[1] SMEULDERS A W M, WORRING M, SANTINI S, et al. Content-based image retrieval at the end of the early years[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2000, 22(12):1349-1380.
[2] LIU Y, ZHANG D, LU G, et al. A survey of content-based image retrieval with high-level semantics[J]. Pattern Recognition, 2007, 40(1):262-282.
[3] KUO Y H, CHEN K T, CHIANG C H, et al. Query expansion for hash-based image object retrieval[C]//MM'09:Proceedings of the 17th ACM International Conference on Multimedia. New York:ACM, 2009:65-74.
[4] ZHEN Y, YEUNG D Y. Active hashing and its application to image and text retrieval[J]. Data Mining and Knowledge Discovery, 2013, 26(2):255-274.
[5] LI Q-N, LI Y-Q, JIANG S-J. Application of a new Hash function in e-commerce[C]//ICEE'12:Proceedings of the 2012 3rd International Conference on E-Business and E-Government. Washington, DC:IEEE Computer Society, 2012, 4:223-225.
[6] WRIGHT A. Controlling risks of e-commerce content[J]. Computers and Security, 2001, 20(2):147-154.
[7] 张文丽,钟晓燕,冯前进,等.基于Hash函数敏感性的医学图像精确认证[J].中国图象图形学报,2008,13(2):204-208.(ZHANG W L, ZHONG X Y, FENG Q J, et al. Hard authentication for medical image based on sensitivity of Hash function[J]. Journal of Image and Graphics, 2008, 13(2):204-208.)
[8] 赵峰.Hash签名在电子商务中的应用[J].计算机与数字工程,2014,42(3):531-534.(ZHAO F. Hash signature application in the electronic commerce[J]. Computer and Digital Engineering, 2014, 42(3):531-534.)
[9] ZHAN S, ZHAO J, TANG Y, et al. Face image retrieval:super-resolution based on sketch-photo transformation[J]. Soft Computing, 2018, 22(4):1351-1360.
[10] AL-MANSOORI S, KUNHU A. Hybrid DWT-DCT-Hash function based digital image watermarking for copyright protection and content authentication of DubaiSat-2 images[C]//Proceedings of the High-Performance Computing in Remote Sensing IV. Bellingham, WA:SPIE, 2014, 9247:924707.
[11] DEEPAKUMARA J, HEYS H M, VENKATESAN R. FPGA implementation of MD5 hash algorithm[C]//Proceedings of the 2001 Canadian Conference on Electrical and Computer Engineering. Piscataway, NJ:IEEE, 2001, 2:919-924.
[12] GREMBOWSKI T, LIEN R, GAJ K, et al. Comparative analysis of the hardware implementations of hash functions SHA-1 and SHA-512[C]//Proceedings of the 2002 International Conference on Information Security, LNCS 2433. Berlin:Springer, 2002:75-89.
[13] SHIM H. PHash:a memory-efficient, high-performance key-value store for large-scale data-intensive applications[J]. Journal of Systems and Software, 2017, 123:33-44.
[14] LIN K, YANG H-F, HSIAO J-H, et al. Deep learning of binary hash codes for fast image retrieval[C]//Proceedings of the 2015 IEEE Conference on Computer Vision and Pattern Recognition Workshops. Piscataway, NJ:IEEE, 2015:27-35.
[15] 刘明生,王艳,赵新生.基于Hash函数的RFID安全认证协议的研究[J].传感技术学报,2011,24(9):1317-1321.(LIU M S, WANG Y, ZHAO X S. Research on RFID security authentication protocol based on Hash function[J]. Chinese Journal of Sensors and Actuators, 2011, 24(9):1317-1321.)
[16] 周国强,田先桃,张卫丰,等.基于图像感知哈希技术的钓鱼网页检测[J].南京邮电大学学报(自然科学版),2012, 32(4):59-63.(ZHOU G Q, TIAN X T, ZHANG W F, et al. Detecting phishing Web pages based on image perceptual hashing technology[J]. Journal of Nanjing University of Posts and Telecommunications (Natural Science), 2012, 32(4):59-63.)
[17] KURSA M B, JANKOWSKI A, RUDNICKI W R. Boruta-a system for feature selection[J]. Fundamenta Informaticae, 2010, 101(4):271-285.
[18] 宁星,蒋年德.基于LBP人脸识别算法的预处理研究[J].电子质量,2012(4):76-77.(NING X, JIANG N D. Pretreatment research for face recognition based on LBP[J]. Electronic Quality, 2012(4):76-77.)
[19] DATAR M, IMMORLICAL N, INDYK P, et al. Locality-sensitive hashing scheme based on p-stable distributions[C]//Proceedings of the 20th Annual Symposium on Computational Geometry. New York:ACM, 2004:253-262. |