Amanote Research

Amanote Research

    RegisterSign In

Conception and Limits of Robust Perceptual Hashing: Towards Side Information Assisted Hash Functions

doi 10.1117/12.805919
Full Text
Open PDF
Abstract

Available in full text

Date

February 5, 2009

Authors
Sviatoslav VoloshynovskiyOleksiy KovalFokko BeekhofThierry Pun
Publisher

SPIE


Related search

Towards Security Limits in Side-Channel Attacks

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2006English

Parameterized Hash Functions

Annales UMCS, Informatica
2012English

Cryptographic Hash Functions

2010English

On Risks of Using Cuckoo Hashing With Simple Universal Hash Classes

2009English

Side Information in Robust Principal Component Analysis: Algorithms and Applications

2017English

On Hash Functions Using Checksums

International Journal of Information Security
Information SystemsRiskComputer NetworksCommunicationsReliabilitySafetyQualitySoftware
2009English

Robust Speech Hashing for Digital Audio Forensics

Applied Sciences (Switzerland)
InstrumentationMaterials ScienceFluid FlowEngineeringComputer Science ApplicationsProcess ChemistryTransfer ProcessesTechnology
2019English

The State of Cryptographic Hash Functions

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
1999English

Cryptanalysis of Hash Functions With Structures

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2009English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy