{"id":"https://openalex.org/W2005175081","doi":"https://doi.org/10.1109/ciss.2012.6310729","title":"Image hashing via hough transform","display_name":"Image hashing via hough transform","publication_year":2012,"publication_date":"2012-03-01","ids":{"openalex":"https://openalex.org/W2005175081","doi":"https://doi.org/10.1109/ciss.2012.6310729","mag":"2005175081"},"language":"en","primary_location":{"id":"doi:10.1109/ciss.2012.6310729","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ciss.2012.6310729","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 46th Annual Conference on Information Sciences and Systems (CISS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064711865","display_name":"Shuhua Lai","orcid":"https://orcid.org/0000-0001-5678-6848"},"institutions":[{"id":"https://openalex.org/I78927796","display_name":"Georgia Gwinnett College","ror":"https://ror.org/05vkmhj10","country_code":"US","type":"education","lineage":["https://openalex.org/I78927796"]},{"id":"https://openalex.org/I2803051760","display_name":"Gwinnett College","ror":"https://ror.org/047y9vj34","country_code":"US","type":"education","lineage":["https://openalex.org/I2803051760"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Shuhua Lai","raw_affiliation_strings":["School of Science & Technology, Georgia Gwinnett College, Lawrenceville, GA, USA","School of Science & Technology in the Georgia Gwinnett College, Lawrenceville, 30043 USA"],"affiliations":[{"raw_affiliation_string":"School of Science & Technology, Georgia Gwinnett College, Lawrenceville, GA, USA","institution_ids":["https://openalex.org/I2803051760","https://openalex.org/I78927796"]},{"raw_affiliation_string":"School of Science & Technology in the Georgia Gwinnett College, Lawrenceville, 30043 USA","institution_ids":["https://openalex.org/I78927796"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026794628","display_name":"Nian Zhang","orcid":"https://orcid.org/0000-0003-1916-7719"},"institutions":[{"id":"https://openalex.org/I174612323","display_name":"University of the District of Columbia","ror":"https://ror.org/037wegn60","country_code":"US","type":"education","lineage":["https://openalex.org/I174612323"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nian Zhang","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of the District of Columbia, Washington, DC, USA","Department of Electrical and Computer Engineering in the University of the District of Columbia, Washington, DC, 20008 USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of the District of Columbia, Washington, DC, USA","institution_ids":["https://openalex.org/I174612323"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering in the University of the District of Columbia, Washington, DC, 20008 USA","institution_ids":["https://openalex.org/I174612323"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5064711865"],"corresponding_institution_ids":["https://openalex.org/I2803051760","https://openalex.org/I78927796"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.08242972,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10627","display_name":"Advanced Image and Video Retrieval Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10627","display_name":"Advanced Image and Video Retrieval Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10824","display_name":"Image Retrieval and Classification Techniques","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.905867338180542},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6436235308647156},{"id":"https://openalex.org/keywords/rolling-hash","display_name":"Rolling hash","score":0.6099992990493774},{"id":"https://openalex.org/keywords/double-hashing","display_name":"Double hashing","score":0.6082820892333984},{"id":"https://openalex.org/keywords/feature-hashing","display_name":"Feature hashing","score":0.5780044198036194},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.5315598845481873},{"id":"https://openalex.org/keywords/universal-hashing","display_name":"Universal hashing","score":0.5303723812103271},{"id":"https://openalex.org/keywords/dynamic-perfect-hashing","display_name":"Dynamic perfect hashing","score":0.5067725777626038},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4458141624927521},{"id":"https://openalex.org/keywords/cryptographic-hash-function","display_name":"Cryptographic hash function","score":0.4304735064506531},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.382508784532547},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3822576403617859},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3443835973739624},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.060921043157577515}],"concepts":[{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.905867338180542},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6436235308647156},{"id":"https://openalex.org/C108546238","wikidata":"https://www.wikidata.org/wiki/Q4228982","display_name":"Rolling hash","level":5,"score":0.6099992990493774},{"id":"https://openalex.org/C138111711","wikidata":"https://www.wikidata.org/wiki/Q478351","display_name":"Double hashing","level":4,"score":0.6082820892333984},{"id":"https://openalex.org/C133667856","wikidata":"https://www.wikidata.org/wiki/Q5439682","display_name":"Feature hashing","level":5,"score":0.5780044198036194},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.5315598845481873},{"id":"https://openalex.org/C116058348","wikidata":"https://www.wikidata.org/wiki/Q846912","display_name":"Universal hashing","level":5,"score":0.5303723812103271},{"id":"https://openalex.org/C122907437","wikidata":"https://www.wikidata.org/wiki/Q5318999","display_name":"Dynamic perfect hashing","level":5,"score":0.5067725777626038},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4458141624927521},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.4304735064506531},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.382508784532547},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3822576403617859},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3443835973739624},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.060921043157577515}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ciss.2012.6310729","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ciss.2012.6310729","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 46th Annual Conference on Information Sciences and Systems (CISS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1551558511","https://openalex.org/W1647732624","https://openalex.org/W1936974923","https://openalex.org/W2097211398","https://openalex.org/W2114550641","https://openalex.org/W2115247187","https://openalex.org/W2150111216","https://openalex.org/W2321339935","https://openalex.org/W2611684114"],"related_works":["https://openalex.org/W2023326318","https://openalex.org/W2783286101","https://openalex.org/W2169139294","https://openalex.org/W4289531427","https://openalex.org/W2126210882","https://openalex.org/W4322097658","https://openalex.org/W2985440808","https://openalex.org/W3158263601","https://openalex.org/W2767060885","https://openalex.org/W1759420840"],"abstract_inverted_index":{"Given":[0],"an":[1,4,6],"image":[2,7,59,72,103,169],"as":[3],"input,":[5],"hash":[8,19,39,104,134,141],"function":[9,142],"should":[10],"produce":[11],"a":[12,53,85,98,126],"short":[13],"bit":[14],"string":[15],"such":[16,138],"that":[17,139,159],"the":[18,25,70,133,140,160],"values":[20,105],"are":[21,52,154],"similar":[22],"(if":[23],"not":[24,66],"same)":[26],"for":[27,34,58,101,117,123,167],"\u201cperceptually":[28,35],"similar\u201d":[29],"content":[30,45],"and":[31,49,156],"significantly":[32],"different":[33],"different\u201d":[36],"content.":[37,170],"Image":[38],"functions":[40],"find":[41],"extensive":[42],"applications":[43],"in":[44],"authentication,":[46],"database":[47],"search,":[48],"watermarking.":[50],"There":[51],"lot":[54],"of":[55,63],"approaches":[56],"reported":[57],"hashing,":[60],"but":[61],"many":[62],"them":[64],"do":[65,114],"perform":[67],"well":[68,115],"when":[69],"input":[71],"undergoes":[73],"severe":[74],"linear":[75],"transformations":[76],"(for":[77],"example,":[78],"big":[79,87,120],"angle":[80],"rotations":[81],"or":[82,88],"scaling":[83,91],"with":[84,119],"very":[86,89],"small":[90],"factor).":[92],"In":[93],"this":[94,152],"paper":[95],"we":[96],"propose":[97],"new":[99,111,161],"algorithm":[100,162],"generating":[102],"based":[106],"on":[107],"Hough":[108],"transform.":[109],"Our":[110],"approach":[112],"can":[113,129,163],"even":[116],"images":[118],"changes.":[121],"Furthermore,":[122],"anti-piracy":[124],"purposes,":[125],"secret":[127],"key":[128],"be":[130],"added":[131],"to":[132],"value":[135],"calculation":[136],"process":[137],"has":[143],"favorable":[144],"security":[145],"properties.":[146],"Some":[147],"test":[148],"results":[149,166],"obtained":[150],"using":[151],"method":[153],"included":[155],"they":[157],"demonstrate":[158],"achieve":[164],"desirable":[165],"identifying":[168]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
