Security of visual hash function.
Regunathan RadhakrishnanZiyou XiongNasir D. MemonPublished in: Security and Watermarking of Multimedia Contents (2003)
Keyphrases
- hash functions
- stream cipher
- encryption scheme
- provably secure
- block cipher
- similarity search
- hashing algorithm
- visual information
- information security
- locality sensitive hashing
- security policies
- hash tables
- data distribution
- access control
- secret key
- visual features
- security requirements
- hamming distance
- security analysis
- binary codes
- hash table
- integer wavelet transform
- high security
- nearest neighbor search
- neural network
- smart card
- nearest neighbor
- data streams