[1] 牛夏牧, 焦玉华. 感知哈希综述[J]. 电子学报, 2008, 36(7): 1405-1411. Niu Xiamu, Jiao Yuhua. An overview of perceptual Hashing[J]. Acta Electronic Sinica, 2008, 36(7): 1405-1411.[2] Tang Zhenjun, Zhang Xianquan, Huang Liyan, et al. Robust image Hashing using ring-based entropies[J]. Signal Processing, 2013, 93(7): 2061-2069.[3] Li Yuenan, Lu Zheming, Zhu Ce, et al. Robust image Hashing based on random Gabor filtering and dithered lattice vector quantization[J]. Image Processing, IEEE Transactions on, 2012, 21(4): 1963-1980.[4] 陈慧婷, 覃团发, 唐振华, 等. 综合纹理统计模型与全局主颜色的图像检索方法[J]. 北京邮电大学学报, 2011, 34 (s1): 100-103. Chen Huiting, Qin Tuanfa, Tang Zhenhua, et al. A method of image retrivals based on texture probability statistics and global dominant color[J]. Journal of Beijing University of Posts and Telecommunications, 2011, 34(s1): 100-103.[5] Jiao Yuhua, Ji Liping, Niu Xiamu. Robust speech Hashing for content authentication[J]. Signal Processing Letters, IEEE, 2009, 16(9): 818-821.[6] Chen Ning, Wan Wanggen. Robust speech Hash function[J]. ETRI Journal, 2010, 32(2): 345-347.[7] Chen Ning, Wan Wanggen. Speech Hashing algorithm based on short-time stability[C] //Artificial Neural Networks-ICANN 2009. Cyprus: Artificial Neural Networks, 2009: 426-434.[8] Nouri M, Farhangian N. Conceptual authentication speech hashing base upon hypotr- ochoid graph[C]//Telecommunications (IST), Sixth International Symposium on. Tehran: IEEE, 2012: 1136-1141.[9] Tang Zhenjun, Wang Shuozhong, Zhang Xinpeng, et al. Structural feature-based image hashing and similarity metric for tampering detection[J]. Fundamenta Informaticae, 2011, 106(1): 75-91.[10] Chen Ning, Wan Wanggen. Robust audio hashing based on discrete-wavelet-transform and non-negative matrix factorization[J]. Communications IET, 2010, 4(14): 1722-1731. |