Search
Search Results
-
Parallel SHA-256 on SW26010 many-core processor for hashing of multiple messages
To explore whether new parallelism techniques can provide additional performance improvements in cryptographic hash functions, we conducted our study...
-
Deep Discriminative Hashing for Cross-Modal Hashing Based Computer-Aided Diagnosis
Massive medical data in multi-modalities emerges with the development of modern medicine, which facilitates the construction of computer-aided... -
A review of hashing based image authentication techniques
In the recent digitization era, image hashing is a key technology, including image recognition, authentication and manipulation detection, among many...
-
Locality sensitive hashing-aware fruit fly optimization algorithm and its application in edge server placement
As is well known that the global optimization ability of the Fruit fly Optimization Algorithm (FOA)is weak because it is easy to fall into local...
-
Lock-Free Bucketized Cuckoo Hashing
Concurrent hash tables are one of the fundamental building blocks for cloud computing. In this paper, we introduce lock-free modifications to... -
S3ACH: Semi-Supervised Semantic Adaptive Cross-Modal Hashing
Hash learning has been a great success in large-scale data retrieval field because of its superior retrieval efficiency and storage consumption.... -
DASH: Data Aware Locality Sensitive Hashing
Locality sensitive hashing (LSH) has been extensively employed to solve the problem of c-approximate nearest neighbor search (c-ANNS) in... -
On Time-Space Tradeoffs for Bounded-Length Collisions in Merkle-Damgård Hashing
We study the power of preprocessing adversaries in finding bounded-length collisions in the widely used Merkle-Damgård (MD) hashing in the random...
-
A comprehensive review of the security flaws of hashing algorithms
The blockchain is an emerging technology. It is widely used because of its efficiency and functionality. The hash function, as a supporting aspect of...
-
Multi-head Hashing with Orthogonal Decomposition for Cross-modal Retrieval
Recently, cross-modal hashing has become a promising line of research in cross-modal retrieval. It not only takes advantage of complementary multiple... -
Deep Consistency Preserving Network for Unsupervised Cross-Modal Hashing
Given the proliferation of multimodal data in search engines and social networks, unsupervised cross-modal hashing has gained traction for its low... -
Deep fused two-step cross-modal hashing with multiple semantic supervision
Existing cross-modal hashing methods ignore the informative multimodal joint information and cannot fully exploit the semantic labels. In this paper,...
-
Using Perceptual Hashing for Targeted Content Scanning
The Internet is increasingly used to disseminate unethical and illegal content. A grave concern is child sexual abuse material that is often... -
Privacy protection and authentication of electronic patient information using hashing and multi watermarking technique
The application of digital technology has brought a new transformation in the healthcare sector. Significantly, the operational efficiency between...
-
Critical Separation Hashing for Cross-Modal Retrieval
With the development of Internet technology, unimodal retrieval techniques are no longer suitable for the current environment, and mutual retrieval... -
Hashing for Structure-Based Anomaly Detection
We focus on the problem of identifying samples in a set that do not conform to structured patterns represented by low-dimensional manifolds. An... -
Deep Multi-Scale Hashing for Image Retrieval (DMSH)
In recent years, with the great success of deep learning, deep networks-based hashing has become a leading approach for image retrieval. Most... -
Content-based encrypted speech retrieval scheme with deep hashing
In order to improve the limitations of manual features and poor feature semantics in the feature extraction process of existing content-based...
-
A retrieval method for encrypted speech based on improved power normalized cepstrum coefficients and perceptual hashing
In order to improve the impact of noise on the robustness and discrimination of the speech perceptual hashing scheme, improve retrieval efficiency...
-
Structure-Preserving Hashing for Tree-Structured Data
Many kinds of data are tree-structured, e.g., XML documents. In this paper, a structure-preserving hashing method for rooted unordered trees is...