UM

Browse/Search Results:  1-4 of 4 Help

Selected(0)Clear Items/Page:    Sort:
Robust image hashing using progressive feature selection for tampering detection Journal article
Pun, Chi-Man, Yan, Cai-Ping, Yuan, Xiao-Chen. Robust image hashing using progressive feature selection for tampering detection[J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 77(10), 11609-11633.
Authors:  Pun, Chi-Man;  Yan, Cai-Ping;  Yuan, Xiao-Chen
Favorite | TC[WOS]:19 TC[Scopus]:24  IF:3.0/2.9 | Submit date:2018/10/30
Robust Image Hashing  Progressive Feature Point Selection  Tampering Detection  Image Authentication  Horizontal Location-context Hashing (Hlch)  Vertical Location-context Hashing (Vlch)  
Image Alignment-Based Multi-Region Matching for Object-Level Tampering Detection Journal article
Chi-Man Pun, Caiping Yan, Xiao-Chen Yuan. Image Alignment-Based Multi-Region Matching for Object-Level Tampering Detection[J]. IEEE Transactions on Information Forensics and Security, 2016, 12(2), 377-391.
Authors:  Chi-Man Pun;  Caiping Yan;  Xiao-Chen Yuan
Favorite | TC[WOS]:18 TC[Scopus]:23  IF:6.3/7.3 | Submit date:2019/02/14
Image Alignment  Image Hashing  Multi-region Matching  Object-level Tampering Detection  
Adaptive local feature based multi-scale image hashing for robust tampering detection Conference paper
Yan C.-P., Pun C.-M., Yuan X.-C.. Adaptive local feature based multi-scale image hashing for robust tampering detection[C], 2016.
Authors:  Yan C.-P.;  Pun C.-M.;  Yuan X.-C.
Favorite | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/02/14
Adaptive Local Feature Extraction  Location-context Information  Multi-scale Image Hashing  Tampering Detection  
Multi-scale image hashing using adaptive local feature extraction for robust tampering detection Journal article
Yan C.-P., Pun C.-M., Yuan X.-C.. Multi-scale image hashing using adaptive local feature extraction for robust tampering detection[J]. Signal Processing, 2015, 121, 1-16.
Authors:  Yan C.-P.;  Pun C.-M.;  Yuan X.-C.
Favorite | TC[WOS]:60 TC[Scopus]:71 | Submit date:2019/02/14
Adaptive Feature Point Detection  Image Authentication  Multi-scale Image Hashing  Tampering Detection