Design and Comparison of Image Hashing Methods: A Case Study on Cork Stopper Unique Identification

Cork stoppers were shown to have unique characteristics that allow their use for authentication purposes in an anti-counterfeiting effort. This authentication process relies on the comparison between a user's cork image and all registered cork images in the database of genuine items. With the g...

Full description

Saved in:
Bibliographic Details
Published inJournal of imaging Vol. 7; no. 3; p. 48
Main Authors Fitas, Ricardo, Rocha, Bernardo, Costa, Valter, Sousa, Armando
Format Journal Article
LanguageEnglish
Published Switzerland MDPI 08.03.2021
MDPI AG
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Cork stoppers were shown to have unique characteristics that allow their use for authentication purposes in an anti-counterfeiting effort. This authentication process relies on the comparison between a user's cork image and all registered cork images in the database of genuine items. With the growth of the database, this one-to-many comparison method becomes lengthier and therefore usefulness decreases. To tackle this problem, the present work designs and compares hashing-assisted image matching methods that can be used in cork stopper authentication. The analyzed approaches are the discrete cosine transform, wavelet transform, Radon transform, and other methods such as difference hash and average hash. The most successful approach uses a 1024-bit hash length and difference hash method providing a 98% accuracy rate. By transforming the image matching into a hash matching problem, the approach presented becomes almost 40 times faster when compared to the literature.
AbstractList Cork stoppers were shown to have unique characteristics that allow their use for authentication purposes in an anti-counterfeiting effort. This authentication process relies on the comparison between a user's cork image and all registered cork images in the database of genuine items. With the growth of the database, this one-to-many comparison method becomes lengthier and therefore usefulness decreases. To tackle this problem, the present work designs and compares hashing-assisted image matching methods that can be used in cork stopper authentication. The analyzed approaches are the discrete cosine transform, wavelet transform, Radon transform, and other methods such as difference hash and average hash. The most successful approach uses a 1024-bit hash length and difference hash method providing a 98% accuracy rate. By transforming the image matching into a hash matching problem, the approach presented becomes almost 40 times faster when compared to the literature.
Author Costa, Valter
Rocha, Bernardo
Sousa, Armando
Fitas, Ricardo
AuthorAffiliation 4 INESC TEC—INESC Technology and Science (formerly INESC Porto), 4200-465 Porto, Portugal
2 INEGI—Institute of Science and Innovation in Mechanical and Industrial Engineering, 4200-465 Porto, Portugal
1 Department of Mechanical Engineering, FEUP—Faculty of Engineering, University of Porto, 4200-465 Porto, Portugal; rfitas99@gmail.com (R.F.); santosrocha.bernardo@gmail.com (B.R.)
3 Department of Electrical and Computer Engineering, FEUP—Faculty of Engineering, University of Porto, 4200-465 Porto, Portugal
AuthorAffiliation_xml – name: 1 Department of Mechanical Engineering, FEUP—Faculty of Engineering, University of Porto, 4200-465 Porto, Portugal; rfitas99@gmail.com (R.F.); santosrocha.bernardo@gmail.com (B.R.)
– name: 4 INESC TEC—INESC Technology and Science (formerly INESC Porto), 4200-465 Porto, Portugal
– name: 3 Department of Electrical and Computer Engineering, FEUP—Faculty of Engineering, University of Porto, 4200-465 Porto, Portugal
– name: 2 INEGI—Institute of Science and Innovation in Mechanical and Industrial Engineering, 4200-465 Porto, Portugal
Author_xml – sequence: 1
  givenname: Ricardo
  orcidid: 0000-0001-5137-2451
  surname: Fitas
  fullname: Fitas, Ricardo
  organization: Department of Mechanical Engineering, FEUP-Faculty of Engineering, University of Porto, 4200-465 Porto, Portugal
– sequence: 2
  givenname: Bernardo
  orcidid: 0000-0002-1529-2101
  surname: Rocha
  fullname: Rocha, Bernardo
  organization: Department of Mechanical Engineering, FEUP-Faculty of Engineering, University of Porto, 4200-465 Porto, Portugal
– sequence: 3
  givenname: Valter
  orcidid: 0000-0002-4769-8843
  surname: Costa
  fullname: Costa, Valter
  organization: INEGI-Institute of Science and Innovation in Mechanical and Industrial Engineering, 4200-465 Porto, Portugal
– sequence: 4
  givenname: Armando
  orcidid: 0000-0002-0317-4714
  surname: Sousa
  fullname: Sousa, Armando
  organization: INESC TEC-INESC Technology and Science (formerly INESC Porto), 4200-465 Porto, Portugal
BackLink https://www.ncbi.nlm.nih.gov/pubmed/34460704$$D View this record in MEDLINE/PubMed
BookMark eNpdkT1vFDEQhi0UREJITYdc0lxi73g_TIEULYScFEQBkeisWX_s-dizF3sPKf8ew4UoobDGHr_zjD3vS3IUYrCEvObsHECyi63f4ejD2DJgTHTPyEkFHFYC4PvRo_0xOct5yxjjsipLviDHIETDWiZOyPDBZj8GisHQPu5mTD7HQKOj6wK39BrzprSgn-2yiSa_o5e0x2zp12Vv7mhR9jH9KKc4zzbR2-B_7i1dGxsW77zGxcfwijx3OGV7dh9Pye3Vx2_99ermy6d1f3mz0qKWywqkrrpKg24axh0DdEZYwWEw4LhlKJsB5WCN5BpQD4YjtEPbNbbTzrRNB6dkfeCaiFs1pzKddKcievU3EdOoMC1eT1Zh25gKpanrQYpW6g6cQyk7GERbscEV1vsDa94PO2t0-U_C6Qn06U3wGzXGX6qDigOvC-DtPSDFMpK8qJ3P2k4TBhv3WVV108quPkgvDlKdYs7Juoc2nKk_Rqv_jC4Vbx6_7kH_z1b4DTnLqMk
CitedBy_id crossref_primary_10_1145_3638053
crossref_primary_10_1016_j_engappai_2023_107329
Cites_doi 10.1109/JIOT.2016.2558659
10.7873/DATE.2014.360
10.1109/JSAC.2005.861395
10.1109/TPAMI.2005.126
10.1109/ACCESS.2019.2908029
10.1109/TNN.2003.813842
10.1007/s11042-017-4809-4
10.1007/s11042-015-2688-0
10.1109/IMIS.2014.66
10.23919/CISTI.2018.8399225
10.3390/app8112150
10.1109/ISPACS.2009.5383770
10.1117/1.JEI.27.4.043055
10.1016/j.ijar.2007.06.008
10.1109/UPCON.2016.7894703
10.3390/jimaging4040054
10.3390/jimaging6040015
10.1016/j.sigpro.2017.07.019
10.1016/B978-0-12-374490-6.00007-6
10.1109/ICIT.2019.8754966
10.1126/science.1074376
10.1007/3-540-44989-2_40
10.1109/AICCSA.2016.7945810
10.1007/978-1-4419-8080-9_4
10.1145/3240508.3240690
10.1155/2017/7925404
10.1142/S0218001413500080
10.1038/s41598-018-22876-8
10.1016/j.image.2019.115713
10.1016/j.cose.2016.07.006
10.1109/MMSP.2006.285345
10.1109/MMIT.2008.134
10.3390/jimaging6040026
10.1109/TIFS.2017.2699942
10.1007/s10015-010-0827-2
10.1007/s11042-012-1188-8
ContentType Journal Article
Copyright 2021 by the authors. 2021
Copyright_xml – notice: 2021 by the authors. 2021
DBID NPM
AAYXX
CITATION
7X8
5PM
DOA
DOI 10.3390/jimaging7030048
DatabaseName PubMed
CrossRef
MEDLINE - Academic
PubMed Central (Full Participant titles)
Directory of Open Access Journals
DatabaseTitle PubMed
CrossRef
MEDLINE - Academic
DatabaseTitleList MEDLINE - Academic
PubMed
CrossRef


Database_xml – sequence: 1
  dbid: DOA
  name: Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: NPM
  name: PubMed
  url: https://proxy.k.utb.cz/login?url=http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed
  sourceTypes: Index Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 2313-433X
ExternalDocumentID oai_doaj_org_article_a76d2a9d55b9479c83ffa9983b4720bf
10_3390_jimaging7030048
34460704
Genre Journal Article
GrantInformation_xml – fundername: Fundação para a Ciência e a Tecnologia
  grantid: UIDB/50022/2020
– fundername: Fundação para a Ciência e a Tecnologia
  grantid: UIDB/50014/2020
– fundername: European Regional Development Fund
  grantid: POCI-01-0145-FEDER-032460 - GRIS
– fundername: Fundação para a Ciência e a Tecnologia
  grantid: POCI-01-0145-FEDER-032460 - GRIS
GroupedDBID 5VS
8FE
8FG
AADQD
AAFWJ
ADBBV
AFKRA
AFZYC
ALMA_UNASSIGNED_HOLDINGS
ARAPS
ARCSS
BCNDV
BENPR
BGLVJ
CCPQU
GROUPED_DOAJ
HCIFZ
KQ8
MODMG
M~E
NPM
OK1
P62
PGMZT
PIMPY
PROAC
RPM
AAYXX
AFPKN
CITATION
7X8
5PM
ID FETCH-LOGICAL-c459t-39c282c3c6601f03afd4e413bd3f1e0a96ba9bed91c3acbd1a37b786e8cfd7683
IEDL.DBID RPM
ISSN 2313-433X
IngestDate Fri Oct 04 13:10:29 EDT 2024
Tue Sep 17 21:23:46 EDT 2024
Sat Aug 17 05:36:48 EDT 2024
Thu Aug 22 11:29:25 EDT 2024
Tue Oct 15 08:56:47 EDT 2024
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 3
Keywords image processing
anti-counterfeiting
Discrete Cosine Transform
hashing
Radon transform
difference hash
cork stoppers
perceptual hash
Language English
License Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c459t-39c282c3c6601f03afd4e413bd3f1e0a96ba9bed91c3acbd1a37b786e8cfd7683
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
Current address: Rua Dr. Roberto Frias, s/n, 4200-465 Porto, Portugal.
ORCID 0000-0002-0317-4714
0000-0001-5137-2451
0000-0002-1529-2101
0000-0002-4769-8843
OpenAccessLink https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8321315/
PMID 34460704
PQID 2567985315
PQPubID 23479
ParticipantIDs doaj_primary_oai_doaj_org_article_a76d2a9d55b9479c83ffa9983b4720bf
pubmedcentral_primary_oai_pubmedcentral_nih_gov_8321315
proquest_miscellaneous_2567985315
crossref_primary_10_3390_jimaging7030048
pubmed_primary_34460704
PublicationCentury 2000
PublicationDate 20210308
PublicationDateYYYYMMDD 2021-03-08
PublicationDate_xml – month: 3
  year: 2021
  text: 20210308
  day: 8
PublicationDecade 2020
PublicationPlace Switzerland
PublicationPlace_xml – name: Switzerland
PublicationTitle Journal of imaging
PublicationTitleAlternate J Imaging
PublicationYear 2021
Publisher MDPI
MDPI AG
Publisher_xml – name: MDPI
– name: MDPI AG
References Ramos (ref_23) 2017; 2017
Liu (ref_39) 2016; 75
ref_14
Dargham (ref_26) 2010; 15
ref_13
ref_11
ref_10
ref_32
ref_31
Juels (ref_8) 2006; 24
Behner (ref_7) 2017; 12
ref_18
Wigger (ref_2) 2018; 8
Santosh (ref_30) 2013; 27
ref_15
Qin (ref_35) 2019; 7
(ref_45) 2005; 27
Pappu (ref_12) 2002; 297
Sun (ref_38) 2014; 70
Jiang (ref_42) 2018; 27
Ishiyama (ref_1) 2016; 11
Qin (ref_36) 2018; 142
Wang (ref_5) 2016; 3
ref_25
Robinson (ref_19) 2003; 14
ref_24
ref_46
ref_22
ref_44
ref_43
ref_20
Tang (ref_21) 2016; 62
Pun (ref_37) 2018; 77
ref_41
ref_40
ref_3
Yan (ref_34) 2017; 12
Loia (ref_16) 2008; 48
ref_29
Du (ref_33) 2020; 81
ref_28
Gupta (ref_17) 2012; 2
ref_27
ref_9
ref_4
ref_6
References_xml – volume: 3
  start-page: 1113
  year: 2016
  ident: ref_5
  article-title: CSI Phase Fingerprinting for Indoor Localization With a Deep Learning Approach
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2016.2558659
  contributor:
    fullname: Wang
– ident: ref_28
– ident: ref_13
  doi: 10.7873/DATE.2014.360
– volume: 24
  start-page: 381
  year: 2006
  ident: ref_8
  article-title: RFID security and privacy: A research survey
  publication-title: IEEE J. Sel. Areas Commun.
  doi: 10.1109/JSAC.2005.861395
  contributor:
    fullname: Juels
– volume: 27
  start-page: 1004
  year: 2005
  ident: ref_45
  article-title: Radon transform orientation estimation for rotation invariant texture analysis
  publication-title: IEEE Trans. Pattern Anal. Mach. Intell.
  doi: 10.1109/TPAMI.2005.126
– ident: ref_24
– volume: 2
  start-page: 515
  year: 2012
  ident: ref_17
  article-title: Analysis of Image Compression Algorithm Using DCT
  publication-title: Int. J. Eng. Res. Appl.
  contributor:
    fullname: Gupta
– volume: 7
  start-page: 45460
  year: 2019
  ident: ref_35
  article-title: Perceptual Image Hashing Based on Weber Local Binary Pattern and Color Angle Representation
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2908029
  contributor:
    fullname: Qin
– volume: 14
  start-page: 950
  year: 2003
  ident: ref_19
  article-title: Combining support vector machine learning with the discrete cosine transform in image compression
  publication-title: IEEE Trans. Neural Netw.
  doi: 10.1109/TNN.2003.813842
  contributor:
    fullname: Robinson
– volume: 77
  start-page: 11609
  year: 2018
  ident: ref_37
  article-title: Robust image hashing using progressive feature selection for tampering detection
  publication-title: Multimed. Tools Appl.
  doi: 10.1007/s11042-017-4809-4
  contributor:
    fullname: Pun
– volume: 75
  start-page: 7681
  year: 2016
  ident: ref_39
  article-title: Robust image hashing with tampering recovery capability via low-rank and sparse representation
  publication-title: Multimed. Tools Appl.
  doi: 10.1007/s11042-015-2688-0
  contributor:
    fullname: Liu
– ident: ref_9
  doi: 10.1109/IMIS.2014.66
– ident: ref_14
– ident: ref_44
  doi: 10.23919/CISTI.2018.8399225
– volume: 11
  start-page: 1
  year: 2016
  ident: ref_1
  article-title: Individual recognition based on the fingerprint of things expands the applications of IoT
  publication-title: NEC Tech. J.
  contributor:
    fullname: Ishiyama
– ident: ref_10
  doi: 10.3390/app8112150
– ident: ref_29
  doi: 10.1109/ISPACS.2009.5383770
– volume: 27
  start-page: 043055
  year: 2018
  ident: ref_42
  article-title: Perceptual image hashing based on a deep convolution neural network for content authentication
  publication-title: J. Electron. Imaging
  doi: 10.1117/1.JEI.27.4.043055
  contributor:
    fullname: Jiang
– volume: 48
  start-page: 110
  year: 2008
  ident: ref_16
  article-title: An image coding/decoding method based on direct and inverse fuzzy transforms
  publication-title: Int. J. Approx. Reason.
  doi: 10.1016/j.ijar.2007.06.008
  contributor:
    fullname: Loia
– ident: ref_6
– ident: ref_40
  doi: 10.1109/UPCON.2016.7894703
– ident: ref_15
  doi: 10.3390/jimaging4040054
– ident: ref_18
  doi: 10.3390/jimaging6040015
– volume: 142
  start-page: 194
  year: 2018
  ident: ref_36
  article-title: Perceptual hashing for color images based on hybrid extraction of structural features
  publication-title: Signal Process.
  doi: 10.1016/j.sigpro.2017.07.019
  contributor:
    fullname: Qin
– ident: ref_25
  doi: 10.1016/B978-0-12-374490-6.00007-6
– ident: ref_31
– ident: ref_27
– ident: ref_3
  doi: 10.1109/ICIT.2019.8754966
– volume: 297
  start-page: 2026
  year: 2002
  ident: ref_12
  article-title: Physical one-way functions
  publication-title: Science
  doi: 10.1126/science.1074376
  contributor:
    fullname: Pappu
– ident: ref_20
  doi: 10.1007/3-540-44989-2_40
– ident: ref_4
  doi: 10.1109/AICCSA.2016.7945810
– ident: ref_11
  doi: 10.1007/978-1-4419-8080-9_4
– ident: ref_41
  doi: 10.1145/3240508.3240690
– volume: 2017
  start-page: 7925404
  year: 2017
  ident: ref_23
  article-title: The Discrete Wavelet Transform and Its Application for Noise Removal in Localized Corrosion Measurements
  publication-title: Int. J. Corros.
  doi: 10.1155/2017/7925404
  contributor:
    fullname: Ramos
– volume: 12
  start-page: 2017
  year: 2017
  ident: ref_7
  article-title: Fighting counterfeit pharmaceuticals: New defenses for an underestimated and growing menace
  publication-title: Retrieved Dec.
  contributor:
    fullname: Behner
– volume: 27
  start-page: 1350008
  year: 2013
  ident: ref_30
  article-title: DTW-radon-based shape descriptor for pattern recognition
  publication-title: Int. J. Pattern Recognit. Artif. Intell.
  doi: 10.1142/S0218001413500080
  contributor:
    fullname: Santosh
– ident: ref_43
– volume: 8
  start-page: 4738
  year: 2018
  ident: ref_2
  article-title: Using unique surface patterns of injection moulded plastic components as an image based Physical Unclonable Function for secure component identification
  publication-title: Sci. Rep.
  doi: 10.1038/s41598-018-22876-8
  contributor:
    fullname: Wigger
– volume: 81
  start-page: 115713
  year: 2020
  ident: ref_33
  article-title: Perceptual hashing for image authentication: A survey
  publication-title: Signal Process. Image Commun.
  doi: 10.1016/j.image.2019.115713
  contributor:
    fullname: Du
– volume: 62
  start-page: 133
  year: 2016
  ident: ref_21
  article-title: Robust image hashing via DCT and LLE
  publication-title: Comput. Secur.
  doi: 10.1016/j.cose.2016.07.006
  contributor:
    fullname: Tang
– ident: ref_46
  doi: 10.1109/MMSP.2006.285345
– ident: ref_22
  doi: 10.1109/MMIT.2008.134
– ident: ref_32
  doi: 10.3390/jimaging6040026
– volume: 12
  start-page: 2144
  year: 2017
  ident: ref_34
  article-title: Multi-Scale Difference Map Fusion for Tamper Localization Using Binary Ranking Hashing
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2017.2699942
  contributor:
    fullname: Yan
– volume: 15
  start-page: 359
  year: 2010
  ident: ref_26
  article-title: Radon transform for face recognition
  publication-title: Artif. Life Robot.
  doi: 10.1007/s10015-010-0827-2
  contributor:
    fullname: Dargham
– volume: 70
  start-page: 1651
  year: 2014
  ident: ref_38
  article-title: Secure and robust image hashing via compressive sensing
  publication-title: Multimed. Tools Appl.
  doi: 10.1007/s11042-012-1188-8
  contributor:
    fullname: Sun
SSID ssj0001920199
Score 2.2150285
Snippet Cork stoppers were shown to have unique characteristics that allow their use for authentication purposes in an anti-counterfeiting effort. This authentication...
SourceID doaj
pubmedcentral
proquest
crossref
pubmed
SourceType Open Website
Open Access Repository
Aggregation Database
Index Database
StartPage 48
SubjectTerms anti-counterfeiting
cork stoppers
Discrete Cosine Transform
hashing
image processing
perceptual hash
SummonAdditionalLinks – databaseName: Directory of Open Access Journals
  dbid: DOA
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LT9wwELYqTnCoeJPykCv10EtEEttxzA0W0LYSPXUlbpHHDxUQyWpZDv33jO1llUVIXDjkkMRKRjN-zJeMv4-QH7VhFWje5BaT-5wD4JgTiFpdXRlhtZRFFfYO3_ypxxP--1bcDqS-Qk1YogdOjjvVsraVVlYIUFwq0zDvNWIEBlxWBfg4-5ZiAKbuU96Ch0pcPgxx_en93WOU_Qk9vAhqP4NlKLL1v5divq2UHCw915vk6yJnpOfJ1i3yxXXbZGPAJLhD4DJWYlDdWTpaSgvS3tNfaJCj46SZRG-iYPTTGT2nI1y_aCgj_E-x5aifPeBZP526GZ1EVleaNvH6xVe9XTK5vvo7GucL-YTccKHmOVMG8ZRhpkbQ5QumveUO1yywzJeu0KoGrcBZVRqmDdhSMwmyqV1jvEUUwvbIWtd37oBQAVXYalRKAMsNFNp54zDKpXKVLQzLyM9Xb7bTxJLRIroIjm_fOD4jF8Hby2aB3jpewKC3i6C3HwU9I99fY9XicAj_OHTn-uenFjM4qTAFKUVG9lPslq9iCH1xhuMZkStRXbFl9U539y9Sbgc9J3zmt88w_pCsV6EwJhSyNUdkbT57dseY2czhJHbiF1bZ-iY
  priority: 102
  providerName: Directory of Open Access Journals
Title Design and Comparison of Image Hashing Methods: A Case Study on Cork Stopper Unique Identification
URI https://www.ncbi.nlm.nih.gov/pubmed/34460704
https://search.proquest.com/docview/2567985315
https://pubmed.ncbi.nlm.nih.gov/PMC8321315
https://doaj.org/article/a76d2a9d55b9479c83ffa9983b4720bf
Volume 7
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Nb9NAEB01RULtAfGNC0SLxIFLGtvr9Xq5taYhIKWqEJF6s_YTUogdpemBf8_s2o6SihMHH2yv5dW-sWbe-s0MwPtc01TJrBgZDO5HmVL4zTFkrTZPNTOS8zj1ucOzy3w6z75es-sDYH0uTBDta7U4rX8vT-vFz6CtXC31uNeJja9mpe-uQxM2HsCAU7pD0W_akAUP0ZbxoUjpxzeLZej4440bDfYIHlIkQWjr2Z4zCjX7_xVo3tdL7jigyWN41EWO5Kyd4RM4sPVTON6pJ_gM1KegxyCyNqTcNhgkjSNfcG6WTNvOSWQW2kbffiRnpEQvRryY8A_BkWWz_oVnzWpl12QearuSNpXXdXt7z2E-ufheTkddE4WRzpjYjKjQyKo01TlSLxdT6Uxm0XMpQ11iYylyJYWyRiSaSq1MIilXvMhtoZ1BLkJfwGHd1PYVEKZSn3CUcKVMplUsrdMWsU6ETU2saQQf-tWsVm2tjAo5hseguodBBOd-tbfDfJHrcKFZ_6g6qCvJc5NKYRhTIuNCF9Q5ifSQqoynsXIRvOuxqvCj8H86ZG2bu9sK4zguMBBJWAQvW-y2r-qxj4Dvobo3l_07aIeh8HZndyf__eRrOEq9JsZr2Io3cLhZ39m3GNRs1BAGxeTzEB6cX1xefRuGrYFhMOy_0Jn9tA
link.rule.ids 230,315,733,786,790,870,891,2115,27955,27956,33407,33778,53825,53827
linkProvider National Library of Medicine
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lj9MwEB4tiwTLgecC4WkkDlzSJnEcx9yWwKoL2xWHLdpb5FeguzSpuu0Bfj1jJ6naigscckjsKHbmszxf8s0MwNtM00TJNA8NOvdhqhSuOYas1WaJZkZyHiUudnh8lo0m6ecLdrEHrI-F8aJ9raaD-udsUE9_eG3lfKaHvU5s-HVcuOo6NGbDG3AT12vCNkj6Zeu04CHaRD4USf3wcjrzNX8cvBGyB3CLIg1CtKdb25HP2v83V3NXMbmxBR3fg2_94FvlydVgtVQD_Xsnr-M_z-4-3O2cUnLUNj-APVs_hDsbqQofgfropR5E1oYU69qFpKnICU7aklFblImMfUXq6_fkiBS4QRKnU_xFsGfRLK7wrJnP7YJMfNpY0kYJV91nw0OYHH86L0ZhV58h1CkTy5AKjYRNU50hq6siKiuTWtwUlaFVbCMpMiWFskbEmkqtTCwpVzzPbK4rgzSHPob9uqntUyBMJS6WKeZKmVSrSNpKW4RRLGxiIk0DeNebqZy3aThKpC_OuOWOcQP44My47ubyZ_sLzeJ72b3nUvLMJFIYxpRIudA5rSqJzJOqlCeRqgJ404OgxPXmfqLI2jar6xJdRC7Qx4lZAE9aUKwf1YMqAL4Fl62xbLcgCHxO787oz_77ztdwe3Q-Pi1PT86-PIeDxElvnFQufwH7y8XKvkTfaale-ZXyB0I2HDs
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9NAEB5Bkapy4P0wz0XiwMXxY22vl1txiVIgVQ9EqrhY-4S0xLbS5AC_nlk_oiTi1IMPttey1_ONZj772xmA95misRRJ7mtM7v1ESvS5FFmryWKVasFYGLu1w9OzbDJLvlykF1utvlrRvpLzUfV7Marmv1ptZbNQwaATC86nheuuQ6M0aLQNbsMd9NmYbRH1yy5xwY13xXwoEvvgcr5o-_44iCNsj-CQIhVCxCc7Iamt3P-_dHNfNbkVhsb34ccwgU59cjVar-RI_d2r7XijGT6Ae31ySo67IQ_hlqkewd2tkoWPQZ60kg8iKk2KTQ9DUltyihM3ZNI1ZyLTtjP19UdyTAoMlMTpFf8QHFnUyyvcq5vGLMmsLR9LutXCtv98-ARm48_fi4nf92nwVZLylU-5QuKmqMqQ3dmQCqsTg8FRamojEwqeScGl0TxSVCipI0GZZHlmcmU10h36FA6qujLPgaQydmuaIialTpQMhbHKIJwibmIdKurBh8FUZdOV4yiRxjgDl3sG9uCTM-VmmKuj3R6olz_L_l2XgmU6FlynqeQJ4yqn1gpkoFQmLA6l9eDdAIQS_c79TBGVqdfXJaaKjGOuE6UePOuAsbnVACwP2A5kdp5l9wwCoa3t3Rv-xY2vfAuH5yfj8tvp2deXcBQ7BY5TzOWv4GC1XJvXmEKt5JvWWf4BDyseuw
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Design+and+Comparison+of+Image+Hashing+Methods%3A+A+Case+Study+on+Cork+Stopper+Unique+Identification&rft.jtitle=Journal+of+imaging&rft.au=Ricardo+Fitas&rft.au=Bernardo+Rocha&rft.au=Valter+Costa&rft.au=Armando+Sousa&rft.date=2021-03-08&rft.pub=MDPI+AG&rft.eissn=2313-433X&rft.volume=7&rft.issue=3&rft.spage=48&rft_id=info:doi/10.3390%2Fjimaging7030048&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_a76d2a9d55b9479c83ffa9983b4720bf
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2313-433X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2313-433X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2313-433X&client=summon