Sciweavers

78 search results - page 5 / 16
» Attacking Some Perceptual Image Hash Algorithms
Sort
View
FSE
2010
Springer
140views Cryptology» more  FSE 2010»
14 years 12 days ago
Cryptanalysis of ESSENCE
ESSENCE is a hash function submitted to the NIST Hash Competition that stands out as a hardware-friendly and highly parallelizable design. Previous analysis showed some non-randomn...
María Naya-Plasencia, Andrea Röck, Jea...
FSE
1993
Springer
89views Cryptology» more  FSE 1993»
13 years 11 months ago
Parallel FFT-Hashing
Parallel FFT-Hashing was designed by C. P. Schnorr and S. Vaudenay in 1993. The function is a simple and light weight hash algorithm with 128-bit digest. Its basic component is a m...
Claus-Peter Schnorr, Serge Vaudenay
CVPR
2010
IEEE
14 years 3 months ago
SPEC Hashing: Similarity Preserving algorithm for Entropy-based Coding
Searching approximate nearest neighbors in large scale high dimensional data set has been a challenging problem. This paper presents a novel and fast algorithm for learning binary...
Ruei-Sung Lin, David Ross, Jay Yagnik
WDAG
2007
Springer
102views Algorithms» more  WDAG 2007»
14 years 1 months ago
A Denial-of-Service Resistant DHT
We consider the problem of designing scalable and robust information systems based on multiple servers that can survive even massive denial-of-service (DoS) attacks. More precisely...
Baruch Awerbuch, Christian Scheideler
HVEI
2010
13 years 9 months ago
Perceptual quality assessment of color images using adaptive signal representation
Perceptual image distortion measures can play a fundamental role in evaluating and optimizing imaging systems and image processing algorithms. Many existing measures are formulate...
Umesh Rajashekar, Zhou Wang, Eero P. Simoncelli