This thesis is devoted to the analysis and implementation of image hashing based on the article "Robust image hashing with compressed sensing and ordinal measures"[3]. Image hashing uses so-called perceptual hashing methods. These methods have great applications in computer vision science, and the properties of these methods allow us to compare the similarity of hashed images and classify these images into groups. We can use this comparison, for example, to search images on the Internet for various reasons. In the theoretical part, we will talk more about the properties of these hashing methods and describe the hashing method according to the mentioned paper, we will focus most on what is compressive sampling, saliency map and how we achiev...
Security is still a relatively unexplored issue in image hash-ing. In this paper, we address this pr...
To represent each set images from multiple set effectively exploited for representation May probabil...
Image hashing has been a popular alternative of digital watermarking for copyright protection and co...
In this paper, a new image hashing scheme satisfying robustness and security is proposed. We exploit...
Perceptual hashing is conventionally used for content identification and authentication. In this wor...
In the last decade, the increased possibility to produce, edit, and disseminate multimedia contents ...
The proliferation of digital images creates problems for managing large image databases, indexing in...
Image hashing is an emerging technology for the need of, such as image authentication, digital water...
Perceptual hashing is a promising solution to image content authentication. However, conventional im...
Hash functions are frequently called message digest functions. Their purpose is to extract a short ...
Hashes can be used to provide authentication of multimedia con-tents. In the case of images, a hash ...
Hashing is popular technique of image authentication to identify malicious attacks and it also allow...
[[abstract]]This paper proposes a robust image hashing method in discrete Fourier domain that can be...
Perceptual hashing is a solution for persistent content identification and robust content authentica...
We address the problem of image hashing by learning binary codes from large and weakly supervised ph...
Security is still a relatively unexplored issue in image hash-ing. In this paper, we address this pr...
To represent each set images from multiple set effectively exploited for representation May probabil...
Image hashing has been a popular alternative of digital watermarking for copyright protection and co...
In this paper, a new image hashing scheme satisfying robustness and security is proposed. We exploit...
Perceptual hashing is conventionally used for content identification and authentication. In this wor...
In the last decade, the increased possibility to produce, edit, and disseminate multimedia contents ...
The proliferation of digital images creates problems for managing large image databases, indexing in...
Image hashing is an emerging technology for the need of, such as image authentication, digital water...
Perceptual hashing is a promising solution to image content authentication. However, conventional im...
Hash functions are frequently called message digest functions. Their purpose is to extract a short ...
Hashes can be used to provide authentication of multimedia con-tents. In the case of images, a hash ...
Hashing is popular technique of image authentication to identify malicious attacks and it also allow...
[[abstract]]This paper proposes a robust image hashing method in discrete Fourier domain that can be...
Perceptual hashing is a solution for persistent content identification and robust content authentica...
We address the problem of image hashing by learning binary codes from large and weakly supervised ph...
Security is still a relatively unexplored issue in image hash-ing. In this paper, we address this pr...
To represent each set images from multiple set effectively exploited for representation May probabil...
Image hashing has been a popular alternative of digital watermarking for copyright protection and co...