[1] Qin C, Chen X Q, Ye D P, et al. A novel image hashing scheme with perceptual robustness using block truncation coding[J]. Information Sciences, 2016, 361: 84-89.
[2] Davarzani R, Mozaffari S, Yaghmaie K. Perceptual image hashing using center-symmetric local binary patterns[J]. Multimedia Tools and Applications, 2016, 75(8): 4639-4667.
[3] Feng He, Chang Guoquan, Guo Xiaobo. Hash algorithm for color image based on super-complex Fourier transform coupled with positon permutation[J/OL]. Journal of Frontiers of Computer Science and Technology: 1-11. (2016-12-16) [2017-09-21]. http://kns.cnki.net/kcms/detail/11.5602.TP.20161216.1049.002.html.
[4] Jiang Cuiling, Lin Jiajun. Robust image hashing based on genetic algorithm and BP network[J]. Journal of Applied Science, 2016, 34(5): 537-546.
[5] Tang Z J, Huang L Y, Zhang X Q, et al. Robust image hashing based on color vector angle and canny operator[J]. International Journal of Electronics and Communications, 2016, 70(6): 833-841.
[6] Vadlamudi L N, Vaddella R P V, Devara V. Robust hash generation technique for content-based image authentication using histogram[J]. Multimedia Tools and Applications, 2016, 75(11): 6585-6604.
[7] Ruan Linlin. Image hashing algorithms based on locally linear embedding and locality preserving projection[D]. Guilin: Guangxi Normal University, 2015: 24-26.
[8] Tang Z J, Zhang X Q, Zhang S C. Robust perceptual image hashing based on ring partition and NMF[J]. IEEE Transactions on Knowledge & Data Engineering, 2014, 26(3): 711-724.
[9] Ylioinas J, Poh N, Holappa J, et al. Data-driven techniques for smoothing histograms of local binary patterns[J]. Pattern Recognition, 2016, 60: 734-747.
[10] Zhang Zhifeng, Pei Zhili. Image forgery detection algorithm based on fuzzy local binary pattern operator[J]. Computer Engineering and Design, 2015, 36 (12): 3284-3290, 3296.
[11] Wang L, He L, Mishra A, et al. Active contours driven by local Gaussian distribution fitting energy[J]. Signal Processing, 2009, 89(12): 2435-2447.
[12] Qureshi M A, Deriche M. A new wavelet based efficient image compression algorithm using compressive sensing[J]. Multimedia Tools and Applications, 2016, 75(12): 6737-6754.
[13] Sun Qian, Hu Su. Improved cat map and chaotic system based fast color image encryption algorithm[J]. Application Research of Computer, 2017, 34(1): 233-237, 255.
[14] Jiang Y Y, Wang Y R, Luo H. Image denoising method for unknown noise based on 2-D FWT with optimal fractional order[J]. Journal of Computers, 2014, 9(2): 412-419.
[15] Schaefer G, Stich M. UCID: an uncompressed colour image database[C]. SPIE, 2003, 5307: 472-480.
[16] Wang Yanchao, Guo Jingbo, Zhou Liyan. Image hash algorithm based on data dimension reduction and symmetric binary pattern[J]. Laser & Optoelectronics Progress, 2017, 54(2): 021004.
[17] Li Xinwei, Li Leida. Robust image hashing based on polar harmonic transform[J]. Computer Simulation, 2014, 31(5): 293-296.