Third International Conference on Electronics and Communication; Network and Computer Technology (ECNCT 2021) 2022
DOI: 10.1117/12.2628802
|View full text |Cite
|
Sign up to set email alerts
|

Application of image hash algorithm in copyright protection system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 4 publications
0
1
0
Order By: Relevance
“…When it comes to images, the hashing function can generate hash codes that capture the unique characteristics of images. Hashing functions can be used for various purposes, including image comparison ( (Yang et al 2022). Hash functions are ideal for detecting (near-)identical photos because of their robustness against minor changes while also minimizing the number of false positive collisions .…”
Section: 3mentioning
confidence: 99%
“…When it comes to images, the hashing function can generate hash codes that capture the unique characteristics of images. Hashing functions can be used for various purposes, including image comparison ( (Yang et al 2022). Hash functions are ideal for detecting (near-)identical photos because of their robustness against minor changes while also minimizing the number of false positive collisions .…”
Section: 3mentioning
confidence: 99%
“…Regarding images, the hashing function can generate hash codes that capture the unique characteristics of images, allowing for image comparison [35], image retrieval [36,37], and image authentication [38]. Hash functions are ideal for detecting (near-)identical photos because of their robustness against minor changes, while also minimizing the number of false-positive collisions [39].…”
Section: The Dhash-based Measurementioning
confidence: 99%