UM

Browse/Search Results:  1-5 of 5 Help

Selected(0)Clear Items/Page:    Sort:
Robust image hashing using progressive feature selection for tampering detection Journal article
MULTIMEDIA TOOLS AND APPLICATIONS, 2017,Volume: 77,Issue: 10,Page: 11609-11633
Authors:  Pun, Chi-Man;  Yan, Cai-Ping;  Yuan, Xiao-Chen
Favorite  |  View/Download:22/0  |  Submit date:2018/10/30
Robust Image Hashing  Progressive Feature Point Selection  Tampering Detection  Image Authentication  Horizontal Location-context Hashing (Hlch)  Vertical Location-context Hashing (Vlch)  
Image Alignment-Based Multi-Region Matching for Object-Level Tampering Detection Journal article
IEEE Transactions on Information Forensics and Security, 2016,Volume: 12,Issue: 2,Page: 377-391
Authors:  Chi-Man Pun;  Caiping Yan;  Xiao-Chen Yuan
Favorite  |  View/Download:5/0  |  Submit date:2019/02/14
Image Alignment  Image Hashing  Multi-region Matching  Object-level Tampering Detection  
Quaternion-Based Image Hashing for Adaptive Tampering Localization Journal article
IEEE Transactions on Information Forensics and Security, 2016,Volume: 11,Issue: 12,Page: 2664-2677
Authors:  Yan C.-P.;  Pun C.-M.;  Yuan X.-C.
Favorite  |  View/Download:6/0  |  Submit date:2019/02/14
Adaptive Tampering Localization  Image Hashing  Quaternion Fourier Transform (Qft)  Quaternion Fourier-mellin Transform (Qmmt)  
Adaptive local feature based multi-scale image hashing for robust tampering detection Conference paper
IEEE Region 10 Annual International Conference, Proceedings/TENCON, Macao, China, 1-4 Nov. 2015
Authors:  Yan C.-P.;  Pun C.-M.;  Yuan X.-C.
Favorite  |  View/Download:7/0  |  Submit date:2019/02/14
Adaptive Local Feature Extraction  Location-context Information  Multi-scale Image Hashing  Tampering Detection  
Multi-scale image hashing using adaptive local feature extraction for robust tampering detection Journal article
Signal Processing, 2015,Volume: 121,Page: 1-16
Authors:  Yan C.-P.;  Pun C.-M.;  Yuan X.-C.
Favorite  |  View/Download:3/0  |  Submit date:2019/02/14
Adaptive Feature Point Detection  Image Authentication  Multi-scale Image Hashing  Tampering Detection