Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,369,713 papers from all fields of science
Search
Sign In
Create Free Account
Identicon
Known as:
Visual hash
An Identicon is a visual representation of a hash value, usually of an IP address, that serves to identify a user of a computer system as a form of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
10 relations
Avatar (computing)
Blog
Canvas element
Distinguishable interfaces
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Common Crucial Feature for Crowdsourcing Based Mobile Visual Location Recognition
Hao Wang
,
Dong Zhao
,
Huadong Ma
,
Yumeng Liang
International Conference on Information Photonics
2018
Corpus ID: 52187551
Crowdsourcing provides a novel and effective way of constructing a location image database for mobile visual location recognition…
Expand
2015
2015
Determining the Effective Entropy of A Visual Hash System
Josh Montegna
2015
Corpus ID: 123227812
An undergraduate thesis pertaining to the viability of fractal images as visual hashes in cryptographic processes.
2014
2014
Developing and testing SCoP - a visual hash scheme
M. Olembo
,
Timo Kilian
,
Simon Stockhardt
,
Andreas Hülsing
,
M. Volkamer
Information Management & Computer Security
2014
Corpus ID: 13095135
Purpose – The purpose of this study was to develop and test SCoP. Users find comparing long meaningless strings of alphanumeric…
Expand
2013
2013
Developing and Testing a Visual Hash Scheme
M. Olembo
,
Timo Kilian
,
Simon Stockhardt
,
Andreas Hülsing
,
M. Volkamer
European Information Security Multi-Conference
2013
Corpus ID: 10782541
Users find comparing long meaningless strings of alphanumeric characters difficult, yet they have to carry out this task when…
Expand
2013
2013
Unequally Weighted Video Hashing for Copy Detection
Jiande Sun
,
Jing Wang
,
Hui Yuan
,
Xiaocui Liu
,
Ju Liu
Conference on Multimedia Modeling
2013
Corpus ID: 39814536
In this paper, an unequally weighted video hashing algorithm is presented, in which visual saliency is used to generate the video…
Expand
2012
2012
A visual saliency based video hashing algorithm
Jing Wang
,
Jiande Sun
,
Ju Liu
,
Xiushan Nie
,
Hua Yan
19th IEEE International Conference on Image…
2012
Corpus ID: 8817603
A novel video hashing algorithm is proposed, which takes account of visual saliency during hash generation. In the proposed…
Expand
2007
2007
Network-aware identification of video clip fragments
José San Pedro
,
S. Domínguez
ACM International Conference on Image and Video…
2007
Corpus ID: 16551993
In this paper, we present a visual hash-based video identification system able to work under variable video encoding conditions…
Expand
2006
2006
1 Browser Enhancements for Preventing Phishing Attacks
Cynthia Kuo
,
Bryan Parno
,
A. Perrig
2006
Corpus ID: 2298014
Phishing attacks exploit human vulnerabilities. They play on our feelings of greed, our instinct to help others, or our need to…
Expand
2004
2004
Robust Visual Hashing Using JPEG 2000
R. Norcen
,
A. Uhl
Communications and Multimedia Security
2004
Corpus ID: 17403044
Robust visual hash functions have been designed to ensure the data integrity of digital visual data. Such algorithms rely on an…
Expand
2002
2002
Secure Oblivious Hiding, Authentication, Tamper Proofing, and Verification Techniques
J. Fridrich
2002
Corpus ID: 59647686
Abstract : In this report, we describe an algorithm for robust visual hash functions with applications to digital image…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE