We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 981 results
  1. A replay attack detection scheme based on perceptual image hashing

    Perceptual image hashing has mainly been used in the literature to authenticate images or to identify similar contents for image copy detection. In...

    Maamar Hamadouche, Zebbiche Khalil, ... Youcef ZAFOUNE in Multimedia Tools and Applications
    Article 12 June 2023
  2. Image perceptual hashing for content authentication based on Watson’s visual model and LLE

    Image perceptual hashing has been widely used in image content authentication. In order to extract hashing sequences that are more consistent with...

    Huifen **ng, Hui Che, ... Honghai Wang in Journal of Real-Time Image Processing
    Article 02 February 2023
  3. PIH-mSCM: a modified spiking cortical model for perceptual image hashing and its application to copy detection

    For one of the most crucial copyright protection of multimedia content, copy image detection necessitates feature extraction and feature matching....

    Moumita Roy, Dalton Meitei Thounaojam, Shyamosree Pal in Multimedia Tools and Applications
    Article 04 October 2023
  4. An Image Perceptual Hashing Algorithm Based on Convolutional Neural Networks

    The conventional perceptual hashing algorithms are constrained to a singular global feature extraction algorithm and lack efficient scalability...
    Meihong Yang, Baolin Qi, ... Jian Li in Digital Forensics and Watermarking
    Conference paper 2024
  5. On Improving Perceptual Image Hashing Using Reference Image Construction

    This paper proposes an improved framework for perceptual image hashing, which is able to improve existing image hashing schemes. In our framework,...
    Conference paper 2022
  6. Using Perceptual Hashing for Targeted Content Scanning

    The Internet is increasingly used to disseminate unethical and illegal content. A grave concern is child sexual abuse material that is often...
    Leon Twenning, Harald Baier, Thomas Göbel in Advances in Digital Forensics XIX
    Chapter 2023
  7. FRIH: A face recognition framework using image hashing

    Face recognition is one of the most important research topics in computer vision. Indeed, the face is an important means of communication with humans...

    Mahsa Ghasemi, Hamid Hassanpour in Multimedia Tools and Applications
    Article 03 January 2024
  8. A novel image hashing with low-rank sparse matrix decomposition and feature distance

    Image hashing is an efficient technique of image processing for various applications, such as retrieval, copy detection and authentication. In this...

    Zixuan Yu, Zhenjun Tang, ... **anquan Zhang in The Visual Computer
    Article 13 June 2024
  9. Perceptual hashing scheme using KAZE feature descriptors for combinatorial manipulations

    Perceptual image hashing methods utilize the visual phenomenon of the images and produce a fixed-length hash function and this hash value can be...

    Moumita Roy, Dalton Meitei Thounaojam, Shyamosree Pal in Multimedia Tools and Applications
    Article 01 April 2022
  10. Incremental image retrieval method based on feature perception and deep hashing

    How to propose an image retrieval algorithm with adaptable model and wide range of applications for large-scale datasets has become a critical...

    Kaiyang Liao, Jie Lin, ... Wen Feng in International Journal of Multimedia Information Retrieval
    Article 09 February 2024
  11. Perceptual Image Hashing with Bidirectional Generative Adversarial Networks for Copy Detection

    The traditional perceptual hashing algorithm is generally achieved by artificially extracting features from an image and quantizing them into a hash...
    Bin Ma, Yili Wang, ... **nan Cui in Advances in Artificial Intelligence and Security
    Conference paper 2022
  12. Perceptual hashing method for video content authentication with maximized robustness

    Perceptual video hashing represents video perceptual content by compact hash. The binary hash is sensitive to content distortion manipulations, but...

    Article Open access 21 November 2021
  13. Robust Image Hashing Based on Histogram Reconstruction

    In this paper, we propose a perceptual image hashing method based on histogram reconstruction. Our method consists of three steps, pre-processing,...
    Conference paper 2023
  14. A perceptual entanglement-based image authentication with tamper localisation

    With the recent development in image editing tools the content of digital images can be easily manipulated. Research efforts are being deployed to...

    Article 03 October 2023
  15. Perceptual Hashing Based on Salient Region and NMF

    Wu, Xujun Cui, Chen Wang, ShenWe propose a novel perceptual hashing based on salient region and a nonnegative matrix factorization (NMF) in this...
    Conference paper 2022
  16. A review of hashing based image authentication techniques

    In the recent digitization era, image hashing is a key technology, including image recognition, authentication and manipulation detection, among many...

    Abdul Subhani Shaik, Ram Kumar Karsh, ... Rabul Hussain Laskar in Multimedia Tools and Applications
    Article 29 October 2021
  17. Attention-based deep supervised hashing for near duplicate video retrieval

    With the explosive growth of video data on the Internet, near duplicate video retrieval (NDVR) has become an important and challenging issue in the...

    Naifei Shi, Chong Fu, ... Chiu-Wing Sham in Neural Computing and Applications
    Article 27 December 2023
  18. Swin transformer-based supervised hashing

    With the rapid development of the modern internet, image data are growing explosively. How to retrieve specific images from such big data has become...

    Liangkang Peng, Jiangbo Qian, ... Yihong Dong in Applied Intelligence
    Article 06 January 2023
  19. Image Authentication System Using Image Hashing with Color Filter Array

    The availability of sophisticated multimedia editing tools makes image authentication a challenge in the modern age of multimedia communication. We...
    Conference paper 2023
  20. Perceptual image hashing using transform domain noise resistant local binary pattern

    A new Discrete Cosine Transform (DCT) domain Perceptual Image Hashing (PIH) scheme is proposed in this paper. PIH schemes are designed to extract a...

    S. Qasim Abbas, Fawad Ahmed, Yi-** Phoebe Chen in Multimedia Tools and Applications
    Article 14 November 2020
Did you find what you were looking for? Share feedback.