Perceptual hashing

Perceptual hashing is the use of a fingerprinting algorithm that produces a snippet, hash, or fingerprint of various forms of multimedia.[1][2] A perceptual hash is a type of locality-sensitive hash, which is analogous if features of the multimedia are similar. This is in contrast to cryptographic hashing, which relies on the avalanche effect of a small change in input value creating a drastic change in output value. Perceptual hash functions are widely used in finding cases of online copyright infringement as well as in digital forensics because of the ability to have a correlation between hashes so similar data can be found (for instance with a differing watermark).

Development

The 1980 work of Marr and Hildreth is a seminal paper in this field.[3]

In 2009, Microsoft Corporation developed PhotoDNA in collaboration with Hany Farid, professor at Dartmouth College. PhotoDNA is a perceptual hashing capability developed to combat the distribution of child sexual abuse material (CSAM) online. Provided by Microsoft for no cost, PhotoDNA remains a critical tool used by major software companies, NGOs and law enforcement agencies around the world. [4]

The July 2010 thesis of Christoph Zauner is a well-written introduction to the topic.[5]

In June 2016 Azadeh Amir Asgari published work on robust image hash spoofing. Asgari notes that perceptual hash function like any other algorithm is prone to errors.[6]

Researchers remarked in December 2017 that Google image search is based on a perceptual hash.[7]

In research published in November 2021 investigators focused on a manipulated image of Stacey Abrams which was published to the internet prior to her loss in the 2018 Georgia gubernatorial election. They found that the pHash algorithm was vulnerable to nefarious actors.[8]

Characteristics

Research reported in January 2019 at Northumbria University has shown for video it can be used to simultaneously identify similar contents for video copy detection and detect malicious manipulations for video authentication. The system proposed performs better than current video hashing techniques in terms of both identification and authentication. [9]

Research reported in May 2020 by the University of Houston in deep learning based perceptual hashing for audio has shown better performance than traditional audio fingerprinting methods for the detection of similar/copied audio subject to transformations.[10]

In addition to its uses in digital forensics, research by a Russian group reported in 2019 has shown that perceptual hashing can be applied to a wide variety of situations. Similar to comparing images for copyright infringement, the group found that it could be used to compare and match images in a database. Their proposed algorithm proved to be not only effective, but more efficient than the standard means of database image searching.[11]

A Chinese team reported in July 2019 that they had discovered a perceptual hash for speech encryption which proved to be effective. They were able to create a system in which the encryption was not only more accurate, but more compact as well.[12]

Apple Inc reported as early as August 2021 a child sexual abuse material (CSAM) system that they know as NeuralHash. A technical summary document, which nicely explains the system with copious diagrams and example photographs, offers that "Instead of scanning images [on corporate] iCloud [servers], the system performs on-device matching using a database of known CSAM image hashes provided by [the National Center for Missing and Exploited Children] (NCMEC) and other child-safety organizations. Apple further transforms this database into an unreadable set of hashes, which is securely stored on users' devices."[13]

In an essay entitled "The Problem With Perceptual Hashes", Oliver Kuederle produces a startling collision generated by a piece of commercial neural net software, of the NeuralHash type. A photographic portrait of a real woman (Adobe Stock #221271979) reduces through the test algorithm to a similar hash as the photograph of a butterfly painted in watercolor (from the "deposit photos" database). Both sample images are in commercial databases. Kuederle is concerned with collisions like this. "These cases will be manually reviewed. That is, according to Apple, an Apple employee will then look at your (flagged) pictures... Perceptual hashes are messy. When such algorithms are used to detect criminal activities, especially at Apple scale, many innocent people can potentially face serious problems... Needless to say, I’m quite worried about this."[14]

Researchers have continued to publish a comprehensive analysis entitled "Learning to Break Deep Perceptual Hashing: The Use Case NeuralHash", in which they investigate the vulnerability of NeuralHash as a representative of deep perceptual hashing algorithms to various attacks. Their results show that hash collisions between different images can be achieved with minor changes applied to the images. According to the authors, these results demonstrate the real chance of such attacks and enable the flagging and possible prosecution of innocent users. They also state that the detection of illegal material can easily be avoided, and the system be outsmarted by simple image transformations, such as provided by free-to-use image editors. The authors assume their results to apply to other deep perceptual hashing algorithms as well, questioning their overall effectiveness and functionality in applications such as client-side scanning and chat controls.[15]

See also

References

  1. ^ Buldas, Ahto; Kroonmaa, Andres; Laanoja, Risto (2013). "Keyless Signatures' Infrastructure: How to Build Global Distributed Hash-Trees". In Riis, Nielson H.; Gollmann, D. (eds.). Secure IT Systems. NordSec 2013. Lecture Notes in Computer Science. Vol. 8208. Berlin, Heidelberg: Springer. doi:10.1007/978-3-642-41488-6_21. ISBN 978-3-642-41487-9. ISSN 0302-9743. Keyless Signatures Infrastructure (KSI) is a globally distributed system for providing time-stamping and server-supported digital signature services. Global per-second hash trees are created and their root hash values published. We discuss some service quality issues that arise in practical implementation of the service and present solutions for avoiding single points of failure and guaranteeing a service with reasonable and stable delay. Guardtime AS has been operating a KSI Infrastructure for 5 years. We summarize how the KSI Infrastructure is built, and the lessons learned during the operational period of the service.
  2. ^ Klinger, Evan; Starkweather, David. "pHash.org: Home of pHash, the open source perceptual hash library". pHash.org. Retrieved 2018-07-05. pHash is an open source software library released under the GPLv3 license that implements several perceptual hashing algorithms, and provides a C-like API to use those functions in your own programs. pHash itself is written in C++.
  3. ^ Marr, D.; Hildreth, E. (29 Feb 1980). "Theory of Edge Detection". Proceedings of the Royal Society of London. Series B, Biological Sciences. 207 (1167): 187–217. Bibcode:1980RSPSB.207..187M. doi:10.1098/rspb.1980.0020. PMID 6102765. S2CID 2150419.
  4. ^ Lohr, Steve (December 2009). "Microsoft Tackles the Child Pornography Problem". New York Times.
  5. ^ Zauner, Christoph (July 2010). Implementation and Benchmarking of Perceptual Image Hash Functions (PDF). Upper Austria University of Applied Sciences, Hagenberg Campus.
  6. ^ Asgari, Azadeh Amir (June 2016). Robust image hash spoofing (PDF). Blekinge Institute of Technology.
  7. ^ "Google Image Search Explained". Medium. 26 December 2017.
  8. ^ Hao, Qingying; Luo, Licheng; Jan, Steve T.K.; Wang, Gang (November 2021). "It's Not What It Looks Like: Manipulating Perceptual Hashing based Applications" (PDF). Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security (CCS '21), November 15–19, 2021, Virtual Event, Republic of Korea. Association for Computing Machinery.
  9. ^ Khelifi, Fouad; Bouridane, Ahmed (January 2019). "Perceptual Video Hashing for Content Identification and Authentication" (PDF). IEEE Transactions on Circuits and Systems for Video Technology. 29 (1): 50–67. doi:10.1109/TCSVT.2017.2776159. S2CID 55725934.
  10. ^ Báez-Suárez, Abraham; Shah, Nolan; Nolazco-Flores, Juan Arturo; Huang, Shou-Hsuan S.; Gnawali, Omprakash; Shi, Weidong (2020-05-19). "SAMAF: Sequence-to-sequence Autoencoder Model for Audio Fingerprinting". ACM Transactions on Multimedia Computing, Communications, and Applications. 16 (2): 43:1–43:23. doi:10.1145/3380828. ISSN 1551-6857.
  11. ^ Zakharov, Victor; Kirikova, Anastasia; Munerman, Victor; Samoilova, Tatyana (2019). "Architecture of Software-Hardware Complex for Searching Images in Database". 2019 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EICon Rus). IEEE. pp. 1735–1739. doi:10.1109/EIConRus.2019.8657241. ISBN 978-1-7281-0339-6. S2CID 71152337.
  12. ^ Zhang, Qiu-yu; Zhou, Liang; Zhang, Tao; Zhang, Deng-hai (July 2019). "A retrieval algorithm of encrypted speech based on short-term cross-correlation and perceptual hashing". Multimedia Tools and Applications. 78 (13): 17825–17846. doi:10.1007/s11042-019-7180-9. S2CID 58010160.
  13. ^ "CSAM Detection - Technical Summary" (PDF). Apple Inc. August 2021.
  14. ^ Kuederle, Oliver (n.d.). "THE PROBLEM WITH PERCEPTUAL HASHES". rentafounder.com. Retrieved 23 May 2022.
  15. ^ Struppek, Lukas; Hintersdorf, Dominik; Neider, Daniel; Kersting, Kristian (2022). "Learning to Break Deep Perceptual Hashing: The Use Case Neural Hash". 2022 ACM Conference on Fairness, Accountability, and Transparency. Proceedings of the ACM Conference on Fairness, Accountability, and Transparency (FAccT). pp. 58–69. arXiv:2111.06628. doi:10.1145/3531146.3533073. ISBN 9781450393522. S2CID 244102645.

Read other articles:

Este artículo o sección necesita referencias que aparezcan en una publicación acreditada.Este aviso fue puesto el 26 de diciembre de 2017. Hierbas provenzales. Se denominan hierbas provenzales o de la Provenza (en francés: herbes de Provence) a una mezcla de plantas culinarias secadas y originarias de la cuenca del Mediterráneo. Tradicionalmente se usan en todos los pueblos mediterráneos sin llamarlas así. El éxito de la cocina profesional primeramente en Francia hizo que se conociera...

 

Coordenadas: 15° 21' N 91° 19' O Aguacatán é uma cidade da Guatemala do departamento de Huehuetenango.[1] Referências ↑ «Directorio de Municipalidades de Huhuetenango» (PDF). Governo da Guatemala. 2017. Consultado em 12 de setembro de 2019  Este artigo sobre Geografia da Guatemala é um esboço. Você pode ajudar a Wikipédia expandindo-o. vdeHuehuetenangoCapital HuehuetenangoMunicípios Aguacatán  • Chiantla  • Colotenango  •&...

 

التفسير المنسوب للحسن العسكري الاسم التفسير المنسوب للحسن العسكري المؤلف الحسن العسكري الموضوع علم التفسير العقيدة شيعة اثنا عشرية اللغة العربية معلومات الطباعة كتب أخرى للمؤلف تعديل مصدري - تعديل   تفسير الإمام الحسن العسكري تفسير منسوب إلى الحسن العسكري ، الإمام الحا

This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.Find sources: Underground Connection – news · newspapers · books · scholar · JSTOR (April 2019) (Learn how and when to remove this template message) 2002 studio album by PMD & DJ HondaUnderground ConnectionStudio album by PMD & DJ HondaReleasedApril 27, 2002R...

 

Ethnic Arabs living in Germany Arabs in Germanyالعرب في المانياDistribution of citizens of Arab countries in Germany (2021)Total population1,401,950[1]Regions with significant populationsBerlin, Bochum, Bonn, Bremen, Cologne, Dortmund, Duisburg, Düsseldorf, Essen, Frankfurt, Gelsenkirchen, Hamburg, Hanover, Leipzig, Munich, Offenbach, Wuppertal, MainzLanguagesArabic, GermanReligionMajority Islam (mainly Sunni Islam, minorities Twelver Shia Islam, Alevism, Alawites, Sufi...

 

Strategic planning document of the Russia The military doctrine of Russia is a strategic planning document of Russia and represents a system of officially state adopted views of preparation for the armed protection of Russia. The most recent revision of the military doctrine was approved in 2014. Numerous successive revisions of military doctrine have been promulgated since 1990. These have included the military doctrines of May 1992 (in draft form), November 1993, and January 2000, as well a...

You can help expand this article with text translated from the corresponding article in German. (March 2015) Click [show] for important translation instructions. View a machine-translated version of the German article. Machine translation, like DeepL or Google Translate, is a useful starting point for translations, but translators must revise errors as necessary and confirm that the translation is accurate, rather than simply copy-pasting machine-translated text into the English Wikipedi...

 

Thiago Simon Thiago Simon Natação Nome completo Thiago Teixeira Simon Estilo Medley Nascimento 3 de abril de 1990 (33 anos)Penápolis,  São Paulo Nacionalidade brasileira Compleição Peso: 93 kg • Altura: 1,84 m Medalhas Jogos Pan-Americanos Ouro Toronto 2015 200 m peito Ouro Toronto 2015 4×200 m livre Jogos Sul-Americanos Prata Santiago 2014 200 m medley Bronze Santiago 2014 400 m medley Thiago Teixeira Simon (Penápolis, 3 de abril de 1990) é um nadador brasileiro.[1]...

 

Abd al-Hakim Hajj YahyaLahir16 Februari 1965 (umur 58)Tempat lahirTayibe, IsraelKnesset20, 21Faksi yang diwakili di Knesset2015–2019Joint List2019–Partai Arab Bersatu Abd al-Hakim Hajj Yahya (Arab: عبد الحكيم حاج يحيى, Ibrani: עַבֵּד אַל־חַכִּים חַאג׳ יָחיָא; lahir 16 Februari 1965) adalah seorang insinyur dan politikus Arab Israel. Ia sekarang menjadi anggota Knesset untuk Partai Arab Bersatu. Pranala luar Abd al-Hakim Hajj Yahya di si...

Former mining town in Northwest Territories, Canada This article is about the mining area. For Port Radium Mine, see Eldorado Mine (Northwest Territories). Great Bear Lake, NWT, Canada Old oblique aerial photo Port Radium is a mining area on the eastern shore of Great Bear Lake, Northwest Territories, Canada.[1][2] It included the settlement of Cameron Bay as well as the Eldorado (also called Port Radium) and Echo Bay mines. The name Port Radium did not come into use until 193...

 

This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.Find sources: Gajanan Maharaj Temples – news · newspapers · books · scholar · JSTOR (November 2018) (Learn how and when to remove this template message) Gajanan Maharaj Temple at Omkareshwar The Gajanan Maharaj Temples are built to honor Sant Gajanan Maharaj, an Indian holy ...

 

Austrian electrical engineer This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these template messages) A major contributor to this article appears to have a close connection with its subject. It may require cleanup to comply with Wikipedia's content policies, particularly neutral point of view. Please discuss further on the talk page. (April 2015) (Learn how and when to remove this template message) This article's...

Punjabi movie LekhTheatrical release posterDirected byManvir Brar[1]Written byJagdeep Sidhu[1][2]Produced byGunbir Singh Sidhu[1][2] Manmord Sidhu[1][2]Starring Gurnam Bhullar[1]Tania[1] CinematographyRavi Kumar Sena [3]Music byB Praak[3]ProductioncompanyWhite Hill Studios[1][2]Release date 1 April 2022 (2022-04-01) Running time130 minutesCountryIndiaLanguagePunjabi Lekh is a...

 

SetabelanKelurahanKantor KelurahanPeta lokasi Kelurahan SetabelanNegara IndonesiaProvinsiJawa TengahKotaSurakartaKecamatanBanjarsariKodepos57133Kode Kemendagri33.72.05.1004 Kode BPS3372050007 Setabelan (Jawa: ꦱꦼꦠꦧꦼꦭꦤ꧀, translit. Setabelan) adalah kelurahan di kecamatan Banjarsari, Surakarta. Kelurahan ini memiliki kode pos 57139. Pada tahun 2020, kelurahan ini berpenduduk sebesar 4.051 jiwa. Kelurahan ini terletak persis di sisi utara Istana Mangkunegaran, dibata...

 

1667 ethnographic map of Siberia Copy by Claes Johansson Prytz The Godunov map was an ethnographic map of Siberia commissioned by Alexis of Russia on 15 November 1667.[1] The original is no longer extant, but two copies were made: one by Claes Johansson Prytz and the other by Fritz Cronman.[2][3] It is named after Petr Ivanovich Godunov the governor (voivode) of Tobolsk.[1][4][5] References ^ a b Imago mundi. International Society for the Histor...

Public university in Tbilisi, Georgia This article includes a list of general references, but it lacks sufficient corresponding inline citations. Please help to improve this article by introducing more precise citations. (January 2008) (Learn how and when to remove this template message) Ivane Javakhishvili Tbilisi State Universityივანე ჯავახიშვილის სახელობის თბილისის სახელმწიფო უნივერსიტ...

 

Artikel ini membutuhkan rujukan tambahan agar kualitasnya dapat dipastikan. Mohon bantu kami mengembangkan artikel ini dengan cara menambahkan rujukan ke sumber tepercaya. Pernyataan tak bersumber bisa saja dipertentangkan dan dihapus.Cari sumber: Umkhonto we Sizwe – berita · surat kabar · buku · cendekiawan · JSTOR Untuk album Prince Far I tahun 1984, lihat Umkhonto We Sizwe (Spear of the Nation). Umkhonto we SizweBendera tempur Umkhonto we Sizwe.Akti...

 

2022 session of the United Nations General Assembly Eleventh emergency special session of the United Nations General Assembly ← 10th ongoing since 28 February 2022 General Assembly Hall (2006)Venue(s)General Assembly Hall at the United Nations headquartersCitiesNew York City, New York, U.S.ParticipantsUnited Nations Member StatesPresidentVariousWebsiteun.org/en/ga/sessions/emergency11th The eleventh emergency special session of the United Nations General Assembly opened on 28 Febru...

British film studio Twickenham Film Studios LimitedView of part of the studiosTypeLimited companyIndustryFilm and TVFounded1913HeadquartersThe Barons, St Margarets, London, United KingdomWebsitewww.twickenhamstudios.com Twickenham Film Studios is a film studio in St Margarets, in the London Borough of Richmond upon Thames, that is used by various motion picture and television companies. It was established in 1913 by Ralph Jupp on the site of a former ice rink. At the time of its original cons...

 

West VirginiaNegara bagian BenderaLambangNegaraAmerika SerikatSebelum menjadi negara bagianVirginiaBergabung ke Serikat20 Juni 1863 (35)Kota terbesarCharlestonMetropolitan terbesarMetro CharlestonPemerintahan • GubernurEarl Ray Tomblin (D) • Wakil GubernurJeff Kessler (D) • Majelis tinggi{{{Upperhouse}}} • Majelis rendah{{{Lowerhouse}}}Senator ASJay Rockefeller (D)Joe Manchin (D)Delegasi DPR AS1: David McKinley (R)2: Shelley Moore Capito (R)3: N...

 

Strategi Solo vs Squad di Free Fire: Cara Menang Mudah!