Login / Signup
Security of visual hash function.
Regunathan Radhakrishnan
Ziyou Xiong
Nasir D. Memon
Published in:
Security and Watermarking of Multimedia Contents (2003)
Keyphrases
</>
hash functions
stream cipher
encryption scheme
provably secure
block cipher
similarity search
hashing algorithm
visual information
information security
locality sensitive hashing
security policies
hash tables
data distribution
access control
secret key
visual features
security requirements
hamming distance
security analysis
binary codes
hash table
integer wavelet transform
high security
nearest neighbor search
neural network
smart card
nearest neighbor
data streams