[1] 韩娟, 周思琪, 平萍. 基于四叉树加密与自适应块编
码的密文图像可逆数据隐藏[J]. 计算机工程, 2025,
51(2): 202-212.
HAN J, ZHOU S Q, PING P. Reversible Data Hiding in
Encrypted Image Based on Quadtree Encryption and
Adaptive Block Encoding[J]. Computer Engineering,
2025, 51(2): 202-212.
[2] 吴若岚, 陈玉玲, 豆慧, 张洋文, 龙钟. 抗攻击的联
邦学习隐私保护算法[J]. 计算机工程, 2025, 51(2):
179-187.
WU R L, CHEN Y L, DOU H, et al. Privacy Preserving
Algorithm Using Federated Learning Against Attacks[J].
Computer Engineering, 2025, 51(2): 179-187.
[3] SINGH D, KUMAR S. Image authentication and
encryption algorithm based on RSA cryptosystem and
chaotic maps[J]. Expert Systems with Applications,
2025: 126883.
[4] LIN P Y, LEE J S, CHANG C C. Protecting the content
integrity of digital imagery with fidelity preservation[J].
ACM Transactions on Multimedia Computing,
Communications, and Applications (TOMM), 2011,
7(3): 1-20.
[5] 周元鼎, 房耀东, 秦川. 面向感知哈希的图像数据集
[J]. 中国图象图形学报, 2024, 29(2): 343-354.
ZHOU Y D, FANG Y D, QIN C. Large-scale image
dataset for perceptual hashing[J]. Journal of Image and
Graphics, 2024, 29(2): 343-354.
[6] HU M C, NG K S, CHEN P Y, et al. Local binary
pattern circuit generator with adjustable parameters for
feature extraction[J]. IEEE Transactions on Intelligent
Transportation Systems, 2017, 19(8): 2582-2591.
[7] QIN C, CHEN X, YE D, et al. A novel image hashing
scheme with perceptual robustness using block
truncation coding[J]. Information Sciences, 2016, 361:
84-99.
[8] ABBAS S Q, SHIRAZI S J, CHEN Y P P. Aggregated
Bidirectional Local Binary Pattern for Robust
Perceptual Image Hashing[C]. 2022 IEEE International
Symposium on Multimedia (ISM). IEEE, 2022: 50-57.
[9] TANG Z, ZHANG X, ZHANG S. Robust perceptual
image hashing based on ring partition and NMF[J].
IEEE transactions on knowledge and data engineering,
2013, 26(3): 711-724.
[10] HUANG Z, LIU S. Perceptual image hashing with
texture and invariant vector distance for copy
detection[J]. IEEE Transactions on Multimedia, 2020,
23: 1516-1529.
[11] SINGH S P, BHATNAGAR G, SINGH A K. A new
robust reference image hashing system[J]. IEEE
Transactions on Dependable and Secure Computing,
2021, 19(4): 2211-2225.
[12] HUANG Z, TANG Z, ZHANG X, et al. Perceptual
image hashing with locality preserving projection for
copy detection[J]. IEEE Transactions on Dependable
and Secure Computing, 2021, 20(1): 463-477.
[13] YU M, TANG Z, ZHANG X, et al. Perceptual hashing
with complementary color wavelet transform and
compressed sensing for reduced-reference image
quality assessment[J]. IEEE Transactions on Circuitsand Systems for Video Technology, 2022, 32(11):
7559-7574.
[14] JIA Y, CUI C, WANG Z, et al. Robust image hashing
based on histogram reconstruction[C]. International
Conference on Intelligent Information Hiding and
Multimedia Signal Processing. Singapore: Springer
Nature Singapore, 2022, 255-265.
[15] QIN C, CHEN X, LUO X, et al. Perceptual image
hashing via dual-cross pattern encoding and salient
structure detection[J]. Information Sciences, 2018, 423:
284-302.
[16] QIN C, SUN M, CHANG C C. Perceptual hashing for
color images based on hybrid extraction of structural
features[J]. Signal processing, 2018, 142: 194-205.
[17] LIANG X, TANG Z, ZHANG X, et al. Robust Image
Hashing with Weighted Saliency Map and Laplacian
Eigenmaps[J]. IEEE Transactions on Information
Forensics and Security, 2024.
[18] ZHANG H, TANG Z, YU M, et al. Robust Color Image
Hashing with NMF and Saliency Map for Copy
Detection[J]. IEEE MultiMedia, 2024.
[19] 白杰, 赵琰. 结合四元数拉盖尔矩和三维结构的图像
哈希[J]. 计算机工程, 2024, 50(04): 208-218.
BAI J, ZHAO T. Image Hash Combining Quaternion
Laguerre Moments and Three-Dimensional
Structures[J]. Computer Engineering, 2024, 50(04):
208-218.
[20] JIANG C, PANG Y. Perceptual image hashing based on
a deep convolution neural network for content
authentication[J]. Journal of electronic imaging, 2018,
27(4): 043055-043055.
[21] QIN C, LIU E, FENG G, et al. Perceptual image
hashing for content authentication based on
convolutional neural network with multiple
constraints[J]. IEEE Transactions on Circuits and
Systems for Video Technology, 2020, 31(11):
4523-4537.
[22] LI Y, WANG D, TANG L. Robust and secure image
fingerprinting learned by neural network[J]. IEEE
Transactions on Circuits and Systems for Video
Technology, 2019, 30(2): 362-375.
[23] PAUL M, THAKURIA A J, KARSH R K, et al. Robust
color image hashing using convolutional stacked
denoising auto-encoders for image authentication[J].
Neural Computing and Applications, 2021, 33:
13317-13331.
[24] XIONG C, LIU E, LI X, et al. Perceptual image hashing
based on multitask neural network[J]. Security and
Communication Networks, 2021, 2021(1): 8297244.
[25] FANG Y, ZHOU Y, LI X, et al. TMCIH: Perceptual
robust image hashing with transformer-based
multi-layer constraints[C]. Proceedings of the 2023
ACM Workshop on Information Hiding and Multimedia
Security. 2023: 7-12.
[26] TANG Z, DAI Y, ZHANG X, et al. Robust image
hashing via colour vector angles and discrete wavelet
transform[J]. IET Image Processing, 2014, 8(3):
142-149.
[27] TANG Z, ZHANG X, LI X, et al. Robust image hashing
with ring partition and invariant vector distance[J].
IEEE transactions on information forensics and security,
2015, 11(1): 200-214.
[28] ZHOU Y D, LI X R, FANG Y D, et al. When perceptual
authentication hashing meets neural architecture
search[C]. Proceedings of the 31st ACM International
Conference on Multimedia. 2023: 8975-8983.
[29] 周元鼎,高国鹏,房耀东,等.基于窗口自注意力特征融
合的感知图像认证哈希[J/OL].计算机研究与发展,
2025:1-12.
ZHOU Y D, GAO G P, FANG Y D, et al. Perceptual
Authentication Hashing with Image Feature Fusion
Based on Window Self-Attention[J/OL]. Journal of
Computer Research and Development, 2025:1-12.
|