{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T17:44:38Z","timestamp":1764783878400},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,3]]},"DOI":"10.1109\/icassp.2016.7472058","type":"proceedings-article","created":{"date-parts":[[2016,6,24]],"date-time":"2016-06-24T01:58:30Z","timestamp":1466733510000},"page":"2154-2158","source":"Crossref","is-referenced-by-count":28,"title":["Robust image hashing based on low-rank and sparse decomposition"],"prefix":"10.1109","author":[{"given":"Yuenan","family":"Li","sequence":"first","affiliation":[]},{"given":"Ping","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2006.881948"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45496-9_5"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2011.2171698"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2005.863502"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2281219"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2015.2395726"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2009.5202795"},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.1117\/12.805919","article-title":"Conception and limits of robust perceptual hashing: toward side information assisted hash functions","author":"voloshynovskiy","year":"2009","journal-title":"Proc SPIE Media Forens Sec XI"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ITA.2010.5454105"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1970392.1970395"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.873601"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-010-0724-7"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2015.2487824"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2097593"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.45"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.902670"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2223680"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2000.899541"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2190594"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.visres.2008.07.012"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2011.2170977"},{"key":"ref21","article-title":"The augmented lagrange multiplier method for exact recovery of corrupted low-rank matrices","author":"lin","year":"2009","journal-title":"UIUC Technical Report UILU-ENG-09-2215"},{"journal-title":"Elements of Information Theory","year":"2006","author":"cover","key":"ref23"}],"event":{"name":"2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","start":{"date-parts":[[2016,3,20]]},"location":"Shanghai","end":{"date-parts":[[2016,3,25]]}},"container-title":["2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7465907\/7471614\/07472058.pdf?arnumber=7472058","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T17:00:08Z","timestamp":1498323608000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7472058\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/icassp.2016.7472058","relation":{},"subject":[],"published":{"date-parts":[[2016,3]]}}}