Akademik Yazılarda Resim İntihal Kontrolü Sistemi

S Oluk, B Kaya - Computer Science, 2022 - dergipark.org.tr
Resimlerde benzerlik (intihal) kontrolü resimlerin her geçen gün bilgi içeriğinin daha fazla
artması ve telif haklarının yaygınlaşmasından dolayı önemli bir hale gelmiştir. Hali hazırda …

Image matching algorithm based on hashes extraction

A Rivas, P Chamoso, JJ Martín-Limorti… - Progress in Artificial …, 2017 - Springer
Nowadays, the rise of social networks and the continuous storage of large of information are
topical issue. But the main problem is not the storage itself, is the ability to process most of …

Detecting similarity in color images based on perceptual image hash algorithm

NHM Ali, ME Mahdi - IOP Conference Series: Materials Science …, 2020 - iopscience.iop.org
Due to the ever-increasing digitization, the authentication of digital media content is
becoming more and more important. Authentication, in general, means deciding whether a …

[PDF][PDF] Mitigation of rotational constraints in image based plagiarism detection using perceptual hash

S Aghav, A Kumar, G Gadakar, A Mehta… - Int J Comput Sci Trends …, 2014 - Citeseer
Image plagiarism can be detected using similarity between the two images. The perceptual
hash function calculates similar hash value for similar images. This paper proposes a new …

Digital image forgery detection using Image hashing

HB Kekre, D Mishra, PN Halarnkar… - … on Advances in …, 2013 - ieeexplore.ieee.org
Image hashing is one of the techniques used to generate hash value for each image in the
database. These hash values generated for images can be used for content based image …

Embedded Hash Codes for Image Similarity Detection and Tamper Proofing

S Nazir, M Kaleem - … on Emerging Trends in Electrical, Control …, 2022 - ieeexplore.ieee.org
The image and video traffic on the Internet has increased due to the ease and abundance of
the image capture and sharing services. However, this can sometimes result in violations of …

A review of hashing based image authentication techniques

AS Shaik, RK Karsh, M Islam, RH Laskar - Multimedia Tools and …, 2022 - Springer
In the recent digitization era, image hashing is a key technology, including image
recognition, authentication and manipulation detection, among many multimedia security …

[PDF][PDF] Python ile Görüntü˙ I¸ slemede Örnek Bir Uygulama

ÖGDM GEZER - Ed.: Uçar, M. Kürşad., Mühendislikte Yapay Zeka …, 2017 - academia.edu
Günümüz büyük bir veri tufanının tam ortasındadır. 2012 rakamlarına göre dijital evrende 2.7
Zetabyte veri bulunmaktaydı ve her geçen gün 2.5 exabyte boyutunda veri bu evrene …

Perceptual image hashing using surf for tampered image detection

CSLR Swetha, C Divya Sri, B Bharathi - International Conference on …, 2020 - Springer
Photographs have become a part of everyone's life. It connects us to our past and is used as
evidence in various fields like advertising, intelligence, journalism, science, etc. Today …

Image authentication by content preserving robust image hashing using local and global features

LS Sebastian, A Varghese, T Manesh - Procedia Computer Science, 2015 - Elsevier
Image hashing technique constructs a short sequence from the image to represent its
contents. This method proposes an image hash which is generated from Haralick and MOD …