We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 692 results
  1. A replay attack detection scheme based on perceptual image hashing

    Perceptual image hashing has mainly been used in the literature to authenticate images or to identify similar contents for image copy detection. In...

    Maamar Hamadouche, Zebbiche Khalil, ... Youcef ZAFOUNE in Multimedia Tools and Applications
    Article 12 June 2023
  2. Image perceptual hashing for content authentication based on Watson’s visual model and LLE

    Image perceptual hashing has been widely used in image content authentication. In order to extract hashing sequences that are more consistent with...

    Huifen **ng, Hui Che, ... Honghai Wang in Journal of Real-Time Image Processing
    Article 02 February 2023
  3. PIH-mSCM: a modified spiking cortical model for perceptual image hashing and its application to copy detection

    For one of the most crucial copyright protection of multimedia content, copy image detection necessitates feature extraction and feature matching....

    Moumita Roy, Dalton Meitei Thounaojam, Shyamosree Pal in Multimedia Tools and Applications
    Article 04 October 2023
  4. An Image Perceptual Hashing Algorithm Based on Convolutional Neural Networks

    The conventional perceptual hashing algorithms are constrained to a singular global feature extraction algorithm and lack efficient scalability...
    Meihong Yang, Baolin Qi, ... Jian Li in Digital Forensics and Watermarking
    Conference paper 2024
  5. Using Perceptual Hashing for Targeted Content Scanning

    The Internet is increasingly used to disseminate unethical and illegal content. A grave concern is child sexual abuse material that is often...
    Leon Twenning, Harald Baier, Thomas Göbel in Advances in Digital Forensics XIX
    Chapter 2023
  6. FRIH: A face recognition framework using image hashing

    Face recognition is one of the most important research topics in computer vision. Indeed, the face is an important means of communication with humans...

    Mahsa Ghasemi, Hamid Hassanpour in Multimedia Tools and Applications
    Article 03 January 2024
  7. A novel image hashing with low-rank sparse matrix decomposition and feature distance

    Image hashing is an efficient technique of image processing for various applications, such as retrieval, copy detection and authentication. In this...

    Zixuan Yu, Zhenjun Tang, ... **anquan Zhang in The Visual Computer
    Article 13 June 2024
  8. Perceptual hashing scheme using KAZE feature descriptors for combinatorial manipulations

    Perceptual image hashing methods utilize the visual phenomenon of the images and produce a fixed-length hash function and this hash value can be...

    Moumita Roy, Dalton Meitei Thounaojam, Shyamosree Pal in Multimedia Tools and Applications
    Article 01 April 2022
  9. Incremental image retrieval method based on feature perception and deep hashing

    How to propose an image retrieval algorithm with adaptable model and wide range of applications for large-scale datasets has become a critical...

    Kaiyang Liao, Jie Lin, ... Wen Feng in International Journal of Multimedia Information Retrieval
    Article 09 February 2024
  10. Perceptual Image Hashing with Bidirectional Generative Adversarial Networks for Copy Detection

    The traditional perceptual hashing algorithm is generally achieved by artificially extracting features from an image and quantizing them into a hash...
    Bin Ma, Yili Wang, ... **nan Cui in Advances in Artificial Intelligence and Security
    Conference paper 2022
  11. A perceptual entanglement-based image authentication with tamper localisation

    With the recent development in image editing tools the content of digital images can be easily manipulated. Research efforts are being deployed to...

    Article 03 October 2023
  12. A review of hashing based image authentication techniques

    In the recent digitization era, image hashing is a key technology, including image recognition, authentication and manipulation detection, among many...

    Abdul Subhani Shaik, Ram Kumar Karsh, ... Rabul Hussain Laskar in Multimedia Tools and Applications
    Article 29 October 2021
  13. Attention-based deep supervised hashing for near duplicate video retrieval

    With the explosive growth of video data on the Internet, near duplicate video retrieval (NDVR) has become an important and challenging issue in the...

    Naifei Shi, Chong Fu, ... Chiu-Wing Sham in Neural Computing and Applications
    Article 27 December 2023
  14. Swin transformer-based supervised hashing

    With the rapid development of the modern internet, image data are growing explosively. How to retrieve specific images from such big data has become...

    Liangkang Peng, Jiangbo Qian, ... Yihong Dong in Applied Intelligence
    Article 06 January 2023
  15. Perceptual image hashing using transform domain noise resistant local binary pattern

    A new Discrete Cosine Transform (DCT) domain Perceptual Image Hashing (PIH) scheme is proposed in this paper. PIH schemes are designed to extract a...

    S. Qasim Abbas, Fawad Ahmed, Yi-** Phoebe Chen in Multimedia Tools and Applications
    Article 14 November 2020
  16. An encrypted speech authentication and tampering recovery method based on perceptual hashing

    With the progress of speech retrieval technology in the cloud, it brings a lot of conveniences for speech user. Yet, the inquiry encrypted speech...

    Qiu-yu Zhang, Deng-hai Zhang, Fu-jiu Xu in Multimedia Tools and Applications
    Article 12 April 2021
  17. A lightweight robust image hash based on random tensors and angle features for IoT devices

    Image hashing can be extensively used in image forensics, and the lightweight image hash suitable for IoT smart devices plays an important role of...

    Hang Gao, Tiegang Gao in Signal, Image and Video Processing
    Article 07 December 2023
  18. A novel hashing-inverted index for secure content-based retrieval with massive encrypted speeches

    The content-based speech retrieval scheme using the hash technique boasts high accuracy; however, its index structures, such as the hash table,...

    Yingjie Hu, Qiuyu Zhang, ... Yugui Jia in Multimedia Systems
    Article 19 January 2024
  19. Asymmetric hashing based on generative adversarial network

    In the era of big data, social media, large-scale video, image, and text data is produced every day. The approximate nearest neighbor (ANN) search...

    Muhammad Umair Hassan, Dongmei Niu, ... **uyang Zhao in Multimedia Tools and Applications
    Article 07 June 2022
  20. Auto-authentication watermarking scheme based on CNN and perceptual hash function in the wavelet domain

    This paper presents a novel method for image watermarking authentication using Convolutional Neural Networks (CNN). The proposed method addresses the...

    Hanen Rhayma, Ridha Ejbali, Habib Hamam in Multimedia Tools and Applications
    Article 03 January 2024
Did you find what you were looking for? Share feedback.