{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T01:53:28Z","timestamp":1767923608032,"version":"3.49.0"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2017,5,2]],"date-time":"2017-05-02T00:00:00Z","timestamp":1493683200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Image Video Proc."],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1186\/s13640-017-0179-0","type":"journal-article","created":{"date-parts":[[2017,5,2]],"date-time":"2017-05-02T13:04:30Z","timestamp":1493730270000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":40,"title":["Robust image hashing through DWT-SVD and spectral residual method"],"prefix":"10.1186","volume":"2017","author":[{"given":"Ram Kumar","family":"Karsh","sequence":"first","affiliation":[]},{"given":"R. H.","family":"Laskar","sequence":"additional","affiliation":[]},{"family":"Aditi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,2]]},"reference":[{"issue":"7","key":"179_CR1","doi-asserted-by":"publisher","first-page":"1057","DOI":"10.1016\/j.jss.2006.12.001","volume":"80","author":"MN Wu","year":"2007","unstructured":"MN Wu, CC Lin, CC Chang, Novel image copy detection with rotating tolerance. J Syst Softw 80(7), 1057\u20131069 (2007)","journal-title":"J Syst Softw"},{"issue":"3","key":"179_CR2","doi-asserted-by":"publisher","first-page":"711","DOI":"10.1109\/TKDE.2013.45","volume":"26","author":"Z Tang","year":"2014","unstructured":"Z Tang, X Zhang, S Zhang, Robust perceptual image hashing based on ring partition and NMF. IEEE Trans Knowl data Eng 26(3), 711\u2013724 (2014)","journal-title":"IEEE Trans Knowl data Eng"},{"issue":"1","key":"179_CR3","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/TIFS.2012.2223680","volume":"8","author":"Y Zhao","year":"2013","unstructured":"Y Zhao, S Wang, X Zhang, H Yao, Robust hashing for image authentication using Zernike moments and local features. IEEE Trans Inf Forensics Sec 8(1), 55\u201363 (2013)","journal-title":"IEEE Trans Inf Forensics Sec"},{"key":"179_CR4","first-page":"163","volume-title":"Discrete wavelet transform-derived features for digital image texture analysis","author":"M Kocio\u0142ek","year":"2001","unstructured":"M Kocio\u0142ek, A Materka, M Strzelecki, P Szczypi\u0144ski, Discrete wavelet transform-derived features for digital image texture analysis (International Conference on Signals and Electronic Systems, Lodz, Poland, 2001), pp. 163\u2013168"},{"key":"179_CR5","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1109\/ICIP.1996.560425","volume-title":"IEEE Int. Conf. Image Processing","author":"M Schneider","year":"1996","unstructured":"M Schneider, SF Chang, A robust content based digital signature for image authentication, in IEEE Int. Conf. Image Processing, 1996, pp. 227\u2013230"},{"key":"179_CR6","first-page":"664","volume-title":"IEEE Int. Conf. Image Processing","author":"R Venkatesan","year":"2000","unstructured":"R Venkatesan, S-M Koon, MH Jakubowski, P Moulin, Robust image hashing, in IEEE Int. Conf. Image Processing, 2000, pp. 664\u2013666"},{"issue":"5","key":"179_CR7","doi-asserted-by":"publisher","first-page":"1456","DOI":"10.1016\/j.sigpro.2009.05.024","volume":"90","author":"F Ahmed","year":"2010","unstructured":"F Ahmed, MY Siyal, VU Abbas, 5, A secure and robust hash-based scheme for image authentication. Signal Proc 90(5), 1456\u20131470 (2010)","journal-title":"Signal Proc"},{"issue":"11","key":"179_CR8","doi-asserted-by":"publisher","first-page":"3452","DOI":"10.1109\/TIP.2006.881948","volume":"15","author":"V Monga","year":"2006","unstructured":"V Monga, BL Evans, Perceptual image hashing via feature points: performance evaluation and tradeoffs. IEEE Trans Image Proc 15(11), 3452\u20133465 (2006)","journal-title":"IEEE Trans Image Proc"},{"issue":"1","key":"179_CR9","first-page":"79","volume":"68","author":"V Monga","year":"2006","unstructured":"V Monga, A Banerjee, BL Evans, A clustering based approach to perceptual image hashing. IEEE Trans Inf Forensics Sec 68(1), 79 (2006)","journal-title":"IEEE Trans Inf Forensics Sec"},{"key":"179_CR10","first-page":"178","volume-title":"IEEE Int. Conf. Inf. Technology Coding and Computing","author":"J Fridrich","year":"2000","unstructured":"J Fridrich, M Goljan, IEEE Int. Conf. Inf. Technology Coding and Computing, 2000, pp. 178\u2013183. Robust Hash Functions for Digital Watermarking"},{"issue":"2","key":"179_CR11","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1109\/76.905982","volume":"11","author":"CY Lin","year":"2001","unstructured":"CY Lin, SF Chang, A robust image authentication system distinguishing JPEG compression from malicious manipulation. IEEE Trans Circ Syst Vid Tech 11(2), 153\u2013168 (2001)","journal-title":"IEEE Trans Circ Syst Vid Tech"},{"issue":"2","key":"179_CR12","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1109\/TIFS.2006.873601","volume":"1","author":"A Swaminathan","year":"2006","unstructured":"A Swaminathan, Y Mao, M Wu, Robust and secure image hashing. IEEE Trans Inf Forensics Sec 1(2), 215\u2013230 (2006)","journal-title":"IEEE Trans Inf Forensics Sec"},{"key":"179_CR13","first-page":"1","volume":"1","author":"G Laimer","year":"2008","unstructured":"G Laimer, A Uhl, Key-dependent JPEG2000-based robust hashing for secure image authentication. EURASIP J Inf Secur 1, 1 (2008)","journal-title":"EURASIP J Inf Secur"},{"key":"179_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2009\/859859","volume":"1","author":"X Lv","year":"2009","unstructured":"X Lv, W ZJane, An extended image hashing concept: content-based fingerprinting using FJLT. EURASIP J Inf Secur 1, 1 (2009)","journal-title":"EURASIP J Inf Secur"},{"key":"179_CR15","first-page":"1","volume":"1","author":"S Xiang","year":"2012","unstructured":"S Xiang, Y Jianquan, Block-based image hashing with restricted blocking strategy for rotational robustness. EURASIP J Adv Sig Proc 1, 1\u201313 (2012)","journal-title":"EURASIP J Adv Sig Proc"},{"key":"179_CR16","first-page":"3443","volume-title":"IEEE Int. Conf. Image Processing","author":"SS Kozat","year":"2004","unstructured":"SS Kozat, R Venkatesan, MK Mihcak, Robust perceptual image hashing via matrix invariants, in IEEE Int. Conf. Image Processing, 2004, pp. 3443\u20133446"},{"issue":"3","key":"179_CR17","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1109\/TIFS.2007.902670","volume":"2","author":"V Monga","year":"2007","unstructured":"V Monga, MK Mihcak, Robust and secure image hashing via non-negative matrix factorizations. IEEE Trans Inf Forensics Sec 2(3), 376\u2013390 (2007)","journal-title":"IEEE Trans Inf Forensics Sec"},{"issue":"1","key":"179_CR18","first-page":"18","volume":"2","author":"Z Tang","year":"2008","unstructured":"Z Tang, S Wang, X Zhang, W Wei, S Su, Robust image hashing for tamper detection using non-negative matrix factorization. J Ubiquitous Convergence Tech 2(1), 18\u201326 (2008)","journal-title":"J Ubiquitous Convergence Tech"},{"key":"179_CR19","first-page":"1285","volume-title":"IEEE Int. Conf. Image Processing","author":"L-W Kang","year":"2009","unstructured":"L-W Kang, C-S Lu, C-Y Hsu, Compressive sensing-based image hashing, in IEEE Int. Conf. Image Processing, 2009, pp. 1285\u20131288"},{"issue":"2\u20133","key":"179_CR20","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/s11042-009-0437-y","volume":"52","author":"Z Tang","year":"2011","unstructured":"Z Tang, S Wang, X Zhang, W Wei, Y Zhao, Lexicographical framework for image hashing with implementation based on DCT and NMF. Multimed Tools Appl 52(2\u20133), 325\u2013345 (2011)","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"179_CR21","doi-asserted-by":"publisher","first-page":"1081","DOI":"10.1109\/TIFS.2012.2190594","volume":"7","author":"X Lv","year":"2012","unstructured":"X Lv, Z Jane Wang, Perceptual image hashing based on shape contexts and local feature points. IEEE Trans Inf Forensics Sec 7(3), 1081\u20131093 (2012)","journal-title":"IEEE Trans Inf Forensics Sec"},{"issue":"(2S","key":"179_CR22","first-page":"643S","volume":"6","author":"Z Tang","year":"2012","unstructured":"Z Tang, Y Dai, X Zhang, Perceptual hashing for color images using invariant moments. Appl Math Inf Sci 6((2S), 643S\u2013650S (2012)","journal-title":"Appl Math Inf Sci"},{"issue":"7","key":"179_CR23","doi-asserted-by":"publisher","first-page":"2061","DOI":"10.1016\/j.sigpro.2013.01.008","volume":"93","author":"Z Tang","year":"2013","unstructured":"Z Tang, X Zhang, L Huang, Y Dai, Robust image hashing using ring-based entropies. Signal Process 93(7), 2061\u20132069 (2013)","journal-title":"Signal Process"},{"issue":"1","key":"179_CR24","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1109\/TIFS.2015.2485163","volume":"11","author":"Z Tang","year":"2016","unstructured":"Z Tang, X Zhang, X Li, S Zhang, Robust image hashing with ring partition and invariant vector distance. IEEE Trans Inf Forensics Sec 11(1), 200\u2013214 (2016)","journal-title":"IEEE Trans Inf Forensics Sec"},{"issue":"3","key":"179_CR25","doi-asserted-by":"publisher","first-page":"1651","DOI":"10.1007\/s11042-012-1188-8","volume":"70","author":"R Sun","year":"2014","unstructured":"R Sun, W Zeng, Secure and robust image hashing via compressive sensing. MultimedTools Appl 70(3), 1651\u20131665 (2014)","journal-title":"MultimedTools Appl"},{"issue":"7","key":"179_CR26","doi-asserted-by":"publisher","first-page":"1336","DOI":"10.1109\/TIFS.2015.2407698","volume":"10","author":"X Wang","year":"2015","unstructured":"X Wang, K Pang, X Zhou et al., A visual model-based perceptual image hash for content authentication. IEEE Trans Inf Forensic Sec 10(7), 1336\u20131349 (2015)","journal-title":"IEEE Trans Inf Forensic Sec"},{"key":"179_CR27","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1016\/j.dsp.2015.03.006","volume":"41","author":"J Ouyang","year":"2015","unstructured":"J Ouyang, G Coatrieux, H Shu, Robust hashing for image authentication using quaternion discrete Fourier transform and log-polar transform. Digital Signal Process 41, 98\u2013109 (2015)","journal-title":"Digital Signal Process"},{"issue":"2","key":"179_CR28","first-page":"2396","volume":"22","author":"YN Li","year":"2015","unstructured":"YN Li, P Wang, YT Su, Robust image hashing based on selective quaternion invariance. IEEE Signal Proc Lett 22(2), 2396\u20132400 (2015)","journal-title":"IEEE Signal Proc Lett"},{"key":"179_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.sigpro.2015.10.027","volume":"121","author":"CP Yan","year":"2016","unstructured":"CP Yan, CM Pun, XC Yuan, Multi-scale image hashing using adaptive local feature extraction for robust tampering detection. Signal Proc 121, 1\u201316 (2016)","journal-title":"Signal Proc"},{"key":"179_CR30","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.ins.2016.04.036","volume":"361","author":"C Qin","year":"2016","unstructured":"C Qin, X Chen, D Ye et al., A novel image hashing scheme with perceptual robustness using block truncation coding. Inf Sci 361, 84\u201399 (2016)","journal-title":"Inf Sci"},{"key":"179_CR31","doi-asserted-by":"publisher","first-page":"833","DOI":"10.1016\/j.aeue.2016.03.010","volume":"70","author":"Z Tang","year":"2016","unstructured":"Z Tang, L Huang, X Zhang et al., Robust image hashing based on color vector angle and canny operator. Int J Electron Comm 70, 833\u2013841 (2016)","journal-title":"Int J Electron Comm"},{"key":"179_CR32","doi-asserted-by":"crossref","unstructured":"R.A.P Hernandez; M.N. Miyatake; B.N. Kurukoski, Robust Image Hashing Using Image Normalization and SVD Decomposition, In Circuits and Systems (MWSCAS), IEEE 54thInternational Midwest Symposium, 2011, Seoul, Korea, pp. 1-4","DOI":"10.1109\/MWSCAS.2011.6026372"},{"key":"179_CR33","first-page":"473","volume-title":"SVD based algorithms for robust face and object recognition in robust vision application (automation and robotics in construction","author":"S Noushath","year":"2007","unstructured":"S Noushath, R Ashok, G Hemanth Kumar, SVD based algorithms for robust face and object recognition in robust vision application (automation and robotics in construction (Symposium, IIT Madras, India, 2007), pp. 473\u2013477"},{"issue":"3","key":"179_CR34","first-page":"1","volume":"1","author":"YS Bute","year":"2012","unstructured":"YS Bute, RW Jasutkar, Implementation of discrete wavelet transform processor for image compression. Int J Comp Sci Netw 1(3), 1\u20135 (2012)","journal-title":"Int J Comp Sci Netw"},{"issue":"3","key":"179_CR35","first-page":"598","volume":"4","author":"D Gupta","year":"2015","unstructured":"D Gupta, S Choubey, Discrete wavelet transform for image processing. Int J EmergTechnol Adv Eng 4(3), 598\u2013602 (2015)","journal-title":"Int J EmergTechnol Adv Eng"},{"key":"179_CR36","first-page":"1","volume-title":"IEEE Int. Conf. Computer Vision and Pattern Recognition","author":"X Hou","year":"2007","unstructured":"X Hou, L Zhang, Saliency detection: a spectral residual approach, in IEEE Int. Conf. Computer Vision and Pattern Recognition, 2007, pp. 1\u20138"},{"key":"179_CR37","first-page":"254","volume-title":"IEEE Int. Conf. on. Higher Order Whitening of Natural Images","author":"J Gluckman","year":"2005","unstructured":"J Gluckman, in computer vision and pattern recognition (CVPR), in IEEE Int. Conf. on. Higher Order Whitening of Natural Images, 2005, pp. 254\u2013360"},{"issue":"17","key":"179_CR38","doi-asserted-by":"publisher","first-page":"2759","DOI":"10.1016\/0042-6989(96)00002-8","volume":"36","author":"A Schaaf van der","year":"1996","unstructured":"A van der Schaaf, J van Hateren, Modelling the power spectra of natural images. Stat Inf Vis Res 36(17), 2759\u20132770 (1996)","journal-title":"Stat Inf Vis Res"},{"issue":"4","key":"179_CR39","doi-asserted-by":"publisher","first-page":"517","DOI":"10.1088\/0954-898X_5_4_006","volume":"5","author":"D Ruderman","year":"1994","unstructured":"D Ruderman, The statistics of natural images. Netw Comput Neural Syst 5(4), 517\u2013548 (1994)","journal-title":"Netw Comput Neural Syst"},{"issue":"23","key":"179_CR40","doi-asserted-by":"publisher","first-page":"3385","DOI":"10.1016\/S0042-6989(97)00008-4","volume":"37","author":"D Ruderman","year":"1997","unstructured":"D Ruderman, Origins of scaling in natural images. Vis Res 37(23), 3385\u20133395 (1997)","journal-title":"Vis Res"},{"issue":"4","key":"179_CR41","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/02564602.2016.1200500","volume":"33","author":"Z Tang","year":"2016","unstructured":"Z Tang, X Li, J Song, M Wei, X Zhang, Color space selection in image hashing: an experimental study. IETE Tech Rev 33(4), 1\u20138 (2016)","journal-title":"IETE Tech Rev"},{"key":"179_CR42","unstructured":"Dong, Jing, and Wei Wang. CASIA tampered image detection evaluation database. (2011). [Online] Available: http:\/\/forensics.idealtest.org ."},{"key":"179_CR43","unstructured":"U. SIPI, USC-SIPI Image Database, [online] Available: http:\/\/sipi.usc.edu\/database\/ , 2007"},{"issue":"5","key":"179_CR44","first-page":"1","volume":"17","author":"FAP Petitcolas","year":"2000","unstructured":"FAP Petitcolas, Watermarking schemes evaluation. IEEE Signal Proc Mag 17(5), 1\u20134 (2000)","journal-title":"IEEE Signal Proc Mag"},{"key":"179_CR45","unstructured":"Ground Truth Database, [online] Available: http:\/\/imagedatabase.cs.washington.edu\/groundtruth\/ . Accessed 8 May 2008."},{"key":"179_CR46","first-page":"1","volume":"2","author":"M Mishra","year":"2013","unstructured":"M Mishra, MC Adhikary, Digital image tamper detection techniques: a comprehensive study. Int J Computer Sci Bus Inform 2, 1\u201312 (2013)","journal-title":"Int J Computer Sci Bus Inform"}],"container-title":["EURASIP Journal on Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13640-017-0179-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13640-017-0179-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13640-017-0179-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,22]],"date-time":"2019-09-22T21:14:30Z","timestamp":1569186870000},"score":1,"resource":{"primary":{"URL":"https:\/\/jivp-eurasipjournals.springeropen.com\/articles\/10.1186\/s13640-017-0179-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,2]]},"references-count":46,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,12]]}},"alternative-id":["179"],"URL":"https:\/\/doi.org\/10.1186\/s13640-017-0179-0","relation":{},"ISSN":["1687-5281"],"issn-type":[{"value":"1687-5281","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,5,2]]},"article-number":"31"}}