Perceptual hashing scheme using KAZE feature descriptors for combinatorial manipulations

M Roy, DM Thounaojam, S Pal - Multimedia Tools and Applications, 2022 - Springer
Perceptual image hashing methods utilize the visual phenomenon of the images and
produce a fixed-length hash function and this hash value can be utilized for digital signature …

A secure perceptual hash algorithm for image content authentication

L Weng, B Preneel - IFIP International Conference on Communications …, 2011 - Springer
Perceptual hashing is a promising solution to image content authentication. However,
conventional image hash algorithms only offer a limited authentication level for the …

Robust perceptual image hashing using fuzzy color histogram

ND Gharde, DM Thounaojam, B Soni… - Multimedia tools and …, 2018 - Springer
Perceptual image hashing technique uses the appearance of the digital media object as
human eye and generates a fixed size hash value. This hash value works as digital …

Real-time visual tracking based on improved perceptual hashing

M Fei, Z Ju, X Zhen, J Li - Multimedia Tools and Applications, 2017 - Springer
Video object tracking represents a very important computer vision domain. In this paper, a
perceptual hashing based template-matching method for object tracking is proposed to …

Supervised multi-scale locality sensitive hashing

L Weng, IH Jhuo, M Shi, M Sun, WH Cheng… - Proceedings of the 5th …, 2015 - dl.acm.org
LSH is a popular framework to generate compact representations of multimedia data, which
can be used for content based search. However, the performance of LSH is limited by its …

Robust visual tracking based on improved perceptual hashing for robot vision

M Fei, J Li, L Shao, Z Ju, G Ouyang - … 2015, Portsmouth, UK, August 24–27 …, 2015 - Springer
In this paper, perceptual hash codes are adopted as appearance models of objects for
visual tracking. Based on three existing basic perceptual hashing techniques, we propose …

Elevating Fingerprint Matching with a Unified dHash, SIFT, and LSH Model

S Dongre, S Mehta, P Raut… - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
User authentication is essential for maintaining the security, privacy, and integrity of systems
and data. It ensures that only authorized individuals can access specific resources …

A feature fusion framework for hashing

IH Jhuo, L Weng, WH Cheng… - 2016 23rd International …, 2016 - ieeexplore.ieee.org
A hash algorithm converts data into compact strings. In the multimedia domain, effective
hashing is the key to large-scale similarity search in high-dimensional feature space. A limit …

Improvement of radon transform-based perceptual hashing using image normalization

KA Ramirez-Gutierrez, M Nakano-Miyatake… - … Journal of Computers …, 2012 - Taylor & Francis
This paper proposes an improvement method using image normalization for Radon
transform (RT)-based perceptual image hashing in which a normalized image is generated …

Specific Document Sign Location Detection Based on Point Matching and Clustering

H Xiong - Advances in Visual Computing: 13th International …, 2018 - Springer
In this paper we describe a method for specific document sign location detection based on
key point grouping correspondence. The proposed method extracts stable points …