{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T02:37:57Z","timestamp":1771468677768,"version":"3.50.1"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1109\/icip.2005.1530332","type":"proceedings-article","created":{"date-parts":[[2005,11,15]],"date-time":"2005-11-15T15:48:27Z","timestamp":1132069707000},"page":"III-77","source":"Crossref","is-referenced-by-count":18,"title":["Robust image hashing based on radial variance of pixels"],"prefix":"10.1109","author":[{"given":"C.","family":"De Roover","sequence":"first","affiliation":[]},{"given":"C.","family":"De Vleeschouwer","sequence":"additional","affiliation":[]},{"given":"F.","family":"Lefebvre","sequence":"additional","affiliation":[]},{"given":"B.","family":"Macq","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2000.899541"},{"key":"2","article-title":"Generating robust digital signature for image\/video authentication","author":"lin","year":"0","journal-title":"ACM Multimedia"},{"key":"10","first-page":"533","article-title":"Rapid scene analysis on compressed video","volume":"5","author":"yeo","year":"1995","journal-title":"IEEE Trans on CSVT"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1998.723518"},{"key":"7","first-page":"153","article-title":"A robust image authentication method distinguishing JPEG compression from malicious manipulation","volume":"11","author":"lin","year":"2001","journal-title":"IEEE Trans on CSVT"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2003.1203613"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ITCC.2000.844203"},{"key":"4","first-page":"121","article-title":"Visual hashing of video: Applications and techniques","volume":"4472","author":"oostveen","year":"0","journal-title":"SPIE"},{"key":"9","article-title":"Rash : Radon soft hash algorithm","author":"lefebvre","year":"2002","journal-title":"EURASIP"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2003.1246789"},{"key":"11","author":"papoulis","year":"1994","journal-title":"\"Probability Random Variables and Stochastic Processes \" Third Edition"}],"event":{"name":"rnational Conference on Image Processing","location":"Genova, Italy","start":{"date-parts":[[2005,9,14]]},"end":{"date-parts":[[2005,9,14]]}},"container-title":["IEEE International Conference on Image Processing 2005"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10242\/32662\/01530332.pdf?arnumber=1530332","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,14]],"date-time":"2017-03-14T22:18:54Z","timestamp":1489529934000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1530332\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/icip.2005.1530332","relation":{},"subject":[],"published":{"date-parts":[[2005]]}}}