Identicon

Known as: Visual hash 
An Identicon is a visual representation of a hash value, usually of an IP address, that serves to identify a user of a computer system as a form of… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
The proliferation of mobile devices is producing a new wave of applications that enable users to sense their surroundings with… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2013
2013
Users find comparing long meaningless strings of alphanumeric characters difficult, yet they have to carry out this task when… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2008
2008
Images in digital representation are widely used in our normal life nowadays. With rapid growth of computer processing power, the… (More)
  • table 1
  • figure 1
  • table 2
Is this relevant?
2007
2007
In this paper, we present a visual hash-based video identification system able to work under variable video encoding conditions… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • figure 5
Is this relevant?
2006
2006
A fingerprinting design extracts discriminating features, called fingerprints. The extracted features are unique and specific to… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2004
2004
Robust visual hash functions have been designed to ensure the data integrity of digital visual data. Such algorithms rely on an… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2003
2003
Robust hash functions for visual data need a feature extraction mechanism to rely on. We experimentally compare spatial and… (More)
Is this relevant?
2003
2003
Robust hash functions are central to the security of multimedia content authentication systems. Such functions are sensitive to a… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2000
Highly Cited
2000
Digital waterma.rks have recently been proposed for authentication and fmgerprinting of both video data and still images and for… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?