Popular messaging applications now enable end-to-end-encryption (E2EE) by default, and E2EE data storage is becoming common. These important advances for security and privacy …
Perceptual image hashing methods utilize the visual phenomenon of the images and produce a fixed-length hash function and this hash value can be utilized for digital signature …
X Wang, X Zhou, Q Zhang, B Xu, J Xue - Signal Processing: Image …, 2020 - Elsevier
Perceptual image hash is an emerging technology that is closely related to many applications such as image content authentication, image forging detection, image similarity …
Z Tang, Z Huang, H Yao, X Zhang, L Chen… - The Computer …, 2018 - academic.oup.com
We propose a novel perceptual image hashing based on weighted discrete wavelet transform (DWT) statistical features. This hashing converts input image into a normalized …
End-to-end encryption (E2EE) prevents online services from accessing user content. This important security property is also an obstacle for content moderation methods that involve …
Z Tang, M Yu, H Yao, H Zhang, C Yu… - The Computer …, 2021 - academic.oup.com
Image hashing is an efficient technique of many multimedia systems, such as image retrieval, image authentication and image copy detection. Classification between robustness …
K Ding, Z Yang, Y Wang, Y Liu - Applied Sciences, 2019 - mdpi.com
Data security technology is of great significance for the effective use of high-resolution remote sensing (HRRS) images in GIS field. Integrity authentication technology is an …
Perceptual image hashing technique uses the appearance of the digital media object as human eye and generates a fixed size hash value. This hash value works as digital …
M Yu, Z Tang, Z Li, X Liang, X Zhang - The Computer Journal, 2023 - academic.oup.com
Image hashing is an effective technology for extensive image applications, such as retrieval, authentication and copy detection. This paper designs a new image hashing scheme based …