Perceptual hashing: Difference between revisions

Content deleted Content added
Development: ref hao21
Citation bot (talk | contribs)
Alter: title, journal. Add: s2cid, bibcode, authors 1-1. Removed parameters. Some additions/deletions were parameter name changes. | Use this bot. Report bugs. | Suggested by Headbomb | Linked from Wikipedia:WikiProject_Academic_Journals/Journals_cited_by_Wikipedia/Sandbox | #UCB_webform_linked 20/30
Line 3:
 
==Development==
The 1980 work of [[Marr–Hildreth algorithm|Marr and Hildreth]] is a seminal paper in this field.<ref name=marr80>{{Cite journal |title=Theory of Edge Detection |firstfirst1=D. |lastlast1=Marr |author1-link=David Marr (neuroscientist) |first2=E. |last2=Hildreth |author2-link=Ellen Hildreth |journal=Proceedings of the Royal Society of London. Series B, Biological Sciences |volume=207 |number=1167 |date=29 Feb 1980 |pages=187–217 |doi=10.1098/rspb.1980.0020|pmid=6102765 |bibcode=1980RSPSB.207..187M |s2cid=2150419 }}</ref>
 
The July 2010 thesis of Zauner is a well-written introduction to the topic.<ref name="zauner10">{{cite book |last1=Zauner |first1=Christoph |title=Implementation and Benchmarking of Perceptual Image Hash Functions |date= July 2010 |publisher=Upper Austria University of Applied Sciences, Hagenberg Campus |url=https://www.phash.org/docs/pubs/thesis_zauner.pdf}}</ref>
Line 11:
Researchers remarked in December 2017 that [[Google image search]] is based on a perceptual hash.<ref name="agis">{{cite news |title=Google Image Search Explained |url=https://alibaba-cloud.medium.com/google-image-search-explained-30af8ba9cbea |publisher=Medium |date=26 December 2017}}</ref>
 
In research published in November 2021 investigators focused on a manipulated image of [[Stacey Abrams]] which was published to the internet prior to her loss in the [[2018 Georgia gubernatorial election]]. They found that the pHash algorithm was vulnerable to nefarious actors.<ref name="hao21">{{cite journal |last1=Hao |first1=Qingying |last2=Luo |first2=Licheng |last3=Jan |first3=Steve T.K. |last4=Wang |first4=Gang |title=It’sIt's Not What It Looks Like: Manipulating Perceptual Hashing based Applications |url=https://gangw.cs.illinois.edu/PHashing.pdf |journal=Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security (CCS ’21'21), November 15–19, 2021, Virtual Event, Republic of Korea |publisher=Association for Computing Machinery |date=November 2021}}</ref>
 
==Characteristics==
Line 17:
Research reported in January 2019 at [[Northumbria University]] has shown for video it can be used to simultaneously identify similar contents for [[video copy detection]] and detect malicious manipulations for video authentication. The system proposed performs better than current [[video hash]]ing techniques in terms of both identification and authentication. <ref name=khelifi19>{{cite journal |last1=Khelifi |first1=Fouad |last2=Bouridane |first2=Ahmed |title=Perceptual Video Hashing for Content Identification and Authentication |journal=IEEE Transactions on Circuits and Systems for Video Technology |date=January 2019 |volume=29 |issue=1 |pages=50–67 |doi=10.1109/TCSVT.2017.2776159 |s2cid=55725934 |url=http://nrl.northumbria.ac.uk/32873/1/paper_double.pdf }}</ref>
 
Research reported in May 2020 by the [[University of Houston]] in deep learning based perceptual hashing for audio has shown better performance than traditional [[audio fingerprinting]] methods for the detection of similar/copied audio subject to transformations.<ref name=bs20>{{Cite journal |lastlast1=Báez-Suárez |firstfirst1=Abraham |last2=Shah |first2=Nolan |last3=Nolazco-Flores |first3=Juan Arturo |last4=Huang |first4=Shou-Hsuan S. |last5=Gnawali |first5=Omprakash |last6=Shi |first6=Weidong |date=2020-05-19 |title=SAMAF: Sequence-to-sequence Autoencoder Model for Audio Fingerprinting |url=https://doi.org/10.1145/3380828 |journal=ACM Transactions on Multimedia Computing, Communications, and Applications |volume=16 |issue=2 |pages=43:1–43:23 |doi=10.1145/3380828 |issn=1551-6857}}</ref>
 
In addition to its uses in digital forensics, research by a Russian group reported in 2019 has shown that perceptual hashing can be applied to a wide variety of situations. Similar to comparing images for copyright infringement, the group found that it could be used to compare and match images in a database. Their proposed algorithm proved to be not only effective, but more efficient than the standard means of database image searching.<ref name=zak19>{{cite book |last1=Zakharov |first1=Victor |last2=Kirikova |first2=Anastasia |last3=Munerman |first3=Victor |last4=Samoilova |first4=Tatyana |title=2019 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EICon ''Rus'') |chapter=Architecture of Software-Hardware Complex for Searching Images in Database |pages=1735–1739 |publisher=IEEE |doi=10.1109/EIConRus.2019.8657241 |isbn=978-1-7281-0339-6 |year=2019 |s2cid=71152337 }}</ref>