Swaminathan A,MAO Yi-nian,WU Min.Robust and secure image hashing[J].IEEE Transactions on Information Forensics and Security,2006,1(2):215 ~230.
[2]
Venkatesan R,Koon S M,Jakubowski M H,et al.Robust image hashing[A].In:Proceedings of International Conference on Image Processing[C],Vancover,BC,Canada,2000,3:664 ~ 666.
[3]
Monga V,Banerjee A,Evans B L.A clustering based approach to perceptual image hashing[J].IEEE Transactions on Information Forensics and Security,2006,1 (1):68 ~ 79.
[4]
Kobayashi H,Kiya H.Robust image authentication using hash function[A].In:Proceedings of IEEE Region 10 Conference on Convergent Technologies[C],Chiang Mai,Thailand,2004,1:435 ~ 438.
[5]
Fridrich J,Goljan M.Robust hash functions for digital watermarking[A].In:Proceedings of International Conference on Information Technology:Coding and Computing[C],Las Vegas,Nevada,USA,2000:173 ~ 178.
[6]
Watson A B.DCT quantization matrices optimized for individual images[J].Proceedings of SPIE Human Vision,Visual Processing,and Digital Display Ⅳ,1993,1913:202 ~ 216.