, 2013, No 8, pp. 929-948.10.1016/j.image.2012.11.009]Search in Google Scholar
[74. Johnson, M., K. Ramchandran. Dither Based Secure Image Hashing Using Distributed Coding. – In: Proceedings of IEEE International Conference Image Processing, 2003, pp. 751-754.]Search in Google Scholar
[75. Kang, L., C. Lu, C. Hsu. Compressive Sensing Based Image Hashing. – In: Proc. of IEEE International Conference on Image Processing, 2009, pp. 1285-1288.10.1109/ICIP.2009.5413606]Search in Google Scholar
[76. Khelifi, F., J. Jiang. Perceptual Image Hashing Based on Virtual Watermark Detection. – IEEE Transactions on Image Processing, Vol. 19, 2010, No 4, pp. 981-994.10.1109/TIP.2009.203863720007047]Search in Google Scholar
[77. Lv, X., Z. J. Wang. Compressed Binary Image Hashes Based on Semisupervised Spectral Embedding. – IEEE Transactions on Information Forensics and Security, Vol. 8, 2013, No 11, pp. 1838-1849.10.1109/TIFS.2013.2281219]Search in Google Scholar
[78. Skrepth, C. J., A. Uhl. Robust Hash Functions for Visual Data: An Experiment Comparison. – Pattern Recognition and Image Analysis, Vol. 2652, 2003, pp. 986-993.10.1007/978-3-540-44871-6_114]Search in Google Scholar
[79. Sun, R., X. Yan, Z. Ding. Robust Image Hashing Using Locally Linear Embedding. – In: International Conference on Computer Science and Service System, 2011, pp. 715-718.]Search in Google Scholar
[80. Xiang, S., H. J. Kim, J. Huang. Histogram-Based Image Hashing Scheme Robust against Geometric Deformations. – In: Proc. of 9th Workshop on Multimedia & Security, 2007, pp. 121-128.10.1145/1288869.1288886]Search in Google Scholar
[81. Zou, F., H. Feng, H. Ling, C. Liu, L. Yan, P. Li, D. Li. Nonnegative Sparse Coding Induced Hashing for Image Copy Detection. – Neurocomputing, Vol. 105, 2013, pp. 81-89.10.1016/j.neucom.2012.06.042]Search in Google Scholar
[82. Tang, Z., L. Huang, X. Zhang, H. Lao. Robust Image Hashing Based on Color Vector Angles and Canny Operator. – International Journal of Electronics and Communications(AEU), Vol. 70, 2016, No 6, pp. 833-841.10.1016/j.aeue.2016.03.010]Search in Google Scholar
[83. Fridrich, J., M. Goljan. Robust Hash Functions for Digital Watermarking. – In: Proc. on IEEE International Conference on Information Technology: Coding and Computing, 2000, pp. 178-183.]Search in Google Scholar
[84. Guo, X. C., D. Hatzinakos. Content-Based Image Hashing via Wavelet and Radon Transform. – In: Advances in Multimedia Information Processing – PCM 2007, LNCS, 4810, 2007, pp. 755-764.10.1007/978-3-540-77255-2_91]Search in Google Scholar
[85. Laraji, I. H., L. Ghouti, E. H. Khiari. Perceptual Hashing of Color Images Using Hyper Complex Representation. – In: Proc. of the IEEE International Conference on Image Processing (ICIP’13), 2013, pp. 4402-4406.10.1109/ICIP.2013.6738907]Search in Google Scholar
[86. Michak, M. K., R. Venkatesan. A Perceptual Audio Hashing Algorithm: A Tool for Robust Audio Identification and Information Hiding. – In: Proc. of 4th International Workshop on Information Hiding, Springer-Verlag, 2001, pp. 51-65.10.1007/3-540-45496-9_5]Search in Google Scholar
[87. Monga, V., D. Vats, B. L Evans. Image Authentication under Geometric Attacks via Structure Matching. –In: IEEE International Conference Multimedia and Expo, 2005.]Search in Google Scholar
[88. Ou, Y., K. H. Rhee. A Key-Dependent Secure Image Hashing Scheme by Using Radon Transform. – 2009 International Symposium on Intelligent Signal Processing and Communications Systems (ISPACS), 2009, pp. 595-598.10.1109/ISPACS.2009.5383770]Search in Google Scholar
[89. Rey, C., J. L. Dugelay. A Survey of Watermarking Algorithms for Image Authentication. – EURASIP Journal on Applied Signal Processing, Vol. 1, 2002, pp. 613-621.10.1155/S1110865702204047]Search in Google Scholar
[90. Sun, Q., S. F. Chang. A Robust and Secure Media Signature Scheme for JPEG Images. – Journal of VLSI Signal Processing Systems for Signal, Image and Video Technology, Vol. 41, 2005, No 3, pp. 305-317.10.1007/s11265-005-4154-0]Search in Google Scholar
[91. Tang, Z., Y. Dai, X. Zhang, S. Zhang. Perceptual Image Hashing with Histogram of Color Vector Angles. – In: 8th International Conference on Active Media Technology(AMT’12), 2012, pp. 237-246.10.1007/978-3-642-35236-2_24]Search in Google Scholar