An overview of perceptual hashing

H Farid - Journal of Online Trust and Safety, 2021 - tsjournal.org
It is said that what happens on the internet stays on the internet, forever. In some cases this
may be considered a feature. Reports of human rights violations and corporate corruption …

Semantic communications for wireless sensing: RIS-aided encoding and self-supervised decoding

H Du, J Wang, D Niyato, J Kang, Z Xiong… - IEEE Journal on …, 2023 - ieeexplore.ieee.org
Semantic communications can reduce the resource consumption by transmitting task-related
semantic information extracted from source messages. However, when the source …

No" zero-shot" without exponential data: Pretraining concept frequency determines multimodal model performance

V Udandarao, A Prabhu, A Ghosh… - The Thirty-eighth …, 2024 - openreview.net
Web-crawled pretraining datasets underlie the impressive" zero-shot" evaluation
performance of multimodal models, such as CLIP for classification and Stable-Diffusion for …

A DWT based watermarking approach for medical image protection

F Kahlessenane, A Khaldi, R Kafi, S Euschi - Journal of Ambient …, 2021 - Springer
In order to contribute to the security of medical image, we present in this paper a blind and
robust watermarking technique that allows the integration of the electronic patient's record …

Perceptual image hashing for content authentication based on convolutional neural network with multiple constraints

C Qin, E Liu, G Feng, X Zhang - IEEE Transactions on Circuits …, 2020 - ieeexplore.ieee.org
In this paper, a novel perceptual image hashing scheme based on convolutional neural
network (CNN) with multiple constraints is proposed, in which our deep hashing network …

A lossless DWT-SVD domain watermarking for medical information security

N Zermi, A Khaldi, MR Kafi, F Kahlessenane… - Multimedia Tools and …, 2021 - Springer
The goal of this work is to protect as much as possible the images exchanged in
telemedicine, to avoid any confusion between the patient's radiographs, these images are …

Recovering Fingerprints from In-Display Fingerprint Sensors via Electromagnetic Side Channel

T Ni, X Zhang, Q Zhao - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
Recently, in-display fingerprint sensors have been widely adopted in newly-released
smartphones. However, we find this new technique can leak information about the user's …

Hash Algorithm In Verification Of Certificate Data Integrity And Security

MR Anwar, D Apriani, IR Adianita - Aptisi Transactions on …, 2021 - att.aptisi.or.id
The hash function is the most important cryptographic primitive function and is an integral
part of the blockchain data structure. Hashes are often used in cryptographic protocols …

A principled design of image representation: Towards forensic tasks

S Qi, Y Zhang, C Wang, J Zhou… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Image forensics is a rising topic as the trustworthy multimedia content is critical for modern
society. Like other vision-related applications, forensic analysis relies heavily on the proper …

Sok: Content moderation for end-to-end encryption

S Scheffler, J Mayer - arXiv preprint arXiv:2303.03979, 2023 - arxiv.org
Popular messaging applications now enable end-to-end-encryption (E2EE) by default, and
E2EE data storage is becoming common. These important advances for security and privacy …