• Laser & Optoelectronics Progress
  • Vol. 54, Issue 10, 101002 (2017)
[in Chinese]* and [in Chinese]
Author Affiliations
  • [in Chinese]
  • show less
    DOI: 10.3788/lop54.101002 Cite this Article Set citation alerts
    [in Chinese], [in Chinese]. A Robust Compact Image Hash Algorithm Zhang Zhifeng, Pei Zhili[J]. Laser & Optoelectronics Progress, 2017, 54(10): 101002 Copy Citation Text show less
    References

    [1] Qin C, Chen X Q, Ye D P, et al. A novel image hashing scheme with perceptual robustness using block truncation coding[J]. Information Sciences, 2016, 361: 84-89.

    [2] Davarzani R, Mozaffari S, Yaghmaie K. Perceptual image hashing using center-symmetric local binary patterns[J]. Multimedia Tools and Applications, 2016, 75(8): 4639-4667.

    [3] Feng He, Chang Guoquan, Guo Xiaobo. Hash algorithm for color image based on super-complex Fourier transform coupled with positon permutation[J/OL]. Journal of Frontiers of Computer Science and Technology: 1-11. (2016-12-16) [2017-09-21]. http://kns.cnki.net/kcms/detail/11.5602.TP.20161216.1049.002.html.

    [4] Jiang Cuiling, Lin Jiajun. Robust image hashing based on genetic algorithm and BP network[J]. Journal of Applied Science, 2016, 34(5): 537-546.

    [5] Tang Z J, Huang L Y, Zhang X Q, et al. Robust image hashing based on color vector angle and canny operator[J]. International Journal of Electronics and Communications, 2016, 70(6): 833-841.

    [6] Vadlamudi L N, Vaddella R P V, Devara V. Robust hash generation technique for content-based image authentication using histogram[J]. Multimedia Tools and Applications, 2016, 75(11): 6585-6604.

    [7] Ruan Linlin. Image hashing algorithms based on locally linear embedding and locality preserving projection[D]. Guilin: Guangxi Normal University, 2015: 24-26.

    [8] Tang Z J, Zhang X Q, Zhang S C. Robust perceptual image hashing based on ring partition and NMF[J]. IEEE Transactions on Knowledge & Data Engineering, 2014, 26(3): 711-724.

    [9] Ylioinas J, Poh N, Holappa J, et al. Data-driven techniques for smoothing histograms of local binary patterns[J]. Pattern Recognition, 2016, 60: 734-747.

    [10] Zhang Zhifeng, Pei Zhili. Image forgery detection algorithm based on fuzzy local binary pattern operator[J]. Computer Engineering and Design, 2015, 36 (12): 3284-3290, 3296.

    [11] Wang L, He L, Mishra A, et al. Active contours driven by local Gaussian distribution fitting energy[J]. Signal Processing, 2009, 89(12): 2435-2447.

    [12] Qureshi M A, Deriche M. A new wavelet based efficient image compression algorithm using compressive sensing[J]. Multimedia Tools and Applications, 2016, 75(12): 6737-6754.

    [13] Sun Qian, Hu Su. Improved cat map and chaotic system based fast color image encryption algorithm[J]. Application Research of Computer, 2017, 34(1): 233-237, 255.

    [14] Jiang Y Y, Wang Y R, Luo H. Image denoising method for unknown noise based on 2-D FWT with optimal fractional order[J]. Journal of Computers, 2014, 9(2): 412-419.

    [15] Schaefer G, Stich M. UCID: an uncompressed colour image database[C]. SPIE, 2003, 5307: 472-480.

    [16] Wang Yanchao, Guo Jingbo, Zhou Liyan. Image hash algorithm based on data dimension reduction and symmetric binary pattern[J]. Laser & Optoelectronics Progress, 2017, 54(2): 021004.

    [17] Li Xinwei, Li Leida. Robust image hashing based on polar harmonic transform[J]. Computer Simulation, 2014, 31(5): 293-296.

    [in Chinese], [in Chinese]. A Robust Compact Image Hash Algorithm Zhang Zhifeng, Pei Zhili[J]. Laser & Optoelectronics Progress, 2017, 54(10): 101002
    Download Citation