About 73,900 results
Open links in new tab
  1. Perceptual hashing - Wikipedia

    Perceptual hashing is the use of a fingerprinting algorithm that produces a snippet, hash, or fingerprint of various forms of multimedia. [1][2] A perceptual hash is a type of locality-sensitive …

  2. Analysis of Perceptual Hashing Algorithms in Image Manipulation ...

    Jan 1, 2021 · Perceptual image hashing is a family of algorithms that generate content-based image hashes. Unlike cryptographic hashes, perceptual hashes are designed to not change …

  3. Nov 22, 2022 · Perceptual hashing can furthermore be subject to adversarial exploits and cyberattacks, including the precise perturbation of images and videos to prevent the detection …

  4. This study compares four perceptual hashing algorithms including A-Hash, D-Hash, P-Hash, and BlockHash, to assess their robustness, sensitivity, and accuracy across standardized image …

  5. Evaluation of Perceptual Hashing Algorithms for Digital Image ...

    To address the challenges of detecting tampered images, this research provides a thorough examination of six perceptual hashing techniques. A-Hash, DHash, P-Hash, W-Hash, SVD …

  6. A Survey of Perceptual Hashing for Multimedia

    Jul 19, 2025 · Perceptual hashing is a cutting-edge technique in the field of digital multimedia security, which maps the perceptual content of multimedia information to a fixed-length hash …

  7. An Overview of Perceptual Hashing | Journal of Online Trust and …

    Oct 28, 2021 · Perceptual hashing has emerged as a powerful technology to limit the redistribution of multimedia content (including audio, images, and video). We review how this …

  8. What is perceptual hashing in image search? - milvus.io

    Perceptual hashing is a technique used in image search to identify visually similar images by generating compact, comparable representations of their content.

  9. Robustness of Practical Perceptual Hashing Algorithms to Hash

    In a perceptual hash system, a service provider scans a client’s unencrypted content, extracts hashes for each image using a perceptual hashing algorithm (PHA) and compares these …

  10. Perceptual hashing for image authentication: A survey

    Feb 1, 2020 · We presented requirements of a perceptual image hashing used for authentication, and given a formulation of the perceptual image hashing problem. We have reviewed the …