{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T18:33:20Z","timestamp":1771007600459,"version":"3.50.1"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2005,10,17]],"date-time":"2005-10-17T00:00:00Z","timestamp":1129507200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Multimedia Systems"],"published-print":{"date-parts":[[2005,12]]},"DOI":"10.1007\/s00530-005-0199-y","type":"journal-article","created":{"date-parts":[[2005,10,21]],"date-time":"2005-10-21T22:12:41Z","timestamp":1129932761000},"page":"159-173","source":"Crossref","is-referenced-by-count":69,"title":["Geometric distortion-resilient image hashing scheme and its applications on copy detection and authentication"],"prefix":"10.1007","volume":"11","author":[{"given":"Chun-Shien","family":"Lu","sequence":"first","affiliation":[]},{"given":"Chao-Yong","family":"Hsu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,10,17]]},"reference":[{"key":"199_CR1","unstructured":"Oostveen, J., Lu, C.S., Sun, Q.: IEEE International Conference on Multimedia and Expo: Special Session on Media Identification, (co-organizers) (2004)"},{"key":"199_CR2","unstructured":"IEEE International Workshop on Multimedia Signal Processing (MMSP) Special Session on Media Recognition, Virgin Islands, USA (2002)"},{"key":"199_CR3","doi-asserted-by":"crossref","unstructured":"Dittmann, J., Steinmetz, A., Steinmetz, R.: Content-based digital signature for motion pictures authentication and content-fragile watermarking. In: Proceedings of the IEEE International Conference on Multimedia Computing and Systems, vol. II, pp. 209\u2013213. Italy (1999)","DOI":"10.1109\/MMCS.1999.778274"},{"key":"199_CR4","unstructured":"Lin, C.Y., Chang, S.F.: Generating robust digital signature for image\/video authentication. In: Proceedings of the ACM Multimedia and Security Workshop. U.K. (1998)"},{"key":"199_CR5","doi-asserted-by":"crossref","unstructured":"Chang, E.Y., Wang, J.Z., Li, C., Wiederhold, G.: RIME: A replicated image detector for the world wide web. In: Proceedings of the SPIE: Multimedia Storage and Archiving Systems, vol. III, 1998","DOI":"10.1117\/12.325852"},{"key":"199_CR6","doi-asserted-by":"crossref","unstructured":"Chang, E.Y., Li, C., Wang, J.Z., Mork, P., Wiederhold, G.: Searching Near-Replicas of Images via Clustering. In: Proceedings of the SPIE Symposium of Voice, Video, and Data Communications, pp. 281\u2013292. Boston (1999)","DOI":"10.1117\/12.360433"},{"key":"199_CR7","first-page":"176","volume":"5021","author":"Y. Meng","year":"2003","unstructured":"Meng, Y., Chang, E.: Image copy detection using dynamic partial function. In: Proc. SPIE Storage Retrieval Media Database. 5021, 176\u2013186 (2003)","journal-title":"In: Proc. SPIE Storage Retrieval Media Database"},{"key":"199_CR8","unstructured":"Li, B., Chang, E., Wu, C.T.: DPF\u2014A perceptual distance function for image retrieval. In: Proceedings of the IEEE International Conference on Image Processing, Vol. II. 597\u2013600, Rochester (2002)"},{"issue":"2","key":"199_CR9","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1109\/76.905982","volume":"11","author":"C.Y. Lin","year":"2001","unstructured":"Lin, C.Y., Chang, S.F.: A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Trans. Circuits Systems Video Tech. 11(2), 153\u2013168 (2001)","journal-title":"IEEE Trans. Circuits Systems Video Tech."},{"issue":"2","key":"199_CR10","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1109\/TMM.2003.811621","volume":"5","author":"C.S. Lu","year":"2003","unstructured":"Lu, C.S., Mark Liao, H.Y.: Structural digital signature for image authentication: An incidental distortion resistant scheme. IEEE Trans. Multimedia 5(2), 161\u2013173 (2003)","journal-title":"IEEE Trans. Multimedia"},{"key":"199_CR11","doi-asserted-by":"crossref","unstructured":"Fridrich, J.: Visual hash for oblivious watermarking. In: Proceedings SPIE: Security and Watermarking of Multimedia Contents II, 286\u2013294, San Jose, California (2000)","DOI":"10.1117\/12.384982"},{"key":"199_CR12","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M.: Robust hash functions for digital watermarking. In: Proceedings IEEE International Conference on Information Technology: Coding and Computing, pp 178\u2013183, Las Vegas, Nevada (2000)","DOI":"10.1109\/ITCC.2000.844203"},{"key":"199_CR13","doi-asserted-by":"crossref","unstructured":"Venkatesan, R., Koon, S.M., Jakubowski, M.H., Moulin, P.: Robust Image Hashing. In: Proceedings of the IEEE International Conference on Image Processing, Vol. III, 664\u2013666, Vancouver (BC), CA (2000)","DOI":"10.1109\/ICIP.2000.899541"},{"key":"199_CR14","unstructured":"Lefebvre, F., Macq, B.: RASH: RAdon Soft Hash algorithm. In: Proceedings European Signal Processing Conference. Toulouse, France (2002)"},{"key":"199_CR15","doi-asserted-by":"crossref","unstructured":"Lefebvre, F., Czyz, J., Macq, B.: A robust soft hash algorithm for digital image signature. In: Proceedings of the IEEE International Conference on Image Processing. Vol. II, 495\u2013498, Barcelona, Spain (2003)","DOI":"10.1109\/ICIP.2003.1246725"},{"key":"199_CR16","first-page":"325","volume":"19","author":"J.S. Seo","year":"2004","unstructured":"Seo, J.S., Haitsma, J., Kalker, T., Yoo, C.D.: A robust image fingerprinting system using the radon transform. Signal Process.: Image Commun. 19, 325\u2013339 (2004)","journal-title":"Signal Process.: Image Commun."},{"key":"199_CR17","doi-asserted-by":"crossref","unstructured":"Mihcak, M.K., Venkatesan, R.: New iterative geometric methods for robust perceptual image hashing. In: Proceedings of the ACM Workshop on Security and Privacy in Digital Rights Management. Philadelphia, PA (2001)","DOI":"10.1007\/3-540-47870-1_2"},{"key":"199_CR18","first-page":"169","volume":"18","author":"C. Kim","year":"2003","unstructured":"Kim, C.: Content-based image copy detection. Signal Process.: Image Commun. 18, 169\u2013184 (2003)","journal-title":"Signal Process.: Image Commun."},{"key":"199_CR19","doi-asserted-by":"crossref","unstructured":"Petitcolas, F., Anderson, R.J., Kuhn, M.G.: Attacks on copyright marking systems. Proceedings of the International Workshop on Information Hiding, LNCS 1575, pp. 219\u2013239 (1998)","DOI":"10.1007\/3-540-49380-8_16"},{"issue":"5","key":"199_CR20","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/79.879339","volume":"17","author":"F. Petitcolas","year":"2000","unstructured":"Petitcolas, F.: Watermarking Schemes Evaluation. IEEE Signal Processing Magazine 17(5), 58\u201364 (2000)","journal-title":"IEEE Signal Processing Magazine"},{"key":"199_CR21","doi-asserted-by":"crossref","first-page":"1014","DOI":"10.1109\/TIP.2002.801587","volume":"11","author":"P. Bas","year":"2002","unstructured":"Bas, P., Chassery, J.M., Macq, B.: Geometrically invariant watermarking using feature points. IEEE Trans. Image Process. 11, 1014\u20131028 (2002)","journal-title":"IEEE Trans. Image Process."},{"issue":"4","key":"199_CR22","doi-asserted-by":"crossref","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z. Wang","year":"2004","unstructured":"Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: From error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600\u2013612 (2004)","journal-title":"IEEE Trans. Image Process."},{"key":"199_CR23","unstructured":"Al-Mualla, M.E., Canagarajah, C.N., Bull, D.R.: Video coding for mobile communications, Academic Press. (2003)"},{"key":"199_CR24","unstructured":"Heiny, L.: Advanced graphics programming using C\/C++, John Wiley & Sons, Inc. (1993)"},{"key":"199_CR25","unstructured":"Kalker, T.: Applications and challenges for audio fingerprinting. In: Proceedings of the 111th AES Convention, in the \u201cWatermarking vs. Fingerprinting\u201d Workshop, December 3 (2001)"},{"issue":"7","key":"199_CR26","doi-asserted-by":"crossref","first-page":"710","DOI":"10.1109\/34.142909","volume":"14","author":"S. Mallat","year":"1992","unstructured":"Mallat, S., Zhong, S.: Characterization of signals from multiscale edges. IEEE Trans. Pattern Anal. Machine Intell. 14(7), 710\u2013732 (1992)","journal-title":"IEEE Trans. Pattern Anal. Machine Intell."},{"key":"199_CR27","unstructured":"Lu, C.S.: On the security of structural information extraction\/embedding for images. In: Proceedings of the IEEE International Symposium on Circuits and Systems, vol. II, pp. 169-172. Vancouver, Canada (2004)"},{"key":"199_CR28","unstructured":"Lu, C.S., Hsu, C.Y., Sun, S.W., Chang, P.C.: Robust mesh-based hashing for copy detection and tracing of images. In: Proceedings of the IEEE International Conference on Multimedia and Expo: Special session on media identification. Taipei, Taiwan (2004)"}],"container-title":["Multimedia Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-005-0199-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00530-005-0199-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-005-0199-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,10]],"date-time":"2020-04-10T12:51:23Z","timestamp":1586523083000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00530-005-0199-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,10,17]]},"references-count":28,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2005,12]]}},"alternative-id":["199"],"URL":"https:\/\/doi.org\/10.1007\/s00530-005-0199-y","relation":{},"ISSN":["0942-4962","1432-1882"],"issn-type":[{"value":"0942-4962","type":"print"},{"value":"1432-1882","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005,10,17]]}}}