نتایج جستجو برای: perceptual image hashing

تعداد نتایج: 428297  

Journal: :Mathematical Problems in Engineering 2022

Image perceptual hashing is broadly applied in image content authentication, recognition, retrieval, and social media hotspot event detection. An authentication algorithm put forward based on the Itti visual saliency model geometric invariant vector distance. To begin with, preprocessed weighted by contourlet transform. After that, randomly divided into blocks, feature constructed calculating d...

2016
YULING LIU GUOJIANG XIN YONG XIAO Yuling LIU Guojiang XIN Yong XIAO

A robust image hashing method based on radon transform and invariant features is proposed for image authentication, image retrieval, and image detection. Specifically, an input image is firstly converted into a counterpart with a normalized size. Then the invariant centroid algorithm is applied to obtain the invariant feature point and the surrounding circular area, and the radon transform is e...

Journal: :Bilgisayar bilimleri 2022

Resimlerde benzerlik (intihal) kontrolü resimlerin her geçen gün bilgi içeriğinin daha fazla artması ve telif haklarının yaygınlaşmasından dolayı önemli bir hale gelmiştir. Hali hazırda yapılan akademik çalışmalarda metin tabanlı tespiti yapan yazılımları bulunmakta olup bu çalışmalardaki resimler ile ilgili olarak yapılamamaktadır. Akademik ne kadar fikirler metinler alınırken atıf yapılıp kay...

Journal: :TURKISH JOURNAL OF ELECTRICAL ENGINEERING & COMPUTER SCIENCES 2021

2011
Li Weng Bart Preneel

Perceptual hashing is a promising solution to image content authentication. However, conventional image hash algorithms only offer a limited authentication level for the protection of overall content. In this work, we propose an image hash algorithm with block level content protection. It extracts features from DFT coefficients of image blocks. Experiments show that the hash has strong robustne...

2015
Qiu-Yu Zhang Shuang Yu Peng-Fei Xing Yi-Bo Huang Zhan-Wei Ren Z. W. Ren

Speech perceptual hashing authentication provides an efficient way for security authentication of speech content. To solve the problem of perceptual hash value efficient and secure transmission, we present a speech watermarking algorithm, which is based on improved phase coding by bipolar quantization and suitable for speech perceptual hashing authentication. This algorithm embeds the perceptua...

2007
Martin Schmucker Andreas Uhl Hui Zhang

Project co-funded by the European Commission within the 6th Framework Programme Dissemination Level PU Public X PP Restricted to other programme participants (including the Commission services) RE Restricted to a group specified by the consortium (including the Commission services) CO Confidential, only for members of the consortium (including the Commission services) Abstract This deliverable ...

2011
Li Weng Bart Preneel

Perceptual hashing is conventionally used for content identification and authentication. In this work, we explore a new application of image hashing techniques. By comparing the hash values of original images and their compressed versions, we are able to estimate the distortion level. A particular image hash algorithm is proposed for this application. The distortion level is measured by the sig...

2012
Li Weng Rony Darazi Bart Preneel Benoit M. Macq Ann Dooms

Perceptual hashing is a promising tool for multimedia content authentication. Digital watermarking is a convenient way of data hiding. By combining the two, we get a more efficient and versatile solution. In a typical scenario, multimedia data is sent from a server to a client. The corresponding hash value is embedded in the data. The data might undergo incidental distortion and malicious modif...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید