Skip to search formSkip to main contentSkip to account menu

Identicon

Known as: Visual hash 
An Identicon is a visual representation of a hash value, usually of an IP address, that serves to identify a user of a computer system as a form of… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
This paper presents the assessment of a visual hash-based loop-closing detection method applied on marine environments colonized… 
2019
2019
Social conformity occurs when an individual changes their behaviour in line with the majority's expectations. Although social… 
2014
2014
The proliferation of mobile devices is producing a new wave of applications that enable users to sense their surroundings with… 
2014
2014
Purpose – The purpose of this study was to develop and test SCoP. Users find comparing long meaningless strings of alphanumeric… 
2013
2013
In this paper, an unequally weighted video hashing algorithm is presented, in which visual saliency is used to generate the video… 
Highly Cited
2006
Highly Cited
2006
A fingerprinting design extracts discriminating features, called fingerprints. The extracted features are unique and specific to… 
2005
2005
Robust hash functions are central to the security of multimedia content authentication systems. Such functions are sensitive to a… 
2004
2004
  • R. NorcenA. Uhl
  • Communications and Multimedia Security
  • 2004
  • Corpus ID: 17403044
Robust visual hash functions have been designed to ensure the data integrity of digital visual data. Such algorithms rely on an… 
2003
2003
Robust hash functions for visual data need a feature extraction mechanism to rely on. We experimentally compare spatial and… 
Highly Cited
2000
Highly Cited
2000
Digital watermarks have recently been proposed for authentication and fingerprinting of both video data and still images and for…