perceptual hashing
Recently Published Documents


TOTAL DOCUMENTS

130
(FIVE YEARS 37)

H-INDEX

10
(FIVE YEARS 3)

2021 ◽  
Vol 13 (24) ◽  
pp. 5109
Author(s):  
Kaimeng Ding ◽  
Shiping Chen ◽  
Yu Wang ◽  
Yueming Liu ◽  
Yue Zeng ◽  
...  

The prerequisite for the use of remote sensing images is that their security must be guaranteed. As a special subset of perceptual hashing, subject-sensitive hashing overcomes the shortcomings of the existing perceptual hashing that cannot distinguish between “subject-related tampering” and “subject-unrelated tampering” of remote sensing images. However, the existing subject-sensitive hashing still has a large deficiency in robustness. In this paper, we propose a novel attention-based asymmetric U-Net (AAU-Net) for the subject-sensitive hashing of remote sensing (RS) images. Our AAU-Net demonstrates obvious asymmetric structure characteristics, which is important to improve the robustness of features by combining the attention mechanism and the characteristics of subject-sensitive hashing. On the basis of AAU-Net, a subject-sensitive hashing algorithm is developed to integrate the features of various bands of RS images. Our experimental results show that our AAU-Net-based subject-sensitive hashing algorithm is more robust than the existing deep learning models such as Attention U-Net and MUM-Net, and its tampering sensitivity remains at the same level as that of Attention U-Net and MUM-Net.


2021 ◽  
Vol 30 (06) ◽  
Author(s):  
Xinran Li ◽  
Chuan Qin ◽  
Heng Yao ◽  
Jian Li

2021 ◽  
Author(s):  
Chen Haozhe

In recent years, many model intellectual property (IP) proof methods for IP protection have been proposed, such as model watermarking and model fingerprinting. However, as an important part of the model IP protection system, the model copy detection task has not received enough attention. With the increasing number of neural network models transmitted and deployed on the Internet, the search for similar models is in great demand, which concurrently triggers the security problem of copy detection of models for IP protection. Due to the high computational complexity, both model watermarking and model fingerprinting lack the capability to efficiently find suspected infringing models among tens of millions of models. In this paper, inspired by the hash-based image retrieval methods, we propose a perceptual hashing algorithm for convolutional neural networks (CNNs). The proposed perceptual hashing algorithm can convert the weights of CNNs to fixed-length binary hash codes so that the lightly modified version has the similar hash code as the original model. By comparing the similarity of a pair of hash codes between a query model and a test model in the model library, the similar versions of a query model can be retrieved efficiently. To the best of our knowledge, this is the first perceptual hashing algorithm for CNNs. The experiment performed on a model library containing 3,565 models indicates that our proposed perceptual hashing scheme has a superior copy detection performance.


2021 ◽  
Author(s):  
Chen Haozhe

In recent years, many model intellectual property (IP) proof methods for IP protection have been proposed, such as model watermarking and model fingerprinting. However, as an important part of the model IP protection system, the model copy detection task has not received enough attention. With the increasing number of neural network models transmitted and deployed on the Internet, the search for similar models is in great demand, which concurrently triggers the security problem of copy detection of models for IP protection. Due to the high computational complexity, both model watermarking and model fingerprinting lack the capability to efficiently find suspected infringing models among tens of millions of models. In this paper, inspired by the hash-based image retrieval methods, we propose a perceptual hashing algorithm for convolutional neural networks (CNNs). The proposed perceptual hashing algorithm can convert the weights of CNNs to fixed-length binary hash codes so that the lightly modified version has the similar hash code as the original model. By comparing the similarity of a pair of hash codes between a query model and a test model in the model library, the similar versions of a query model can be retrieved efficiently. To the best of our knowledge, this is the first perceptual hashing algorithm for CNNs. The experiment performed on a model library containing 3,565 models indicates that our proposed perceptual hashing scheme has a superior copy detection performance.


2021 ◽  
Vol 2021 (1) ◽  
Author(s):  
Qiang Ma ◽  
Ling Xing

AbstractPerceptual video hashing represents video perceptual content by compact hash. The binary hash is sensitive to content distortion manipulations, but robust to perceptual content preserving operations. Currently, boundary between sensitivity and robustness is often ambiguous and it is decided by an empirically defined threshold. This may result in large false positive rates when received video is to be judged similar or dissimilar in some circumstances, e.g., video content authentication. In this paper, we propose a novel perceptual hashing method for video content authentication based on maximized robustness. The developed idea of maximized robustness means that robustness is maximized on condition that security requirement of hash is first met. We formulate the video hashing as a constrained optimization problem, in which coefficients of features offset and robustness are to be learned. Then we adopt a stochastic optimization method to solve the optimization. Experimental results show that the proposed hashing is quite suitable for video content authentication in terms of security and robustness.


2021 ◽  
Author(s):  
Qingying Hao ◽  
Licheng Luo ◽  
Steve T.K. Jan ◽  
Gang Wang
Keyword(s):  

2021 ◽  
Vol 1 (1) ◽  
Author(s):  
Hany Farid

It is said that what happens on the internet stays on the internet, forever. In some cases this may be considered a feature. Reports of human rights violations and corporate corruption, for example, should remain part of the public record. In other cases, however, digital immortality may be considered less desirable. Most would agree that terror-related content, child sexual abuse material, non-consensual intimate imagery, and dangerous disinformation, to name a few, should not be so easily found online. Neither human moderation nor artificial intelligence is currently able to contend with the spread of harmful content. Perceptual hashing has emerged as a powerful technology to limit the redistribution of multimedia content (including audio, images, and video). We review how this technology works, its advantages and disadvantages, and how it has been deployed on small- to large-scale platforms.


2021 ◽  
Author(s):  
Meng Zhaoxiong ◽  
Morizumi Tetsuya ◽  
Miyata Sumiko ◽  
Kinoshita Hirotsugu

2021 ◽  
pp. 104245
Author(s):  
Rubel Biswas ◽  
Víctor González-Castro ◽  
Eduardo Fidalgo ◽  
Enrique Alegre
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document