[1] Lin Chao, Shen Xueju, Lei Ming, et al. Optical security validation based on orthogonal polarization multiplexing in three-dimensional space[J]. Acta Optica Sinica, 2016, 36(3): 0307001.
[2] Oommen R S, Jayamohan M, Sruthy S. Using fractal dimension and singular values for image forgery detection and localization [J]. Procedia Technology, 2016, 24: 1452-1459.
[3] Liu Z, Li Q, Niu X. Improve the security of image robust hash using fuzzy commitment scheme[J]. Neural Computing and Applications, 2013, 23(1): 67-72.
[4] Li Xinwei, Li Leida. Robust image hashing algorithm based on polar harmonic transform[J].Computer Simulation, 2014, 31(5): 293-296.
[5] Choi Y S, Park J H. Image hash generation method using hierarchical histogram[J]. Multimedia Tools and Applications, 2012, 61(1): 181-194.
[6] Zeng Yong, Sun Shusen, Xia Aijun. Image perceptual hashing based on image normalization and DCT[J]. Journal of Zhejiang Sci-Tech University, 2012, 29(1): 84-88.
[7] Sun R, Zeng W. Secure and robust image hashing via compressive sensing[J]. Multimedia Tools and Applications, 2014, 70(3): 1651-1665.
[8] Cheng Xiangzheng, Zeng Chaoyang, Chen Hang, et al. Calibration method of low-resolution sensor based on bilinear interpolation strategy[J]. Laser & Optoelectronics Progress, 2013, 50(7): 071501.
[9] Fang Wangsheng, Li Yunan, Zhang Rong. Blind watermarking algorithm for color image guided by visual model[J]. Application Research of Computers, 2011, 28(7): 2719-2722.
[10] Zhang Z, Chen J, Li X, et al. An image matching method based on Fourier and LOG-polar transform[J]. Sensors & Transducers, 2014, 169(4): 61-66.
[12] Tiwari D, Tyagi V. A novel scheme based on local binary pattern for dynamic texture recognition[J]. Computer Vision and Image Understanding, 2016, 150: 58-65.
[13] Zhang Zhifeng, Pei Zhili. Image forgery detection based on fuzzy local binary pattern operator[J].Computer Engineering and Design, 2015, 36(12): 3284-3290.
[14] Brinkhuis J, Protasov V. A new proof of the Lagrange multiplier rule[J]. Operations Research Letters, 2016, 44(3): 400-402.
[15] Zhao Xin. Research on the optimization performance comparison of different one-dimensional chaotic maps[J]. Computer Application of Research, 2012, 29(3): 913-915.
[16] Schaefer G, Stich M. UCID-an uncompressed colour image database[C]. SPIE, 2004, 5307: 472-480.
[17] Tang Z, Zhang X, Zhang S. Robust perceptual image hashing based on ring partition and nonnegative matrix factorization[J]. IEEE Transactions on Knowledge and Data Engineering, 2014, 26(3): 711-724.