Design and Comparison of Image Hashing Methods: A Case Study on Cork Stopper Unique Identification
Cork stoppers were shown to have unique characteristics that allow their use for authentication purposes in an anti-counterfeiting effort. This authentication process relies on the comparison between a user's cork image and all registered cork images in the database of genuine items. With the g...
Saved in:
Published in | Journal of imaging Vol. 7; no. 3; p. 48 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
Switzerland
MDPI
08.03.2021
MDPI AG |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Cork stoppers were shown to have unique characteristics that allow their use for authentication purposes in an anti-counterfeiting effort. This authentication process relies on the comparison between a user's cork image and all registered cork images in the database of genuine items. With the growth of the database, this one-to-many comparison method becomes lengthier and therefore usefulness decreases. To tackle this problem, the present work designs and compares hashing-assisted image matching methods that can be used in cork stopper authentication. The analyzed approaches are the discrete cosine transform, wavelet transform, Radon transform, and other methods such as difference hash and average hash. The most successful approach uses a 1024-bit hash length and difference hash method providing a 98% accuracy rate. By transforming the image matching into a hash matching problem, the approach presented becomes almost 40 times faster when compared to the literature. |
---|---|
AbstractList | Cork stoppers were shown to have unique characteristics that allow their use for authentication purposes in an anti-counterfeiting effort. This authentication process relies on the comparison between a user's cork image and all registered cork images in the database of genuine items. With the growth of the database, this one-to-many comparison method becomes lengthier and therefore usefulness decreases. To tackle this problem, the present work designs and compares hashing-assisted image matching methods that can be used in cork stopper authentication. The analyzed approaches are the discrete cosine transform, wavelet transform, Radon transform, and other methods such as difference hash and average hash. The most successful approach uses a 1024-bit hash length and difference hash method providing a 98% accuracy rate. By transforming the image matching into a hash matching problem, the approach presented becomes almost 40 times faster when compared to the literature. |
Author | Costa, Valter Rocha, Bernardo Sousa, Armando Fitas, Ricardo |
AuthorAffiliation | 4 INESC TEC—INESC Technology and Science (formerly INESC Porto), 4200-465 Porto, Portugal 2 INEGI—Institute of Science and Innovation in Mechanical and Industrial Engineering, 4200-465 Porto, Portugal 1 Department of Mechanical Engineering, FEUP—Faculty of Engineering, University of Porto, 4200-465 Porto, Portugal; rfitas99@gmail.com (R.F.); santosrocha.bernardo@gmail.com (B.R.) 3 Department of Electrical and Computer Engineering, FEUP—Faculty of Engineering, University of Porto, 4200-465 Porto, Portugal |
AuthorAffiliation_xml | – name: 1 Department of Mechanical Engineering, FEUP—Faculty of Engineering, University of Porto, 4200-465 Porto, Portugal; rfitas99@gmail.com (R.F.); santosrocha.bernardo@gmail.com (B.R.) – name: 4 INESC TEC—INESC Technology and Science (formerly INESC Porto), 4200-465 Porto, Portugal – name: 3 Department of Electrical and Computer Engineering, FEUP—Faculty of Engineering, University of Porto, 4200-465 Porto, Portugal – name: 2 INEGI—Institute of Science and Innovation in Mechanical and Industrial Engineering, 4200-465 Porto, Portugal |
Author_xml | – sequence: 1 givenname: Ricardo orcidid: 0000-0001-5137-2451 surname: Fitas fullname: Fitas, Ricardo organization: Department of Mechanical Engineering, FEUP-Faculty of Engineering, University of Porto, 4200-465 Porto, Portugal – sequence: 2 givenname: Bernardo orcidid: 0000-0002-1529-2101 surname: Rocha fullname: Rocha, Bernardo organization: Department of Mechanical Engineering, FEUP-Faculty of Engineering, University of Porto, 4200-465 Porto, Portugal – sequence: 3 givenname: Valter orcidid: 0000-0002-4769-8843 surname: Costa fullname: Costa, Valter organization: INEGI-Institute of Science and Innovation in Mechanical and Industrial Engineering, 4200-465 Porto, Portugal – sequence: 4 givenname: Armando orcidid: 0000-0002-0317-4714 surname: Sousa fullname: Sousa, Armando organization: INESC TEC-INESC Technology and Science (formerly INESC Porto), 4200-465 Porto, Portugal |
BackLink | https://www.ncbi.nlm.nih.gov/pubmed/34460704$$D View this record in MEDLINE/PubMed |
BookMark | eNpdkT1vFDEQhi0UREJITYdc0lxi73g_TIEULYScFEQBkeisWX_s-dizF3sPKf8ew4UoobDGHr_zjD3vS3IUYrCEvObsHECyi63f4ejD2DJgTHTPyEkFHFYC4PvRo_0xOct5yxjjsipLviDHIETDWiZOyPDBZj8GisHQPu5mTD7HQKOj6wK39BrzprSgn-2yiSa_o5e0x2zp12Vv7mhR9jH9KKc4zzbR2-B_7i1dGxsW77zGxcfwijx3OGV7dh9Pye3Vx2_99ermy6d1f3mz0qKWywqkrrpKg24axh0DdEZYwWEw4LhlKJsB5WCN5BpQD4YjtEPbNbbTzrRNB6dkfeCaiFs1pzKddKcievU3EdOoMC1eT1Zh25gKpanrQYpW6g6cQyk7GERbscEV1vsDa94PO2t0-U_C6Qn06U3wGzXGX6qDigOvC-DtPSDFMpK8qJ3P2k4TBhv3WVV108quPkgvDlKdYs7Juoc2nKk_Rqv_jC4Vbx6_7kH_z1b4DTnLqMk |
CitedBy_id | crossref_primary_10_1145_3638053 crossref_primary_10_1016_j_engappai_2023_107329 |
Cites_doi | 10.1109/JIOT.2016.2558659 10.7873/DATE.2014.360 10.1109/JSAC.2005.861395 10.1109/TPAMI.2005.126 10.1109/ACCESS.2019.2908029 10.1109/TNN.2003.813842 10.1007/s11042-017-4809-4 10.1007/s11042-015-2688-0 10.1109/IMIS.2014.66 10.23919/CISTI.2018.8399225 10.3390/app8112150 10.1109/ISPACS.2009.5383770 10.1117/1.JEI.27.4.043055 10.1016/j.ijar.2007.06.008 10.1109/UPCON.2016.7894703 10.3390/jimaging4040054 10.3390/jimaging6040015 10.1016/j.sigpro.2017.07.019 10.1016/B978-0-12-374490-6.00007-6 10.1109/ICIT.2019.8754966 10.1126/science.1074376 10.1007/3-540-44989-2_40 10.1109/AICCSA.2016.7945810 10.1007/978-1-4419-8080-9_4 10.1145/3240508.3240690 10.1155/2017/7925404 10.1142/S0218001413500080 10.1038/s41598-018-22876-8 10.1016/j.image.2019.115713 10.1016/j.cose.2016.07.006 10.1109/MMSP.2006.285345 10.1109/MMIT.2008.134 10.3390/jimaging6040026 10.1109/TIFS.2017.2699942 10.1007/s10015-010-0827-2 10.1007/s11042-012-1188-8 |
ContentType | Journal Article |
Copyright | 2021 by the authors. 2021 |
Copyright_xml | – notice: 2021 by the authors. 2021 |
DBID | NPM AAYXX CITATION 7X8 5PM DOA |
DOI | 10.3390/jimaging7030048 |
DatabaseName | PubMed CrossRef MEDLINE - Academic PubMed Central (Full Participant titles) Directory of Open Access Journals |
DatabaseTitle | PubMed CrossRef MEDLINE - Academic |
DatabaseTitleList | MEDLINE - Academic PubMed CrossRef |
Database_xml | – sequence: 1 dbid: DOA name: Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: NPM name: PubMed url: https://proxy.k.utb.cz/login?url=http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed sourceTypes: Index Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 2313-433X |
ExternalDocumentID | oai_doaj_org_article_a76d2a9d55b9479c83ffa9983b4720bf 10_3390_jimaging7030048 34460704 |
Genre | Journal Article |
GrantInformation_xml | – fundername: Fundação para a Ciência e a Tecnologia grantid: UIDB/50022/2020 – fundername: Fundação para a Ciência e a Tecnologia grantid: UIDB/50014/2020 – fundername: European Regional Development Fund grantid: POCI-01-0145-FEDER-032460 - GRIS – fundername: Fundação para a Ciência e a Tecnologia grantid: POCI-01-0145-FEDER-032460 - GRIS |
GroupedDBID | 5VS 8FE 8FG AADQD AAFWJ ADBBV AFKRA AFZYC ALMA_UNASSIGNED_HOLDINGS ARAPS ARCSS BCNDV BENPR BGLVJ CCPQU GROUPED_DOAJ HCIFZ KQ8 MODMG M~E NPM OK1 P62 PGMZT PIMPY PROAC RPM AAYXX AFPKN CITATION 7X8 5PM |
ID | FETCH-LOGICAL-c459t-39c282c3c6601f03afd4e413bd3f1e0a96ba9bed91c3acbd1a37b786e8cfd7683 |
IEDL.DBID | RPM |
ISSN | 2313-433X |
IngestDate | Fri Oct 04 13:10:29 EDT 2024 Tue Sep 17 21:23:46 EDT 2024 Sat Aug 17 05:36:48 EDT 2024 Thu Aug 22 11:29:25 EDT 2024 Tue Oct 15 08:56:47 EDT 2024 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 3 |
Keywords | image processing anti-counterfeiting Discrete Cosine Transform hashing Radon transform difference hash cork stoppers perceptual hash |
Language | English |
License | Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c459t-39c282c3c6601f03afd4e413bd3f1e0a96ba9bed91c3acbd1a37b786e8cfd7683 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 23 Current address: Rua Dr. Roberto Frias, s/n, 4200-465 Porto, Portugal. |
ORCID | 0000-0002-0317-4714 0000-0001-5137-2451 0000-0002-1529-2101 0000-0002-4769-8843 |
OpenAccessLink | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8321315/ |
PMID | 34460704 |
PQID | 2567985315 |
PQPubID | 23479 |
ParticipantIDs | doaj_primary_oai_doaj_org_article_a76d2a9d55b9479c83ffa9983b4720bf pubmedcentral_primary_oai_pubmedcentral_nih_gov_8321315 proquest_miscellaneous_2567985315 crossref_primary_10_3390_jimaging7030048 pubmed_primary_34460704 |
PublicationCentury | 2000 |
PublicationDate | 20210308 |
PublicationDateYYYYMMDD | 2021-03-08 |
PublicationDate_xml | – month: 3 year: 2021 text: 20210308 day: 8 |
PublicationDecade | 2020 |
PublicationPlace | Switzerland |
PublicationPlace_xml | – name: Switzerland |
PublicationTitle | Journal of imaging |
PublicationTitleAlternate | J Imaging |
PublicationYear | 2021 |
Publisher | MDPI MDPI AG |
Publisher_xml | – name: MDPI – name: MDPI AG |
References | Ramos (ref_23) 2017; 2017 Liu (ref_39) 2016; 75 ref_14 Dargham (ref_26) 2010; 15 ref_13 ref_11 ref_10 ref_32 ref_31 Juels (ref_8) 2006; 24 Behner (ref_7) 2017; 12 ref_18 Wigger (ref_2) 2018; 8 Santosh (ref_30) 2013; 27 ref_15 Qin (ref_35) 2019; 7 (ref_45) 2005; 27 Pappu (ref_12) 2002; 297 Sun (ref_38) 2014; 70 Jiang (ref_42) 2018; 27 Ishiyama (ref_1) 2016; 11 Qin (ref_36) 2018; 142 Wang (ref_5) 2016; 3 ref_25 Robinson (ref_19) 2003; 14 ref_24 ref_46 ref_22 ref_44 ref_43 ref_20 Tang (ref_21) 2016; 62 Pun (ref_37) 2018; 77 ref_41 ref_40 ref_3 Yan (ref_34) 2017; 12 Loia (ref_16) 2008; 48 ref_29 Du (ref_33) 2020; 81 ref_28 Gupta (ref_17) 2012; 2 ref_27 ref_9 ref_4 ref_6 |
References_xml | – volume: 3 start-page: 1113 year: 2016 ident: ref_5 article-title: CSI Phase Fingerprinting for Indoor Localization With a Deep Learning Approach publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2016.2558659 contributor: fullname: Wang – ident: ref_28 – ident: ref_13 doi: 10.7873/DATE.2014.360 – volume: 24 start-page: 381 year: 2006 ident: ref_8 article-title: RFID security and privacy: A research survey publication-title: IEEE J. Sel. Areas Commun. doi: 10.1109/JSAC.2005.861395 contributor: fullname: Juels – volume: 27 start-page: 1004 year: 2005 ident: ref_45 article-title: Radon transform orientation estimation for rotation invariant texture analysis publication-title: IEEE Trans. Pattern Anal. Mach. Intell. doi: 10.1109/TPAMI.2005.126 – ident: ref_24 – volume: 2 start-page: 515 year: 2012 ident: ref_17 article-title: Analysis of Image Compression Algorithm Using DCT publication-title: Int. J. Eng. Res. Appl. contributor: fullname: Gupta – volume: 7 start-page: 45460 year: 2019 ident: ref_35 article-title: Perceptual Image Hashing Based on Weber Local Binary Pattern and Color Angle Representation publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2908029 contributor: fullname: Qin – volume: 14 start-page: 950 year: 2003 ident: ref_19 article-title: Combining support vector machine learning with the discrete cosine transform in image compression publication-title: IEEE Trans. Neural Netw. doi: 10.1109/TNN.2003.813842 contributor: fullname: Robinson – volume: 77 start-page: 11609 year: 2018 ident: ref_37 article-title: Robust image hashing using progressive feature selection for tampering detection publication-title: Multimed. Tools Appl. doi: 10.1007/s11042-017-4809-4 contributor: fullname: Pun – volume: 75 start-page: 7681 year: 2016 ident: ref_39 article-title: Robust image hashing with tampering recovery capability via low-rank and sparse representation publication-title: Multimed. Tools Appl. doi: 10.1007/s11042-015-2688-0 contributor: fullname: Liu – ident: ref_9 doi: 10.1109/IMIS.2014.66 – ident: ref_14 – ident: ref_44 doi: 10.23919/CISTI.2018.8399225 – volume: 11 start-page: 1 year: 2016 ident: ref_1 article-title: Individual recognition based on the fingerprint of things expands the applications of IoT publication-title: NEC Tech. J. contributor: fullname: Ishiyama – ident: ref_10 doi: 10.3390/app8112150 – ident: ref_29 doi: 10.1109/ISPACS.2009.5383770 – volume: 27 start-page: 043055 year: 2018 ident: ref_42 article-title: Perceptual image hashing based on a deep convolution neural network for content authentication publication-title: J. Electron. Imaging doi: 10.1117/1.JEI.27.4.043055 contributor: fullname: Jiang – volume: 48 start-page: 110 year: 2008 ident: ref_16 article-title: An image coding/decoding method based on direct and inverse fuzzy transforms publication-title: Int. J. Approx. Reason. doi: 10.1016/j.ijar.2007.06.008 contributor: fullname: Loia – ident: ref_6 – ident: ref_40 doi: 10.1109/UPCON.2016.7894703 – ident: ref_15 doi: 10.3390/jimaging4040054 – ident: ref_18 doi: 10.3390/jimaging6040015 – volume: 142 start-page: 194 year: 2018 ident: ref_36 article-title: Perceptual hashing for color images based on hybrid extraction of structural features publication-title: Signal Process. doi: 10.1016/j.sigpro.2017.07.019 contributor: fullname: Qin – ident: ref_25 doi: 10.1016/B978-0-12-374490-6.00007-6 – ident: ref_31 – ident: ref_27 – ident: ref_3 doi: 10.1109/ICIT.2019.8754966 – volume: 297 start-page: 2026 year: 2002 ident: ref_12 article-title: Physical one-way functions publication-title: Science doi: 10.1126/science.1074376 contributor: fullname: Pappu – ident: ref_20 doi: 10.1007/3-540-44989-2_40 – ident: ref_4 doi: 10.1109/AICCSA.2016.7945810 – ident: ref_11 doi: 10.1007/978-1-4419-8080-9_4 – ident: ref_41 doi: 10.1145/3240508.3240690 – volume: 2017 start-page: 7925404 year: 2017 ident: ref_23 article-title: The Discrete Wavelet Transform and Its Application for Noise Removal in Localized Corrosion Measurements publication-title: Int. J. Corros. doi: 10.1155/2017/7925404 contributor: fullname: Ramos – volume: 12 start-page: 2017 year: 2017 ident: ref_7 article-title: Fighting counterfeit pharmaceuticals: New defenses for an underestimated and growing menace publication-title: Retrieved Dec. contributor: fullname: Behner – volume: 27 start-page: 1350008 year: 2013 ident: ref_30 article-title: DTW-radon-based shape descriptor for pattern recognition publication-title: Int. J. Pattern Recognit. Artif. Intell. doi: 10.1142/S0218001413500080 contributor: fullname: Santosh – ident: ref_43 – volume: 8 start-page: 4738 year: 2018 ident: ref_2 article-title: Using unique surface patterns of injection moulded plastic components as an image based Physical Unclonable Function for secure component identification publication-title: Sci. Rep. doi: 10.1038/s41598-018-22876-8 contributor: fullname: Wigger – volume: 81 start-page: 115713 year: 2020 ident: ref_33 article-title: Perceptual hashing for image authentication: A survey publication-title: Signal Process. Image Commun. doi: 10.1016/j.image.2019.115713 contributor: fullname: Du – volume: 62 start-page: 133 year: 2016 ident: ref_21 article-title: Robust image hashing via DCT and LLE publication-title: Comput. Secur. doi: 10.1016/j.cose.2016.07.006 contributor: fullname: Tang – ident: ref_46 doi: 10.1109/MMSP.2006.285345 – ident: ref_22 doi: 10.1109/MMIT.2008.134 – ident: ref_32 doi: 10.3390/jimaging6040026 – volume: 12 start-page: 2144 year: 2017 ident: ref_34 article-title: Multi-Scale Difference Map Fusion for Tamper Localization Using Binary Ranking Hashing publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2017.2699942 contributor: fullname: Yan – volume: 15 start-page: 359 year: 2010 ident: ref_26 article-title: Radon transform for face recognition publication-title: Artif. Life Robot. doi: 10.1007/s10015-010-0827-2 contributor: fullname: Dargham – volume: 70 start-page: 1651 year: 2014 ident: ref_38 article-title: Secure and robust image hashing via compressive sensing publication-title: Multimed. Tools Appl. doi: 10.1007/s11042-012-1188-8 contributor: fullname: Sun |
SSID | ssj0001920199 |
Score | 2.2150285 |
Snippet | Cork stoppers were shown to have unique characteristics that allow their use for authentication purposes in an anti-counterfeiting effort. This authentication... |
SourceID | doaj pubmedcentral proquest crossref pubmed |
SourceType | Open Website Open Access Repository Aggregation Database Index Database |
StartPage | 48 |
SubjectTerms | anti-counterfeiting cork stoppers Discrete Cosine Transform hashing image processing perceptual hash |
SummonAdditionalLinks | – databaseName: Directory of Open Access Journals dbid: DOA link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LT9wwELYqTnCoeJPykCv10EtEEttxzA0W0LYSPXUlbpHHDxUQyWpZDv33jO1llUVIXDjkkMRKRjN-zJeMv4-QH7VhFWje5BaT-5wD4JgTiFpdXRlhtZRFFfYO3_ypxxP--1bcDqS-Qk1YogdOjjvVsraVVlYIUFwq0zDvNWIEBlxWBfg4-5ZiAKbuU96Ch0pcPgxx_en93WOU_Qk9vAhqP4NlKLL1v5divq2UHCw915vk6yJnpOfJ1i3yxXXbZGPAJLhD4DJWYlDdWTpaSgvS3tNfaJCj46SZRG-iYPTTGT2nI1y_aCgj_E-x5aifPeBZP526GZ1EVleaNvH6xVe9XTK5vvo7GucL-YTccKHmOVMG8ZRhpkbQ5QumveUO1yywzJeu0KoGrcBZVRqmDdhSMwmyqV1jvEUUwvbIWtd37oBQAVXYalRKAMsNFNp54zDKpXKVLQzLyM9Xb7bTxJLRIroIjm_fOD4jF8Hby2aB3jpewKC3i6C3HwU9I99fY9XicAj_OHTn-uenFjM4qTAFKUVG9lPslq9iCH1xhuMZkStRXbFl9U539y9Sbgc9J3zmt88w_pCsV6EwJhSyNUdkbT57dseY2czhJHbiF1bZ-iY priority: 102 providerName: Directory of Open Access Journals |
Title | Design and Comparison of Image Hashing Methods: A Case Study on Cork Stopper Unique Identification |
URI | https://www.ncbi.nlm.nih.gov/pubmed/34460704 https://search.proquest.com/docview/2567985315 https://pubmed.ncbi.nlm.nih.gov/PMC8321315 https://doaj.org/article/a76d2a9d55b9479c83ffa9983b4720bf |
Volume | 7 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Nb9NAEB01RULtAfGNC0SLxIFLGtvr9Xq5taYhIKWqEJF6s_YTUogdpemBf8_s2o6SihMHH2yv5dW-sWbe-s0MwPtc01TJrBgZDO5HmVL4zTFkrTZPNTOS8zj1ucOzy3w6z75es-sDYH0uTBDta7U4rX8vT-vFz6CtXC31uNeJja9mpe-uQxM2HsCAU7pD0W_akAUP0ZbxoUjpxzeLZej4440bDfYIHlIkQWjr2Z4zCjX7_xVo3tdL7jigyWN41EWO5Kyd4RM4sPVTON6pJ_gM1KegxyCyNqTcNhgkjSNfcG6WTNvOSWQW2kbffiRnpEQvRryY8A_BkWWz_oVnzWpl12QearuSNpXXdXt7z2E-ufheTkddE4WRzpjYjKjQyKo01TlSLxdT6Uxm0XMpQ11iYylyJYWyRiSaSq1MIilXvMhtoZ1BLkJfwGHd1PYVEKZSn3CUcKVMplUsrdMWsU6ETU2saQQf-tWsVm2tjAo5hseguodBBOd-tbfDfJHrcKFZ_6g6qCvJc5NKYRhTIuNCF9Q5ifSQqoynsXIRvOuxqvCj8H86ZG2bu9sK4zguMBBJWAQvW-y2r-qxj4Dvobo3l_07aIeh8HZndyf__eRrOEq9JsZr2Io3cLhZ39m3GNRs1BAGxeTzEB6cX1xefRuGrYFhMOy_0Jn9tA |
link.rule.ids | 230,315,733,786,790,870,891,2115,27955,27956,33407,33778,53825,53827 |
linkProvider | National Library of Medicine |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lj9MwEB4tiwTLgecC4WkkDlzSJnEcx9yWwKoL2xWHLdpb5FeguzSpuu0Bfj1jJ6naigscckjsKHbmszxf8s0MwNtM00TJNA8NOvdhqhSuOYas1WaJZkZyHiUudnh8lo0m6ecLdrEHrI-F8aJ9raaD-udsUE9_eG3lfKaHvU5s-HVcuOo6NGbDG3AT12vCNkj6Zeu04CHaRD4USf3wcjrzNX8cvBGyB3CLIg1CtKdb25HP2v83V3NXMbmxBR3fg2_94FvlydVgtVQD_Xsnr-M_z-4-3O2cUnLUNj-APVs_hDsbqQofgfropR5E1oYU69qFpKnICU7aklFblImMfUXq6_fkiBS4QRKnU_xFsGfRLK7wrJnP7YJMfNpY0kYJV91nw0OYHH86L0ZhV58h1CkTy5AKjYRNU50hq6siKiuTWtwUlaFVbCMpMiWFskbEmkqtTCwpVzzPbK4rgzSHPob9uqntUyBMJS6WKeZKmVSrSNpKW4RRLGxiIk0DeNebqZy3aThKpC_OuOWOcQP44My47ubyZ_sLzeJ72b3nUvLMJFIYxpRIudA5rSqJzJOqlCeRqgJ404OgxPXmfqLI2jar6xJdRC7Qx4lZAE9aUKwf1YMqAL4Fl62xbLcgCHxO787oz_77ztdwe3Q-Pi1PT86-PIeDxElvnFQufwH7y8XKvkTfaale-ZXyB0I2HDs |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9NAEB5Bkapy4P0wz0XiwMXxY22vl1txiVIgVQ9EqrhY-4S0xLbS5AC_nlk_oiTi1IMPttey1_ONZj772xmA95misRRJ7mtM7v1ESvS5FFmryWKVasFYGLu1w9OzbDJLvlykF1utvlrRvpLzUfV7Marmv1ptZbNQwaATC86nheuuQ6M0aLQNbsMd9NmYbRH1yy5xwY13xXwoEvvgcr5o-_44iCNsj-CQIhVCxCc7Iamt3P-_dHNfNbkVhsb34ccwgU59cjVar-RI_d2r7XijGT6Ae31ySo67IQ_hlqkewd2tkoWPQZ60kg8iKk2KTQ9DUltyihM3ZNI1ZyLTtjP19UdyTAoMlMTpFf8QHFnUyyvcq5vGLMmsLR9LutXCtv98-ARm48_fi4nf92nwVZLylU-5QuKmqMqQ3dmQCqsTg8FRamojEwqeScGl0TxSVCipI0GZZHlmcmU10h36FA6qujLPgaQydmuaIialTpQMhbHKIJwibmIdKurBh8FUZdOV4yiRxjgDl3sG9uCTM-VmmKuj3R6olz_L_l2XgmU6FlynqeQJ4yqn1gpkoFQmLA6l9eDdAIQS_c79TBGVqdfXJaaKjGOuE6UePOuAsbnVACwP2A5kdp5l9wwCoa3t3Rv-xY2vfAuH5yfj8tvp2deXcBQ7BY5TzOWv4GC1XJvXmEKt5JvWWf4BDyseuw |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Design+and+Comparison+of+Image+Hashing+Methods%3A+A+Case+Study+on+Cork+Stopper+Unique+Identification&rft.jtitle=Journal+of+imaging&rft.au=Ricardo+Fitas&rft.au=Bernardo+Rocha&rft.au=Valter+Costa&rft.au=Armando+Sousa&rft.date=2021-03-08&rft.pub=MDPI+AG&rft.eissn=2313-433X&rft.volume=7&rft.issue=3&rft.spage=48&rft_id=info:doi/10.3390%2Fjimaging7030048&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_a76d2a9d55b9479c83ffa9983b4720bf |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2313-433X&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2313-433X&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2313-433X&client=summon |