1 G. Schaefer, "UCID: An uncompressed color image database" 5307 : 472-480, 2004
2 J. Daugman, "The importance of being random: statistical principles of iris recognition" 36 (36): 279-291, 2003
3 M. Steinebach, "StirMark Benchmark: audio watermarking attacks" 49-54, 2001
4 Z. Li, "Robust structured subspace learning for data representation" 37 (37): 2085-2098, 2015
5 L. Ghouti, "Robust perceptual color image hashing using quaternion singular value decomposition" 3794-3798, 2014
6 C.-S. Lu, "Robust mesh-based hashing for copy detection and tracing of images" 1 : 731-734, 2004
7 Z. Tang, "Robust image hash function using local color features" 67 (67): 717-722, 2013
8 Z. Xu, "Robust image copy detection using multi-resolution histogram" 129 (129): 2010
9 Y. Zhao, "Robust hashing for image authentication using Zernike moments and local features" 8 (8): 55-63, 2013
10 J. Fridrich, "Robust hash functions for digital watermarking" 178-183, 2000
1 G. Schaefer, "UCID: An uncompressed color image database" 5307 : 472-480, 2004
2 J. Daugman, "The importance of being random: statistical principles of iris recognition" 36 (36): 279-291, 2003
3 M. Steinebach, "StirMark Benchmark: audio watermarking attacks" 49-54, 2001
4 Z. Li, "Robust structured subspace learning for data representation" 37 (37): 2085-2098, 2015
5 L. Ghouti, "Robust perceptual color image hashing using quaternion singular value decomposition" 3794-3798, 2014
6 C.-S. Lu, "Robust mesh-based hashing for copy detection and tracing of images" 1 : 731-734, 2004
7 Z. Tang, "Robust image hash function using local color features" 67 (67): 717-722, 2013
8 Z. Xu, "Robust image copy detection using multi-resolution histogram" 129 (129): 2010
9 Y. Zhao, "Robust hashing for image authentication using Zernike moments and local features" 8 (8): 55-63, 2013
10 J. Fridrich, "Robust hash functions for digital watermarking" 178-183, 2000
11 A. Swaminathan, "Robust and secure image hashing" 1 (1): 215-230, 2006
12 S. C. Pei, "Quaternion matrix singular value decomposition and its applications for color image processing" 1 : 805-808, 2003
13 W. Feng, "Quaternion discrete cosine transform and its application in color template matching" 2 : 252-256, 2008
14 Z. Tang, "Perceptual image hashing with histogram of color vector angles" 7669 : 237-246, 2012
15 V. Monga, "Perceptual image hashing via feature points: Performance evaluation and tradeoffs" 15 (15): 3453-3466, 2006
16 I. H. Laradji, "Perceptual hashing of color images using hypercomplex representations" 4 : 4402-4406, 2013
17 Z. Tang, "Perceptual hashing for color images using invariant moments" 6 (6): 643S-650S, 2012
18 J. Tang, "Neighborhood discriminant hashing for large-scale image retrival" 24 (24): 2827-2840, 2015
19 T. A. Ell, "Hypercomplex Fourier transforms of color images" 16 : 22-35, 2007
20 A. J. Menezes, "Handbook of applied cryptography" CRC press 2010
21 S. J. Sangwine, "Fourier transforms of colour images using quaternion, or hypercomplex, numbers" 32 (32): 979-1980, 1996
22 A. Qamra, "Enhanced perceptual distance functions and indexing for image replica recognition" 27 (27): 379-391, 2005
23 W. R. Hamilton, "Elements of Quaternions" Longmans 1866
24 S. C. Pei, "Efficient implementation of quaternion Fourier transform, convolution, and correlation by 2-D complex FFT" 49 (49): 2844-2852, 2001
25 T. K. Tsui, "Color image watermarking using multidimensional Fourier transforms" 3 (3): 16-28, 2008
26 Q. Wang, "Color image registration based on quaternion Fourier transformation" 51 (51): 1-8, 2012
27 T. Fawcett, "An introduction to roc analysis" 27 (27): 861-874, 2006
28 M. Schneider, "A robust content based digital signature for image authentication" 3 : 227-230, 1996