References
[1]. Yong Soo Choi and Jong Hyuk Park, (2012). “Image
Hash Generation Method using Hierarchical Histogram”.
Journal of Multimedia Tools and Applications, Vol. 61, No.
1, pp. 181-194.
[2]. Rui Sun and Wenjun Zeng, (2012). “Secure and Robust
Image Hashing via Compressive Sensing”. Journal of
Multimedia Tools and Applications, Vol. 70, No. 3, pp. 1-
15.
[3]. Guangjie Liu, et al. (2011). “A Passive Image
Authentication Scheme for Detecting Region Duplication
Forgery with Rotation”. Journal of Network and Computer
Applications, Vol. 34, No. 5, pp. 1557-1565.
[4]. Shijun Xiang and Hyoung Joong Kim, (2011).
“Histogram Based Image Hashing for Searching Content-
Preserving Copies”. Transactions on Data Hiding
Multimedia Security VI, Vol. 6730, pp. 83-108.
[5]. Li Weng and Bart Preneel, (2011). “A Secure
Perceptual Hash Algorithm for Image Content
Authentication”. Communications and Multimedia
Security, Vol. 7025, pp. 108-121.
[6]. Yanqiang Lei, Yuangen Wang, and Jiwu Huang,
(2011). “Robust Image Hash in Radon Transform domain
for Authentication”. Journal of Signal Processing: Image
Communication, Vol. 26, No. 6, pp. 280-288.
[7]. Zhihua Xu, et al. (2011). “A Novel Image Copy
Detection Scheme Based on the Local Multi-resolution
Histogram Descriptor”. Journal of Multimedia Tools and
Applications, Vol. 52, No. 2-3, pp. 445-463.
[8]. Zhenjun Tang, et al. (2011). “Lexicographical
Framework for Image Hashing with Implementation
based on DCT and NMF”. Journal of Multimedia Tools and
Applications, Vol. 52, No. 2-3, pp. 325-345.
[9]. Lina Wang, et al. (2011). “Image Authentication
based on Perceptual Hash using Gabor Filters”. Journal of
Soft Computing, Vol. 15, No. 3, pp. 493-504.
[10]. Nighat Jamil and Arshad Aziz, (2010). “A Unified
Approach to Secure and Robust Hashing Scheme for Image and Video Authentication”. In Proc. of 3rd Int.
Congress on Image and Signal Processing (CISP-2010),
pp. 274-278.
[11]. Shui-Hua Han and Chao-Hsien Chu, (2010).
“Content-based Image Authentication: Current Status,
Issues and Challenges”. International Journal of
Information Security, Vol. 9, No. 1, pp. 19-32.
[12]. Fawad Ahmed, M.Y. Siyal, and Vali Uddin Abbas,
(2010). “A Secure and Robust Hash-Based Scheme for
Image Authentication”. Journal of Signal Processing,
Vol.90, No. 5, pp. 1456-1470.
[13]. Yang Ou, Chul Sur, and Kyung Hyune Rhee, (2010).
“Discriminative Image Hashing Based on Region of
Interest”. In Proc. of 16 Int. Conf. on Advances in
Multimedia Modeling, Vol. 5916, pp 701-706.
[14]. Ammar M. Hassan, et al. (2009). “Semi Fragile Image
Authentication using Robust Image Hashing with
Localization”. In Proc. of Second International Conf. on
Machine Vision (ICMV-09), pp. 133-137.
[15]. Marco Tagliasacchi, et al. (2009). “Hash-Based Identification of Spare Image Tampering”. IEEE Trans. on
Image Processing, Vol. 18, No. 11, pp. 2491-2504.
[16]. Han-Ling Zhang, et al. (2009). “Content Based
Image Hashing Robust to Geometric Transformation”. In
Proc. of Second Int. Symposium on Electronic
Commerce and Security (ISECS-09), pp. 105-108.
[17]. S.M. Saad, (2009). “Design of a Robust and Secure
Digital Signature Scheme for Image Authentication over
Wireless Channels”. IET Information Security, Vol. 3, No. 1,
pp. 1-8.
[18]. Adil Haouzia and Rita Noumeir, (2008). “Methods for
image authentication: A Survey”. Journal of Multimedia
Tools Applications, Vol. 39, No. 1, pp. 1-46.
[19]. Swinathan Ashwin, et at. (2006). “Robust and Secure
Image Hashing”. IEEE Trans on Inf. Forensics and Security,
Vol.1, No. 2, pp. 215-230.
[20]. Shijun Xiang, et al. (2007). “Histogram based Image
Hashing Scheme Robust against Geometric Deformations”. In Proc. of 9th International Workshop on
Multimedia and Security (MMS-07), pp. 121-128.
[21]. Vishal Monga and M. Kivac Mihcak, (2007). “Robust
and Secure Image Hashing via Non–Negative Matrix
Factorizations”. IEEE Transaction on Information Forensics
and Security, Vol. 2, No. 3, pp. 376-390.
[22]. Kai Chen, Xingleizhu, and Zhishou Zhang, (2007). “A
Hybrid Content-Based Image Authentication Scheme”. In
Proc. of Advances in Multimedia Information Processing
(PCM-2007), Vol. 4810, pp. 226-235.
[23]. Young-Dong Zhang, et al. (2007). “Secure and
Incidental Distortion Tolerant Digital Signature for Image
Authentication”. Journal of Computer Science and
Technology, Vol. 22, No. 4, pp. 523-526.