Have a personal or library account? Click to login
A Review of Hashing based Image Copy Detection Techniques Cover

A Review of Hashing based Image Copy Detection Techniques

Open Access
|Jun 2019

References

  1. 1. Lian, S., D. Kanellopoulos. Recent Advances in Multimedia Information Systems Security. – Informatica – An International Journal of Computing and Informatics, Vol. 33, 2009, pp. 3-24.
  2. 2. Qureshi, M. A., M. Deriche. A Bibliography of Pixel-Based Blind Image Forgery Detection. – Signal Processing: Image Communication, Vol. 39, 2015, No A, pp. 46-74.10.1016/j.image.2015.08.008
  3. 3. Liu, G., J. Wang, S. Lian, Z. Wang. A Passive Image Authentication Scheme for Detecting Region-Duplication Forgery with Rotation. – Journal of Network and Computer Applications, Vol. 34, 2011, No 5, pp. 1557-1565.10.1016/j.jnca.2010.09.001
  4. 4. Qazi, T., K. Hayat, S. U. Khan, S. A. Madani, I. A. Khan, J. Kolodziej, H. Li, W. Lin, K. C. Yow, C. Z. Xu. Survey on Blind Image Forgery Detection. – IET Image Processing, Vol. 7, 2013, No 7, pp. 660-670.10.1049/iet-ipr.2012.0388
  5. 5. Kang, X., S. Wei. An Efficient Approach to Still Image Copy Detection Based on SVD and Block Partition for Digital Forensics. – In: IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS), 2009, pp. 457-461.10.1109/ICICISYS.2009.5358149
  6. 6. Battiato, S., G. M. Farinella, E. Messina, G. Puglisi. Robust Image Alignment for Tampering Detection. – IEEE Transactions on Information Technology Forensics and Security, Vol. 7, 2012, No 4, pp. 1105-1117.10.1109/TIFS.2012.2194285
  7. 7. Redi, J. A., W. Taktak, J. A. Dugelay. Digital Image Forensics: A Booklet for Beginners. – Multimedia Tools and Applications, Vol. 51, 2011, No 1, pp. 133-162.10.1007/s11042-010-0620-1
  8. 8. Han, B., J. Li. A New Zero-Watermarking Algorithm Resisting Attacks Based on Differences Hashing. – Cybernetics and Information Technologies, Vol. 16, No 2, 2016, pp. 135-147.10.1515/cait-2016-0026
  9. 9. Wu, M. N., C. C. Lin, C. C. Chang. Novel Image Copy Detection with Rotating Tolerance. – Journal of Systems and Software, Vol. 80, 2007, No 7, pp. 1057-1069.10.1016/j.jss.2006.12.001
  10. 10. Chang, E., J. Z. Wang, C. Li, G. Wiederhold. RIME: A Replicated Image Detector for the World-Wide Web. – In: Proc. in SPIE Multimedia Storage and Archiving Systems III, Vol. 3527, 1998.10.1117/12.325852
  11. 11. Hsiao, J. H., C. S. Chen, L. F. Chien, M. S. Chen. A New Approach to Image Copy Detection Based on Extended Feature Sets. – IEEE Transactions on Image Processing, Vol. 16, 2007, No 8, pp. 2069-2079.10.1109/TIP.2007.90009917688212
  12. 12. Szucs, G., D. Papp. Content-Based Image Retrieval for Multiple Objects Search. – Cybernetics and Information Technologies, Vol. 17, 2017, No 2, pp. 106-118.10.1515/cait-2017-0020
  13. 13. Nassih, B., M. Ngadi, A. Amine, A. El-Attar. New Proposed Fusion between DCT for Feature Extraction and NSVC for Face Classification. – Cybernetics and Information Technologies, Vol. 18, 2018, No 2, pp. 89-97.10.2478/cait-2018-0030
  14. 14. Arnia, F., Agustinus, K. Munandi, M. Fujiyoshi, H. Kiya. Content-Based Image Copy Detection Based on Sign of Wavelet Coefficients. – In: International Workshop on Advanced Image Technology, 2011.
  15. 15. Wang, Y. G., Y. Lei, J. Huang. An Image Copy Detection Scheme Based on Radon Transform. – In: IEEE 17th International Conference on Image Processing, 2010, pp. 1009-1012.10.1109/ICIP.2010.5653456
  16. 16. Kim, C. Content-Based Image Copy Detection. – Signal Processing: Image Communication, Vol. 18, 2003, No 3, pp. 169-184.10.1016/S0923-5965(02)00130-3
  17. 17. Sebe, N., Y. Liu, Y. Zhuang, T. Huang, S. F. Chang. Blind Passive Media Forensics: Motivation and Opportunity. – In: International Conference on Multimedia Content Analysis and Mining, Vol. 4577, 2007, pp. 57-59.
  18. 18. Tang, Z., F. Yang, L. Huang, X. Zhang. Robust Image Hashing with Dominant DCT Coefficients. – Optik, Vol. 125, 2014, No 18, pp. 5102-5107.10.1016/j.ijleo.2014.05.015
  19. 19. Tang, Z., X. Zhang, X. Dai, J. Yang, T. Wu. Robust Image Hash Function Using Local Color Features. – International Journal of Electronics and Communications (AEU), Vol. 67, 2013, No 8, pp. 717-722.10.1016/j.aeue.2013.02.009
  20. 20. Ouyang, J., G. Coatrieux, H. Shu. Robust Hashing or Image Authentication Using Quaternion Discrete Fourier Transform and Log-Polar Transform. – Digital Signal Processing, Vol. 41, 2015, pp. 98-109.10.1016/j.dsp.2015.03.006
  21. 21. Tang, Z., Y. Dai, X. Zhang, L. Huang, F. Yang. Robust Image Hashing via Colour Vector Angles and Discrete Wavelet Transform. – IET Image Processing, Vol. 8, 2014, No 3, pp. 142-149.10.1049/iet-ipr.2013.0332
  22. 22. Tang, Z., L. Ruan, C. Qin, X. Zhang, C. Yu. Robust Image Hashing with Embedding Vector Variance of LLE. – Digital Signal Processing, Vol. 43, 2015, pp. 17-27.10.1016/j.dsp.2015.05.002
  23. 23. Lei, Y., Y. Wang, J. Huang. Robust Image Hash in Radon Transform Domain for Authentication. – Signal Processing: Image Communication, Vol. 26, 2011, No 6, pp. 280-288.10.1016/j.image.2011.04.007
  24. 24. Tang, Z., X. Zhang, X. Li, S. Zhang. Robust Image Hashing with Ring Partition and Invariant Vector Distance. – IEEE Transactions on Information Forensics and Security, Vol. 11, 2016, No 1, pp. 200-214.10.1109/TIFS.2015.2485163
  25. 25. Tang, Z., Z. Y. Dai, X. Zhang. Perceptual Hashing for Color Images Using Invariant Moments. – Applied Mathematics and Information Sciences, Vol. 6, 2012, No 2S, pp. 643S-650S.
  26. 26. Al-Qershi, O. M., B. E. Khoo. Passive Detection of Copy-Move Forgery in Digital Images: State-of-the-art. – Forensic Science International, Vol. 231, 2013, No 1-3, pp. 284-295.10.1016/j.forsciint.2013.05.02723890651
  27. 27. Kailasanathan, C., R. S. Naini, P. Ogunbona. Compression Tolerant DCT Based Image Hash. – In: Proc. of 23rd International Conference Distributed Computing Systems Workshop, 2003, pp. 562-567.10.1109/ICDCSW.2003.1203613
  28. 28. Roover, C. D., C. D. Vleeschouwer, F. Lefebvre, B. Macq. Robust Video Hashing Based on Radial Projections of Keyframes. – IEEE Transactions on Signal Processing, Vol. 53, 2005, No 10, pp. 4020-4037.10.1109/TSP.2005.855414
  29. 29. Tang, Z., S. Wan, X. Zhang. Lexicographical Framework for Image Hashing with Implementation Based on DCT and NMF. – Multimedia Tools and Applications, Vol. 52, 2010, No 2-3, pp. 325-345.10.1007/s11042-009-0437-y
  30. 30. Yu, Y., S. Sun. Image Robust Hashing Based on DCT Sign. – In: Proc. of 2006 International Conference Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP’06), 2006.10.1109/IIH-MSP.2006.264971
  31. 31. Qin, C., C. Chang. Robust Image Hashing Using Non-Uniform Sampling in Discrete Fourier Domain. – Digital Signal Processing, Vol. 23, 2013, No 2, pp. 578-585.10.1016/j.dsp.2012.11.002
  32. 32. Swaminathan, A. Robust and Secure Image Hashing. – IEEE Transactions on Information Forensics and Security, Vol. 1, 2006, No 2, pp. 215-230.10.1109/TIFS.2006.873601
  33. 33. Swaminathan, A., Y. Mao, M. Wu. Image Hashing Resilient to Geometric and Filtering Operations. – In: IEEE 6th Workshop on Multimedia Signal Processing, 2004, pp. 355-358.10.1109/MMSP.2004.1436566
  34. 34. Ahmed, F., M. Y. Siyal, V. U. Abbas. A Secure and Robust Hash-Based Scheme for Image Authentication. – Signal Processing, Vol. 90, 2010, No 5, pp. 1456-1470.10.1016/j.sigpro.2009.05.024
  35. 35. Lu, C. S., C. Y. Hsu. Geometric Distortion Resilient Image Hashing Scheme and Its Applications on Copy Detection and Authentication. – Multimedia Systems, Vol. 11, 2005, No 2, pp. 159-173.10.1007/s00530-005-0199-y
  36. 36. Lu, C. S., C. Y. Hsu, S. W. Sun, P. C. Chang. Robust Mesh-Based Hashing for Copy Detection and Tracing of Images. – In: IEEE International Conference on Multimedia and Expo (ICME), 2004, pp. 731-734.
  37. 37. Meixner, A., A. Uhl. Robustness and Security of a Wavelet-Based CBIR Hashing Algorithm. – In: Proc. of 8th Workshop on Multimedia and Security, 2006, pp. 140-145.10.1145/1161366.1161392
  38. 38. Michak, M. K., R. Venkatesan. New Iterative Geometric Methods for Robust Perceptual Image Hashing. – ACM Workshop: Security and Privacy on Digital Rights Management DRM, 2001, pp. 13-21.10.1007/3-540-47870-1_2
  39. 39. Monga, V., B. L. Evans. Perceptual Image Hashing via Feature Points: Performance Evaluation and Tradeoffs. – IEEE Transactions on Image Processing, Vol. 15, 2006, No 11, pp. 3453-3466.10.1109/TIP.2006.881948
  40. 40. Venkatesan, R., S. M. Koon, M. H. Jakubowski, P. Moulin. Robust Image Hashing. – In: International Conference on Image Processing, 2000, pp. 664-666.10.1109/ICIP.2000.899541
  41. 41. Yang, S. H., C. F. Chen. Robust Image Hashing Based on SPIHT. – In: Proc. of IEEE International Conference Information Technology: Research & Education (IIH-MSP’06), 2006, pp. 110-114.
  42. 42. Karsh, R. K., R. H. Laskar, Aditi. Robust Image Hashing through DWT-SVD and Spectral Residual Method. – EURASIP Journal on Image and Video Processing, Vol. 2017, 2017, No 31, pp. 1-17.10.1186/s13640-017-0179-0
  43. 43. Lefebvre, F., J. Cryz, B. Macq. A Robust Soft Hash Algorithm for Digital Image Signature. – In: Proc. of IEEE International Conference Image Processing, 2003, pp. 495-498.10.1109/ICIP.2003.1246725
  44. 44. Lefebvre, F., B. Macq, J. D. Legat. RASH: RAdon Soft Hash Algorithm. – In: 11th European Signal Processing Conference, 2002, pp. 1-4.
  45. 45. Malkin, M. R. Venkatesan. The Randlet Transform: Applications to Universal Perceptual Hashing and Image Authentication. – In: Proc. of Allerton Conference, 2004.
  46. 46. Seo, J. S., J. Haitsma, T. Kalker, C. D. Yoo. A Robust Image Fingerprinting System Using the Radon Transform. – Signal Processing: Image Communication, Vol. 19, 2006, No 4, pp. 325-339.10.1016/j.image.2003.12.001
  47. 47. Wu, D., X. Zhou, X. Niu. A Novel Image Hash Algorithm Resistant to Print-Scan. – Signal Processing, Vol. 89, 2009, No 12, pp. 2415-2424.10.1016/j.sigpro.2009.05.016
  48. 48. Chen, C. C., S. L. Hsieh. Using Binarization and Hashing for Efficient SIFT Matching. – Journal of Visual Communication & Image Representation, Vol. 30, 2015, pp. 86-93.10.1016/j.jvcir.2015.02.014
  49. 49. Ling, H., L. Yan, F. Zou, C. Liu, H. Feng. Fast Image Copy Detection Approach Based on Local Fingerprint Defined Visual Words. – Signal Processing, Vol. 93, 2013, No 8, pp. 2328-2338.10.1016/j.sigpro.2012.08.011
  50. 50. Lv, X., Z. J. Wang. Perceptual Image Hashing Based on Shape Contexts and Local Feature Points. – IEEE Transactions on Information Forensics and Security, Vol. 7, 2012, No 3, pp. 1081-1093.10.1109/TIFS.2012.2190594
  51. 51. Li, Y., Z. Lu, C. Zhu, X. Niu. Robust Image Hashing Based on Random Gabor Filtering and Dithered Lattice Vector Quantization. – IEEE Transactions on Image Processing, Vol. 21, 2012, No 4, pp. 1963-1980.10.1109/TIP.2011.217169821997268
  52. 52. Liu, F., L. Cheng, H. Leung, Q. Fu. Wave Atom Transform Generated Strong Image Hashing Scheme. – Optical Communications, Vol. 285, 2012, No 24, pp. 5008-5018.10.1016/j.optcom.2012.08.007
  53. 53. Liu, Y. L., Y. Xiao. A Robust Image Hashing Algorithm Resistant against Geometrical Attacks. – Radio Engineering, Vol. 22, 2013, No 4, pp. 1072-1081.
  54. 54. Wang, L., X. Jiang, D. Hu, D. Ye, S. Lian. Robust Perceptual Image Hash Using Gabor Filters. – In: International Conference on Multimedia Information Networking and Security, 2009, pp. 53-56.10.1109/MINES.2009.138
  55. 55. Yang, B., F. Gu, X. Niu. Block Mean Value Based Image Perceptual Hashing. – In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2006, pp. 167-172.10.1109/IIH-MSP.2006.265125
  56. 56. Hernandez, R. A. P., B. M. Kurkoski. Robust Image Hashing Using Image Normalization and SVD Decomposition. – In: IEEE 54th International Midwest Symposium on Circuits and Systems (MWSCAS), 2011, pp. 1-4.10.1109/MWSCAS.2011.6026372
  57. 57. Kozat, S. S., R. Venkatesan, M. K. Michak. Robust Perceptual Image Hashing via Matrix Invariants. – IEEE International Conference on Image Processing (ICIP), 2004, pp. 3443-3446.10.1109/ICIP.2004.1421855
  58. 58. Lv, X., Z. J. Wang. An Extended Image Hashing Concept: Content-Based Fingerprinting Using FJLT. – EURASIP Journal on Information Security, 2009, pp. 1-17.10.1186/1687-417X-2009-859859
  59. 59. Monga, V., M. K. Michak. Robust and Secure Image Hashing via Non-Negative Matrix Factorizations. – IEEE Transactions on Information Forensics and Security, Vol. 2, 2007, No 3, pp. 376-390.10.1109/TIFS.2007.902670
  60. 60. Tang, Z., S. Wang, X. Zhang, W. Wei, S. Su. Robust Image Hashing for Tamper Detection Using Non-Negative Matrix Factorization. – Journal of Ubiquitous Convergence and Technology, Vol. 2, 2008, No 1, pp. 18-26.
  61. 61. Karsh, R. K., R. H., Laskar, B. B. Richhariya. Robust Image Hashing Using Ring Partition-PGNMF and Local Features. – SpringerPlus, Vol. 5, 2016, No 1, pp. 1-20.10.1186/s40064-016-3639-6511838127933251
  62. 62. Monga, V., B. L. Evans. Robust Perceptual Image Hashing Using Feature Points. – In: IEEE International Conference on Image Processing, 2004, pp. 677-680.10.1109/ICIP.2004.1418845
  63. 63. Roy, S., Q. Su. Robust Hashfor Detecting and Localizing Image Tampering. – In: IEEE International Conference on Image Processing, 2007, pp. 117-120.10.1109/ICIP.2007.4379535
  64. 64. Tang, Z., S. Wang, X. Zhang, W. Wei. Structural Feature-Based Image Hashing and Similarity Metric for Tampering Detection. – Fundamenta Informaticae, Vol. 106, 2011, No 1, pp. 75-91.10.3233/FI-2011-377
  65. 65. Xiaofeng, W., P. Kemu, Z. Xiaorui, Z. Wang, L. Lu, X. Jianru. A Visual Model Based Perceptual Image Hash for Content Authentication. – IEEE Transactions on Information Forensics Security, Vol. 10, 2015, No 7, pp. 1336-1349.10.1109/TIFS.2015.2407698
  66. 66. Chen, Y., W. Yu, J. Feng. Robust Image Hashing Using Invariants of Tchebichef Moments. – Optik, Vol. 125, 2014, No 19, pp. 5582-5587.10.1016/j.ijleo.2014.07.006
  67. 67. Zhao, Y., S. Wang, X. Zhang, H. Yao. Robust Hashing for Image Authentication Using Zernike Moments and Local Features. – IEEE Transactions on Information Forensics and Security, Vol. 8, 2013, No 1, pp. 55-63.10.1109/TIFS.2012.2223680
  68. 68. Zhao, Y., W. Wei. Perceptual Image Hash for Tampering Detection Using Zernike Moments. – In: Proc. of IEEE International Conference on Progress in Informatics and Computing, 2010, pp. 738-742.10.1109/PIC.2010.5687938
  69. 69. Tang, Z., L. Huang, Y. Dai, F. Yang. Robust Image Hashing Based on Multiple Histograms. – International Journal of Digital Content Technology and its Applications (JDCTA), Vol. 6, 2013, No 23, pp. 39-47.10.4156/jdcta.vol6.issue23.5
  70. 70. Tang, Z., X. Zhang, L. Huang, Y. Dai. Robust Image Hashing Using Ring-Based Entropies. – Signal Processing, Vol. 93, 2013, No 7, pp. 2061-2069.10.1016/j.sigpro.2013.01.008
  71. 71. Tang, Z., X. Zhang, S. Zhang. Robust Perceptual Image Hashing Based on Ring Partition and NMF. – IEEE Transactions on Knowledge and Data Engineering, Vol. 26, 2014, No 3, pp. 711-724.10.1109/TKDE.2013.45
  72. 72. Gerold, L., U. Andreas. Key-Dependent JPEG2000 Based Robust Hashing for Secure Image Authentication. – EURASIP Journal on Information Technology, Vol. 8, 2008, No 1, pp. 1-19.10.1155/2008/895174
  73. 73. Hadmi, A., W. Puech, B. A. Es Said, A. A. Ouahman. A Robust and Secure Perceptual Hashing System Based on Quantization Step Analysis. – Signal Processing: Image Communications, Vol. 28, 2013, No 8, pp. 929-948.10.1016/j.image.2012.11.009
  74. 74. Johnson, M., K. Ramchandran. Dither Based Secure Image Hashing Using Distributed Coding. – In: Proceedings of IEEE International Conference Image Processing, 2003, pp. 751-754.10.1109/ICIP.2003.1246789
  75. 75. Kang, L., C. Lu, C. Hsu. Compressive Sensing Based Image Hashing. – In: Proc. of IEEE International Conference on Image Processing, 2009, pp. 1285-1288.10.1109/ICIP.2009.5413606
  76. 76. Khelifi, F., J. Jiang. Perceptual Image Hashing Based on Virtual Watermark Detection. – IEEE Transactions on Image Processing, Vol. 19, 2010, No 4, pp. 981-994.10.1109/TIP.2009.203863720007047
  77. 77. Lv, X., Z. J. Wang. Compressed Binary Image Hashes Based on Semisupervised Spectral Embedding. – IEEE Transactions on Information Forensics and Security, Vol. 8, 2013, No 11, pp. 1838-1849.10.1109/TIFS.2013.2281219
  78. 78. Skrepth, C. J., A. Uhl. Robust Hash Functions for Visual Data: An Experiment Comparison. – Pattern Recognition and Image Analysis, Vol. 2652, 2003, pp. 986-993.10.1007/978-3-540-44871-6_114
  79. 79. Sun, R., X. Yan, Z. Ding. Robust Image Hashing Using Locally Linear Embedding. – In: International Conference on Computer Science and Service System, 2011, pp. 715-718.10.1109/CSSS.2011.5972117
  80. 80. Xiang, S., H. J. Kim, J. Huang. Histogram-Based Image Hashing Scheme Robust against Geometric Deformations. – In: Proc. of 9th Workshop on Multimedia & Security, 2007, pp. 121-128.10.1145/1288869.1288886
  81. 81. Zou, F., H. Feng, H. Ling, C. Liu, L. Yan, P. Li, D. Li. Nonnegative Sparse Coding Induced Hashing for Image Copy Detection. – Neurocomputing, Vol. 105, 2013, pp. 81-89.10.1016/j.neucom.2012.06.042
  82. 82. Tang, Z., L. Huang, X. Zhang, H. Lao. Robust Image Hashing Based on Color Vector Angles and Canny Operator. – International Journal of Electronics and Communications(AEU), Vol. 70, 2016, No 6, pp. 833-841.10.1016/j.aeue.2016.03.010
  83. 83. Fridrich, J., M. Goljan. Robust Hash Functions for Digital Watermarking. – In: Proc. on IEEE International Conference on Information Technology: Coding and Computing, 2000, pp. 178-183.10.1109/ITCC.2000.844203
  84. 84. Guo, X. C., D. Hatzinakos. Content-Based Image Hashing via Wavelet and Radon Transform. – In: Advances in Multimedia Information Processing – PCM 2007, LNCS, 4810, 2007, pp. 755-764.10.1007/978-3-540-77255-2_91
  85. 85. Laraji, I. H., L. Ghouti, E. H. Khiari. Perceptual Hashing of Color Images Using Hyper Complex Representation. – In: Proc. of the IEEE International Conference on Image Processing (ICIP’13), 2013, pp. 4402-4406.10.1109/ICIP.2013.6738907
  86. 86. Michak, M. K., R. Venkatesan. A Perceptual Audio Hashing Algorithm: A Tool for Robust Audio Identification and Information Hiding. – In: Proc. of 4th International Workshop on Information Hiding, Springer-Verlag, 2001, pp. 51-65.10.1007/3-540-45496-9_5
  87. 87. Monga, V., D. Vats, B. L Evans. Image Authentication under Geometric Attacks via Structure Matching. –In: IEEE International Conference Multimedia and Expo, 2005.
  88. 88. Ou, Y., K. H. Rhee. A Key-Dependent Secure Image Hashing Scheme by Using Radon Transform. – 2009 International Symposium on Intelligent Signal Processing and Communications Systems (ISPACS), 2009, pp. 595-598.10.1109/ISPACS.2009.5383770
  89. 89. Rey, C., J. L. Dugelay. A Survey of Watermarking Algorithms for Image Authentication. – EURASIP Journal on Applied Signal Processing, Vol. 1, 2002, pp. 613-621.10.1155/S1110865702204047
  90. 90. Sun, Q., S. F. Chang. A Robust and Secure Media Signature Scheme for JPEG Images. – Journal of VLSI Signal Processing Systems for Signal, Image and Video Technology, Vol. 41, 2005, No 3, pp. 305-317.10.1007/s11265-005-4154-0
  91. 91. Tang, Z., Y. Dai, X. Zhang, S. Zhang. Perceptual Image Hashing with Histogram of Color Vector Angles. – In: 8th International Conference on Active Media Technology(AMT’12), 2012, pp. 237-246.10.1007/978-3-642-35236-2_24
DOI: https://doi.org/10.2478/cait-2019-0012 | Journal eISSN: 1314-4081 | Journal ISSN: 1311-9702
Language: English
Page range: 3 - 27
Submitted on: Nov 1, 2018
Accepted on: Mar 25, 2019
Published on: Jun 18, 2019
Published by: Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2019 Mayank Srivastava, Jamshed Siddiqui, Mohammad Athar Ali, published by Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.