Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,182,843 papers from all fields of science
Search
Sign In
Create Free Account
Perceptual hashing
Perceptual hashing is the use of an algorithm that produces a snippet or fingerprint of various forms of multimedia. Perceptual hash functions are…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
5 relations
Algorithm
Avalanche effect
Cryptographic hash function
Hash function
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Towards Evaluating Gaussian Blurring in Perceptual Hashing as a Facial Image Filter
Y. Alparslan
,
Mannika Kshettry
,
L. Kratz
arXiv.org
2020
Corpus ID: 211010937
With the growth in social media, there is a huge amount of images of faces available on the internet. Often, people use other…
Expand
2019
2019
Perceptual Video Hashing for Content Identification and Authentication
F. Khelifi
,
A. Bouridane
IEEE transactions on circuits and systems for…
2019
Corpus ID: 55725934
Perceptual hashing has been broadly used in the literature to identify similar contents for video copy detection. It has also…
Expand
2018
2018
Perceptual Hashing-Based Image Copy-Move Forgery Detection
Huan Wang
,
Hongxia Wang
Secur. Commun. Networks
2018
Corpus ID: 3283237
This paper proposes a blind authentication scheme to identify duplicated regions for copy-move forgery based on perceptual…
Expand
Highly Cited
2017
Highly Cited
2017
Turn Signal Detection During Nighttime by CNN Detector and Perceptual Hashing Tracking
Long Chen
,
Xuemin Hu
,
Tong Xu
,
Hulin Kuang
,
Qingquan Li
IEEE transactions on intelligent transportation…
2017
Corpus ID: 11241776
Detecting vehicle turn signals at night is critical for both assistant driving systems and autonomous driving systems. In this…
Expand
Highly Cited
2017
Highly Cited
2017
Automatic Image Filtering on Social Networks Using Deep Learning and Perceptual Hashing During Crises
T. Nguyen
,
Firoj Alam
,
Ferda Ofli
,
Muhammad Imran
International Conference on Information Systems…
2017
Corpus ID: 11754214
The extensive use of social media platforms, especially during disasters, creates unique opportunities for humanitarian…
Expand
2017
2017
Perceptual Hashing of Color Images Using Interpolation Mapping and Non-negative Matrix Factorization
Qiu-yu Zhang
,
Q. Dou
,
Zi Yang
,
Yan Yan
J. Inf. Hiding Multim. Signal Process.
2017
Corpus ID: 220523779
. In order to improved tampering detection ability and resistance of arbitrary rotation attack in color image authentication, a…
Expand
2013
2013
Towards a Process Model for Hash Functions in Digital Forensics
F. Breitinger
,
Huajian Liu
,
Christian Winter
,
Harald Baier
,
A. Rybalchenko
,
M. Steinebach
International ICST Conference on Digital…
2013
Corpus ID: 46047951
Handling forensic investigations gets more and more difficult as the amount of data one has to analyze is increasing continuously…
Expand
2007
2007
MDCT-Based Perceptual Hashing for Compressed Audio Content Identification
Yuhua Jiao
,
Bian Yang
,
Mingyu Li
,
X. Niu
IEEE Workshop on Multimedia Signal Processing
2007
Corpus ID: 2248114
In this paper, a perceptual audio hashing method in compressed domain is proposed for content identification, in which MDCT…
Expand
Highly Cited
2006
Highly Cited
2006
Block Mean Value Based Image Perceptual Hashing
Bian Yang
,
Fan Gu
,
X. Niu
International Conference on Intelligent…
2006
Corpus ID: 2127800
Image perceptual hashing has been proposed to identify or authenticate image contents in a robust way against distortions caused…
Expand
Highly Cited
2001
Highly Cited
2001
A Perceptual Audio Hashing Algorithm: A Tool for Robust Audio Identification and Information Hiding
M. K. Mihçak
,
R. Venkatesan
Information Hiding
2001
Corpus ID: 5996061
Assuming that watermarking is feasible (say, against a limited set of attacks of significant interest), current methods use a…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE