{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T06:52:20Z","timestamp":1726037540709},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030242701"},{"type":"electronic","value":"9783030242718"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24271-8_41","type":"book-chapter","created":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T19:19:24Z","timestamp":1563391164000},"page":"455-466","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Image Hashing Based on CS-LBP and DCT for Copy Detection"],"prefix":"10.1007","author":[{"given":"Qi","family":"Shen","sequence":"first","affiliation":[]},{"given":"Yan","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"issue":"3","key":"41_CR1","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/S0923-5965(02)00130-3","volume":"18","author":"C Kim","year":"2003","unstructured":"Kim, C.: Content-based image copy detection. Sig. Process. Image Commun. 18(3), 169\u2013184 (2003)","journal-title":"Sig. Process. Image Commun."},{"issue":"11","key":"41_CR2","first-page":"2961","volume":"7","author":"Z Tang","year":"2013","unstructured":"Tang, Z., Yang, F., Huang, L., Wei, M.: DCT and DWT based image hashing for copy detection. ICIC Express Lett. 7(11), 2961\u20132967 (2013)","journal-title":"ICIC Express Lett."},{"issue":"18","key":"41_CR3","doi-asserted-by":"publisher","first-page":"5102","DOI":"10.1016\/j.ijleo.2014.05.015","volume":"125","author":"Z Tang","year":"2014","unstructured":"Tang, Z., Yang, F., Huang, L., Zhang, X.: Robust image hashing with dominant DCT coefficients. Optik-Int. J. Light. Electron Opt. 125(18), 5102\u20135107 (2014)","journal-title":"Optik-Int. J. Light. Electron Opt."},{"key":"41_CR4","unstructured":"Venkatesan, R., Koon, S.M., Jakubowski, M.H., Moulin P.: Robust image hashing. In: International Conference on Image Processing, vol. 663, pp. 664\u2013666 (2000)"},{"key":"41_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-014-1857-x","volume-title":"A Novel Approach to Detecting Duplicate Images using Multiple Hash Tables","author":"SL Hsieh","year":"2015","unstructured":"Hsieh, S.L., Chen, C.C., Chen, C.R.: A Novel Approach to Detecting Duplicate Images using Multiple Hash Tables. Kluwer Academic Publishers, Hingham (2015)"},{"key":"41_CR6","doi-asserted-by":"crossref","unstructured":"Ou, Y.: Rhee, K.H.: A key-dependent secure image hashing scheme by using Radon transform. In: International Symposium on Intelligent Signal Processing and Communication Systems, pp. 595\u2013598 (2009)","DOI":"10.1109\/ISPACS.2009.5383770"},{"key":"41_CR7","doi-asserted-by":"crossref","unstructured":"Srivastava, M., Siddiqui, J., Ali, M.A.: Robust image hashing based on statistical features for copy detection. In: IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics Engineering, pp. 490\u2013495 (2017)","DOI":"10.1109\/UPCON.2016.7894703"},{"key":"41_CR8","unstructured":"Li, X.-W., Xia, X.Z.: Robust image hashing based on content structure diagram. J. Appl. Sci. 34(6), 691\u2013701 (2016)"},{"issue":"2","key":"41_CR9","first-page":"331","volume":"55","author":"Z Tang","year":"2018","unstructured":"Tang, Z., et al.: Robust image hashing via random Gabor filtering and DWT. CMC: Comput. Mater. Contin. 55(2), 331\u2013344 (2018)","journal-title":"CMC: Comput. Mater. Contin."},{"issue":"3","key":"41_CR10","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1109\/TIFS.2007.902670","volume":"2","author":"V Monga","year":"2007","unstructured":"Monga, V., Mihcak, M.K.V.: Robust and secure image hashing via non-negative matrix factorizations. IEEE Trans. Inf. Forensics Secur. 2(3), 376\u2013390 (2007)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"4","key":"41_CR11","first-page":"9","volume":"34","author":"Z Tang","year":"2016","unstructured":"Tang, Z., Yang, F., Huang, Z., Lao, H.: Image hashing algorithm based on PCA feature distance. J. Guangxi Norm. Univ. (Nat. Sci. Ed.) 34(4), 9\u201318 (2016)","journal-title":"J. Guangxi Norm. Univ. (Nat. Sci. Ed.)"},{"issue":"1","key":"41_CR12","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/MMUL.2011.75","volume":"19","author":"H Ling","year":"2012","unstructured":"Ling, H., Cheng, H., Ma, Q., Zou, F., Yan, W.Q.: Efficient image copy detection using multiscale fingerprints. IEEE Multimed. 19(1), 60\u201369 (2012)","journal-title":"IEEE Multimed."},{"key":"41_CR13","doi-asserted-by":"crossref","unstructured":"Baber, J., Satoh, S.I., Keatmanee, C., Afzulpurkar, N.: Improving the performance of SIFT and CSLBP for image copy detection. In: International Conference on Telecommunications and Signal Processing (2013)","DOI":"10.1109\/TSP.2013.6614049"},{"issue":"1","key":"41_CR14","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/TIFS.2016.2601065","volume":"12","author":"Z Zhou","year":"2016","unstructured":"Zhou, Z., Wang, Y., Wu, Q.M.J., Yang, C.N., Sun, X.: Effective and efficient global context verification for image copy detection. IEEE Trans. Inf. Forensics Secur. 12(1), 48\u201363 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"41_CR15","first-page":"91","volume":"56","author":"Q Wu","year":"2018","unstructured":"Wu, Q., Li, Y., Lin, Y., Zhou, R.: Weighted sparse image classification based on low rank representation. CMC: Comput. Mater. Contin. 56(1), 91\u2013105 (2018)","journal-title":"CMC: Comput. Mater. Contin."},{"issue":"21","key":"41_CR16","doi-asserted-by":"publisher","first-page":"9729","DOI":"10.1007\/s11042-014-2148-2","volume":"74","author":"L Yan","year":"2015","unstructured":"Yan, L., Ling, H., Zou, F., Liu, C.: Iterated local search optimized hashing for image copy detection. Multimed. Tools Appl. 74(21), 9729\u20139746 (2015)","journal-title":"Multimed. Tools Appl."},{"issue":"4","key":"41_CR17","doi-asserted-by":"publisher","first-page":"725","DOI":"10.1080\/18756891.2015.1046332","volume":"8","author":"J Liu","year":"2015","unstructured":"Liu, J., Ling, H., Yan, L., Ou, X.: Feature fusion based hashing for large scale image copy detection. Int. J. Comput. Intell. Syst. 8(4), 725\u2013734 (2015)","journal-title":"Int. J. Comput. Intell. Syst."},{"key":"41_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1007\/978-3-319-19321-2_5","volume-title":"Digital-Forensics and Watermarking","author":"Z Zhou","year":"2015","unstructured":"Zhou, Z., Sun, X., Wang, Y., Fu, Z., Shi, Y.-Q.: Combination of SIFT feature and convex region-based global context feature for image copy detection. In: Shi, Y.-Q., Kim, H.J., P\u00e9rez-Gonz\u00e1lez, F., Yang, C.-N. (eds.) IWDW 2014. LNCS, vol. 9023, pp. 60\u201371. Springer, Cham (2015). \n                      https:\/\/doi.org\/10.1007\/978-3-319-19321-2_5"},{"key":"41_CR19","doi-asserted-by":"crossref","unstructured":"Lin, S.D., Yang, L.S.O.: An effective content-based copy detection scheme for image authentication. In: International Conference on Machine Learning and Cybernetics, pp. 321\u2013325 (2014)","DOI":"10.1109\/ICMLC.2014.7009136"},{"key":"41_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1007\/11949619_6","volume-title":"Computer Vision, Graphics and Image Processing","author":"M Heikkil\u00e4","year":"2006","unstructured":"Heikkil\u00e4, M., Pietik\u00e4inen, M., Schmid, C.: Description of interest regions with center-symmetric local binary patterns. In: Kalra, P.K., Peleg, S. (eds.) ICVGIP 2006. LNCS, vol. 4338, pp. 58\u201369. Springer, Heidelberg (2006). \n                      https:\/\/doi.org\/10.1007\/11949619_6"},{"issue":"1","key":"41_CR21","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1109\/TIFS.2015.2485163","volume":"11","author":"Z Tang","year":"2015","unstructured":"Tang, Z., Zhang, X., Li, X., Zhang, S.: Robust image hashing with ring partition and invariant vector distance. IEEE Trans. Inf. Forensics Secur. 11(1), 200\u2013214 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"41_CR22","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/TIFS.2012.2223680","volume":"8","author":"Y Zhao","year":"2013","unstructured":"Zhao, Y., Wang, S., Zhang, X., Yao, H.: Robust hashing for image authentication using Zernike moments and local features. IEEE Trans. Inf. Forensics Secur. 8(1), 55\u201363 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"41_CR23","unstructured":"Test Image. \n                      http:\/\/wang.ist.psu.edu\/docs\/related\/\n                      \n                    . Accessed 21 Mar 2018"},{"issue":"5","key":"41_CR24","doi-asserted-by":"publisher","first-page":"593","DOI":"10.1016\/S0167-8655(00)00118-5","volume":"22","author":"H M\u00fcller","year":"2001","unstructured":"M\u00fcller, H., M\u00fcller, W., Squire, D.M., Marchand-Maillet, S., Pun, T.: Performance evaluation in content-based image retrieval: overview and proposals. Pattern Recogn. Lett. 22(5), 593\u2013601 (2001)","journal-title":"Pattern Recogn. Lett."}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24271-8_41","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T19:35:46Z","timestamp":1563392146000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24271-8_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030242701","9783030242718"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24271-8_41","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}