{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T18:33:18Z","timestamp":1771007598060,"version":"3.50.1"},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"2-3","license":[{"start":{"date-parts":[[2010,1,13]],"date-time":"2010-01-13T00:00:00Z","timestamp":1263340800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2011,4]]},"DOI":"10.1007\/s11042-009-0437-y","type":"journal-article","created":{"date-parts":[[2010,1,12]],"date-time":"2010-01-12T08:01:49Z","timestamp":1263283309000},"page":"325-345","source":"Crossref","is-referenced-by-count":66,"title":["Lexicographical framework for image hashing with implementation based on DCT and NMF"],"prefix":"10.1007","volume":"52","author":[{"given":"Zhenjun","family":"Tang","sequence":"first","affiliation":[]},{"given":"Shuozhong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xinpeng","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Weimin","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,1,13]]},"reference":[{"key":"437_CR1","unstructured":"Fridrich J, Goljan M (2000) Robust hash functions for digital watermarking. In: Proceedings of IEEE International Conference on Information Technology: Coding and Computing (ITCC\u201900), Las Vergas, USA, Mar. 27\u201329, 2000, pp 178\u2013183"},{"key":"437_CR2","unstructured":"Ground Truth Database, http:\/\/www.cs.washington.edu\/research\/imagedatabase\/groundtruth\/ . Accessed 8 May 2008"},{"key":"437_CR3","unstructured":"Kozat SS, Mihcak K, Venkatesan R (2004) Robust perceptual image hashing via matrix invariants. In: Proceedings of IEEE Conference on Image Processing (ICIP\u201904), Singapore, Oct. 24\u201327, 2004, pp 3443\u20133446"},{"key":"437_CR4","unstructured":"Lefebvre F, Macq B, Legat J-D (2002) RASH: Radon soft hash algorithm. In: Proceedings of European Signal Processing Conference (EUSIPCO\u201902), Toulouse, France, Sep. 3\u20136, 2002, pp 299\u2013302"},{"key":"437_CR5","first-page":"590","volume-title":"Testing statistical hypotheses","author":"EL Lehmann","year":"2005","unstructured":"Lehmann EL, Romano JP (2005) Testing statistical hypotheses, 3rd edn. Springer, New York, pp 590\u2013599","edition":"3"},{"issue":"2","key":"437_CR6","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1109\/76.905982","volume":"11","author":"Y Lin","year":"2001","unstructured":"Lin Y, Chang SF (2001) A robust image authentication system distinguishing JPEG compression from malicious manipulation. IEEE Trans Circuits Syst Video Technol 11(2):153\u2013168","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"3","key":"437_CR7","doi-asserted-by":"crossref","first-page":"462","DOI":"10.1109\/TIFS.2007.902260","volume":"2","author":"Y Mao","year":"2007","unstructured":"Mao Y, Wu M (2007) Unicity distance of robust image hashing. IEEE Trans Inf Forensics Secur 2(3):462\u2013467","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"11","key":"437_CR8","doi-asserted-by":"crossref","first-page":"3453","DOI":"10.1109\/TIP.2006.881948","volume":"15","author":"V Monga","year":"2006","unstructured":"Monga V, Evans BL (2006) Perceptual image hashing via feature points: performance evaluation and trade-offs. IEEE Trans Image Process 15(11):3453\u20133466","journal-title":"IEEE Trans Image Process"},{"issue":"3","key":"437_CR9","doi-asserted-by":"crossref","first-page":"376","DOI":"10.1109\/TIFS.2007.902670","volume":"2","author":"V Monga","year":"2007","unstructured":"Monga V, Mihcak MK (2007) Robust and secure image hashing via non-negative matrix factorizations. IEEE Trans Inf Forensics Secur 2(3):376\u2013390","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"5","key":"437_CR10","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/79.879339","volume":"17","author":"FAP Petitcolas","year":"2000","unstructured":"Petitcolas FAP (2000) Watermarking schemes evaluation. IEEE Signal Process Mag 17(5):58\u201364","journal-title":"IEEE Signal Process Mag"},{"issue":"10","key":"437_CR11","doi-asserted-by":"crossref","first-page":"4020","DOI":"10.1109\/TSP.2005.855414","volume":"53","author":"CD Roover","year":"2005","unstructured":"Roover CD, Vleeschouwer CD, Lefebvre F, Macq B (2005) Robust video hashing based on radial projections of key frames. IEEE Trans Signal Process 53(10):4020\u20134036","journal-title":"IEEE Trans Signal Process"},{"issue":"2","key":"437_CR12","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1109\/TIFS.2006.873601","volume":"1","author":"A Swaminathan","year":"2006","unstructured":"Swaminathan A, Mao Y, Wu M (2006) Robust and secure image hashing. IEEE Trans Inf Forensics Secur 1(2):215\u2013230","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"1","key":"437_CR13","first-page":"18","volume":"2","author":"Z Tang","year":"2008","unstructured":"Tang Z, Wang S, Zhang X, Wei W, Su S (2008) Robust image hashing for tamper detection using non-negative matrix factorization. Journal of Ubiquitous Convergence and Technology 2(1):18\u201326","journal-title":"Journal of Ubiquitous Convergence and Technology"},{"key":"437_CR14","doi-asserted-by":"crossref","unstructured":"Tang Z, Wang S, Zhang X, Wei W (2009) Perceptual similarity metric resilient to rotation for application in robust image hashing. In: Proceedings of the 3rd International Conference on Multimedia and Ubiquitous Engineering (MUE\u201909), Qingdao, China, June 4\u20136, 2009, pp 183\u2013188","DOI":"10.1109\/MUE.2009.42"},{"key":"437_CR15","unstructured":"USC-SIPI Image Database, http:\/\/sipi.usc.edu\/services\/database\/database.html . Accessed 12 Jan. 2007"},{"key":"437_CR16","unstructured":"Venkatesan R, Koon S-M, Jakubowski MH, Moulin P (2000) Robust image hashing. In: Proceedings of IEEE International Conference on Image Processing (ICIP\u201900), Vancouver, Canada, Sep. 10\u201313, 2000, pp 664\u2013666"},{"issue":"4","key":"437_CR17","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1007\/s11741-007-0401-2","volume":"11","author":"S Wang","year":"2007","unstructured":"Wang S, Zhang X (2007) Recent development of perceptual image hashing. Journal of Shanghai University 11(4):323\u2013331","journal-title":"Journal of Shanghai University"},{"issue":"4","key":"437_CR18","doi-asserted-by":"crossref","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600\u2013612","journal-title":"IEEE Trans Image Process"},{"issue":"3","key":"437_CR19","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1007\/s11741-007-0302-2","volume":"11","author":"S Wang","year":"2007","unstructured":"Wang S, Lu X, Su S, Zhang X (2007) Image block feature vectors based on a singular-value information metric and color-texture description. Journal of Shanghai University 11(3):205\u2013209","journal-title":"Journal of Shanghai University"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-009-0437-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-009-0437-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-009-0437-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T23:27:53Z","timestamp":1559345273000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-009-0437-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,1,13]]},"references-count":19,"journal-issue":{"issue":"2-3","published-print":{"date-parts":[[2011,4]]}},"alternative-id":["437"],"URL":"https:\/\/doi.org\/10.1007\/s11042-009-0437-y","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,1,13]]}}}