{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T16:31:23Z","timestamp":1775838683527,"version":"3.50.1"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T00:00:00Z","timestamp":1675209600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T00:00:00Z","timestamp":1675209600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"the Anhui Provincial Key Research and Development Plan","award":["201904a05020091"],"award-info":[{"award-number":["201904a05020091"]}]},{"name":"the Provincial Natural Science Research Program of Higher Education Institutions of Anhui province","award":["KJ2021A1030"],"award-info":[{"award-number":["KJ2021A1030"]}]},{"name":"the Key Scientific Research Projects of Chaohu University","award":["XLZ-202108"],"award-info":[{"award-number":["XLZ-202108"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Real-Time Image Proc"],"published-print":{"date-parts":[[2023,2]]},"DOI":"10.1007\/s11554-023-01269-9","type":"journal-article","created":{"date-parts":[[2023,2,2]],"date-time":"2023-02-02T13:05:44Z","timestamp":1675343144000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Image perceptual hashing for content authentication based on Watson\u2019s visual model and LLE"],"prefix":"10.1007","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5414-3408","authenticated-orcid":false,"given":"Huifen","family":"Xing","sequence":"first","affiliation":[]},{"given":"Hui","family":"Che","sequence":"additional","affiliation":[]},{"given":"Qilin","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Honghai","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,2,2]]},"reference":[{"issue":"3","key":"1269_CR1","first-page":"507","volume":"10","author":"J Li","year":"2014","unstructured":"Li, J., Li, X., Yang, B., Sun, X.: Segmentation-based image copy-move forgery detection scheme. IEEE Trans. Inform. Foren. Secur. 10(3), 507\u2013518 (2014)","journal-title":"IEEE Trans. Inform. Foren. Secur."},{"key":"1269_CR2","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2019.2909936","author":"Z Zhou","year":"2020","unstructured":"Zhou, Z., Wu, Q.M.J., Wan, S., Sun, W., Sun, X.: Integrating SIFT and CNN feature matching for partial-duplicate image detection. IEEE Trans. Emerg. Top. Comput. Intell. (2020). https:\/\/doi.org\/10.1109\/TETCI.2019.2909936","journal-title":"IEEE Trans. Emerg. Top. Comput. Intell."},{"issue":"10","key":"1269_CR3","doi-asserted-by":"publisher","first-page":"11609","DOI":"10.1007\/s11042-017-4809-4","volume":"77","author":"CM Pun","year":"2018","unstructured":"Pun, C.M., Yan, C.P., Yuan, X.C.: Robust image hashing using progressive feature selection for tampering detection. Multimed. Tools Appl. 77(10), 11609\u201311633 (2018)","journal-title":"Multimed. Tools Appl."},{"key":"1269_CR4","doi-asserted-by":"publisher","first-page":"115642","DOI":"10.1016\/j.image.2019.115642","volume":"80","author":"X Wang","year":"2019","unstructured":"Wang, X., Zhou, X., Zhang, Q., Xu, B., Xue, J.: Image alignment based perceptual image hash for content authentication. Signal Proces. Image Commun. 80, 115642 (2019)","journal-title":"Signal Proces. Image Commun."},{"key":"1269_CR5","doi-asserted-by":"publisher","first-page":"115713","DOI":"10.1016\/j.image.2019.115713","volume":"81","author":"L Du","year":"2019","unstructured":"Du, L., Ho, A.T., Cong, R.: Perceptual hashing for image authentication: a survey. Signal Proces. Image Commun. 81, 115713 (2019)","journal-title":"Signal Proces. Image Commun."},{"key":"1269_CR6","doi-asserted-by":"crossref","unstructured":"Schneider, M., Chang, S.F.: A robust content based digital signature for image authentication. In: Proceedings of the IEEE International Conference on Image Processing (ICIP), pp. 227\u2212230. IEEE, Piscataway (1996)","DOI":"10.1109\/ICIP.1996.560425"},{"issue":"18","key":"1269_CR7","doi-asserted-by":"publisher","first-page":"5102","DOI":"10.1016\/j.ijleo.2014.05.015","volume":"125","author":"Z Tang","year":"2014","unstructured":"Tang, Z., Yang, F., Huang, L., Zhang, X.Q.: Robust image hashing with dominant DCT coefficients. Optik-Int. J. Light Electron Opt. 125(18), 5102\u20135107 (2014)","journal-title":"Optik-Int. J. Light Electron Opt."},{"issue":"11","key":"1269_CR8","doi-asserted-by":"publisher","first-page":"1695","DOI":"10.1093\/comjnl\/bxy047","volume":"61","author":"Z Tang","year":"2018","unstructured":"Tang, Z., Huang, Z., Yao, Z.H., et al.: Perceptual image hashing with weighted DWT features for reduced-reference image quality assessment. Comput. J. 61(11), 1695\u20131709 (2018)","journal-title":"Comput. J."},{"key":"1269_CR9","doi-asserted-by":"publisher","first-page":"2587","DOI":"10.1109\/TIFS.2020.2971142","volume":"15","author":"SM Abdullahi","year":"2020","unstructured":"Abdullahi, S.M., Wang, H., Li, T.: Fractal coding-based robust and alignment-free fingerprint image hashing. IEEE Trans. Inf. Forens. Secur. 15, 2587\u20132601 (2020)","journal-title":"IEEE Trans. Inf. Forens. Secur."},{"issue":"3","key":"1269_CR10","doi-asserted-by":"publisher","first-page":"1081","DOI":"10.1109\/TIFS.2012.2190594","volume":"17","author":"X Lv","year":"2012","unstructured":"Lv, X., Wang, Z.J.: Perceptual image hashing based on shape contexts and local feature points. IEEE Trans. Inform. Foren. Secur. 17(3), 1081\u20131093 (2012)","journal-title":"IEEE Trans. Inform. Foren. Secur."},{"key":"1269_CR11","doi-asserted-by":"crossref","unstructured":"Paul, M., Karsh, R.K., Ahmed Talukdar, F.: Image hashing based on shape context and speeded up robust features. In: 2019 International Conference on Automation, Computational and Technology Management (ICACTM), pp. 464\u2013468 (2019)","DOI":"10.1109\/ICACTM.2019.8776713"},{"key":"1269_CR12","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3050435","author":"SP Singh","year":"2021","unstructured":"Singh, S.P., Bhatnagar, G., Singh, A.K.: A new robust reference image hashing system. IEEE Trans. Depend. Secure Comput. (2021). https:\/\/doi.org\/10.1109\/TDSC.2021.3050435","journal-title":"IEEE Trans. Depend. Secure Comput."},{"issue":"4","key":"1269_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2978572","volume":"12","author":"J Ouyang","year":"2016","unstructured":"Ouyang, J., Wen, X., Liu, J., Chen, J.: Robust hashing based on quaternion Zernike moments for image authentication. ACM Trans. Multimed. Comput. Commun. Appl. 12(4), 1\u201313 (2016)","journal-title":"ACM Trans. Multimed. Comput. Commun. Appl."},{"key":"1269_CR14","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2020.3027001","author":"Z Huang","year":"2020","unstructured":"Huang, Z., Liu, S.: Perceptual hashing with visual content understanding for reduced-reference screen content image quality assessment. IEEE Trans. Circ. Syst. Video Technol. (2020). https:\/\/doi.org\/10.1109\/TCSVT.2020.3027001","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"key":"1269_CR15","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2020.3002146","author":"Z Su","year":"2020","unstructured":"Su, Z., Yao, L., Mei, J., Zhou, L., Li, W.: Learning to hash for personalized image authentication. IEEE Trans. Circ. Syst. Video Technol. (2020). https:\/\/doi.org\/10.1109\/TCSVT.2020.3002146","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"key":"1269_CR16","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxz127","author":"Z Tang","year":"2019","unstructured":"Tang, Z., Yu, M., Yao, H., Zhang, H., Yu, C., Zhang, X.Q.: Robust image hashing with singular values of quaternion SVD. Comput. J. (2019). https:\/\/doi.org\/10.1093\/comjnl\/bxz127","journal-title":"Comput. J."},{"issue":"3","key":"1269_CR17","doi-asserted-by":"publisher","first-page":"711","DOI":"10.1109\/TKDE.2013.45","volume":"26","author":"Z Tang","year":"2014","unstructured":"Tang, Z., Zhang, X., Zhang, S.: Robust perceptual image hashing based on ring partition and NMF. IEEE Trans. Knowl. Data Eng. 26(3), 711\u2013724 (2014)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"1269_CR18","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/j.cose.2016.07.006","volume":"62","author":"Z Tang","year":"2016","unstructured":"Tang, Z., Lao, H., Zhang, X.Q., Liu, K.: Robust image hashing via DCT and LLE. Comput. Secur. 62, 133\u2013148 (2016)","journal-title":"Comput. Secur."},{"key":"1269_CR19","doi-asserted-by":"crossref","unstructured":"Sun, R., Yan, X., Ding, Z.: Robust image hashing using locally linear embedding. In: Proc. of the 2011 International Conference on Computer Science and Service System (CSSS), pp. 715\u2013718 (2011)","DOI":"10.1109\/CSSS.2011.5972117"},{"issue":"3","key":"1269_CR20","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/s00530-020-00696-z","volume":"27","author":"X Liang","year":"2020","unstructured":"Liang, X., Tang, Z., Xie, X., Wu, J., Zhang, X.: Robust and fast image hashing with two-dimensional PCA. Multimed. Syst. 27(3), 389\u2013401 (2020)","journal-title":"Multimed. Syst."},{"issue":"6","key":"1269_CR21","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1016\/j.image.2011.04.007","volume":"26","author":"Y Lei","year":"2011","unstructured":"Lei, Y., Wang, Y., Huang, J.: Robust image hash in Radon transform domain for authentication. Signal Process. Image Commun. 26(6), 280\u2013288 (2011)","journal-title":"Signal Process. Image Commun."},{"issue":"8","key":"1269_CR22","first-page":"2365","volume":"8","author":"Z Tang","year":"2014","unstructured":"Tang, Z., Huang, L., Yang, F., Zhang, X.: Robust image hashing based on fan-beam transform. ICIC Express Lett. 8(8), 2365\u20132372 (2014)","journal-title":"ICIC Express Lett."},{"issue":"4","key":"1269_CR23","doi-asserted-by":"publisher","first-page":"1963","DOI":"10.1109\/TIP.2011.2171698","volume":"21","author":"Y Li","year":"2012","unstructured":"Li, Y., Lu, Z., Zhu, C.E., Niu, X.: Robust image hashing based on random gabor filtering and dithered lattice vector quantization. IEEE Trans. Image Process 21(4), 1963\u20131980 (2012)","journal-title":"IEEE Trans. Image Process"},{"key":"1269_CR24","doi-asserted-by":"publisher","first-page":"1516","DOI":"10.1109\/TMM.2020.2999188","volume":"23","author":"Z Huang","year":"2020","unstructured":"Huang, Z., Liu, S.: Perceptual image hashing with texture and invariant vector distance for copy detection. IEEE Trans. Multimedia 23, 1516\u20131529 (2020)","journal-title":"IEEE Trans. Multimedia"},{"key":"1269_CR25","first-page":"1","volume":"4","author":"S Liu","year":"2019","unstructured":"Liu, S., Huang, Z.: Efficient image hashing with geometric invariant vector distance for copy detection. ACM Trans. Multimed. Comput. Commun. Appl. 4, 1\u201322 (2019)","journal-title":"ACM Trans. Multimed. Comput. Commun. Appl."},{"key":"1269_CR26","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.neucom.2018.04.057","volume":"308","author":"Z Tang","year":"2018","unstructured":"Tang, Z., Li, X., Zhang, X., Dai, Y.: Image hashing with color angle. Neurocomputing 308, 147\u2013158 (2018)","journal-title":"Neurocomputing"},{"issue":"1","key":"1269_CR27","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1049\/ipr2.12015","volume":"15","author":"C Huang","year":"2021","unstructured":"Huang, C., Zhou, X., Hu, J., Zhou, Q.: SAR image noise suppression of BEMD by the kernel principle component analysis. IET Image Proc. 15(1), 155\u2013165 (2021)","journal-title":"IET Image Proc."},{"issue":"6","key":"1269_CR28","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1109\/76.475889","volume":"5","author":"C-H Chou","year":"1995","unstructured":"Chou, C.-H., Li, Y.-C.: A perceptually tuned subband image coder based on the measure of just-noticeable-distortion profile [J]. IEEE Trans. Circ. Syst. Video Technol. 5(6), 467\u2013476 (1995)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"issue":"11","key":"1269_CR29","doi-asserted-by":"publisher","first-page":"4523","DOI":"10.1109\/TCSVT.2020.3047142","volume":"31","author":"C Qin","year":"2021","unstructured":"Qin, C., Liu, E., Feng, G., Zhang, X.: Perceptual image hashing for content authentication based on convolutional neural network with multiple constraints. IEEE Trans. Circ. Syst. Video Technol. 31(11), 4523\u20134537 (2021)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"issue":"7","key":"1269_CR30","doi-asserted-by":"publisher","first-page":"1336","DOI":"10.1109\/TIFS.2015.2407698","volume":"10","author":"X Wang","year":"2015","unstructured":"Wang, X., Pang, K., Zhou, X., Zhou, Y., Li, L., Xue, J.: A visual model-based perceptual image hash for content authentication. IEEE Trans. Inf. Foren. Secur. 10(7), 1336\u20131349 (2015)","journal-title":"IEEE Trans. Inf. Foren. Secur."},{"issue":"5","key":"1269_CR31","doi-asserted-by":"publisher","first-page":"901","DOI":"10.1049\/iet-ipr.2019.1157","volume":"14","author":"Z Tang","year":"2020","unstructured":"Tang, Z., Zhang, H., Pun, C.-M., Mengzhu, Yu., Chunqiang, Yu., Zhang, X.: Robust image hashing with visual attention model and invariant moments. IET Image Proc. 14(5), 901\u2013908 (2020)","journal-title":"IET Image Proc."},{"issue":"11","key":"1269_CR32","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1117\/12.152694","volume":"11","author":"AB Watson","year":"1993","unstructured":"Watson, A.B.: DCT quantization matrices visually optimized for individual images. Proc. SPIE. 11(11), 202\u2013216 (1993)","journal-title":"Proc. SPIE."},{"key":"1269_CR33","doi-asserted-by":"publisher","first-page":"2323","DOI":"10.1126\/science.290.5500.2323","volume":"290","author":"ST Roweis","year":"2000","unstructured":"Roweis, S.T., Saul, L.K.: Nonlinear dimensionality reduction by locally linear embedding. Science 290, 2323\u20132360 (2000)","journal-title":"Science"},{"key":"1269_CR34","unstructured":"USC-SIPI Image Database. Retrieved from: Available: http:\/\/sipi.usc.edu\/database\/. Accessed December 2020"},{"key":"1269_CR35","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1117\/12.525375","volume":"5307","author":"G Schaefer","year":"2004","unstructured":"Schaefer, G., Stich, M.: UCID. AN uncompressed colour image database. Proc. SPIE 5307, 472\u2013480 (2004)","journal-title":"Proc. SPIE"},{"issue":"5","key":"1269_CR36","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/79.879339","volume":"17","author":"FAP Petitcolas","year":"2000","unstructured":"Petitcolas, F.A.P.: Watermarking schemes evaluation. IEEE Signal Process. Mag. 17(5), 58\u201364 (2000)","journal-title":"IEEE Signal Process. Mag."},{"issue":"8","key":"1269_CR37","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1016\/j.patrec.2005.10.010","volume":"27","author":"T Fawcett","year":"2016","unstructured":"Fawcett, T.: An introduction to ROC analysis. Pattern Recogn. Lett. 27(8), 861\u2013874 (2016)","journal-title":"Pattern Recogn. Lett."},{"key":"1269_CR38","doi-asserted-by":"crossref","unstructured":"Huang, X., Liu X., Wang, G., Su, M.: A robust image hashing with enhanced randomness by using random walk on zigzag blocking. In: 2016 IEEE Trustcom\/BigDataSE\/ISPA, pp. 14\u201318. IEEE, Piscataway (2016)","DOI":"10.1109\/TrustCom.2016.0040"},{"issue":"Jan","key":"1269_CR39","first-page":"194","volume":"142","author":"C Qin","year":"2017","unstructured":"Qin, C., Sun, M., Chang, C.-C.: Perceptual hashing for color images based on hybrid extraction of structural features. Signal Process. 142(Jan), 194\u2013205 (2017)","journal-title":"Signal Process."},{"issue":"1","key":"1269_CR40","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1109\/TIP.2009.2032890","volume":"19","author":"Z Chen","year":"2010","unstructured":"Chen, Z., Sun, S.K.: A Zernike moment phase-based descriptor for local image representation and matching [J]. IEEE Trans. Image Process. 19(1), 205\u2013219 (2010)","journal-title":"IEEE Trans. Image Process."}],"container-title":["Journal of Real-Time Image Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-023-01269-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11554-023-01269-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-023-01269-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,13]],"date-time":"2024-10-13T13:31:44Z","timestamp":1728826304000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11554-023-01269-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2]]},"references-count":40,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,2]]}},"alternative-id":["1269"],"URL":"https:\/\/doi.org\/10.1007\/s11554-023-01269-9","relation":{},"ISSN":["1861-8200","1861-8219"],"issn-type":[{"value":"1861-8200","type":"print"},{"value":"1861-8219","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,2]]},"assertion":[{"value":"26 September 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 December 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 February 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"7"}}