散列函数
计算机科学
感知
上传
安全散列算法
密码哈希函数
特征哈希
图像(数学)
人工智能
计算机视觉
算法
沙-2
计算机安全
双重哈希
万维网
心理学
神经科学
作者
Mohammed Alkhowaiter,Khalid Almubarak,Cliff C. Zou
标识
DOI:10.1109/csr54599.2022.9850288
摘要
Perceptual hash is a fingerprint of features of multimedia content. Compared with crypto hash, perceptual hash shows many advantages when defending against image-based fake news attacks in terms of detecting deliberate image manipulation while still tolerating normal format or resolution changes conducted on user-uploaded images by content-hosting providers such as social media platforms. Previous research into perceptual hash has studied general image manipulation without considering legitimate image transformation by social media platforms. This paper evaluates and analyzes six state-of-the-art perceptual hash algorithms for detecting image manipulation over two major social media platforms: Facebook and Twitter. Our real-world image evaluation shows differences in the two platforms’ image processing and how the six algorithms perform in detecting image manipulation over these platforms. We also present a new approach to finding the optimal detection threshold for each perceptual hash algorithm in distinguishing the platform’s standard image processing from deliberate image manipulation.
科研通智能强力驱动
Strongly Powered by AbleSci AI