{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:12:09Z","timestamp":1771701129519,"version":"3.50.1"},"reference-count":81,"publisher":"Springer Science and Business Media LLC","issue":"15","license":[{"start":{"date-parts":[[2020,3,19]],"date-time":"2020-03-19T00:00:00Z","timestamp":1584576000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,3,19]],"date-time":"2020-03-19T00:00:00Z","timestamp":1584576000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100010909","name":"Young Scientists Fund","doi-asserted-by":"publisher","award":["61602344"],"award-info":[{"award-number":["61602344"]}],"id":[{"id":"10.13039\/501100010909","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1007\/s11042-020-08736-6","type":"journal-article","created":{"date-parts":[[2020,3,19]],"date-time":"2020-03-19T18:03:07Z","timestamp":1584640987000},"page":"22927-22949","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Binary multi-view perceptual hashing for image authentication"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7752-1814","authenticated-orcid":false,"given":"Ling","family":"Du","sequence":"first","affiliation":[]},{"given":"Zhen","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Anthony T. S.","family":"Ho","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,19]]},"reference":[{"key":"8736_CR1","doi-asserted-by":"crossref","unstructured":"Abbas SQ, Ahmed F, Zivic N, and Ur-Rehman O (2016) \u201cPerceptual image hashing using svd based noise resistant local binary pattern,\u201d in International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2016, pp. 401\u2013407.","DOI":"10.1109\/ICUMT.2016.7765393"},{"key":"8736_CR2","doi-asserted-by":"crossref","unstructured":"Anitha K and Leveenbose P (2015) \u201cEdge detection based salient region detection for accurate image forgery detection,\u201d in IEEE International Conference on Computational Intelligence and Computing Research, pp. 1\u20134","DOI":"10.1109\/ICCIC.2014.7238385"},{"key":"8736_CR3","doi-asserted-by":"crossref","unstructured":"Bondi L, Lameri S, Guera D, Bestagini P, Delp EJ, and Tubaro S (2017) \u201cTampering detection and localization through clustering of camera-based cnn features,\u201d 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp. 1855\u20131864","DOI":"10.1109\/CVPRW.2017.232"},{"issue":"2","key":"8736_CR4","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1016\/j.patcog.2017.08.024","volume":"73","author":"M Brbi","year":"2018","unstructured":"Brbi M, Kopriva I (2018) Multi-view low-rank sparse subspace clustering. Pattern Recogn 73(2):247\u2013258","journal-title":"Pattern Recogn"},{"issue":"19","key":"8736_CR5","doi-asserted-by":"crossref","first-page":"5582","DOI":"10.1016\/j.ijleo.2014.07.006","volume":"125","author":"Y Chen","year":"2014","unstructured":"Chen Y, Yu W, Feng J (2014) Robust image hashing using invariants of tchebichef moments. Optik - International Journal for Light and Electron Optics 125(19):5582\u20135587","journal-title":"Optik - International Journal for Light and Electron Optics"},{"key":"8736_CR6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2018\/4235268","volume":"2018","author":"L Du","year":"2018","unstructured":"Du L, Chen Z, Ke Y (2018) Image hashing for tamper detection with multi-view embedding and perceptual saliency. Advances in Multimedia 2018:1\u201311","journal-title":"Advances in Multimedia"},{"key":"8736_CR7","doi-asserted-by":"crossref","unstructured":"Gao H, Nie F, Li X and Huang H (2015) \u201cMulti-view Subspace Clustering,\u201d in IEEE International Conference on Computer Vision, pp. 2380\u20137504","DOI":"10.1109\/ICCV.2015.482"},{"key":"8736_CR8","doi-asserted-by":"crossref","unstructured":"Ghouti L (2014) \u201cRobust perceptual color image hashing using quaternion singular value decomposition,\u201d in IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 3794\u20133798","DOI":"10.1109\/ICASSP.2014.6854311"},{"key":"8736_CR9","doi-asserted-by":"crossref","unstructured":"Hosny KM, Khedr YM, Khedr WI, and Mohamed ER (2018) \u201cRobust image hashing using exact gaussian-hermite moments,\u201d IET Image Processing, pp. 1\u20138","DOI":"10.1049\/iet-ipr.2018.5661"},{"key":"8736_CR10","doi-asserted-by":"crossref","unstructured":"Huang Z and Liu S (2018) \u201cRobustness and discrimination oriented hashing combining texture and invariant vector distance,\u201d in Proceedings of the 26th ACM International Conference on Multimedia, 2018, pp. 1389\u20131397","DOI":"10.1145\/3240508.3240690"},{"issue":"1","key":"8736_CR11","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1109\/TPAMI.2010.57","volume":"33","author":"H Jgou","year":"2011","unstructured":"Jgou H, Douze M, Schmid C (Jan. 2011) Product quantization for nearest neighbor search. IEEE Trans Pattern Anal Mach Intell 33(1):117\u2013128","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"4","key":"8736_CR12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1117\/1.JEI.27.4.043055","volume":"27","author":"C Jiang","year":"2018","unstructured":"Jiang C, Pang Y (2018) Perceptual image hashing based on a deep convolution neural network for content authentication. Journal of Electronic Imaging 27(4):1\u201311","journal-title":"Journal of Electronic Imaging"},{"key":"8736_CR13","doi-asserted-by":"crossref","unstructured":"Kang LW, Lu CS, and Hsu CY (2010) \u201cCompressive sensing-based image hashing,\u201d in IEEE International Conference on Image Processing, pp. 1277\u20131280","DOI":"10.1109\/ICIP.2009.5413606"},{"issue":"1","key":"8736_CR14","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1109\/LSP.2009.2032451","volume":"17","author":"F Khelifi","year":"2009","unstructured":"Khelifi F, Jiang J (2009) Analysis of the security of perceptual image hashing based on non-negative matrix factorization. IEEE Signal Processing Letters 17(1):43\u201346","journal-title":"IEEE Signal Processing Letters"},{"issue":"3","key":"8736_CR15","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1016\/S0923-5965(02)00130-3","volume":"18","author":"C Kim","year":"2003","unstructured":"Kim C (2003) Content-based image copy detection. Signal Process Image Commun 18(3):169\u2013184","journal-title":"Signal Process Image Commun"},{"key":"8736_CR16","unstructured":"Kozat SS, Mihcak K, Venkatesan R (2004) \u201cRobust perceptual image hashing via matrix invariances,\u201d in IEEE Conf. on Image Processing, pp. 3443\u20133446"},{"key":"8736_CR17","doi-asserted-by":"crossref","unstructured":"Kulis B and Grauman K (2010) \u201cKernelized locality-sensitive hashing for scalable image search,\u201d in in Proc. IEEE 12th Int. Conf. Computer Vision, pp. 2130\u20132137","DOI":"10.1109\/ICCV.2009.5459466"},{"key":"8736_CR18","doi-asserted-by":"crossref","unstructured":"Lefebvre F, Czyz J, Macq B (2003) \u201cA robust soft hash algorithm for digital image signature,\u201d in in Proc. IEEE Int. Conf. Image Processing (ICIP), vol. 2, pp. 495\u2013498","DOI":"10.1109\/ICIP.2003.1246725"},{"key":"8736_CR19","doi-asserted-by":"crossref","unstructured":"Lei Y, Wang Y-G, Huang J (2011) Robust image hash in radon transform domain for authentication. 26:280\u2013288","DOI":"10.1016\/j.image.2011.04.007"},{"key":"8736_CR20","unstructured":"Liu W, Wang J, Kumar S, and Chang SF (2011) \u201cHashing with graphs,\u201d in in Proc. 28th Int. Conf. Machine Learning (ICML), pp. 1\u20138"},{"key":"8736_CR21","unstructured":"Liu W, Wang J, Ji R, Jiang YG, and Chang SF (2012) \u201cSupervised hashing with kernels,\u201d in in Proc. IEEE Conf. Computer Vision and Pattern Recognition (CVPR), pp. 2074\u20132081."},{"issue":"13","key":"8736_CR22","doi-asserted-by":"crossref","first-page":"7681","DOI":"10.1007\/s11042-015-2688-0","volume":"75","author":"H Liu","year":"2016","unstructured":"Liu H, Xiao D, Xiao Y, Zhang Y (2016) Robust image hashing with tampering recovery capability via low-rank and sparse representation. Multimed Tools Appl 75(13):7681\u20137696","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"8736_CR23","first-page":"1","volume":"2009","author":"X Lv","year":"2009","unstructured":"Lv X, Wang ZJ (2009) An extended image hashing concept: content based fingerprinting using fjlt. EURASIP J Inf Security 2009(1):1\u201317","journal-title":"EURASIP J Inf Security"},{"key":"8736_CR24","doi-asserted-by":"crossref","unstructured":"Lv X and Wang ZJ (2009) \u201cAn extended image hashing concept: Content-based fingerprinting using fjlt,\u201d EURASIP J. Information Security, vol. 2009","DOI":"10.1186\/1687-417X-2009-859859"},{"issue":"3","key":"8736_CR25","doi-asserted-by":"crossref","first-page":"1081","DOI":"10.1109\/TIFS.2012.2190594","volume":"7","author":"X Lv","year":"2012","unstructured":"Lv X, Wang ZJ (2012) Perceptual image hashing based on shape contexts and local feature points. IEEE Trans. Inf. Forensics Security 7(3):1081\u20131093","journal-title":"IEEE Trans. Inf. Forensics Security"},{"key":"8736_CR26","doi-asserted-by":"crossref","first-page":"1081","DOI":"10.1109\/TIFS.2012.2190594","volume":"7","author":"X Lv","year":"2012","unstructured":"Lv X, Wang ZJ (2012) Perceptual image hashing based on shape contexts and local feature points. IEEE Transactions on Information Forensics and Security 7:1081\u20131093","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"11","key":"8736_CR27","doi-asserted-by":"crossref","first-page":"1838","DOI":"10.1109\/TIFS.2013.2281219","volume":"8","author":"X Lv","year":"2013","unstructured":"Lv X, Wang A (Nov. 2013) Compressed binary image hashes based on semisupervised spectral embedding. IEEE Trans Inf Forensics Security 8(11):1838\u20131849","journal-title":"IEEE Trans Inf Forensics Security"},{"key":"8736_CR28","doi-asserted-by":"crossref","unstructured":"Monga V and Evans B (2004) \u201cRobust perceptual image hashing using feature points,\u201d in 2004 International Conference on Image Processing, pp. 677\u2013680","DOI":"10.1109\/ICIP.2004.1418845"},{"issue":"11","key":"8736_CR29","doi-asserted-by":"crossref","first-page":"3452","DOI":"10.1109\/TIP.2006.881948","volume":"15","author":"V Monga","year":"2006","unstructured":"Monga V, Evans B (2006) Perceptual image hashing via feature points: performance evaluation and tradeoffs. IEEE Trans Image Process 15(11):3452\u20133465","journal-title":"IEEE Trans Image Process"},{"issue":"3","key":"8736_CR30","doi-asserted-by":"crossref","first-page":"376","DOI":"10.1109\/TIFS.2007.902670","volume":"2","author":"V Monga","year":"2007","unstructured":"Monga V, Mhcak M (Sep. 2007) Robust and secure image hashing via nonnegative matrix factorizations. IEEE Trans. Inf. Forensics Security 2(3):376\u2013390","journal-title":"IEEE Trans. Inf. Forensics Security"},{"key":"8736_CR31","doi-asserted-by":"crossref","first-page":"376","DOI":"10.1109\/TIFS.2007.902670","volume":"2","author":"V Monga","year":"2007","unstructured":"Monga V, Mihcak MK (2007) Robust and secure image hashing via non-negative matrix factorizations. IEEE Transactions on Information Forensics and Security 2:376\u2013390","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"8736_CR32","doi-asserted-by":"crossref","unstructured":"Mu Y, Shen J, and Yan S (2010) \u201cWeakly-supervised hashing in kernel space,\u201d in in Proc. IEEE Conf. Computer Vision and Pattern Recognition (CVPR), pp. 3344\u20133351.","DOI":"10.1109\/CVPR.2010.5540024"},{"key":"8736_CR33","doi-asserted-by":"crossref","unstructured":"Nguyen DQ, Weng L, and Preneel B (2011) \u201cRadon transform-based secure image hashing,\u201d in Communications and Multimedia Security","DOI":"10.1007\/978-3-642-24712-5_17"},{"key":"8736_CR34","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1016\/j.dsp.2015.03.006","volume":"41","author":"J Ouyang","year":"2015","unstructured":"Ouyang J, Coatrieux G, Shu H (2015) Robust hashing for image authentication using quaternion discrete fourier transform and log-polar transform. Digital Signal Processing 41:98\u2013109","journal-title":"Digital Signal Processing"},{"key":"8736_CR35","doi-asserted-by":"crossref","unstructured":"Ouyang J, Wen X, Liu J, and Chen J (2016) \u201cRobust hashing based on quaternion zernike moments for image authentication,\u201d Acm Transactions on Multimedia Computing Communications and Applications, vol. 12, no. 4s, p. 63","DOI":"10.1145\/2978572"},{"key":"8736_CR36","doi-asserted-by":"crossref","unstructured":"Pun CM, Yan CP, and Yuan X (2017) \u201cRobust image hashing using progressive feature selection for tampering detection,\u201d Multimedia Tools and Applications, vol. 77, pp. 11 609\u201311 633","DOI":"10.1007\/s11042-017-4809-4"},{"issue":"2","key":"8736_CR37","doi-asserted-by":"crossref","first-page":"578","DOI":"10.1016\/j.dsp.2012.11.002","volume":"23","author":"C Qin","year":"2013","unstructured":"Qin C, Chang C-H, Tsou P-L (2013) Robust image hashing using non-uniform sampling in discrete fourier domain. Digital Signal Processing 23(2):578\u2013585","journal-title":"Digital Signal Processing"},{"key":"8736_CR38","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1016\/j.displa.2016.09.003","volume":"45","author":"C Qin","year":"2016","unstructured":"Qin C, Chen X, Dong J, Zhang X (2016) Perceptual image hashing with selective sampling for salient structure features. Displays 45:26\u201337","journal-title":"Displays"},{"key":"8736_CR39","doi-asserted-by":"crossref","first-page":"284","DOI":"10.1016\/j.ins.2017.09.060","volume":"423","author":"C Qin","year":"2018","unstructured":"Qin C, Chen X, Luo X, Xinpeng Z, Sun X (2018) Perceptual image hashing via dual-cross pattern encoding and salient structure detection. Inf Sci 423:284\u2013302","journal-title":"Inf Sci"},{"key":"8736_CR40","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1016\/j.sigpro.2017.07.019","volume":"142","author":"C Qin","year":"2018","unstructured":"Qin C, Sun M, Chang C-C (2018) Perceptual hashing for color images based on hybrid extraction of structural features. Signal Process 142:194\u2013205","journal-title":"Signal Process"},{"key":"8736_CR41","doi-asserted-by":"crossref","unstructured":"C. Qin, Y. Hu, H. Yao, X. Duan, and L. Gao (2019) \u201cPerceptual image hashing based on weber local binary pattern and color angle representation,\u201d IEEE Access, vol. 7, pp. 45 460\u201345 471","DOI":"10.1109\/ACCESS.2019.2908029"},{"issue":"7","key":"8736_CR42","doi-asserted-by":"crossref","first-page":"969","DOI":"10.1016\/j.ijar.2008.11.006","volume":"50","author":"R Salakhutdinov","year":"2009","unstructured":"Salakhutdinov R, Hinton G (2009) Semantic hashing. Int J Approx Reason 50(7):969\u2013978","journal-title":"Int J Approx Reason"},{"key":"8736_CR43","doi-asserted-by":"crossref","unstructured":"Srivastava M, Siddiqui J, and Ali MA (2017) \u201cRobust image hashing based on statistical features for copy detection,\u201d in IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics Engineering, pp. 490\u2013495","DOI":"10.1109\/UPCON.2016.7894703"},{"issue":"1","key":"8736_CR44","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1109\/TPAMI.2011.103","volume":"34","author":"MBC Strecha","year":"2012","unstructured":"Strecha MBC, Bronstein A (Jan. 2012) Ldahash: improved matching with smaller descriptors. IEEE Trans Pattern Anal Mach Intell 34(1):66\u201378","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"3","key":"8736_CR45","doi-asserted-by":"crossref","first-page":"1651","DOI":"10.1007\/s11042-012-1188-8","volume":"70","author":"R Sun","year":"2014","unstructured":"Sun R, Zeng W (2014) Secure and robust image hashing via compressive sensing. Multimed Tools Appl 70(3):1651\u20131665","journal-title":"Multimed Tools Appl"},{"key":"8736_CR46","unstructured":"Sun R, Yan X, and Ding Z (2011) \u201cRobust image hashing using locally linear embedding,\u201d in International Conference on Computer Science and Service System, pp. 715\u2013718"},{"issue":"2","key":"8736_CR47","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1109\/TIFS.2006.873601","volume":"1","author":"A Swaminathan","year":"2006","unstructured":"Swaminathan A, Mao Y, Wu M (2006) Robust and secure image hashing. IEEE Trans. Inf. Forensics Security 1(2):215\u2013230","journal-title":"IEEE Trans. Inf. Forensics Security"},{"issue":"11","key":"8736_CR48","doi-asserted-by":"crossref","first-page":"2491","DOI":"10.1109\/TIP.2009.2028251","volume":"18","author":"M Tagliasacchi","year":"2009","unstructured":"Tagliasacchi M, Valenzise G, Tubaro S (2009) Hash-based identification of sparse image tampering. IEEE Trans Image Process 18(11):2491\u20132504","journal-title":"IEEE Trans Image Process"},{"issue":"2\u20133","key":"8736_CR49","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1007\/s11042-009-0437-y","volume":"52","author":"Z Tang","year":"2011","unstructured":"Tang Z, Wang S, Zhang X, Wei W, Zhao Y (2011) Lexicographical framework for image hashing with implementation based on dct and nmf. Multimed Tools Appl 52(2\u20133):325\u2013345","journal-title":"Multimed Tools Appl"},{"issue":"23","key":"8736_CR50","doi-asserted-by":"crossref","first-page":"39","DOI":"10.4156\/jdcta.vol6.issue23.5","volume":"6","author":"Z Tang","year":"2012","unstructured":"Tang Z, Huang L, Dai Y, Yang F (2012) Robust image hashing based on multiple histograms. International Journal of Digital Content Technology and its Applications 6(23):39\u201347","journal-title":"International Journal of Digital Content Technology and its Applications"},{"issue":"7","key":"8736_CR51","doi-asserted-by":"crossref","first-page":"2061","DOI":"10.1016\/j.sigpro.2013.01.008","volume":"93","author":"Z Tang","year":"2013","unstructured":"Tang Z, Zhang X, Huang L, Dai Y (2013) Robust image hashing using ring-based entropies. Signal Process 93(7):2061\u20132069","journal-title":"Signal Process"},{"issue":"18","key":"8736_CR52","doi-asserted-by":"crossref","first-page":"5102","DOI":"10.1016\/j.ijleo.2014.05.015","volume":"125","author":"Z Tang","year":"2014","unstructured":"Tang Z, Yang F, Huang L, Zhang X (2014) Robust image hashing with dominant dct coefficients. Optik - International Journal for Light and Electron Optics 125(18):5102\u20135107","journal-title":"Optik - International Journal for Light and Electron Optics"},{"key":"8736_CR53","doi-asserted-by":"crossref","unstructured":"Tang Z, Dai Y, Zhang X, Huang L, Yang F (2014) Robust image hashing via colour vector angles and discrete wavelet transform. 8:142\u2013149","DOI":"10.1049\/iet-ipr.2013.0332"},{"issue":"C","key":"8736_CR54","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/j.dsp.2015.05.002","volume":"43","author":"Z Tang","year":"2015","unstructured":"Tang Z, Ruan L, Qin C, Zhang X, Yu C (2015) Robust image hashing with embedding vector variance of lle. Digital Signal Processing 43(C):17\u201327","journal-title":"Digital Signal Processing"},{"issue":"1","key":"8736_CR55","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1109\/TIFS.2015.2485163","volume":"11","author":"Z Tang","year":"2016","unstructured":"Tang Z, Zhang X, Li X, Zhang S (2016) Robust image hashing with ring partition and invariant vector distance. IEEE Trans. Inf. Forensics Security 11(1):200\u2013214","journal-title":"IEEE Trans. Inf. Forensics Security"},{"key":"8736_CR56","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1109\/TIFS.2015.2485163","volume":"11","author":"Z Tang","year":"2016","unstructured":"Tang Z, Zhang X, Li X, Zhang S (2016) Robust image hashing with ring partition and invariant vector distance. IEEE Transactions on Information Forensics and Security 11:200\u2013214","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"6","key":"8736_CR57","doi-asserted-by":"crossref","first-page":"833","DOI":"10.1016\/j.aeue.2016.03.010","volume":"70","author":"Z Tang","year":"2016","unstructured":"Tang Z, Huang L, Zhang X, Lao H (2016) Robust image hashing based on color vector angle and canny operator. AEUE - International Journal of Electronics and Communications 70(6):833\u2013841","journal-title":"AEUE - International Journal of Electronics and Communications"},{"issue":"7","key":"8736_CR58","doi-asserted-by":"crossref","first-page":"1724","DOI":"10.1109\/TMM.2018.2889560","volume":"21","author":"C Tang","year":"2019","unstructured":"Tang C, Zhu X, Liu X, Li M, Wang P, Zhang C, Wang L (2019) Learning a joint affinity graph for multiview subspace clustering. IEEE Transactions on Multimedia 21(7):1724\u20131736","journal-title":"IEEE Transactions on Multimedia"},{"key":"8736_CR59","unstructured":"Venkatesan MHJR, Koon SM and Moulin P (2000) \u201cRobust image hashing,\u201d in IEEE Conf. on Image Processing, pp. 664\u2013666"},{"issue":"12","key":"8736_CR60","doi-asserted-by":"crossref","first-page":"2393","DOI":"10.1109\/TPAMI.2012.48","volume":"34","author":"J Wang","year":"2012","unstructured":"Wang J, Kumar S, Chang S (Dec. 2012) Semi-supervised hashing for large-scale search. IEEE Trans Pattern Anal Mach Intell 34(12):2393\u20132406","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"8736_CR61","doi-asserted-by":"crossref","first-page":"782","DOI":"10.1016\/j.jvcir.2012.03.005","volume":"23","author":"X Wang","year":"2012","unstructured":"Wang X, Xue J, Zheng Z, Liu Z, Li N (2012) Image forensic signature for content authenticity analysis. J Visual Communication and Image Representation 23:782\u2013797","journal-title":"J Visual Communication and Image Representation"},{"issue":"7","key":"8736_CR62","doi-asserted-by":"crossref","first-page":"1336","DOI":"10.1109\/TIFS.2015.2407698","volume":"10","author":"X Wang","year":"2015","unstructured":"Wang X, Pang K, Zhou X, Zhou Y, Li L, Xue J (2015) A visual model-based perceptual image hash for content authentication. IEEE Trans. Inf. Forensics Security 10(7):1336\u20131349","journal-title":"IEEE Trans. Inf. Forensics Security"},{"key":"8736_CR63","doi-asserted-by":"crossref","unstructured":"P. Wang, A. Jiang, Y. Cao, Y. Gao, R. Tan, H. He, and M. Zhou (2018) \u201cRobust image hashing based on hybrid approach of scale-invariant feature transform and local binary patterns,\u201d in 2018 IEEE 23rd International Conference on Digital Signal Processing (DSP), 11, pp. 1\u20135","DOI":"10.1109\/ICDSP.2018.8631569"},{"key":"8736_CR64","unstructured":"Weiss Y, Torralba A, and Fergus R (2008) \u201cSpectral hashing,\u201d in in Proc. Advances in Nerual Information Processing Systems, pp. 1753\u20131760."},{"key":"8736_CR65","doi-asserted-by":"crossref","first-page":"2144","DOI":"10.1109\/TIFS.2017.2699942","volume":"12","author":"C-P Yan","year":"2017","unstructured":"Yan C-P, Pun C-M (2017) Multi-scale difference map fusion for tamper localization using binary ranking hashing. IEEE Transactions on Information Forensics and Security 12:2144\u20132158","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"8736_CR66","doi-asserted-by":"crossref","unstructured":"C.-P. Yan, C.-M. Pun, and X.-C. Yuan (2015) \u201cAdaptive local feature based multi-scale image hashing for robust tampering detection,\u201d TENCON 2015\u20132015 IEEE Region 10 Conference, pp. 1\u20134","DOI":"10.1016\/j.sigpro.2015.10.027"},{"issue":"12","key":"8736_CR67","doi-asserted-by":"crossref","first-page":"2664","DOI":"10.1109\/TIFS.2016.2594136","volume":"11","author":"C Yan","year":"2016","unstructured":"Yan C, Pun C, Yuan X (2016) Quaternion-based image hashing for adaptive tampering localization. IEEE Trans. Inf. Forensics Security 11(12):2664\u20132677","journal-title":"IEEE Trans. Inf. Forensics Security"},{"key":"8736_CR68","doi-asserted-by":"crossref","first-page":"2664","DOI":"10.1109\/TIFS.2016.2594136","volume":"11","author":"C-P Yan","year":"2016","unstructured":"Yan C-P, Pun C-M, Yuan X (2016) Quaternion-based image hashing for adaptive tampering localization. IEEE Transactions on Information Forensics and Security 11:2664\u20132677","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"8736_CR69","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.sigpro.2015.10.027","volume":"121","author":"CP Yan","year":"2016","unstructured":"Yan CP, Pun CM, Yuan XC (2016) Multi-scale image hashing using adaptive local feature extraction for robust tampering detection. Signal Process 121:1\u201316","journal-title":"Signal Process"},{"issue":"12","key":"8736_CR70","doi-asserted-by":"crossref","first-page":"1378","DOI":"10.1002\/sec.265","volume":"4","author":"L Yang","year":"2011","unstructured":"Yang L, Chen Q, Tian J, Wu D (2011) Content based image hashing using companding and gray code. Security and Communication Networks 4(12):1378\u20131386","journal-title":"Security and Communication Networks"},{"key":"8736_CR71","doi-asserted-by":"crossref","unstructured":"Yarlagadda SK, G\u00fcera D, Bestagini P, Zhu FM, Tubaro S, and Delp EJ (2018) \u201cSatellite image forgery detection and localization using gan and one-class classifier,\u201d CoRR, vol. abs\/1802.04881","DOI":"10.2352\/ISSN.2470-1173.2018.07.MWSF-214"},{"issue":"10","key":"8736_CR72","doi-asserted-by":"crossref","first-page":"2887","DOI":"10.1109\/TCYB.2017.2751646","volume":"48","author":"K Zhan","year":"2018","unstructured":"Zhan K, Zhang C, Guan J, Wang J (2018) Graph learning for multiview clustering. IEEE Transactions on Cybernetics 48(10):2887\u20132895","journal-title":"IEEE Transactions on Cybernetics"},{"issue":"3","key":"8736_CR73","doi-asserted-by":"crossref","first-page":"1261","DOI":"10.1109\/TIP.2018.2877335","volume":"28","author":"K Zhan","year":"2019","unstructured":"Zhan K, Nie F, Wang J, Yang Y (2019) Multiview consensus graph clustering. IEEE Trans Image Process 28(3):1261\u20131270","journal-title":"IEEE Trans Image Process"},{"issue":"10","key":"8736_CR74","doi-asserted-by":"crossref","first-page":"1984","DOI":"10.1109\/TKDE.2018.2872061","volume":"31","author":"K Zhan","year":"2019","unstructured":"Zhan K, Niu C, Chen C, Nie F, Zhang C, Yang Y (2019) Graph structure fusion for multiview clustering. IEEE Trans Knowl Data Eng 31(10):1984\u20131993","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"8736_CR75","unstructured":"D. Zhang, J. Chen, and B. Shao (2015) \u201cPerceptual image hashing based on zernike moment and entropy,\u201d Electronic Science and Technology"},{"key":"8736_CR76","doi-asserted-by":"crossref","unstructured":"Zhang C, Hu Q, Fu H, Zhu P, Cao X (2017) \u201cLatent Multi-view Subspace Clustering,\u201d in IEEE Conference on Computer Vision and Pattern Recognition, pp. 1063\u20136919","DOI":"10.1109\/CVPR.2017.461"},{"key":"8736_CR77","unstructured":"Zhang Z, Liu L, Shen F, Shen HT, and Shao L (2018) \u201cBinary multi-view clustering,\u201d IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. PP, no. 99, pp. 1\u20131"},{"key":"8736_CR78","unstructured":"Zhang C, Fu H, Hu Q, Cao X, Xie Y, Tao D and Xu D, \u201cGeneralized Latent Multi-View Subspace Clustering,\u201d IEEE Trans. Pattern Analysis and Machine Intelligencel, to be published"},{"key":"8736_CR79","unstructured":"Zhao Y and Wei W (2010) \u201cPerceptual image hash for tampering detection using zernike moments,\u201d in IEEE International Conference on Progress in Informatics and Computing, pp. 738\u2013742."},{"issue":"1","key":"8736_CR80","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1109\/TIFS.2012.2223680","volume":"8","author":"Y Zhao","year":"2013","unstructured":"Zhao Y, Wang S, Zhang X, Yao H (2013) Robust hashing for image authentication using zernike moments and local features. IEEE Transactions on Information Forensics and Security 8(1):55\u201363","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"9","key":"8736_CR81","first-page":"2024","volume":"32","author":"L Zhaoqing","year":"2011","unstructured":"Zhaoqing L, Qiong L, Jingrui L, Xiyuan P (2011) Sift based image hashing algorithm. Chinese Journal of Scientific Instrument 32(9):2024\u20132028","journal-title":"Chinese Journal of Scientific Instrument"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-08736-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-08736-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-08736-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,3]],"date-time":"2021-07-03T09:12:58Z","timestamp":1625303578000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-08736-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,19]]},"references-count":81,"journal-issue":{"issue":"15","published-print":{"date-parts":[[2021,6]]}},"alternative-id":["8736"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-08736-6","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,3,19]]},"assertion":[{"value":"29 July 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 November 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 February 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 March 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}