{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T23:25:51Z","timestamp":1769729151799,"version":"3.49.0"},"reference-count":73,"publisher":"Oxford University Press (OUP)","issue":"11","license":[{"start":{"date-parts":[[2019,12,9]],"date-time":"2019-12-09T00:00:00Z","timestamp":1575849600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/open_access\/funder_policies\/chorus\/standard_publication_model"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61962008"],"award-info":[{"award-number":["61962008"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61562007"],"award-info":[{"award-number":["61562007"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61762017"],"award-info":[{"award-number":["61762017"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61702332"],"award-info":[{"award-number":["61702332"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Guangxi `Bagui Scholar\u2019 Team for Innovation and Research"},{"DOI":"10.13039\/501100004607","name":"Guangxi Natural Science Foundation","doi-asserted-by":"publisher","award":["2017GXNSFAA198222"],"award-info":[{"award-number":["2017GXNSFAA198222"]}],"id":[{"id":"10.13039\/501100004607","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Project of Guangxi Science and Technology","award":["GuiKeAD17195062"],"award-info":[{"award-number":["GuiKeAD17195062"]}]},{"name":"Guangxi 1000-Plan of Training Middle-aged\/Young Teachers in Higher Education Institutions"},{"name":"Guangxi Collaborative Innovation Center of Multi-source Information Integration and Intelligent Processing"},{"name":"Innovation Project of Guangxi Graduate Education","award":["XYCSZ2019066"],"award-info":[{"award-number":["XYCSZ2019066"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,11,17]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>Image hashing is an efficient technique of many multimedia systems, such as image retrieval, image authentication and image copy detection. Classification between robustness and discrimination is one of the most important performances of image hashing. In this paper, we propose a robust image hashing with singular values of quaternion singular value decomposition (QSVD). The key contribution is the innovative use of QSVD, which can extract stable and discriminative image features from CIE L*a*b* color space. In addition, image features of a block are viewed as a point in the Cartesian coordinates and compressed by calculating the Euclidean distance between its point and a reference point. As the Euclidean distance requires smaller storage than the original block features, this technique helps to make a discriminative and compact hash. Experiments with three open image databases are conducted to validate efficiency of our image hashing. The results demonstrate that our image hashing can resist many digital operations and reaches a good discrimination. Receiver operating characteristic curve comparisons illustrate that our image hashing outperforms some state-of-the-art algorithms in classification performance.<\/jats:p>","DOI":"10.1093\/comjnl\/bxz127","type":"journal-article","created":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T19:23:19Z","timestamp":1569957799000},"page":"1656-1671","source":"Crossref","is-referenced-by-count":28,"title":["Robust Image Hashing With Singular Values Of Quaternion SVD"],"prefix":"10.1093","volume":"64","author":[{"given":"Zhenjun","family":"Tang","sequence":"first","affiliation":[{"name":"Guangxi Key Lab of Multi-source Information Mining & Security, and Department of Computer Science, Guangxi Normal University, Guilin 541004, China"}]},{"given":"Mengzhu","family":"Yu","sequence":"additional","affiliation":[{"name":"Guangxi Key Lab of Multi-source Information Mining & Security, and Department of Computer Science, Guangxi Normal University, Guilin 541004, China"}]},{"given":"Heng","family":"Yao","sequence":"additional","affiliation":[{"name":"Shanghai Key Lab of Modern Optical System, and Engineering Research Center of Optical Instrument and System, Ministry of Education, University of Shanghai for Science and Technology, Shanghai 200093, China"}]},{"given":"Hanyun","family":"Zhang","sequence":"additional","affiliation":[{"name":"Guangxi Key Lab of Multi-source Information Mining & Security, and Department of Computer Science, Guangxi Normal University, Guilin 541004, China"}]},{"given":"Chunqiang","family":"Yu","sequence":"additional","affiliation":[{"name":"Guangxi Key Lab of Multi-source Information Mining & Security, and Department of Computer Science, Guangxi Normal University, Guilin 541004, China"}]},{"given":"Xianquan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Guangxi Key Lab of Multi-source Information Mining & Security, and Department of Computer Science, Guangxi Normal University, Guilin 541004, China"}]}],"member":"286","published-online":{"date-parts":[[2019,12,9]]},"reference":[{"key":"2021120104053046800_ref1","doi-asserted-by":"crossref","first-page":"1275","DOI":"10.1093\/comjnl\/bxv079","article-title":"Perceptual hash function based on scale-invariant feature transform and singular value decomposition","volume":"59","author":"Neelima","year":"2016","journal-title":"Comput. J."},{"key":"2021120104053046800_ref2","doi-asserted-by":"crossref","first-page":"686","DOI":"10.1093\/comjnl\/bxr108","article-title":"A novel image signature method for content authentication","volume":"55","author":"Wang","year":"2012","journal-title":"Comput. J."},{"key":"2021120104053046800_ref3","doi-asserted-by":"crossref","first-page":"1695","DOI":"10.1093\/comjnl\/bxy047","article-title":"Perceptual image hashing with weighted DWT features for reduced-reference image quality assessment","volume":"61","author":"Tang","year":"2018","journal-title":"Comput. J."},{"key":"2021120104053046800_ref4","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1007\/s11280-015-0346-0","article-title":"Feature aggregating hashing for image copy detection","volume":"19","author":"Yan","year":"2016","journal-title":"World Wide Web"},{"key":"2021120104053046800_ref5","doi-asserted-by":"crossref","first-page":"989","DOI":"10.1109\/ICIP.2010.5650613","volume-title":"Proc. IEEE Int. Conf. Image Processing (ICIP 2010)","author":"Lu","year":"2010"},{"key":"2021120104053046800_ref6","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1016\/j.jvcir.2012.10.003","article-title":"A novel method for image retrieval based on structure elements\u2019 descriptor","volume":"24","author":"Wang","year":"2013","journal-title":"J. Vis. Commun. Image Represent."},{"key":"2021120104053046800_ref7","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.image.2016.03.007","article-title":"Geometrically invariant image watermarking based on fast radial harmonic Fourier moments","volume":"45","author":"Wang","year":"2016","journal-title":"Signal Process. Image Commun."},{"key":"2021120104053046800_ref8","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1016\/j.inffus.2018.03.006","article-title":"Visual and textual information fusion using Kernel method for content based image retrieval","volume":"44","author":"Unar","year":"2018","journal-title":"Inform. Fusion"},{"key":"2021120104053046800_ref9","doi-asserted-by":"crossref","first-page":"1177","DOI":"10.1016\/j.sigpro.2004.04.001","article-title":"Singular value decomposition of quaternion matrices: a new tool for vector-sensor signal processing","volume":"84","author":"Bihan","year":"2004","journal-title":"Signal Process."},{"key":"2021120104053046800_ref10","first-page":"131","volume-title":"Proc. 2008 IEEE Int. Joint Conf. Neural Networks","author":"Lei","year":"2008"},{"key":"2021120104053046800_ref11","doi-asserted-by":"crossref","first-page":"057002","DOI":"10.1117\/1.OE.51.5.057002","article-title":"Color image registration based on quaternion Fourier transformation","volume":"51","author":"Wang","year":"2012","journal-title":"Opt. Eng."},{"key":"2021120104053046800_ref12","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/TIFS.2007.916275","article-title":"Color image watermarking using multidimensional Fourier transforms","volume":"3","author":"Tsui","year":"2008","journal-title":"IEEE Trans. Inf. Forensics Security"},{"key":"2021120104053046800_ref13","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1016\/j.dsp.2014.02.010","article-title":"Full 4-D quaternion discrete Fourier transform based watermarking for color images","volume":"28","author":"Chen","year":"2014","journal-title":"Digit. Signal Process."},{"key":"2021120104053046800_ref14","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/TIP.2006.884955","article-title":"Hypercomplex Fourier transforms of color images","volume":"16","author":"Ell","year":"2007","journal-title":"IEEE Trans. Image Process."},{"key":"2021120104053046800_ref15","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1016\/j.sigpro.2016.12.010","article-title":"Geometric correction based color image watermarking using fuzzy least squares support vector machine and Bessel K form distribution","volume":"134","author":"Wang","year":"2017","journal-title":"Signal Process."},{"key":"2021120104053046800_ref16","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1016\/j.ins.2018.03.040","article-title":"Quaternion polar harmonic Fourier moments for color images","volume":"450","author":"Wang","year":"2018","journal-title":"Inform. Sci."},{"key":"2021120104053046800_ref17","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1109\/TIFS.2015.2485163","article-title":"Robust image hashing with ring partition and invariant vector distance","volume":"11","author":"Tang","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Security"},{"key":"2021120104053046800_ref18","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1016\/j.cose.2016.07.006","article-title":"Robust image hashing via DCT and LLE","volume":"62","author":"Tang","year":"2016","journal-title":"Comput. Secur."},{"key":"2021120104053046800_ref19","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1109\/TIFS.2006.873601","article-title":"Robust and secure image hashing","volume":"1","author":"Swaminathan","year":"2006","journal-title":"IEEE Trans Inf. Forensics Security"},{"key":"2021120104053046800_ref20","doi-asserted-by":"crossref","first-page":"578","DOI":"10.1016\/j.dsp.2012.11.002","article-title":"Robust image hashing using non-uniform sampling in discrete Fourier domain","volume":"23","author":"Qin","year":"2013","journal-title":"Digit. Signal Process."},{"key":"2021120104053046800_ref21","first-page":"4402","volume-title":"Proc. IEEE Int. Conf. Image Processing (ICIP 2014)","author":"Laradji","year":"2014"},{"key":"2021120104053046800_ref22","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1016\/j.dsp.2015.03.006","article-title":"Robust hashing for image authentication using quaternion discrete Fourier transform and log-polar transform","volume":"41","author":"Ouyang","year":"2015","journal-title":"Digit. Signal Process."},{"key":"2021120104053046800_ref23","first-page":"178","volume-title":"Proc. IEEE Int. Conf. Information Technology: Coding and Computing","author":"Fridrich","year":"2000"},{"key":"2021120104053046800_ref24","doi-asserted-by":"crossref","first-page":"5102","DOI":"10.1016\/j.ijleo.2014.05.015","article-title":"Robust image hashing with dominant DCT coefficients","volume":"125","author":"Tang","year":"2014","journal-title":"Optik"},{"key":"2021120104053046800_ref25","doi-asserted-by":"crossref","first-page":"1336","DOI":"10.1109\/TIFS.2015.2407698","article-title":"A visual model-based perceptual image hash for content authentication","volume":"10","author":"Wang","year":"2015","journal-title":"IEEE Trans. Inf. Forensics and Security"},{"key":"2021120104053046800_ref26","first-page":"664","volume-title":"Proc. IEEE Int. Conf. Image Processing (ICIP 2000)","author":"Venkatesan","year":"2000"},{"key":"2021120104053046800_ref27","doi-asserted-by":"crossref","first-page":"3453","DOI":"10.1109\/TIP.2006.881948","article-title":"Perceptual image hashing via feature points: Performance evaluation and trade-offs","volume":"15","author":"Monga","year":"2006","journal-title":"IEEE Trans. Image Process."},{"key":"2021120104053046800_ref28","doi-asserted-by":"crossref","first-page":"1456","DOI":"10.1016\/j.sigpro.2009.05.024","article-title":"A secure and robust hash-based scheme for image authentication","volume":"90","author":"Ahmed","year":"2010","journal-title":"Signal Process."},{"key":"2021120104053046800_ref29","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1049\/iet-ipr.2013.0332","article-title":"Robust image hashing via colour vector angles and discrete wavelet transform","volume":"8","author":"Tang","year":"2014","journal-title":"IET Image Process."},{"key":"2021120104053046800_ref30","doi-asserted-by":"crossref","first-page":"2396","DOI":"10.1109\/LSP.2015.2487824","article-title":"Robust image hashing based on selective quaternion invariance","volume":"22","author":"Li","year":"2015","journal-title":"IEEE Signal Process. Lett."},{"key":"2021120104053046800_ref31","first-page":"299","volume-title":"Proc. European Signal Processing Conf.","author":"Lefebvre","year":"2002"},{"key":"2021120104053046800_ref32","doi-asserted-by":"crossref","first-page":"2415","DOI":"10.1016\/j.sigpro.2009.05.016","article-title":"A novel image hash algorithm resistant to print\u2013scan","volume":"89","author":"Wu","year":"2009","journal-title":"Signal Process."},{"key":"2021120104053046800_ref33","doi-asserted-by":"crossref","first-page":"280","DOI":"10.1016\/j.image.2011.04.007","article-title":"Robust image hash in Radon transform domain for authentication","volume":"26","author":"Lei","year":"2011","journal-title":"Signal Process. Image Commun."},{"key":"2021120104053046800_ref34","first-page":"2365","article-title":"Robust image hashing based on fan-beam transform","volume":"8","author":"Tang","year":"2014","journal-title":"ICIC Exp. Lett."},{"key":"2021120104053046800_ref35","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1109\/ICIP.1996.560425","volume-title":"Proc. IEEE Int. Conf. Image Processing (ICIP 1996)","author":"Schneider","year":"1996"},{"key":"2021120104053046800_ref36","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1145\/1288869.1288886","article-title":"Histogram-based image hashing scheme robust against geometric deformations","author":"Xiang","year":"2007","journal-title":"Proc. ACM Multimedia and Security Workshop (MM&Sec\u201907)"},{"key":"2021120104053046800_ref37","doi-asserted-by":"crossref","first-page":"6585","DOI":"10.1007\/s11042-015-2591-8","article-title":"Robust hash generation technique for content-based image authentication using histogram","volume":"75","author":"Vadlamudi","year":"2016","journal-title":"Multimed. Tools Appl."},{"key":"2021120104053046800_ref38","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1016\/j.neucom.2018.04.057","article-title":"Image hashing with color vector angle","volume":"308","author":"Tang","year":"2018","journal-title":"Neurocomputing"},{"key":"2021120104053046800_ref39","first-page":"643S","article-title":"Perceptual hashing for color images using invariant moments","volume":"6","author":"Tang","year":"2012","journal-title":"Appl. Math. Inf. Sci."},{"key":"2021120104053046800_ref40","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1109\/TIFS.2012.2223680","article-title":"Robust hashing for image authentication using Zernike moments and local features","volume":"8","author":"Zhao","year":"2013","journal-title":"IEEE Trans. Inf. Forensics Security"},{"key":"2021120104053046800_ref41","doi-asserted-by":"crossref","DOI":"10.1145\/2978572","article-title":"Robust hashing based on quaternion Zernike moments for image authentication","volume":"12","author":"Ouyang","year":"2016","journal-title":"ACM Trans. Multimed. Comput. Commun. Appl."},{"key":"2021120104053046800_ref42","doi-asserted-by":"crossref","first-page":"5441","DOI":"10.1007\/s00034-018-0822-8","article-title":"Robust color image hashing using quaternion polar complex exponential transform for image authentication","volume":"37","author":"Hosny","year":"2018","journal-title":"Circuits Syst. Signal Process."},{"key":"2021120104053046800_ref43","doi-asserted-by":"crossref","first-page":"717","DOI":"10.1016\/j.aeue.2013.02.009","article-title":"Robust image hash function using local color features","volume":"67","author":"Tang","year":"2013","journal-title":"AE\u00dc Int. J. Electron. Commun."},{"key":"2021120104053046800_ref44","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1016\/j.sigpro.2017.07.019","article-title":"Perceptual hashing for color images based on hybrid extraction of structural features","volume":"142","author":"Qin","year":"2018","journal-title":"Signal Process."},{"key":"2021120104053046800_ref45","doi-asserted-by":"crossref","first-page":"6103","DOI":"10.3934\/mbe.2019305","article-title":"Robust image hashing via visual attention model and ring partition","volume":"16","author":"Tang","year":"2019","journal-title":"Math. Biosci. Eng."},{"key":"2021120104053046800_ref46","first-page":"3443","article-title":"Robust perceptual image hashing via matrix invariants","volume":"5","author":"Kozat","year":"2004","journal-title":"Proc. IEEE Int. Conf. Image Processing (ICIP 2004)"},{"key":"2021120104053046800_ref47","first-page":"3794","article-title":"Robust perceptual color image hashing using quaternion singular value decomposition","author":"Ghouti","year":"2014","journal-title":"Proc. IEEE Int. Conf. Acoustic, Speech and Signal Processing (ICASSP2014)"},{"key":"2021120104053046800_ref48","doi-asserted-by":"crossref","first-page":"4639","DOI":"10.1007\/s11042-015-2496-6","article-title":"Perceptual image hashing using center-symmetric local binary patterns","volume":"75","author":"Davarzani","year":"2016","journal-title":"Multimed. Tools Appl."},{"key":"2021120104053046800_ref49","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1007\/s11042-009-0437-y","article-title":"Lexicographical framework for image hashing with implementation based on DCT and NMF","volume":"52","author":"Tang","year":"2011","journal-title":"Multimed. Tools Appl."},{"key":"2021120104053046800_ref50","doi-asserted-by":"crossref","first-page":"711","DOI":"10.1109\/TKDE.2013.45","article-title":"Robust perceptual image hashing based on ring partition and NMF","volume":"26","author":"Tang","year":"2014","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"2021120104053046800_ref51","doi-asserted-by":"crossref","first-page":"715","DOI":"10.1109\/CSSS.2011.5972117","article-title":"Robust image hashing using locally linear embedding","author":"Sun","year":"2011","journal-title":"Proc. 2011 Int. Conf. Computer Science and Service System (CSSS 2011)"},{"key":"2021120104053046800_ref52","doi-asserted-by":"crossref","first-page":"240","DOI":"10.1016\/j.sigpro.2017.02.008","article-title":"Robust image hashing with multidimensional scaling","volume":"137","author":"Tang","year":"2017","journal-title":"Signal Process."},{"key":"2021120104053046800_ref53","first-page":"1285","volume-title":"Proc. IEEE Int. Conf. Image Processing (ICIP 2009)","author":"Kang","year":"2009"},{"key":"2021120104053046800_ref54","doi-asserted-by":"crossref","first-page":"981","DOI":"10.1109\/TIP.2009.2038637","article-title":"Perceptual image hashing based on virtual watermark detection","volume":"19","author":"Khelifi","year":"2010","journal-title":"IEEE Trans. Image Process."},{"key":"2021120104053046800_ref55","doi-asserted-by":"crossref","first-page":"1081","DOI":"10.1109\/TIFS.2012.2190594","article-title":"Perceptual image hashing based on shape contexts and local feature points","volume":"7","author":"Lv","year":"2012","journal-title":"IEEE Trans. Inf. Forensics Security"},{"key":"2021120104053046800_ref56","doi-asserted-by":"crossref","first-page":"1963","DOI":"10.1109\/TIP.2011.2171698","article-title":"Robust image hashing based on random Gabor filtering and dithered lattice vector quantization","volume":"21","author":"Li","year":"2012","journal-title":"IEEE Trans. Image Process."},{"key":"2021120104053046800_ref57","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.sigpro.2015.10.027","article-title":"Multi-scale image hashing using adaptive local feature extraction for robust tampering detection","volume":"121","author":"Yan","year":"2016","journal-title":"Signal Process."},{"key":"2021120104053046800_ref58","doi-asserted-by":"crossref","first-page":"3293","DOI":"10.1016\/j.patcog.2014.04.020","article-title":"The method for image retrieval based on multi-factors correlation utilizing block truncation coding","volume":"47","author":"Wang","year":"2014","journal-title":"Pattern Recognit."},{"key":"2021120104053046800_ref59","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1016\/j.ins.2016.04.036","article-title":"A novel image hashing scheme with perceptual robustness using block truncation coding","volume":"361","author":"Qin","year":"2016","journal-title":"Inform. Sci."},{"key":"2021120104053046800_ref60","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1109\/LSP.2017.2777881","article-title":"Robust image fingerprinting via distortion-resistant sparse coding","volume":"25","author":"Li","year":"2018","journal-title":"IEEE Signal Process. Lett."},{"key":"2021120104053046800_ref61","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/TrustCom.2016.0040","volume-title":"Proc. 2016 IEEE TrustCom\/BigDataSE\/ISPA","author":"Huang","year":"2016"},{"key":"2021120104053046800_ref62","doi-asserted-by":"crossref","first-page":"284","DOI":"10.1016\/j.ins.2017.09.060","article-title":"Perceptual image hashing via dual-cross pattern encoding and salient structure detection","volume":"423","author":"Qin","year":"2018","journal-title":"Inform. Sci."},{"key":"2021120104053046800_ref63","volume-title":"Digital Image Processing","author":"Gonzalez","year":"2007","edition":"3rd"},{"key":"2021120104053046800_ref64","volume-title":"Principles of Digital Image Processing: Core Algorithm","author":"Burger","year":"2009"},{"key":"2021120104053046800_ref65","article-title":"On quaternions","author":"Hamilton","year":"1844","journal-title":"Proceeding of the Royal Irish Academy"},{"key":"2021120104053046800_ref66","doi-asserted-by":"crossref","first-page":"2783","DOI":"10.1109\/78.960426","article-title":"Efficient implementation of quaternion Fourier transform, convolution, and correlation by 2-D complex FFT","volume":"49","author":"Pei","year":"2001","journal-title":"IEEE Trans. Signal Process."},{"key":"2021120104053046800_ref67","first-page":"21","article-title":"Quaternions and matrices of quaternions","volume":"21","author":"Zhang","year":"1987","journal-title":"Linear Algebra Appl."},{"key":"2021120104053046800_ref68","first-page":"805","volume-title":"Proc. IEEE Int. Conf. Image Processing (ICIP 2003)","author":"Pei","year":"2003"},{"key":"2021120104053046800_ref69","author":"Frazen","journal-title":"Kodak lossless true color image suite"},{"key":"2021120104053046800_ref70","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/79.879339","article-title":"Watermarking schemes evaluation","volume":"17","author":"Petitcolas","year":"2000","journal-title":"IEEE Signal Process. Mag."},{"issue":"5307","key":"2021120104053046800_ref71","first-page":"472","article-title":"UCID\u2014an uncompressed colour image database","volume":"2004","author":"Schaefer","year":"2004","journal-title":"Proc. SPIE, Storage and Retrieval Methods and Applications for Multimedia"},{"key":"2021120104053046800_ref72","volume-title":"Ground Truth Database","author":"Li"},{"key":"2021120104053046800_ref73","doi-asserted-by":"crossref","first-page":"861","DOI":"10.1016\/j.patrec.2005.10.010","article-title":"An introduction to ROC analysis","volume":"27","author":"Fawcett","year":"2006","journal-title":"Pattern Recognit. Lett."}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/comjnl\/article-pdf\/64\/11\/1656\/41269385\/bxz127.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/comjnl\/article-pdf\/64\/11\/1656\/41269385\/bxz127.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T05:11:00Z","timestamp":1638335460000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/64\/11\/1656\/5670505"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,9]]},"references-count":73,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2019,12,9]]},"published-print":{"date-parts":[[2021,11,17]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxz127","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"value":"0010-4620","type":"print"},{"value":"1460-2067","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2021,11]]},"published":{"date-parts":[[2019,12,9]]}}}