Perceptual hashing: Difference between revisions

Content deleted Content added
m spelling fix
No edit summary
Line 5:
 
In addition to its uses in digital forensics, research has shown that perceptual hashing can be applied to a wide variety of situations. Similar to comparing images for copyright infringement, a group of researchers<ref>{{cite book |last1=Zakharov |first1=Victor |last2=Kirikova |first2=Anastasia |last3=Munerman |first3=Victor |last4=Samoilova |first4=Tatyana |title=2019 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EICon ''Rus'') |chapter=Architecture of Software-Hardware Complex for Searching Images in Database |pages=1735–1739 |publisher=IEEE |doi=10.1109/EIConRus.2019.8657241 |isbn=978-1-7281-0339-6 |year=2019 |s2cid=71152337 }}</ref> found that it could be used to compare and match images in a database. Their proposed algorithm proved to be not only effective, but more efficient than the standard means of database image searching. In addition, a team from China<ref>{{cite journal |last1=Zhang |first1=Qiu-yu |last2=Zhou |first2=Liang |last3=Zhang |first3=Tao |last4=Zhang |first4=Deng-hai |title=A retrieval algorithm of encrypted speech based on short-term cross-correlation and perceptual hashing |journal=Multimedia Tools and Applications |date=July 2019 |volume=78 |issue=13 |pages=17825–17846 |doi=10.1007/s11042-019-7180-9 |s2cid=58010160 }}</ref> discovered that applying perceptual hashing to speech encryption proved to be effective. They were able to create a system in which the encryption was not only more accurate, but more compact as well.
 
<gallery>
Töölö Malminkadulta, Helsinki 1907.jpg
Leppäsuo - N234 (hkm.HKMS000005-000000or).jpg|comparison with pHash checksum
</gallery>
 
==See also==