Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 210,000,528 papers from all fields of science
Search
Sign In
Create Free Account
Identicon
Known as:
Visual hash
An Identicon is a visual representation of a hash value, usually of an IP address, that serves to identify a user of a computer system as a form of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
10 relations
Avatar (computing)
Blog
Canvas element
Distinguishable interfaces
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Real-time Hash-based Loop Closure Detection in Underwater Multi-Session Visual SLAM
Giovani Peralta
,
F. Bonin-Font
,
A. Caiti
Oceans
2019
Corpus ID: 204700481
This paper presents the assessment of a visual hash-based loop-closing detection method applied on marine environments colonized…
Expand
2019
2019
Measuring the Effects of Gender on Online Social Conformity
S. Wijenayake
,
N. V. Berkel
,
V. Kostakos
,
Jorge Gonçalves
Proc. ACM Hum. Comput. Interact.
2019
Corpus ID: 204808088
Social conformity occurs when an individual changes their behaviour in line with the majority's expectations. Although social…
Expand
2014
2014
Instant Mobile Video Search With Layered Audio-Video Indexing and Progressive Transmission
Wu Liu
,
Tao Mei
,
Yongdong Zhang
IEEE transactions on multimedia
2014
Corpus ID: 2183471
The proliferation of mobile devices is producing a new wave of applications that enable users to sense their surroundings with…
Expand
2014
2014
Developing and testing SCoP - a visual hash scheme
M. M. Olembo
,
Timo Kilian
,
Simon Stockhardt
,
Andreas Hülsing
,
M. Volkamer
Information Management & Computer Security
2014
Corpus ID: 13095135
Purpose – The purpose of this study was to develop and test SCoP. Users find comparing long meaningless strings of alphanumeric…
Expand
2013
2013
Unequally Weighted Video Hashing for Copy Detection
Jiande Sun
,
Jing Wang
,
Hui Yuan
,
Xiaocui Liu
,
Ju Liu
Conference on Multimedia Modeling
2013
Corpus ID: 39814536
In this paper, an unequally weighted video hashing algorithm is presented, in which visual saliency is used to generate the video…
Expand
Highly Cited
2006
Highly Cited
2006
A Video Fingerprint Based on Visual Digest and Local Fingerprints
Ayoub Massoudi
,
F. Lefèbvre
,
C. Demarty
,
Lionel Oisel
,
B. Chupeau
International Conference on Information Photonics
2006
Corpus ID: 14955550
A fingerprinting design extracts discriminating features, called fingerprints. The extracted features are unique and specific to…
Expand
2005
2005
On the security of the visual hash function
R. Radhakrishnan
,
Ziyou Xiong
,
N. Memon
J. Electronic Imaging
2005
Corpus ID: 5472025
Robust hash functions are central to the security of multimedia content authentication systems. Such functions are sensitive to a…
Expand
2004
2004
Robust Visual Hashing Using JPEG 2000
R. Norcen
,
A. Uhl
Communications and Multimedia Security
2004
Corpus ID: 17403044
Robust visual hash functions have been designed to ensure the data integrity of digital visual data. Such algorithms rely on an…
Expand
2003
2003
Robust Hash Functions for Visual Data: An Experimental Comparison
Champskud J. Skrepth
,
A. Uhl
Iberian Conference on Pattern Recognition and…
2003
Corpus ID: 12778063
Robust hash functions for visual data need a feature extraction mechanism to rely on. We experimentally compare spatial and…
Expand
Highly Cited
2000
Highly Cited
2000
Visual hash for oblivious watermarking
J. Fridrich
Electronic imaging
2000
Corpus ID: 42825424
Digital watermarks have recently been proposed for authentication and fingerprinting of both video data and still images and for…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE