Content deleted Content added
→Development: Upper Austria University of Applied Sciences, Hagenberg Campus |
→Development: months |
||
Line 5:
The 1980 work of [[Marr–Hildreth algorithm|Marr and Hildreth]] is a seminal paper in this field.<ref name=marr80>{{Cite journal |title=Theory of Edge Detection |first=D. |last=Marr |author1-link=David Marr (neuroscientist) |first2=E. |last2=Hildreth |author2-link=Ellen Hildreth |journal=Proceedings of the Royal Society of London. Series B, Biological Sciences |volume=207 |number=1167 |date=29 Feb 1980 |pages=187–217 |doi=10.1098/rspb.1980.0020|pmid=6102765 }}</ref>
The July 2010 thesis of Zauner is a well-written introduction to the topic.<ref name="zauner10">{{cite book |last1=Zauner |first1=Christoph |title=Implementation and Benchmarking of Perceptual Image Hash Functions |date= July 2010 |publisher=Upper Austria University of Applied Sciences, Hagenberg Campus |url=https://www.phash.org/docs/pubs/thesis_zauner.pdf}}</ref>
Already in June 2016, Asgari published work on robust image hash spoofing. Asgari notes that perceptual hash function like any other algorithm is prone to errors.<ref name="asgari16">{{cite book |last1=Asgari |first1=Azadeh Amir |title=Robust image hash spoofing |date=June 2016 |publisher=Blekinge Institute of Technology |url=http://www.diva-portal.se/smash/get/diva2:946365/FULLTEXT01.pdf}}</ref>
==Characteristics==
|