{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T07:01:48Z","timestamp":1770706908969,"version":"3.49.0"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,1,8]],"date-time":"2019-01-08T00:00:00Z","timestamp":1546905600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Image Video Proc."],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1186\/s13640-018-0400-9","type":"journal-article","created":{"date-parts":[[2019,1,8]],"date-time":"2019-01-08T10:50:36Z","timestamp":1546944636000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Self-feedback image retrieval algorithm based on annular color moments"],"prefix":"10.1186","volume":"2019","author":[{"given":"Ying","family":"Deng","sequence":"first","affiliation":[]},{"given":"Yuanhui","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,8]]},"reference":[{"key":"400_CR1","volume-title":"Online Multimedia Information Analysis and Retrieval","author":"YT Zhuang","year":"2002","unstructured":"Y.T. Zhuang, Q. Pan, F. Wu, Online Multimedia Information Analysis and Retrieval (Tsinghua University Press, Beijing, 2002)."},{"key":"400_CR2","first-page":"664","volume-title":"Robust image hashing","author":"R Venkatesan","year":"2000","unstructured":"R. Venkatesan, S.-M. Koon, M.H. Jakubowski, P. Moulin, Robust image hashing (Proceedings of IEEE International Conference on Image Processing (ICIP2000), Vancouer, 2000), pp. 664\u2013666."},{"issue":"2","key":"400_CR3","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1109\/TKDE.2016.2562624","volume":"29","author":"L Zhu","year":"2017","unstructured":"L. Zhu, J. Shen, L. Xie, Z. Cheng, Unsupervised visual hashing with semantic assistant for content-based image retrieval. IEEE Trans. Knowl. Data Eng. 29(2), 472\u2013486 (2017).","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"8","key":"400_CR4","first-page":"1690","volume":"49","author":"Q Chuan","year":"2012","unstructured":"Q. Chuan, C.C. Chen, G. Cheng, Perceptual robust image hashing scheme based on secret sharing. J. Comput. Res. Dev. 49(8), 1690\u20131698 (2012).","journal-title":"J. Comput. Res. Dev."},{"issue":"18","key":"400_CR5","doi-asserted-by":"publisher","first-page":"5102","DOI":"10.1016\/j.ijleo.2014.05.015","volume":"125","author":"Z TANG","year":"2014","unstructured":"Z. TANG, F. YANG, L. HUANG, et al., Image hashing with dominant DCT coefficients. Opt. Int. J Light Electron. Opt. 125(18), 5102\u20135107 (2014).","journal-title":"Opt. Int. J Light Electron. Opt."},{"key":"400_CR6","first-page":"121","volume-title":"Histogram-Based Image Hashing Scheme Robust against Geometric Deformations. Workshop Multimedia Security","author":"S Xiang","year":"2007","unstructured":"S. Xiang, H.J. Kim, J. Huang, Histogram-Based Image Hashing Scheme Robust against Geometric Deformations. Workshop Multimedia Security (2007), pp. 121\u2013128."},{"key":"400_CR7","doi-asserted-by":"crossref","unstructured":"M. Wu, A. Swaminathan, Y. Mao, A Signal Processing and Randomization Perspective of Robust and Secure Image Hashing (Proceedings of IEEE 14th Workshop on Statistical Signal Processing (SSP\u201907), Madison,2007), pp. 166\u2013170.","DOI":"10.1109\/SSP.2007.4301240"},{"key":"400_CR8","first-page":"299","volume-title":"RASH: Radon Soft Hash Algorithm. Proceedings of 11th European Signal Processing Conference","author":"F LEFEBVRE","year":"2002","unstructured":"F. LEFEBVRE, B. MACQ, L.E.U.A.T. JD, RASH: Radon Soft Hash Algorithm. Proceedings of 11th European Signal Processing Conference (IEEE Press, Piscataway, 2002), pp. 299\u2013302."},{"key":"400_CR9","first-page":"3443","volume-title":"Robust Perceptual Image Hashing via Matrix Invariants. Proceedings of 2004 International Conference on Image Processing","author":"S KOZAT S","year":"2004","unstructured":"S. KOZAT S, R. VENKATESAN, M.K. MIHCAK, Robust Perceptual Image Hashing via Matrix Invariants. Proceedings of 2004 International Conference on Image Processing (IEEE Press, Piscataway, 2004), pp. 3443\u20133446."},{"issue":"11","key":"400_CR10","doi-asserted-by":"publisher","first-page":"3941","DOI":"10.1109\/TCYB.2016.2591068","volume":"47","author":"L Zhu","year":"2017","unstructured":"L. Zhu, J. Shen, L. Xie, Z. Cheng, Unsupervised topic hypergraph hashing for efficient mobile image retrieval. IEEE Trans. Cybernetics 47(11), 3941\u20133954 (2017).","journal-title":"IEEE Trans. Cybernetics"},{"key":"400_CR11","doi-asserted-by":"publisher","unstructured":"D.C. Guimar\u00e3es Pedronette, R.T. Calumby, R.d.S. Torres, A semi-supervised learning algorithm for relevance feedback and collaborative image retrieval. J. Image Video Process. (2015). \n                    https:\/\/doi.org\/10.1186\/s13640-015-0081-6\n                    \n                  .","DOI":"10.1186\/s13640-015-0081-6"},{"key":"400_CR12","volume-title":"Content-Based Image Retrieval Systems:A Survey. Technical Report UU-CS-2000-34, Dept. of Computing Science, Utrecht University","author":"RC Veltkamp","year":"2000","unstructured":"R.C. Veltkamp, M. Tanase, Content-Based Image Retrieval Systems:A Survey. Technical Report UU-CS-2000-34, Dept. of Computing Science, Utrecht University (2000)."},{"issue":"2","key":"400_CR13","first-page":"217","volume":"5","author":"YU Yuanhui","year":"2015","unstructured":"Y.U. Yuanhui, D.E.N.G. Ying, Research of marine organism image retrieval approach based on multi-feature. J. Henan Univ. (Nature Science) 5(2), 217\u2013222 (2015).","journal-title":"J. Henan Univ. (Nature Science)"},{"issue":"2","key":"400_CR14","first-page":"152","volume":"16","author":"X ZHOU","year":"2003","unstructured":"X. ZHOU, L. ZHANG, Q. ZHANG, et al., A relevance feedback method based on local distribution center in image retrieval. Pattern Recognit. Artif. Intell. 16(2), 152\u2013157 (2003).","journal-title":"Pattern Recognit. Artif. Intell."},{"issue":"6","key":"400_CR15","first-page":"1465","volume":"29","author":"X WANG","year":"2008","unstructured":"X. WANG, K. XIE, Research on pseudo-relevance feedback and clustering-based image retrieval. Comput. Eng. Des. 29(6), 1465\u20131471 (2008).","journal-title":"Comput. Eng. Des."},{"issue":"7","key":"400_CR16","first-page":"673","volume":"25","author":"L ZHANG","year":"2002","unstructured":"L. ZHANG, F. LIN, B. ZHANG, A forward neural network based relevance feedback algorithm design in image retrieval. Chin. J. Comput. 25(7), 673\u2013680 (2002).","journal-title":"Chin. J. Comput."},{"issue":"6","key":"400_CR17","doi-asserted-by":"publisher","first-page":"1178","DOI":"10.1109\/TKDE.2017.2784430","volume":"30","author":"X Zhou","year":"2018","unstructured":"X. Zhou, X. Liang, X. Du, J. Zhao, Structure based user identification across social networks. IEEE Trans. Knowl. Data Eng. 30(6), 1178\u20131191 (2018).","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"1","key":"400_CR18","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/j.jss.2005.02.005","volume":"78","author":"DH KIM","year":"2005","unstructured":"D.H. KIM, C.H.U.N.G. CW, K. BARNARD, Relevance feedback using adaptive clustering for image similarity retrieval. J. Syst. Softw. 78(1), 9\u201323 (2005).","journal-title":"J. Syst. Softw."},{"key":"400_CR19","doi-asserted-by":"crossref","unstructured":"H. Sun, M. Sun, Trail-and-Error Approach for Determining the Number of Clusters (Proceedings of 4th International Conference on Advances in Machine Learning and Cybernetics (ICMLC 2005), Guangzhou, 2005), pp. 229\u2013238.","DOI":"10.1007\/11739685_24"},{"issue":"11","key":"400_CR20","doi-asserted-by":"publisher","first-page":"11219","DOI":"10.1109\/TVT.2018.2870872","volume":"67","author":"D Lu","year":"2018","unstructured":"D. Lu, X. Huang, G. Zhang, X. Zheng, H. Liu, Trusted device-to-device based heterogeneous cellular networks: a new framework for connectivity optimization. IEEE Trans. Veh. Technol. 67(11), 11219\u201311233 (2018).","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"15","key":"400_CR21","first-page":"1301","volume":"19","author":"Q Ming","year":"2009","unstructured":"Q. Ming, Research of color and texture based image retrieval technique [J]. Sci. Technol. Eng. 19(15), 1301\u20131304 (2009).","journal-title":"Sci. Technol. Eng."},{"issue":"2","key":"400_CR22","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1109\/76.905982","volume":"11","author":"CY LIN","year":"2001","unstructured":"C.Y. LIN, S.F. CHANG, A key-dependent secure image hashing scheme by using Radon transform. A robust image authentication method distinguishing JPEU compression from malicious manipulation. IEEE Trans. Circuits Syst. Video Technol. 11(2), 153\u2013168 (2001).","journal-title":"IEEE Trans. Circuits Syst. Video Technol."}],"container-title":["EURASIP Journal on Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13640-018-0400-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13640-018-0400-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13640-018-0400-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,7]],"date-time":"2020-01-07T19:07:32Z","timestamp":1578424052000},"score":1,"resource":{"primary":{"URL":"https:\/\/jivp-eurasipjournals.springeropen.com\/articles\/10.1186\/s13640-018-0400-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,8]]},"references-count":22,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["400"],"URL":"https:\/\/doi.org\/10.1186\/s13640-018-0400-9","relation":{},"ISSN":["1687-5281"],"issn-type":[{"value":"1687-5281","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1,8]]},"assertion":[{"value":"1 September 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 December 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 January 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Dengying received her M.S. degree in computer software and theory from Xiamen University in 2010. She is currently an associate professor of Xiamen Institute of technology. Her research interests are image processing, pattern recognition and data mining.Yuyuanhui, associate professor, master tutor, received his M.S. degree from University of Electronic Science and technology of China in 2002 and worked in Jimei University. His research interests include image processing, intelligent information processing, mobile agent computing and data fusion.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Authors\u2019 information"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Publisher\u2019s Note"}}],"article-number":"7"}}