Perceptual hashing: Difference between revisions

Content deleted Content added
Characteristics: apple inc csam detection ref apcsam
Line 11:
 
A Chinese team reported in July 2019 that they had discovered a perceptual hash for [[speech encryption]] which proved to be effective. They were able to create a system in which the encryption was not only more accurate, but more compact as well.<ref name=zhang19>{{cite journal |last1=Zhang |first1=Qiu-yu |last2=Zhou |first2=Liang |last3=Zhang |first3=Tao |last4=Zhang |first4=Deng-hai |title=A retrieval algorithm of encrypted speech based on short-term cross-correlation and perceptual hashing |journal=Multimedia Tools and Applications |date=July 2019 |volume=78 |issue=13 |pages=17825–17846 |doi=10.1007/s11042-019-7180-9 |s2cid=58010160 }}</ref>
 
[[Apple Inc]] reported as early as August 2021 a [[Child Sexual Abuse Material]] (CSAM) system that they know as [[NeuralHash]]. A technical summary document, which nicely explains the system with copious diagrams and example photographs, offers that "Instead of scanning images [on corporate] [[iCloud]] [servers], the system performs on-device matching using a database of known CSAM image hashes provided by [the [[National Center for Missing and Exploited Children]]] and other child-safety organizations. Apple further transforms this database into an unreadable set of hashes, which is securely stored on users’ devices."<ref name="apcsam">{{cite news |title=CSAM Detection - Technical Summary |url=https://www.apple.com/child-safety/pdf/CSAM_Detection_Technical_Summary.pdf |publisher=Apple Inc |date=August 2021}}</ref>
 
==Gallery==