A. Menezes, P. Van-oorschot, and S. Vanstone, Handbook of Applied Cryptography, 1996.
DOI : 10.1201/9781439821916

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

B. Coskun and N. Memon, Confusion/Diffusion Capabilities of Some Robust Hash Functions, 2006 40th Annual Conference on Information Sciences and Systems, 2006.
DOI : 10.1109/CISS.2006.286645

URL : http://citeseerx.ist.psu.edu/viewdoc/download?doi=

L. Weng and B. Preneel, Attacking Some Perceptual Image Hash Algorithms, Multimedia and Expo, 2007 IEEE International Conference on, pp.879-882, 2007.
DOI : 10.1109/ICME.2007.4284791

S. Voloshynovskiy, O. Koval, F. Beekhof, and T. Pun, Conception and limits of robust perceptual hashing: towards side information assisted hash functions, Media Forensics and Security, 2009.
DOI : 10.1117/12.805919

L. Weng and B. Preneel, Shape-based features for image hashing, 2009 IEEE International Conference on Multimedia and Expo, 2009.
DOI : 10.1109/ICME.2009.5202684

URL : https://www.cosic.esat.kuleuven.be/publications/article-1232.pdf

M. Schneider and S. F. Chang, A robust content based digital signature for image authentication, Proceedings of 3rd IEEE International Conference on Image Processing, pp.227-230, 1996.
DOI : 10.1109/ICIP.1996.560425

J. Fridrich, Robust bit extraction from images, Proceedings IEEE International Conference on Multimedia Computing and Systems, pp.536-540, 1999.
DOI : 10.1109/MMCS.1999.778542

J. Fridrich and M. Goljan, Robust hash functions for digital watermarking, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540), 2000.
DOI : 10.1109/ITCC.2000.844203

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

R. Venkatesan, S. M. Koon, M. Jakubowski, and P. Moulin, Robust image hashing, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101), pp.664-666, 2000.
DOI : 10.1109/ICIP.2000.899541

M. K. Mihçak and R. Venkatesan, New iterative geometric methods for robust perceptual image hashing, Proceedings of ACM Workshop on Security and Privacy in Digital Rights Management, 2001.

V. Monga and B. Evans, Robust perceptual image hashing using feature points, 2004 International Conference on Image Processing, 2004. ICIP '04., pp.677-680, 2004.
DOI : 10.1109/ICIP.2004.1418845

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

F. Lefèbvre, B. Macq, and J. D. Legat, RASH: RAdon Soft Hash algorithm, Proc. of the 11th European Signal Processing Conference, pp.299-302, 2002.

A. Swaminathan, Y. Mao, and M. Wu, Robust and Secure Image Hashing, IEEE Transactions on Information Forensics and Security, vol.1, issue.2, pp.215-230, 2006.
DOI : 10.1109/TIFS.2006.873601

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

A. Swaminathan, Y. Mao, and M. Wu, Security of Feature Extraction in Image Hashing, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005., 2005.
DOI : 10.1109/ICASSP.2005.1415586

R. Radhakrishnan, Z. Xiong, and N. Memon, On the security of the visual hash function, Journal of Electronic Imaging, vol.14, p.10, 2005.

A. Oppenheim and J. Lim, The importance of phase in signals, Proceedings of the IEEE, vol.69, issue.5, pp.529-541, 1981.
DOI : 10.1109/PROC.1981.12022

K. Gegenfurtner, D. Braun, and F. Wichmann, The importance of phase information for recognizing natural images, Journal of Vision, vol.3, issue.9, p.519, 2003.
DOI : 10.1167/3.9.519

X. Ni and X. Huo, Statistical interpretation of the importance of phase information in signal and image reconstruction, Statistics & Probability Letters, vol.77, issue.4, pp.447-454, 2007.
DOI : 10.1016/j.spl.2006.08.025

E. Barker and J. Kelsey, Recommendation for random number generation using deterministic random bit generators, NIST, 2007.
DOI : 10.6028/nist.sp.800-90ar1

M. Johnson and K. Ramchandran, Dither-based secure image hashing using distributed coding, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429), pp.751-754, 2003.
DOI : 10.1109/ICIP.2003.1246789

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

Z. Wang, A. Bovik, H. Sheikh, and E. Simoncelli, Image Quality Assessment: From Error Visibility to Structural Similarity, IEEE Transactions on Image Processing, vol.13, issue.4, pp.600-612, 2004.
DOI : 10.1109/TIP.2003.819861

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

Y. Mao and M. Wu, Unicity Distance of Robust Image Hashing, IEEE Transactions on Information Forensics and Security, vol.2, issue.3, pp.462-467, 2007.
DOI : 10.1109/TIFS.2007.902260

URL : http://citeseerx.ist.psu.edu/viewdoc/download?doi=