{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,11]],"date-time":"2026-01-11T05:54:13Z","timestamp":1768110853808,"version":"3.49.0"},"reference-count":43,"publisher":"Oxford University Press (OUP)","issue":"11","license":[{"start":{"date-parts":[[2018,5,4]],"date-time":"2018-05-04T00:00:00Z","timestamp":1525392000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/open_access\/funder_policies\/chorus\/standard_publication_model"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61562007"],"award-info":[{"award-number":["61562007"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61300109"],"award-info":[{"award-number":["61300109"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61762017"],"award-info":[{"award-number":["61762017"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61702332"],"award-info":[{"award-number":["61702332"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61363034"],"award-info":[{"award-number":["61363034"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004607","name":"Guangxi Natural Science Foundation","doi-asserted-by":"crossref","award":["2017GXNSFAA198222"],"award-info":[{"award-number":["2017GXNSFAA198222"]}],"id":[{"id":"10.13039\/501100004607","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100004607","name":"Guangxi Natural Science Foundation","doi-asserted-by":"crossref","award":["2015GXNSFDA139040"],"award-info":[{"award-number":["2015GXNSFDA139040"]}],"id":[{"id":"10.13039\/501100004607","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Project of Guangxi Science and Technology","award":["GuiKeAD17195062"],"award-info":[{"award-number":["GuiKeAD17195062"]}]},{"name":"Project of the Guangxi Key Lab of Multi-source Information Mining & Security","award":["16-A-02-02"],"award-info":[{"award-number":["16-A-02-02"]}]},{"name":"Project of the Guangxi Key Lab of Multi-source Information Mining & Security","award":["15-A-02-02"],"award-info":[{"award-number":["15-A-02-02"]}]},{"name":"Project of the Guangxi Key Lab of Multi-source Information Mining & Security","award":["14-A-02-02"],"award-info":[{"award-number":["14-A-02-02"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,11,1]]},"DOI":"10.1093\/comjnl\/bxy047","type":"journal-article","created":{"date-parts":[[2018,4,14]],"date-time":"2018-04-14T15:07:01Z","timestamp":1523718421000},"page":"1695-1709","source":"Crossref","is-referenced-by-count":47,"title":["Perceptual Image Hashing with Weighted DWT Features for Reduced-Reference Image Quality Assessment"],"prefix":"10.1093","volume":"61","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3664-1363","authenticated-orcid":false,"given":"Zhenjun","family":"Tang","sequence":"first","affiliation":[{"name":"Guangxi Key Lab of Multi-source Information Mining & Security, Guangxi Normal University, Guilin, China"},{"name":"Department of Computer Science, Guangxi Normal University, Guilin, China"},{"name":"Guangxi Collaborative Innovation Center of Multi-source Information Integration and Intelligent Processing, Guangxi Normal University, Guilin, China"}]},{"given":"Ziqing","family":"Huang","sequence":"additional","affiliation":[{"name":"Guangxi Key Lab of Multi-source Information Mining & Security, Guangxi Normal University, Guilin, China"},{"name":"Department of Computer Science, Guangxi Normal University, Guilin, China"}]},{"given":"Heng","family":"Yao","sequence":"additional","affiliation":[{"name":"Shanghai Key Lab of Modern Optical System, Engineering Research Center of Optical Instrument and System, Ministry of Education, University of Shanghai for Science and Technology, Shanghai, China"}]},{"given":"Xianquan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Guangxi Key Lab of Multi-source Information Mining & Security, Guangxi Normal University, Guilin, China"},{"name":"Department of Computer Science, Guangxi Normal University, Guilin, China"},{"name":"Guangxi Collaborative Innovation Center of Multi-source Information Integration and Intelligent Processing, Guangxi Normal University, Guilin, China"}]},{"given":"Lv","family":"Chen","sequence":"additional","affiliation":[{"name":"Guangxi Key Lab of Multi-source Information Mining & Security, Guangxi Normal University, Guilin, China"},{"name":"Department of Computer Science, Guangxi Normal University, Guilin, China"}]},{"given":"Chunqiang","family":"Yu","sequence":"additional","affiliation":[{"name":"Guangxi Key Lab of Multi-source Information Mining & Security, Guangxi Normal University, Guilin, China"}]}],"member":"286","published-online":{"date-parts":[[2018,5,4]]},"reference":[{"key":"key\n\t\t\t\t2018103007204742200_bxy047C1","author":"Venkatesan","year":"2000"},{"key":"key\n\t\t\t\t2018103007204742200_bxy047C2","doi-asserted-by":"crossref","first-page":"1275","DOI":"10.1093\/comjnl\/bxv079","article-title":"Perceptual hash function based on scale-invariant feature transform and singular value decomposition","volume":"59","author":"Neelima","year":"2016","journal-title":"Comput. J."},{"key":"key\n\t\t\t\t2018103007204742200_bxy047C3","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1109\/MSP.2007.914237","article-title":"Locality-sensitive hashing for finding nearest neighbors","volume":"25","author":"Slaney","year":"2008","journal-title":"IEEE Signal Process. Mag."},{"key":"key\n\t\t\t\t2018103007204742200_bxy047C4","doi-asserted-by":"crossref","first-page":"686","DOI":"10.1093\/comjnl\/bxr108","article-title":"A novel image signature method for content authentication","volume":"55","author":"Wang","year":"2012","journal-title":"Comput. J."},{"key":"key\n\t\t\t\t2018103007204742200_bxy047C5","doi-asserted-by":"crossref","first-page":"6585","DOI":"10.1007\/s11042-015-2591-8","article-title":"Robust hash generation technique for content-based image authentication using histogram","volume":"75","author":"Vadlamudi","year":"2016","journal-title":"Multimed. Tools Appl."},{"key":"key\n\t\t\t\t2018103007204742200_bxy047C6","doi-asserted-by":"crossref","first-page":"1383","DOI":"10.1093\/comjnl\/bxu008","article-title":"Content-based image retrieval of axial brain slices using a novel LBP with a ternary encoding","volume":"57","author":"Varghese","year":"2014","journal-title":"Comput. J."},{"key":"key\n\t\t\t\t2018103007204742200_bxy047C7","author":"Lu","year":"2004"},{"key":"key\n\t\t\t\t2018103007204742200_bxy047C8","author":"Lu","year":"2010"},{"key":"key\n\t\t\t\t2018103007204742200_bxy047C9","first-page":"18","article-title":"Robust image hashing for tamper detection using non-negative matrix factorization","volume":"2","author":"Tang","year":"2008","journal-title":"J. Ubiquitous Convergence Technol."},{"key":"key\n\t\t\t\t2018103007204742200_bxy047C10","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1109\/TIFS.2015.2485163","article-title":"Robust image hashing with ring partition and invariant vector distance","volume":"11","author":"Tang","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"key\n\t\t\t\t2018103007204742200_bxy047C11","author":"Fridrich","year":"2000"},{"key":"key\n\t\t\t\t2018103007204742200_bxy047C12","author":"Lefebvre","year":"2002"},{"key":"key\n\t\t\t\t2018103007204742200_bxy047C13","author":"Ou","year":"2009"},{"key":"key\n\t\t\t\t2018103007204742200_bxy047C14","doi-asserted-by":"crossref","first-page":"280","DOI":"10.1016\/j.image.2011.04.007","article-title":"Robust image hash in Radon transform domain for authentication","volume":"26","author":"Lei","year":"2011","journal-title":"Signal Process. Image Commun."},{"key":"key\n\t\t\t\t2018103007204742200_bxy047C15","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1109\/76.905982","article-title":"A robust image authentication method distinguishing JPEG compression from malicious manipulation","volume":"11","author":"Lin","year":"2001","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"key\n\t\t\t\t2018103007204742200_bxy047C16","doi-asserted-by":"crossref","first-page":"1456","DOI":"10.1016\/j.sigpro.2009.05.024","article-title":"A secure and robust hash-based scheme for image authentication","volume":"90","author":"Ahmed","year":"2010","journal-title":"Signal Process."},{"key":"key\n\t\t\t\t2018103007204742200_bxy047C17","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1007\/s11042-009-0437-y","article-title":"Lexicographical framework for image hashing with implementation based on DCT and NMF","volume":"52","author":"Tang","year":"2011","journal-title":"Multimed. Tools Appl."},{"key":"key\n\t\t\t\t2018103007204742200_bxy047C18","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1049\/iet-ipr.2013.0332","article-title":"Robust image hashing via colour vector angles and discrete wavelet transform","volume":"8","author":"Tang","year":"2014","journal-title":"IET Image Process."},{"key":"key\n\t\t\t\t2018103007204742200_bxy047C19","author":"Kozat","year":"2004"},{"key":"key\n\t\t\t\t2018103007204742200_bxy047C20","doi-asserted-by":"crossref","first-page":"4639","DOI":"10.1007\/s11042-015-2496-6","article-title":"Perceptual image hashing using center-symmetric local binary patterns","volume":"75","author":"Davarzani","year":"2016","journal-title":"Multimed. Tools Appl."},{"key":"key\n\t\t\t\t2018103007204742200_bxy047C21","doi-asserted-by":"crossref","first-page":"376","DOI":"10.1109\/TIFS.2007.902670","article-title":"Robust and secure image hashing via non-negative matrix factorizations","volume":"2","author":"Monga","year":"2007","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"key\n\t\t\t\t2018103007204742200_bxy047C22","doi-asserted-by":"crossref","first-page":"711","DOI":"10.1109\/TKDE.2013.45","article-title":"Robust Perceptual image hashing based on ring partition and NMF","volume":"26","author":"Tang","year":"2014","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"key\n\t\t\t\t2018103007204742200_bxy047C23","doi-asserted-by":"crossref","first-page":"1963","DOI":"10.1109\/TIP.2011.2171698","article-title":"Robust image hashing based on random Gabor filtering and dithered lattice vector quantization","volume":"21","author":"Li","year":"2012","journal-title":"IEEE Trans. Image Process."},{"key":"key\n\t\t\t\t2018103007204742200_bxy047C24","doi-asserted-by":"crossref","first-page":"39","DOI":"10.4156\/jdcta.vol6.issue23.5","article-title":"Robust image hashing based on multiple histograms","volume":"6","author":"Tang","year":"2012","journal-title":"Int. J. Digit. Content Technol. Appl."},{"key":"key\n\t\t\t\t2018103007204742200_bxy047C25","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1109\/TIFS.2012.2223680","article-title":"Robust hashing for image authentication using Zernike moments and local features","volume":"8","author":"Zhao","year":"2013","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"key\n\t\t\t\t2018103007204742200_bxy047C26","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.sigpro.2015.10.027","article-title":"Multi-scale image hashing using adaptive local feature extraction for robust tampering detection","volume":"121","author":"Yan","year":"2016","journal-title":"Signal Process."},{"key":"key\n\t\t\t\t2018103007204742200_bxy047C27","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1016\/j.ins.2016.04.036","article-title":"A novel image hashing scheme with perceptual robustness using block truncation coding","volume":"361","author":"Qin","year":"2016","journal-title":"Inf. Sci."},{"key":"key\n\t\t\t\t2018103007204742200_bxy047C28","author":"Huang","year":"2016"},{"key":"key\n\t\t\t\t2018103007204742200_bxy047C29","doi-asserted-by":"crossref","first-page":"240","DOI":"10.1016\/j.sigpro.2017.02.008","article-title":"Robust image hashing with multidimensional scaling","volume":"137","author":"Tang","year":"2017","journal-title":"Signal Process."},{"key":"key\n\t\t\t\t2018103007204742200_bxy047C30","doi-asserted-by":"crossref","first-page":"833","DOI":"10.1016\/j.aeue.2016.03.010","article-title":"Robust image hashing based on color vector angle and Canny operator","volume":"70","author":"Tang","year":"2016","journal-title":"AE\u00dc-Int. J. Electron. Commun."},{"key":"key\n\t\t\t\t2018103007204742200_bxy047C31","author":"Zhang","year":"2010"},{"key":"key\n\t\t\t\t2018103007204742200_bxy047C32","doi-asserted-by":"crossref","first-page":"679","DOI":"10.1109\/TPAMI.1986.4767851","article-title":"A computational approach to edge detection","volume":"8","author":"Canny","year":"1986","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"key\n\t\t\t\t2018103007204742200_bxy047C33","author":"Jegou","year":"2016"},{"key":"key\n\t\t\t\t2018103007204742200_bxy047C34","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/79.879339","article-title":"Watermarking schemes evaluation","volume":"17","author":"Petitcolas","year":"2000","journal-title":"IEEE Signal Process. Mag."},{"key":"key\n\t\t\t\t2018103007204742200_bxy047C35","author":"Schaefer","year":"2004"},{"key":"key\n\t\t\t\t2018103007204742200_bxy047C36","doi-asserted-by":"crossref","first-page":"861","DOI":"10.1016\/j.patrec.2005.10.010","article-title":"An introduction to ROC analysis","volume":"27","author":"Fawcett","year":"2006","journal-title":"Pattern Recognit. Lett."},{"key":"key\n\t\t\t\t2018103007204742200_bxy047C37","first-page":"1","volume-title":"IEEE Standard for Floating-Point Arithmetic","author":"IEEE Std 754\u20132008","year":"2008"},{"key":"key\n\t\t\t\t2018103007204742200_bxy047C38","doi-asserted-by":"crossref","first-page":"1700","DOI":"10.1109\/TMM.2013.2266093","article-title":"Reduced-reference image quality assessment with visual information fidelity","volume":"15","author":"Wu","year":"2013","journal-title":"IEEE Trans. Multimed."},{"key":"key\n\t\t\t\t2018103007204742200_bxy047C39","author":"Tang","year":"2009"},{"key":"key\n\t\t\t\t2018103007204742200_bxy047C40","author":"Sheikh","year":"2012"},{"key":"key\n\t\t\t\t2018103007204742200_bxy047C41","doi-asserted-by":"crossref","first-page":"874","DOI":"10.1016\/j.jvcir.2014.01.008","article-title":"Visual-PSNR measure of image quality","volume":"25","author":"Tanchenko","year":"2014","journal-title":"J. Vis. Commun. Image Representation"},{"key":"key\n\t\t\t\t2018103007204742200_bxy047C42","doi-asserted-by":"crossref","first-page":"600","DOI":"10.1109\/TIP.2003.819861","article-title":"Image quality assessment: from error visibility to structural similarity","volume":"13","author":"Wang","year":"2004","journal-title":"IEEE Trans. Image Process."},{"key":"key\n\t\t\t\t2018103007204742200_bxy047C43","author":"Kim","year":"2013"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/61\/11\/1695\/26194555\/bxy047.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,15]],"date-time":"2019-10-15T17:01:16Z","timestamp":1571158876000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/61\/11\/1695\/4993055"}},"subtitle":[],"editor":[{"given":"Fionn","family":"Murtagh","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2018,5,4]]},"references-count":43,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2018,5,4]]},"published-print":{"date-parts":[[2018,11,1]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxy047","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"value":"0010-4620","type":"print"},{"value":"1460-2067","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2018,11]]},"published":{"date-parts":[[2018,5,4]]}}}