{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T04:17:06Z","timestamp":1748751426015},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/iccomm.2014.6866755","type":"proceedings-article","created":{"date-parts":[[2014,7,30]],"date-time":"2014-07-30T17:12:11Z","timestamp":1406740331000},"page":"1-6","source":"Crossref","is-referenced-by-count":6,"title":["Efficient and robust perceptual hashing using log-polar image representation"],"prefix":"10.1109","author":[{"given":"Cezar","family":"Plesca","sequence":"first","affiliation":[]},{"given":"Luciana","family":"Morogan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2223680"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2190594"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-0833-7_8"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.873601"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2004.1421855"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2003.1246789"},{"key":"11","doi-asserted-by":"crossref","DOI":"10.1117\/12.477340","article-title":"On the security of the visual hash function","author":"radhakrishnan","year":"2003","journal-title":"Proc SPIE Security and Watermarking of Multimedia Contents"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1117\/12.526932"},{"key":"3","article-title":"New iterative geometric methods for robust perceptual image hashing","author":"mihc?ak","year":"2000","journal-title":"Proc ACM Workshop Security and Privacy in Digital Rights Management"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2000.899541"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1998.723518"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/ITCC.2000.844203"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2004.826125"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2004.1418845"},{"key":"5","article-title":"The randlet transform: Applications to universal perceptual hashing and image authentication","author":"malkin","year":"2004","journal-title":"Allerton Conference on Communication Control and Computing"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2003.1246725"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/76.905982"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/MMSP.1998.738950"}],"event":{"name":"2014 10th International Conference on Communications (COMM)","start":{"date-parts":[[2014,5,29]]},"location":"Bucharest, Romania","end":{"date-parts":[[2014,5,31]]}},"container-title":["2014 10th International Conference on Communications (COMM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6856368\/6866648\/06866755.pdf?arnumber=6866755","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T13:37:04Z","timestamp":1498138624000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6866755\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/iccomm.2014.6866755","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}