2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) 2017
DOI: 10.23919/mipro.2017.7973569
|View full text |Cite
|
Sign up to set email alerts
|

Evaluating robustness of perceptual image hashing algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 21 publications
(8 citation statements)
references
References 15 publications
0
8
0
Order By: Relevance
“…Another work [12] demonstrated the susceptibility of various image hashing functions against gradient-based collision attacks. Similar works investigated the robustness of non-deep perceptual hashing algorithms against adversarial attacks [24,28] and their robustness [15] against visible image modifications. Other research has focused on recovering the original images from the supposedly anonymous real-valued image hashes by training a deep neural network to reconstruct inputs, given their hash values [48].…”
Section: Attacks Against Neural Networkmentioning
confidence: 99%
“…Another work [12] demonstrated the susceptibility of various image hashing functions against gradient-based collision attacks. Similar works investigated the robustness of non-deep perceptual hashing algorithms against adversarial attacks [24,28] and their robustness [15] against visible image modifications. Other research has focused on recovering the original images from the supposedly anonymous real-valued image hashes by training a deep neural network to reconstruct inputs, given their hash values [48].…”
Section: Attacks Against Neural Networkmentioning
confidence: 99%
“…Hash based approach Hash-based algorithms are used in various application areas, such as image search, duplicate or near duplicate detection, or image authentication. [9] [10] [11] [12] Hash functions can be divided into the two categories of cryptographic hashes and robust hashes. Cryptographic hashes are very sensitive with respect to the input data.…”
Section: Feature Based Approachmentioning
confidence: 99%
“…Another work [11] demonstrated the susceptibility of various image hashing functions against gradient-based collision attacks. Similar works investigated the robustness of non-deep perceptual hashing algorithms against adversarial attacks [21,25] and their robustness [12]. Other works have focused on recovering the original images from the supposedly anonymous real-valued image hashes [48].…”
Section: Attacks Against Neural Networkmentioning
confidence: 99%