Perceptual hashing

Perceptual hashing is the use of an algorithm that produces a snippet or fingerprint of various forms of multimedia. Perceptual hash functions are… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
The two well-known problems of the existing inter-frame differencing are foreground aperture and ghosting for low-speed moving… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2013
2013
Perceptual hashing is conventionally used for content identification and authentication. It has applications in database content… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 6
  • figure 5
Is this relevant?
2013
2013
This paper presents a new perceptual image hashing approach that exploits the image color information using hypercomplex… (More)
  • figure 1
  • figure 3
  • figure 4
  • figure 2
Is this relevant?
2012
2012
Image hashing is a new technology in multimedia security. It maps visually identical images to the same or similar short strings… (More)
  • figure 1
  • table 1
  • figure 3
  • figure 4
Is this relevant?
2009
2009
Perceptual hashing has to deal with the constraints of robustness, accuracy and security. After modeling the process of hash… (More)
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
2008
2008
An arbitrarily rotated image should not be recognized as a different one, but the conventional image perceptual hashing… (More)
  • figure 3
  • figure 1
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
2007
2007
In this paper, a perceptual audio hashing method in compressed domain is proposed for content identification, in which MDCT… (More)
  • figure 1
  • figure 2
  • table I
  • figure 3
  • figure 4
Is this relevant?
2006
2006
Image perceptual hashing has been proposed to identify or authenticate image contents in a robust way against distortions caused… (More)
  • table 1
Is this relevant?
2004
2004
This paper presents a hashing method for automatic song recognition. This technique works by analyzing the signal and taking into… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Highly Cited
2001
Highly Cited
2001
Assuming that watermarking is feasible (say, against a limited set of attacks of significant interest), current methods use a… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?