{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T09:37:30Z","timestamp":1758706650326,"version":"3.37.3"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2016,1,18]],"date-time":"2016-01-18T00:00:00Z","timestamp":1453075200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61271312"],"award-info":[{"award-number":["61271312"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"the Hunan Provincial University Innovation Platform Open Fund Project","award":["14K037"],"award-info":[{"award-number":["14K037"]}]},{"name":"the Research Fund for the Hunan Provincial Natural Science Foundation","award":["2015JJ2056"],"award-info":[{"award-number":["2015JJ2056"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2017,1]]},"DOI":"10.1007\/s11042-015-3225-x","type":"journal-article","created":{"date-parts":[[2016,1,18]],"date-time":"2016-01-18T03:59:05Z","timestamp":1453089545000},"page":"2609-2626","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":32,"title":["Robust hashing for image authentication using SIFT feature and quaternion Zernike moments"],"prefix":"10.1007","volume":"76","author":[{"given":"Junlin","family":"Ouyang","sequence":"first","affiliation":[]},{"given":"Yizhi","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Huazhong","family":"Shu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,18]]},"reference":[{"issue":"4","key":"3225_CR1","doi-asserted-by":"crossref","first-page":"1105","DOI":"10.1109\/TIFS.2012.2194285","volume":"7","author":"S Battiato","year":"2012","unstructured":"Battiato S, Farinella GM, Messina E, Puglisi G (2012) Robust image alignment for tampering detection. IEEE Trans Inf Forensics Secur 7(4):1105\u20131117","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"3225_CR2","doi-asserted-by":"crossref","unstructured":"Chen B, Shu H, Zhang H, Chen G, Luo L (2010) Color image analysis by quaternion Zernike moments. IEEE Int. Conf. Pattern Recognition, pp 625\u2013628","DOI":"10.1109\/ICPR.2010.158"},{"issue":"2","key":"3225_CR3","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1016\/j.sigpro.2011.07.018","volume":"92","author":"B Chen","year":"2012","unstructured":"Chen B, Shu H, Zhang H, Chen G, Luo L (2012) Quaternion Zernike moments and their invariants for color image analysis and object recognition. Signal Process 92(2):308\u2013318","journal-title":"Signal Process"},{"issue":"8","key":"3225_CR4","doi-asserted-by":"crossref","first-page":"861","DOI":"10.1016\/j.patrec.2005.10.010","volume":"27","author":"T Fawcett","year":"2006","unstructured":"Fawcett T (2006) An introduction to ROC analysis. Pattern Recogn Lett 27(8):861\u2013874","journal-title":"Pattern Recogn Lett"},{"key":"3225_CR5","doi-asserted-by":"crossref","unstructured":"Fridrich J, Goljan M (2000) Robust hash functions for digital watermarking. Proc. Information Technology: Coding and Computing, pp 178\u2013183","DOI":"10.1109\/ITCC.2000.844203"},{"key":"3225_CR6","volume-title":"Elements of quaternions","author":"WR Hamilton","year":"1866","unstructured":"Hamilton WR (1866) Elements of quaternions. Longmans Green, London"},{"key":"3225_CR7","doi-asserted-by":"crossref","unstructured":"Kozat SS, Venkatesan R, Mih\u00e7ak MK (2004) Robust perceptual image hashing via matrix invariants. Proc IEEE Int. Conf. Image Process, pp 3443\u20133446","DOI":"10.1109\/ICIP.2004.1421855"},{"key":"3225_CR8","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1023\/B:VISI.0000029664.99615.94","volume":"60","author":"DG Lowe","year":"2004","unstructured":"Lowe DG (2004) Distinctive image features from scale-invariant keypoints. Int J Comput Vis 60:91\u2013110","journal-title":"Int J Comput Vis"},{"key":"3225_CR9","doi-asserted-by":"crossref","unstructured":"Lu W, Wu M (2010) Multimedia forensic hash based on visual words. Proc. IEEE Int. Conf. Image Process, pp 989\u2013992","DOI":"10.1109\/ICIP.2010.5650613"},{"issue":"3","key":"3225_CR10","doi-asserted-by":"crossref","first-page":"1081","DOI":"10.1109\/TIFS.2012.2190594","volume":"7","author":"X Lv","year":"2012","unstructured":"Lv X, Wang ZJ (2012) Perceptual image hashing based on shape contexts and local feature points. IEEE Trans Inf Forensics Secur 7(3):1081\u20131093","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"1","key":"3225_CR11","doi-asserted-by":"crossref","first-page":"376","DOI":"10.1109\/TIFS.2007.902670","volume":"1","author":"V Monga","year":"2007","unstructured":"Monga V, Mhcak M (2007) Robust and secure image hashing via non-negative matrix factorizations. IEEE Trans Inf Forensics Secur 1(1):376\u2013390","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"1","key":"3225_CR12","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1016\/j.dsp.2015.03.006","volume":"41","author":"JL Ouyang","year":"2015","unstructured":"Ouyang JL, Coatrieux G, Shu HZ (2015) Robust hashing for image authentication using quaternion discrete Fourier transform and log-polar transform. Digital Signal Process 41(1):98\u2013109","journal-title":"Digital Signal Process"},{"issue":"2","key":"3225_CR13","doi-asserted-by":"crossref","first-page":"578","DOI":"10.1016\/j.dsp.2012.11.002","volume":"23","author":"C Qin","year":"2012","unstructured":"Qin C, Chang CC, Tsou P-L (2012) Robust image hashing using non-uniform sampling in discrete Fourier domain. Digital Signal Process 23(2):578\u2013585","journal-title":"Digital Signal Process"},{"issue":"10","key":"3225_CR14","doi-asserted-by":"crossref","first-page":"4020","DOI":"10.1109\/TSP.2005.855414","volume":"53","author":"C Roover","year":"2005","unstructured":"Roover C, Vleeschouwer C, Lef\u00e8bvre F, Macq B (2005) Robust video hashing based on radial projections of key frames. IEEE Trans Signal Process 53(10):4020\u20134037","journal-title":"IEEE Trans Signal Process"},{"key":"3225_CR15","doi-asserted-by":"crossref","unstructured":"Roy S, Sun Q (2007) Robust hash for detecting and localizing image tampering. IEEE Int. Conf. Image Processing, pp 117\u2013120","DOI":"10.1109\/ICIP.2007.4379535"},{"issue":"21","key":"3225_CR16","doi-asserted-by":"crossref","first-page":"1979","DOI":"10.1049\/el:19961331","volume":"32","author":"SJ Sangwine","year":"1966","unstructured":"Sangwine SJ (1966) Fourier transforms of colour images using quaternion or hypercomplex numbers. Electron Lett 32(21):1979\u20131980","journal-title":"Electron Lett"},{"key":"3225_CR17","unstructured":"Schaefer G, Stich M (2004) UCID: an uncompressed color image database. Electronic Imaging, pp 472\u2013480"},{"issue":"2","key":"3225_CR18","first-page":"643","volume":"6","author":"Z Tang","year":"2012","unstructured":"Tang Z, Dai Y, Zhang X (2012) Perceptual hashing for color images using invariant moments. Appl Math 6(2):643\u2013650","journal-title":"Appl Math"},{"issue":"1","key":"3225_CR19","first-page":"376","volume":"1","author":"Z Tang","year":"2013","unstructured":"Tang Z, Zhang X, Zhang S (2013) Robust perceptual image hashing based on ring partition and NMF. IEEE Trans Knowl Data Eng 1(1):376\u2013390","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"3225_CR20","unstructured":"USC-SIPI Image database. \nhttp:\/\/sipi.usc.edu\/database\/\n\n, Accessed 26 June 2015"},{"key":"3225_CR21","doi-asserted-by":"crossref","first-page":"782","DOI":"10.1016\/j.jvcir.2012.03.005","volume":"23","author":"XF Wang","year":"2012","unstructured":"Wang XF, Xue JR, Zheng ZQ, Liu ZL, Li N (2012) Image forensic signature for content authenticity analysis. J Vis Commun Image Represent 23:782\u2013797","journal-title":"J Vis Commun Image Represent"},{"key":"3225_CR22","doi-asserted-by":"crossref","unstructured":"Xiang S, Kim H-J, Huang J (2007) Histogram-based image hashing scheme robust against geometric deformations. Proc. ACM Multimedia & Security Workshop, pp. 121\u2013128","DOI":"10.1145\/1288869.1288886"},{"key":"3225_CR23","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/s11042-010-0724-7","volume":"61","author":"SC Yong","year":"2012","unstructured":"Yong SC, Jong HP (2012) Image hash generation method using hierarchical histogram. Multimed Tools Appl 61:181\u2013194","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"3225_CR24","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1109\/TIFS.2012.2223680","volume":"8","author":"Y Zhao","year":"2013","unstructured":"Zhao Y, Wang ZX, Yao H (2013) Robust hashing for image authentication using Zernike moments and local features. IEEE Trans Inf Forensics Secur 8(1):55\u201363","journal-title":"IEEE Trans Inf Forensics Secur"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-015-3225-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-015-3225-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-015-3225-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-015-3225-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T23:32:42Z","timestamp":1559345562000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-015-3225-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1,18]]},"references-count":24,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,1]]}},"alternative-id":["3225"],"URL":"https:\/\/doi.org\/10.1007\/s11042-015-3225-x","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2016,1,18]]}}}