[1. Qureshi, M. A., M. Deriche. A Bibliography of Pixel-Based Blind Image Forgery Detection. – Signal Processing: Image Communication, Vol. 39, 2015, pp. 46-74.10.1016/j.image.2015.08.008]Search in Google Scholar
[2. Liu, G., J. Wang, S. Lian, Z. Wang. A Passive Image Authentication Scheme for Detecting Region-Duplication Forgery with Rotation. – Journal of Network and Computer Applications, Vol. 34, 2011, pp. 1557-1565.10.1016/j.jnca.2010.09.001]Search in Google Scholar
[3. Qazi, T., K. Hayat, S. U. Khan, S. A. Madani, I. A. Khan, J. Kolodziej, H. Li, W. Lin, K. C. Yow, C. Z. Xu. Survey on Blind Image Forgery Detection. – IET Image Processing, Vol. 7, 2013, pp. 660-670.10.1049/iet-ipr.2012.0388]Search in Google Scholar
[4. Battiato, S., G. M. Farinella, E. Messina, G. Puglisi. Robust Image Alignment for Tampering Detection. – IEEE Transactions on Information Technology Forensics and Security, Vol. 7, 2012, pp. 1105-1117.10.1109/TIFS.2012.2194285]Search in Google Scholar
[5. Khelifi, F. Perceptual Image Hashing Based on Virtual Watermark Detection. – IEEE Transactions on Image Processing, Vol. 19, 2010, pp. 981-993.10.1109/TIP.2009.203863720007047]Search in Google Scholar
[6. Tang, Z., L. Chin, H. Yao, X. Zhang, C. Yu. Video Hashing with DCT and NMF. – The Computer Journal, 2019.10.1093/comjnl/bxz060]Search in Google Scholar
[7. Tang, Z., X. Zhang, X. Dai, J. Yang, T. Wu. Robust Image Hash Function Using Local Color Features. – International Journal of Electronics and Communications (AEU), Vol. 67, 2013, pp. 717-722.10.1016/j.aeue.2013.02.009]Search in Google Scholar
[8. Karsh, R. K., R. H., Laskar, andAditi. Robust Image Hashing through DWT-SVD and Spectral Residual Method. – EURASIP Journal on Image and Video Processing, Vol. 31, 2017, pp. 1-17.10.1186/s13640-017-0179-0]Search in Google Scholar
[9. Tang, Z., F. Yang, L. Huang, X. Zhang. Robust Image Hashing with Dominant DCT Coefficients. – Optik-International Journal for Light and Electron Optics, Vol. 125, 2014, pp. 5102-5107.10.1016/j.ijleo.2014.05.015]Search in Google Scholar
[10. Chen, C. C., Shang-LinHsieh. Using Binarization and Hashing for Efficient SIFT Matching. – Journal of Visual Communication and Image Representation, Vol. 30, 2015, pp. 86-93.10.1016/j.jvcir.2015.02.014]Search in Google Scholar
[11. Ouyang, J., G. Coatrieux, H. Shu. Robust Hashing for Image Authentication Using Quaternion Discrete Fourier Transform and Log-Polar Transform. – Digital Signal Processing, Vol. 41, 2015, pp. 98-109.10.1016/j.dsp.2015.03.006]Search in Google Scholar
[12. Liu, F., L. Cheng, H. Leung, Q. Fu. Wave Atom Transform Generated Strong Image Hashing Scheme. – Opt. Communication, Vol. 7, 2012, pp. 5008-5018.10.1016/j.optcom.2012.08.007]Search in Google Scholar
[13. Tang, Z., L. Huang, X. Zhang, H. Lao. Robust Image Hashing Based on Color Vector Angles and Canny Operator. – International Journal of Electronics and Communications (AEU), Vol. 70, 2016, pp. 833-841.10.1016/j.aeue.2016.03.010]Search in Google Scholar
[14. Tang, Z., Y. Dai, X. Zhang, L. Huang, FanYang. Robust Image Hashing via Colour Vector Angles and Discrete Wavelet Transform. – IET Image Processing, Vol. 8, 2014, pp. 142-149.10.1049/iet-ipr.2013.0332]Search in Google Scholar
[15. Karsh, R. K., R. H., Laskar, B. B. Richhariya. Robust Image Hashing Using Ring Partition-PGNMF and Local Features. – SpringerPlus, Vol. 5, 2016, pp. 1-20.10.1186/s40064-016-3639-6]Search in Google Scholar
[16. Chen, Y., W. Yu, J. Feng. Robust Image Hashing Using Invariants of Tchebichef Moments. – Optik, Vol. 125, 2014, pp. 5582-5587.10.1016/j.ijleo.2014.07.006]Search in Google Scholar
[17. Ojala, T., M. Pietikainen, D. Harwood. A Comparative Study of Texture Measures with Classification Based on Feature Distributions. – Pattern Recognition, Vol. 29, 1996.10.1016/0031-3203(95)00067-4]Search in Google Scholar
[18. Ryu, S-J, H-YLee, I-WCho, H-KLee. Document Forgery Detection with SVM Classifier and Image Quality Measures. – Advances in Multimedia Information Processing PCM 2008, Vol. 5353, 2008, pp. 486-495.10.1007/978-3-540-89796-5_50]Search in Google Scholar
[19. Tang, Z., M. Yu, H. Yao, H. Zang, C. Yu, X. Zhang. Robust Image Hashing with Singular Values of Quaternion SVD. – The Computer Journal, 2019.10.1093/comjnl/bxz127]Search in Google Scholar
[20. Tang, Z., S. Wang, X. Zhang, W. Wei, S. Su. Robust Image Hashing for Tamper Detection Using Non-Negative Matrix Factorization. – Journal of Ubiquitous Convergence and Technology, Vol. 2, 2008, pp. 18-26.]Search in Google Scholar
[21. Tang, Z., H. Zhang, C. M. Pun, M. Yu, C. Yu, Z. Xianquan. Robust Image Hashing with Visual Attention Model and Invariant Moments. – Mathematical Biosciences and Engineering, Vol. 16, 2019, Issue 5, pp. 6103-6120.10.3934/mbe.201930531499754]Search in Google Scholar
[22. Ou, Y., K. H. Rhee. A Key-Dependent Secure Image Hashing Scheme by Using Radon Transform. – In: Proc. of 2009 International Symposium on Intelligent Signal Processing and Communications Systems (ISPACS’09), 2009, pp. 595-598.10.1109/ISPACS.2009.5383770]Search in Google Scholar
[23. USC-SIPI Image Database (2007). http://sipi.usc.edu/database.]Search in Google Scholar
[24. 17 Category Flower Dataset. http://www.robots.ox.ac.uk/~vgg/data/flowers/17/]Search in Google Scholar