Assessing the Adversarial Security of Perceptual Hashing Algorithms.
Jordan MaddenMoxanki BhavsarLhamo DorjeXiaohua LiPublished in: CoRR (2024)
Keyphrases
- theoretical analysis
- learning algorithm
- access control
- computational cost
- orders of magnitude
- genetic algorithm
- significant improvement
- computational complexity
- data structure
- image segmentation
- optimization problems
- information systems
- computationally efficient
- social networks
- machine learning algorithms
- neural network
- times faster
- information security