On the security of the visual hash function.
Regunathan RadhakrishnanZiyou XiongNasir D. MemonPublished in: J. Electronic Imaging (2005)
Keyphrases
- hash functions
- stream cipher
- provably secure
- encryption scheme
- similarity search
- block cipher
- security analysis
- locality sensitive hashing
- secret key
- security requirements
- hamming distance
- access control
- information security
- visual information
- data distribution
- visual features
- security model
- nearest neighbor search
- key management
- neural network
- data sets
- hash table
- image quality
- high security
- hash tables
- databases