Identifying harmful media in {End-to-End} encrypted communication: Efficient private membership computation

A Kulshrestha, J Mayer - 30th USENIX Security Symposium (USENIX …, 2021 - usenix.org
End-to-end encryption (E2EE) poses a challenge for automated detection of harmful media,
such as child sexual abuse material and extremist content. The predominant approach at …

Sok: Content moderation for end-to-end encryption

S Scheffler, J Mayer - arXiv preprint arXiv:2303.03979, 2023 - arxiv.org
Popular messaging applications now enable end-to-end-encryption (E2EE) by default, and
E2EE data storage is becoming common. These important advances for security and privacy …

Perceptual hashing scheme using KAZE feature descriptors for combinatorial manipulations

M Roy, DM Thounaojam, S Pal - Multimedia Tools and Applications, 2022 - Springer
Perceptual image hashing methods utilize the visual phenomenon of the images and
produce a fixed-length hash function and this hash value can be utilized for digital signature …

Image alignment based perceptual image hash for content authentication

X Wang, X Zhou, Q Zhang, B Xu, J Xue - Signal Processing: Image …, 2020 - Elsevier
Perceptual image hash is an emerging technology that is closely related to many
applications such as image content authentication, image forging detection, image similarity …

Perceptual image hashing with weighted DWT features for reduced-reference image quality assessment

Z Tang, Z Huang, H Yao, X Zhang, L Chen… - The Computer …, 2018 - academic.oup.com
We propose a novel perceptual image hashing based on weighted discrete wavelet
transform (DWT) statistical features. This hashing converts input image into a normalized …

Public verification for private hash matching

S Scheffler, A Kulshrestha… - 2023 IEEE Symposium on …, 2023 - ieeexplore.ieee.org
End-to-end encryption (E2EE) prevents online services from accessing user content. This
important security property is also an obstacle for content moderation methods that involve …

Robust image hashing with singular values of quaternion SVD

Z Tang, M Yu, H Yao, H Zhang, C Yu… - The Computer …, 2021 - academic.oup.com
Image hashing is an efficient technique of many multimedia systems, such as image
retrieval, image authentication and image copy detection. Classification between robustness …

An improved perceptual hash algorithm based on u-net for the authentication of high-resolution remote sensing image

K Ding, Z Yang, Y Wang, Y Liu - Applied Sciences, 2019 - mdpi.com
Data security technology is of great significance for the effective use of high-resolution
remote sensing (HRRS) images in GIS field. Integrity authentication technology is an …

Robust perceptual image hashing using fuzzy color histogram

ND Gharde, DM Thounaojam, B Soni… - Multimedia tools and …, 2018 - Springer
Perceptual image hashing technique uses the appearance of the digital media object as
human eye and generates a fixed size hash value. This hash value works as digital …

Robust image hashing with saliency map and sparse model

M Yu, Z Tang, Z Li, X Liang, X Zhang - The Computer Journal, 2023 - academic.oup.com
Image hashing is an effective technology for extensive image applications, such as retrieval,
authentication and copy detection. This paper designs a new image hashing scheme based …