{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:43:27Z","timestamp":1750308207081,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,9,20]],"date-time":"2004-09-20T00:00:00Z","timestamp":1095638400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,9,20]]},"DOI":"10.1145\/1022431.1022448","type":"proceedings-article","created":{"date-parts":[[2004,10,7]],"date-time":"2004-10-07T17:39:48Z","timestamp":1097170788000},"page":"81-92","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Geometric distortion-resilient image hashing system and its application scalability"],"prefix":"10.1145","author":[{"given":"Chao-Yong","family":"Hsu","sequence":"first","affiliation":[{"name":"Institute of Information Science, Academia Sinica, Taipei City, Taiwan, Republic of China"}]},{"given":"Chun-Shien","family":"Lu","sequence":"additional","affiliation":[{"name":"Institute of Information Science, Academia Sinica, Taipei City, Taiwan, Republic of China"}]}],"member":"320","published-online":{"date-parts":[[2004,9,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2002.801587"},{"key":"e_1_3_2_1_2_1","volume-title":"SPIE: Multimedia Storage and Archiving Systems","volume":"1998","author":"Chang E. Y.","unstructured":"E. Y. Chang , J. Z. Wang , C. Li , and G. Wiederhold , \" RIME:A Replicated Image Detector for the World-Wide-Web,\" Proc . SPIE: Multimedia Storage and Archiving Systems Vol.III, 1998 .]] E. Y. Chang, J. Z. Wang, C. Li, and G. Wiederhold, \"RIME:A Replicated Image Detector for the World-Wide-Web,\" Proc. SPIE: Multimedia Storage and Archiving Systems Vol.III, 1998.]]"},{"key":"e_1_3_2_1_3_1","first-page":"281","volume-title":"SPIE Symposium of Voice, Video, and Data Communications","author":"Chang E. Y.","year":"1999","unstructured":"E. Y. Chang , C. Li , J. Z. Wang , P. Mork , and G. Wiederhold , \" Searching Near-Replicas of Images via Clustering,\" Proc . SPIE Symposium of Voice, Video, and Data Communications pp. 281 -- 292 , Boston , 1999 .]] E. Y. Chang, C. Li, J. Z. Wang, P. Mork, and G. Wiederhold, \"Searching Near-Replicas of Images via Clustering,\" Proc. SPIE Symposium of Voice, Video, and Data Communications pp. 281--92, Boston, 1999.]]"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/839287.841996"},{"key":"e_1_3_2_1_5_1","volume-title":"Proc. SPIE: Security and Watermarking of Multimedia Contents II","author":"Fridrich J.","year":"2000","unstructured":"J. Fridrich , \"Visual Hash for Oblivious Watermarking,\" Proc. SPIE: Security and Watermarking of Multimedia Contents II , 2000 .]] J. Fridrich, \"Visual Hash for Oblivious Watermarking,\" Proc. SPIE: Security and Watermarking of Multimedia Contents II , 2000.]]"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/851038.856624"},{"key":"e_1_3_2_1_7_1","volume-title":"Int. Conf. on Multimedia and Expo special session on Media Identification, J. Oostveen, C. S. Lu, and Q .Sun (co-organizers)","author":"IEEE","year":"2004","unstructured":"IEEE Int. Conf. on Multimedia and Expo special session on Media Identification, J. Oostveen, C. S. Lu, and Q .Sun (co-organizers) , June 2004 .]] IEEE Int. Conf. on Multimedia and Expo special session on Media Identification, J. Oostveen, C. S. Lu, and Q .Sun (co-organizers), June 2004.]]"},{"key":"e_1_3_2_1_8_1","volume-title":"111th AES Convention, in the \"Watermarking versus Fingerprinting\" Workshop","author":"Kalker T.","year":"2001","unstructured":"T. Kalker , \"Applications and Challenges for Audio Fingerprinting, \"Proc. 111th AES Convention, in the \"Watermarking versus Fingerprinting\" Workshop December 3, 2001 .]] T. Kalker, \"Applications and Challenges for Audio Fingerprinting, \"Proc. 111th AES Convention, in the \"Watermarking versus Fingerprinting\" Workshop December 3, 2001.]]"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0923-5965(02)00130-3"},{"key":"e_1_3_2_1_10_1","volume-title":"European Signal Processing Conference Toulouse","author":"Lefebvre F.","year":"2002","unstructured":"F. Lefebvre and B. Macq , \" RA H : RAdon Soft Hash algorithm,\" Proc . European Signal Processing Conference Toulouse , France , 2002 .]] F. Lefebvre and B. Macq, \"RA H : RAdon Soft Hash algorithm,\" Proc. European Signal Processing Conference Toulouse, France, 2002.]]"},{"key":"e_1_3_2_1_11_1","volume-title":"IEEE Int. Conf. on Image Proc.","author":"Lefebvre F.","year":"2003","unstructured":"F. Lefebvre , J. Czyz , and B. Macq , \" A Robust Soft Hash Algorithm for Digital Image Signature,\" Proc . IEEE Int. Conf. on Image Proc. , 2003 .]] F. Lefebvre, J. Czyz, and B. Macq, \"A Robust Soft Hash Algorithm for Digital Image Signature,\" Proc. IEEE Int. Conf. on Image Proc., 2003.]]"},{"key":"e_1_3_2_1_12_1","volume-title":"IEEE Int. Conf. on Image Processing","author":"Li B.","year":"2002","unstructured":"B. Li , E. Chang , and C. T. Wu , \" DPF -- A Perceptual Distance Function for Image Retrieval,\" Proc . IEEE Int. Conf. on Image Processing 2002 .]] B. Li, E. Chang, and C. T. Wu, \"DPF -- A Perceptual Distance Function for Image Retrieval,\" Proc. IEEE Int. Conf. on Image Processing 2002.]]"},{"key":"e_1_3_2_1_13_1","volume-title":"ACM Multimedia and Security Workshop UK","author":"Lin C. Y.","year":"1998","unstructured":"C. Y. Lin and S. F. Chang , \" Generating Robust Digital Signature for Image\/Video Authentication,\" Proc . ACM Multimedia and Security Workshop UK , 1998 .]] C. Y. Lin and S. F. Chang, \"Generating Robust Digital Signature for Image\/Video Authentication,\" Proc. ACM Multimedia and Security Workshop UK, 1998.]]"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/76.905982"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2003.811621"},{"key":"e_1_3_2_1_16_1","volume-title":"Proc. IEEE Int. Symposium on Circuits and Systems Vancouver","author":"Lu C. S.","year":"2004","unstructured":"C. S. Lu , \"On the Security of Structural Information Extraction\/Embedding for Images,\" Proc. IEEE Int. Symposium on Circuits and Systems Vancouver , Canada , 2004 .]] C. S. Lu, \"On the Security of Structural Information Extraction\/Embedding for Images,\" Proc. IEEE Int. Symposium on Circuits and Systems Vancouver, Canada, 2004.]]"},{"key":"e_1_3_2_1_17_1","volume-title":"IEEE Int. Conf. on Multimedia and Expo: special session on Media Identification Taipei","author":"Lu C. S.","year":"2004","unstructured":"C. S. Lu , C. Y. Hsu , S. W. Sun , and P. C. Chang , \" Robust Mesh-based Hashing for Copy Detection and Tracing of Images,\" Proc . IEEE Int. Conf. on Multimedia and Expo: special session on Media Identification Taipei , Taiwan , 2004 .]] C. S. Lu, C. Y. Hsu, S. W. Sun, and P. C. Chang, \"Robust Mesh-based Hashing for Copy Detection and Tracing of Images,\" Proc. IEEE Int. Conf. on Multimedia and Expo: special session on Media Identification Taipei, Taiwan, 2004.]]"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.142909"},{"key":"e_1_3_2_1_19_1","first-page":"176","article-title":"Image Copy Detection Using Dynamic Partial Function","volume":"5021","author":"Meng Y.","year":"2003","unstructured":"Y. Meng and E. Chang , \" Image Copy Detection Using Dynamic Partial Function ,\" Proc. SPIE Storage and Retrieval for Media Database Vol. 5021 , pp. 176 -- 186 , 2003 .]] Y. Meng and E. Chang, \"Image Copy Detection Using Dynamic Partial Function,\" Proc. SPIE Storage and Retrieval for Media Database Vol. 5021, pp. 176--186, 2003.]]","journal-title":"Proc. SPIE Storage and Retrieval for Media Database"},{"key":"e_1_3_2_1_20_1","volume-title":"ACM Workshop on Security and Privacy in Digital Rights Management Philadelphia, PA","author":"Mihcak M. K.","year":"2001","unstructured":"M. K. Mihcak and R. Venkatesan , \" New Iterative Geometric Methods for Robust Perceptual Image Hashing,\" Proc . ACM Workshop on Security and Privacy in Digital Rights Management Philadelphia, PA , 2001 .]] M. K. Mihcak and R. Venkatesan, \"New Iterative Geometric Methods for Robust Perceptual Image Hashing,\" Proc. ACM Workshop on Security and Privacy in Digital Rights Management Philadelphia, PA, 2001.]]"},{"key":"e_1_3_2_1_21_1","volume-title":"Int. Workshop on Multimedia Signal Processing (MMSP), special session on Media Recognition","author":"IEEE","year":"2002","unstructured":"IEEE Int. Workshop on Multimedia Signal Processing (MMSP), special session on Media Recognition , Virgin Islands, USA , 2002 .]] IEEE Int. Workshop on Multimedia Signal Processing (MMSP), special session on Media Recognition, Virgin Islands, USA, 2002.]]"},{"key":"e_1_3_2_1_22_1","first-page":"219","volume-title":"Int. Workshop on Information Hiding LNC 1575","author":"Petitcolas F.","year":"1998","unstructured":"F. Petitcolas , R. J. Anderson , and M. G. Kuhn , \" Attacks on Copyright Marking Systems,\" Proc . Int. Workshop on Information Hiding LNC 1575 , pp. 219 -- 239 , 1998 .]] F. Petitcolas, R. J. Anderson, and M. G. Kuhn, \"Attacks on Copyright Marking Systems,\" Proc. Int. Workshop on Information Hiding LNC 1575, pp. 219--239, 1998.]]"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/79.879339"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2003.12.001"},{"key":"e_1_3_2_1_25_1","volume-title":"IEEE Int. Conf. Image Processing","author":"Venkatesan R.","year":"2000","unstructured":"R. Venkatesan , S. M. Koon , M. H. Jakubowski , and P. Moulin , \" Robust Image Hashing,\" Proc . IEEE Int. Conf. Image Processing 2000 .]] R. Venkatesan, S. M. Koon, M. H. Jakubowski, and P. Moulin, \"Robust Image Hashing,\" Proc. IEEE Int. Conf. Image Processing 2000.]]"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"}],"event":{"name":"MM&Sec '04: Multimedia and Security Workshop 2004","sponsor":["ACM Association for Computing Machinery","SIGMM ACM Special Interest Group on Multimedia"],"location":"Magdeburg Germany","acronym":"MM&Sec '04"},"container-title":["Proceedings of the 2004 workshop on Multimedia and security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1022431.1022448","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1022431.1022448","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:30:57Z","timestamp":1750264257000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1022431.1022448"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,9,20]]},"references-count":26,"alternative-id":["10.1145\/1022431.1022448","10.1145\/1022431"],"URL":"https:\/\/doi.org\/10.1145\/1022431.1022448","relation":{},"subject":[],"published":{"date-parts":[[2004,9,20]]},"assertion":[{"value":"2004-09-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}