Skip to search formSkip to main contentSkip to account menu

Identicon

Known as: Visual hash 
An Identicon is a visual representation of a hash value, usually of an IP address, that serves to identify a user of a computer system as a form of… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Crowdsourcing provides a novel and effective way of constructing a location image database for mobile visual location recognition… 
2015
2015
An undergraduate thesis pertaining to the viability of fractal images as visual hashes in cryptographic processes. 
2014
2014
Purpose – The purpose of this study was to develop and test SCoP. Users find comparing long meaningless strings of alphanumeric… 
2013
2013
Users find comparing long meaningless strings of alphanumeric characters difficult, yet they have to carry out this task when… 
2013
2013
In this paper, an unequally weighted video hashing algorithm is presented, in which visual saliency is used to generate the video… 
2012
2012
A novel video hashing algorithm is proposed, which takes account of visual saliency during hash generation. In the proposed… 
2007
2007
In this paper, we present a visual hash-based video identification system able to work under variable video encoding conditions… 
2006
2006
Phishing attacks exploit human vulnerabilities. They play on our feelings of greed, our instinct to help others, or our need to… 
2004
2004
Robust visual hash functions have been designed to ensure the data integrity of digital visual data. Such algorithms rely on an… 
2002
2002
Abstract : In this report, we describe an algorithm for robust visual hash functions with applications to digital image…