{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T02:45:34Z","timestamp":1767926734088,"version":"3.49.0"},"reference-count":46,"publisher":"Oxford University Press (OUP)","issue":"7","license":[{"start":{"date-parts":[[2019,8,20]],"date-time":"2019-08-20T00:00:00Z","timestamp":1566259200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/open_access\/funder_policies\/chorus\/standard_publication_model"}],"funder":[{"name":"Guangxi 1000-Plan of Training Middle-aged\/Young Teachers in Higher Education Institutions"},{"name":"Project of Guangxi Science and Technology","award":["GuiKeAD16380008"],"award-info":[{"award-number":["GuiKeAD16380008"]}]},{"name":"Project of Guangxi Science and Technology","award":["GuiKeAD17195062"],"award-info":[{"award-number":["GuiKeAD17195062"]}]},{"DOI":"10.13039\/501100004607","name":"Guangxi Natural Science Foundation","doi-asserted-by":"publisher","award":["2017GXNSFAA198222"],"award-info":[{"award-number":["2017GXNSFAA198222"]}],"id":[{"id":"10.13039\/501100004607","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1736211"],"award-info":[{"award-number":["U1736211"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1636101"],"award-info":[{"award-number":["U1636101"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61702332"],"award-info":[{"award-number":["61702332"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61762017"],"award-info":[{"award-number":["61762017"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61562007"],"award-info":[{"award-number":["61562007"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,7,17]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>Video hashing is a novel technique of multimedia processing and finds applications in video retrieval, video copy detection, anti-piracy search and video authentication. In this paper, we propose a robust video hashing based on discrete cosine transform (DCT) and non-negative matrix decomposition (NMF). The proposed video hashing extracts secure features from a normalized video via random partition and dominant DCT coefficients, and exploits NMF to learn a compact representation from the secure features. Experiments with 2050 videos are carried out to validate efficiency of the proposed video hashing. The results show that the proposed video hashing is robust to many digital operations and reaches good discrimination. Receiver operating characteristic (ROC) curve comparisons illustrate that the proposed video hashing outperforms some state-of-the-art algorithms in classification between robustness and discrimination.<\/jats:p>","DOI":"10.1093\/comjnl\/bxz060","type":"journal-article","created":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T11:09:21Z","timestamp":1558091361000},"page":"1017-1030","source":"Crossref","is-referenced-by-count":15,"title":["Video Hashing with DCT and NMF"],"prefix":"10.1093","volume":"63","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3664-1363","authenticated-orcid":false,"given":"Zhenjun","family":"Tang","sequence":"first","affiliation":[{"name":"Guangxi Key Lab of Multi-source Information Mining and Security, Guangxi Normal University, Guilin, China"}]},{"given":"Lv","family":"Chen","sequence":"additional","affiliation":[{"name":"Guangxi Key Lab of Multi-source Information Mining and Security, Guangxi Normal University, Guilin, China"},{"name":"Key Lab of Aerospace Information Security and Trusted Computing, Ministry of Education, Wuhan, China"}]},{"given":"Heng","family":"Yao","sequence":"additional","affiliation":[{"name":"Shanghai Key Lab of Modern Optical System, and Engineering Research Center of Optical Instrument and System, Ministry of Education, University of Shanghai for Science and Technology, Shanghai, China"}]},{"given":"Xianquan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Guangxi Key Lab of Multi-source Information Mining and Security, Guangxi Normal University, Guilin, China"}]},{"given":"Chunqiang","family":"Yu","sequence":"additional","affiliation":[{"name":"Guangxi Key Lab of Multi-source Information Mining and Security, Guangxi Normal University, Guilin, China"}]}],"member":"286","published-online":{"date-parts":[[2019,8,20]]},"reference":[{"key":"2020071706562846700_ref1","doi-asserted-by":"crossref","first-page":"1275","DOI":"10.1093\/comjnl\/bxv079","article-title":"Perceptual hash function based on scale-invariant feature transform and singular value decomposition","volume":"59","author":"Neelima","year":"2016","journal-title":"Comput. J."},{"key":"2020071706562846700_ref2","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1109\/TIFS.2015.2485163","article-title":"Robust image hashing with ring partition and invariant vector distance","volume":"11","author":"Tang","year":"2016","journal-title":"IEEE Trans. Inf. Foren. Sec."},{"key":"2020071706562846700_ref3","doi-asserted-by":"crossref","first-page":"1695","DOI":"10.1093\/comjnl\/bxy047","article-title":"Perceptual image hashing with weighted DWT features for reduced-reference image quality assessment","volume":"61","author":"Tang","year":"2018","journal-title":"Comput. J."},{"key":"2020071706562846700_ref4","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1117\/12.449746","article-title":"Visual Hashing of Digital Video: Applications and Techniques","volume-title":"Proceedings of SPIE: Applications of Digital Image Processing XXIV","author":"Oostveen","year":"2001"},{"key":"2020071706562846700_ref5","first-page":"51","article-title":"A Perceptual Audio Hashing Algorithm: A Tool for Robust Audio Identification and Information Hiding","volume-title":"Lecture Notes in Computer Science","author":"Mihcak","year":"2001"},{"key":"2020071706562846700_ref6","first-page":"3222","article-title":"DLSTM Approach to Video Modeling with Hashing for Large-scale Video Retrieval","volume-title":"Proceedings of the 23rd IEEE International Conference on Pattern Recognition (ICPR)","author":"Zhuang","year":"2016"},{"key":"2020071706562846700_ref7","doi-asserted-by":"crossref","first-page":"1837","DOI":"10.1109\/ICOSP.2010.5656914","article-title":"LLE-based Video Hashing for Video Identification","volume-title":"Proceedings of IEEE International Conference on Signal Processing (ICSP)","author":"Nie","year":"2010"},{"key":"2020071706562846700_ref8","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1016\/j.patcog.2017.03.021","article-title":"Quantization-based hashing: a general framework for scalable image and video retrieval","volume":"75","author":"Song","year":"2018","journal-title":"Pattern Recognit."},{"key":"2020071706562846700_ref9","first-page":"2239","article-title":"A Novel Hashing Algorithm for Video Sequences","volume-title":"Proceedings of IEEE International Conference on Image Processing (ICIP)","author":"Mucedero","year":"2004"},{"key":"2020071706562846700_ref10","first-page":"2295","volume-title":"Proceedings of IEEE Signal Processing and Communications Applications Conference (SPCA)","author":"Co\u015fkun","year":"2004"},{"key":"2020071706562846700_ref11","doi-asserted-by":"crossref","first-page":"4020","DOI":"10.1109\/TSP.2005.855414","article-title":"Robust video hashing based on radial projections of key frames","volume":"53","author":"Roover","year":"2005","journal-title":"IEEE Trans. Signal Process."},{"key":"2020071706562846700_ref12","doi-asserted-by":"crossref","first-page":"983","DOI":"10.1109\/TCSVT.2008.920739","article-title":"Robust video fingerprinting for content-based video identification","volume":"18","author":"Lee","year":"2008","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"2020071706562846700_ref13","first-page":"662","article-title":"From Image Hashing to Video Hashing","volume-title":"Lecture Notes in Computer Science","author":"Weng","year":"2010"},{"key":"2020071706562846700_ref14","first-page":"2112","article-title":"Key-frame based robust video hashing using isometric feature mapping","volume":"7","author":"Nie","year":"2011","journal-title":"J. Comput. Inf. Syst."},{"key":"2020071706562846700_ref15","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/j.cose.2011.11.004","article-title":"A robust hashing algorithm based on SURF for video copy detection","volume":"31","author":"Yang","year":"2011","journal-title":"Comput. Secur."},{"key":"2020071706562846700_ref16","doi-asserted-by":"crossref","first-page":"1190","DOI":"10.1109\/TMM.2006.884614","article-title":"Spatio-temporal transform based video hashing","volume":"8","author":"Coskun","year":"2006","journal-title":"IEEE Trans. Multimedia"},{"key":"2020071706562846700_ref17","first-page":"80","article-title":"Perceptual Hashing of Video Content Based on Differential Block Similarity","volume-title":"Lecture Notes in Computer Science","author":"Zhou","year":"2005"},{"key":"2020071706562846700_ref18","first-page":"69","article-title":"Video Copy Detection Using Temporally Informative Representative Images","volume-title":"Proceedings of International Conference on Machine Learning and Applications","author":"Malekesmaeili","year":"2009"},{"key":"2020071706562846700_ref19","first-page":"694","article-title":"Perceptual Hashing in the 3D-DWT Domain","volume-title":"Proceedings of International Conference on Green Computing and Internet of Things","author":"Saikia","year":"2015"},{"key":"2020071706562846700_ref20","first-page":"24","volume-title":"Proceedings of International Conference on Information Technology Systems and Innovation (ICITSI)","author":"Setyawan","year":"2015"},{"key":"2020071706562846700_ref21","doi-asserted-by":"crossref","first-page":"5303","DOI":"10.1007\/s11042-017-4434-2","article-title":"Multi-granularity geometrically robust video hashing for tampering detection","volume":"77","author":"Chen","year":"2018","journal-title":"Multimed. Tools Appl."},{"key":"2020071706562846700_ref22","doi-asserted-by":"crossref","DOI":"10.1007\/s11042-019-7189-0","article-title":"Perceptual video hashing based on temporal wavelet transform and random projections with application to indexing and retrieval of near-identical videos","author":"Rameshnath","year":"2019","journal-title":"Multimed. Tools Appl."},{"key":"2020071706562846700_ref23","first-page":"433","article-title":"Energy Based Robust Video Hash Algorithm","volume-title":"Proceedings of IEEE International Conference on Computational Intelligence and Security (CIS)","author":"Li","year":"2010"},{"key":"2020071706562846700_ref24","doi-asserted-by":"crossref","first-page":"4397","DOI":"10.1109\/TIP.2012.2206036","article-title":"Robust video hashing via multilinear subspace projections","volume":"21","author":"Li","year":"2012","journal-title":"IEEE Trans. Image Process."},{"key":"2020071706562846700_ref25","doi-asserted-by":"crossref","first-page":"7779","DOI":"10.1007\/s11042-015-2695-1","article-title":"Perceptual video hashing based on Tucker decomposition with application to indexing and retrieval of near-identical videos","volume":"75","author":"Sandeep","year":"2016","journal-title":"Multimed. Tools Appl."},{"key":"2020071706562846700_ref26","doi-asserted-by":"crossref","first-page":"1727","DOI":"10.1109\/TIFS.2015.2425362","article-title":"Twofold video hashing with automatic synchronization","volume":"10","author":"Li","year":"2015","journal-title":"IEEE Trans. Inf. Foren. Sec."},{"key":"2020071706562846700_ref27","doi-asserted-by":"crossref","first-page":"711","DOI":"10.1109\/TKDE.2013.45","article-title":"Robust perceptual image hashing based on ring partition and NMF","volume":"26","author":"Tang","year":"2014","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"2020071706562846700_ref28","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11432-016-5528-6","article-title":"Spherical torus-based video hashing for near-duplicate video detection","volume":"59","author":"Nie","year":"2016","journal-title":"Sci. China Inform. Sci."},{"key":"2020071706562846700_ref29","doi-asserted-by":"crossref","first-page":"1209","DOI":"10.1109\/TMM.2016.2645404","article-title":"Deep video hashing","volume":"19","author":"Liong","year":"2017","journal-title":"IEEE Trans Multimedia"},{"key":"2020071706562846700_ref30","doi-asserted-by":"crossref","first-page":"1993","DOI":"10.1109\/TIP.2018.2882155","article-title":"Unsupervised deep video hashing via balanced code for large-scale video retrieval","volume":"28","author":"Wu","year":"2019","journal-title":"IEEE Trans. Image Process."},{"key":"2020071706562846700_ref31","doi-asserted-by":"crossref","first-page":"202","DOI":"10.4304\/jmm.6.2.202-206","article-title":"Secure image encryption without size limitation using Arnold transform and random strategies","volume":"6","author":"Tang","year":"2011","journal-title":"J. Multimed."},{"key":"2020071706562846700_ref32","doi-asserted-by":"crossref","first-page":"5429","DOI":"10.1007\/s11042-014-1861-1","article-title":"Efficient image encryption with block shuffling and chaotic map","volume":"74","author":"Tang","year":"2015","journal-title":"Multimed. Tools Appl."},{"key":"2020071706562846700_ref33","first-page":"18","article-title":"Robust image hashing for tamper detection using non-negative matrix factorization","volume":"2","author":"Tang","year":"2008","journal-title":"J. Ubiquit. Converge. Technol."},{"key":"2020071706562846700_ref34","doi-asserted-by":"crossref","first-page":"8257","DOI":"10.1007\/s11042-016-3476-1","article-title":"Image encryption based on random projection partition and chaotic system","volume":"76","author":"Tang","year":"2017","journal-title":"Multimed. Tools Appl."},{"key":"2020071706562846700_ref35","doi-asserted-by":"crossref","first-page":"5103","DOI":"10.1016\/j.ijleo.2014.05.015","article-title":"Robust image hashing with dominant DCT coefficients","volume":"125","author":"Tang","year":"2014","journal-title":"Optik Int. J. Light Electron Optics"},{"key":"2020071706562846700_ref36","doi-asserted-by":"crossref","first-page":"788","DOI":"10.1038\/44565","article-title":"Learning the parts of objects by non-negative matrix factorization","volume":"401","author":"Lee","year":"1999","journal-title":"Nature"},{"key":"2020071706562846700_ref37","doi-asserted-by":"crossref","first-page":"2356","DOI":"10.1109\/TCSI.2008.918233","article-title":"Nonnegative matrix factorization applied to nonlinear speech and image cryptosystems","volume":"55","author":"Xie","year":"2008","journal-title":"IEEE Trans. Circuits Syst.. I. Regul. Pap."},{"key":"2020071706562846700_ref38","doi-asserted-by":"crossref","first-page":"1822","DOI":"10.1016\/j.patrec.2011.07.015","article-title":"Large margin based nonnegative matrix factorization and partial least squares regression for face recognition","volume":"32","author":"Pan","year":"2011","journal-title":"Pattern Recognit. Lett."},{"key":"2020071706562846700_ref39","doi-asserted-by":"crossref","first-page":"1590","DOI":"10.1109\/TPAMI.2011.18","article-title":"Nonnegative matrix factorization with earth mover\u2019s distance metric for image analysis","volume":"33","author":"Sandler","year":"2011","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"2020071706562846700_ref40","doi-asserted-by":"crossref","first-page":"1459","DOI":"10.1109\/TKDE.2009.169","article-title":"Non-negative matrix factorization for semisupervised heterogeneous data clustering","volume":"22","author":"Chen","year":"2010","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"2020071706562846700_ref41","first-page":"556","volume-title":"Advances in Neural Information Processing Systems","author":"Lee","year":"2000"},{"key":"2020071706562846700_ref42","doi-asserted-by":"crossref","first-page":"588","DOI":"10.1109\/TIFS.2007.902017","article-title":"A novel discriminant non-negative matrix factorization algorithm with applications to facial image characterization problems","volume":"2","author":"Kotsia","year":"2007","journal-title":"IEEE Trans. Inf. Foren. Sec."},{"key":"2020071706562846700_ref43","author":"Video Trace Library"},{"key":"2020071706562846700_ref44","author":"ReefVid: Free Reef Video Clip Database"},{"key":"2020071706562846700_ref45","doi-asserted-by":"crossref","first-page":"861","DOI":"10.1016\/j.patrec.2005.10.010","article-title":"An introduction to ROC analysis","volume":"27","author":"Fawcett","year":"2006","journal-title":"Pattern Recognit. Lett."},{"key":"2020071706562846700_ref46","first-page":"1","volume-title":"IEEE Standard for Floating-Point Arithmetic","author":"IEEE Std 754\u20132008","year":"2008"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/63\/7\/1017\/33506028\/bxz060.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/63\/7\/1017\/33506028\/bxz060.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,17]],"date-time":"2020-07-17T18:38:04Z","timestamp":1595011084000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/63\/7\/1017\/5540176"}},"subtitle":[],"editor":[{"given":"Fionn","family":"Murtagh","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2019,8,20]]},"references-count":46,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2019,8,20]]},"published-print":{"date-parts":[[2020,7,17]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxz060","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"value":"0010-4620","type":"print"},{"value":"1460-2067","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2020,7]]},"published":{"date-parts":[[2019,8,20]]}}}