Hamming Distributions of Popular Perceptual Hashing Techniques

12/15/2022
by   Sean McKeown, et al.
0

Content-based file matching has been widely deployed for decades, largely for the detection of sources of copyright infringement, extremist materials, and abusive sexual media. Perceptual hashes, such as Microsoft's PhotoDNA, are one automated mechanism for facilitating detection, allowing for machines to approximately match visual features of an image or video in a robust manner. However, there does not appear to be much public evaluation of such approaches, particularly when it comes to how effective they are against content-preserving modifications to media files. In this paper, we present a million-image scale evaluation of several perceptual hashing archetypes for popular algorithms (including Facebook's PDQ, Apple's Neuralhash, and the popular pHash library) against seven image variants. The focal point is the distribution of Hamming distance scores between both unrelated images and image variants to better understand the problems faced by each approach.

READ FULL TEXT
research
08/26/2021

State of the Art: Image Hashing

Perceptual image hashing methods are often applied in various objectives...
research
12/16/2019

PDQ TMK + PDQF – A Test Drive of Facebook's Perceptual Hashing Algorithms

Efficient and reliable automated detection of modified image and multime...
research
02/01/2020

Towards Evaluating Gaussian Blurring in Perceptual Hashing as a Facial Image Filter

With the growth in social media, there is a huge amount of images of fac...
research
05/20/2020

Perceptual Hashing applied to Tor domains recognition

The Tor darknet hosts different types of illegal content, which are moni...
research
06/18/2013

A Novel Block-DCT and PCA Based Image Perceptual Hashing Algorithm

Image perceptual hashing finds applications in content indexing, large-s...
research
06/17/2021

Adversarial Detection Avoidance Attacks: Evaluating the robustness of perceptual hashing-based client-side scanning

End-to-end encryption (E2EE) by messaging platforms enable people to sec...
research
06/20/2023

Deep perceptual hashing algorithms with hidden dual purpose: when client-side scanning does facial recognition

End-to-end encryption (E2EE) provides strong technical protections to in...

Please sign up or login with your details

Forgot password? Click here to reset