Otwarty dostęp

Image Copy Detection Based on Local Binary Pattern and SVM Classifier


Zacytuj

1. Qureshi, M. A., M. Deriche. A Bibliography of Pixel-Based Blind Image Forgery Detection. – Signal Processing: Image Communication, Vol. 39, 2015, pp. 46-74.10.1016/j.image.2015.08.008Search in Google Scholar

2. Liu, G., J. Wang, S. Lian, Z. Wang. A Passive Image Authentication Scheme for Detecting Region-Duplication Forgery with Rotation. – Journal of Network and Computer Applications, Vol. 34, 2011, pp. 1557-1565.10.1016/j.jnca.2010.09.001Search in Google Scholar

3. Qazi, T., K. Hayat, S. U. Khan, S. A. Madani, I. A. Khan, J. Kolodziej, H. Li, W. Lin, K. C. Yow, C. Z. Xu. Survey on Blind Image Forgery Detection. – IET Image Processing, Vol. 7, 2013, pp. 660-670.10.1049/iet-ipr.2012.0388Search in Google Scholar

4. Battiato, S., G. M. Farinella, E. Messina, G. Puglisi. Robust Image Alignment for Tampering Detection. – IEEE Transactions on Information Technology Forensics and Security, Vol. 7, 2012, pp. 1105-1117.10.1109/TIFS.2012.2194285Search in Google Scholar

5. Khelifi, F. Perceptual Image Hashing Based on Virtual Watermark Detection. – IEEE Transactions on Image Processing, Vol. 19, 2010, pp. 981-993.10.1109/TIP.2009.203863720007047Search in Google Scholar

6. Tang, Z., L. Chin, H. Yao, X. Zhang, C. Yu. Video Hashing with DCT and NMF. – The Computer Journal, 2019.10.1093/comjnl/bxz060Search in Google Scholar

7. Tang, Z., X. Zhang, X. Dai, J. Yang, T. Wu. Robust Image Hash Function Using Local Color Features. – International Journal of Electronics and Communications (AEU), Vol. 67, 2013, pp. 717-722.10.1016/j.aeue.2013.02.009Search in Google Scholar

8. Karsh, R. K., R. H., Laskar, andAditi. Robust Image Hashing through DWT-SVD and Spectral Residual Method. – EURASIP Journal on Image and Video Processing, Vol. 31, 2017, pp. 1-17.10.1186/s13640-017-0179-0Search in Google Scholar

9. Tang, Z., F. Yang, L. Huang, X. Zhang. Robust Image Hashing with Dominant DCT Coefficients. – Optik-International Journal for Light and Electron Optics, Vol. 125, 2014, pp. 5102-5107.10.1016/j.ijleo.2014.05.015Search in Google Scholar

10. Chen, C. C., Shang-LinHsieh. Using Binarization and Hashing for Efficient SIFT Matching. – Journal of Visual Communication and Image Representation, Vol. 30, 2015, pp. 86-93.10.1016/j.jvcir.2015.02.014Search in Google Scholar

11. Ouyang, J., G. Coatrieux, H. Shu. Robust Hashing for Image Authentication Using Quaternion Discrete Fourier Transform and Log-Polar Transform. – Digital Signal Processing, Vol. 41, 2015, pp. 98-109.10.1016/j.dsp.2015.03.006Search in Google Scholar

12. Liu, F., L. Cheng, H. Leung, Q. Fu. Wave Atom Transform Generated Strong Image Hashing Scheme. – Opt. Communication, Vol. 7, 2012, pp. 5008-5018.10.1016/j.optcom.2012.08.007Search in Google Scholar

13. Tang, Z., L. Huang, X. Zhang, H. Lao. Robust Image Hashing Based on Color Vector Angles and Canny Operator. – International Journal of Electronics and Communications (AEU), Vol. 70, 2016, pp. 833-841.10.1016/j.aeue.2016.03.010Search in Google Scholar

14. Tang, Z., Y. Dai, X. Zhang, L. Huang, FanYang. Robust Image Hashing via Colour Vector Angles and Discrete Wavelet Transform. – IET Image Processing, Vol. 8, 2014, pp. 142-149.10.1049/iet-ipr.2013.0332Search in Google Scholar

15. Karsh, R. K., R. H., Laskar, B. B. Richhariya. Robust Image Hashing Using Ring Partition-PGNMF and Local Features. – SpringerPlus, Vol. 5, 2016, pp. 1-20.10.1186/s40064-016-3639-6Search in Google Scholar

16. Chen, Y., W. Yu, J. Feng. Robust Image Hashing Using Invariants of Tchebichef Moments. – Optik, Vol. 125, 2014, pp. 5582-5587.10.1016/j.ijleo.2014.07.006Search in Google Scholar

17. Ojala, T., M. Pietikainen, D. Harwood. A Comparative Study of Texture Measures with Classification Based on Feature Distributions. – Pattern Recognition, Vol. 29, 1996.10.1016/0031-3203(95)00067-4Search in Google Scholar

18. Ryu, S-J, H-YLee, I-WCho, H-KLee. Document Forgery Detection with SVM Classifier and Image Quality Measures. – Advances in Multimedia Information Processing PCM 2008, Vol. 5353, 2008, pp. 486-495.10.1007/978-3-540-89796-5_50Search in Google Scholar

19. Tang, Z., M. Yu, H. Yao, H. Zang, C. Yu, X. Zhang. Robust Image Hashing with Singular Values of Quaternion SVD. – The Computer Journal, 2019.10.1093/comjnl/bxz127Search in Google Scholar

20. Tang, Z., S. Wang, X. Zhang, W. Wei, S. Su. Robust Image Hashing for Tamper Detection Using Non-Negative Matrix Factorization. – Journal of Ubiquitous Convergence and Technology, Vol. 2, 2008, pp. 18-26.Search in Google Scholar

21. Tang, Z., H. Zhang, C. M. Pun, M. Yu, C. Yu, Z. Xianquan. Robust Image Hashing with Visual Attention Model and Invariant Moments. – Mathematical Biosciences and Engineering, Vol. 16, 2019, Issue 5, pp. 6103-6120.10.3934/mbe.201930531499754Search in Google Scholar

22. Ou, Y., K. H. Rhee. A Key-Dependent Secure Image Hashing Scheme by Using Radon Transform. – In: Proc. of 2009 International Symposium on Intelligent Signal Processing and Communications Systems (ISPACS’09), 2009, pp. 595-598.10.1109/ISPACS.2009.5383770Search in Google Scholar

23. USC-SIPI Image Database (2007). http://sipi.usc.edu/database.Search in Google Scholar

24. 17 Category Flower Dataset. http://www.robots.ox.ac.uk/~vgg/data/flowers/17/Search in Google Scholar

eISSN:
1314-4081
Język:
Angielski
Częstotliwość wydawania:
4 razy w roku
Dziedziny czasopisma:
Computer Sciences, Information Technology