{"id":"https://openalex.org/W4407467191","doi":"https://doi.org/10.1109/sin63213.2024.10871542","title":"Assessing Perceptual Hash Algorithms for Publicly Evaluatable Framework","display_name":"Assessing Perceptual Hash Algorithms for Publicly Evaluatable Framework","publication_year":2024,"publication_date":"2024-12-02","ids":{"openalex":"https://openalex.org/W4407467191","doi":"https://doi.org/10.1109/sin63213.2024.10871542"},"language":"en","primary_location":{"id":"doi:10.1109/sin63213.2024.10871542","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sin63213.2024.10871542","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 17th International Conference on Security of Information and Networks (SIN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5116254252","display_name":"Yaser Saei","orcid":null},"institutions":[{"id":"https://openalex.org/I143150842","display_name":"Urmia University of Technology","ror":"https://ror.org/02v319z25","country_code":"IR","type":"education","lineage":["https://openalex.org/I143150842"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"Yaser Saei","raw_affiliation_strings":["Urmia University of Technology,IT and Computer Engineering,Urmia,Iran"],"affiliations":[{"raw_affiliation_string":"Urmia University of Technology,IT and Computer Engineering,Urmia,Iran","institution_ids":["https://openalex.org/I143150842"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010007196","display_name":"Jafar Tahmoresnezhad","orcid":"https://orcid.org/0000-0002-4893-1272"},"institutions":[{"id":"https://openalex.org/I143150842","display_name":"Urmia University of Technology","ror":"https://ror.org/02v319z25","country_code":"IR","type":"education","lineage":["https://openalex.org/I143150842"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Jafar Tahmoresnezhad","raw_affiliation_strings":["Urmia University of Technology,IT and Computer Engineering,Urmia,Iran"],"affiliations":[{"raw_affiliation_string":"Urmia University of Technology,IT and Computer Engineering,Urmia,Iran","institution_ids":["https://openalex.org/I143150842"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007755477","display_name":"Sima Jafarikhah","orcid":null},"institutions":[{"id":"https://openalex.org/I153901656","display_name":"University of North Carolina Wilmington","ror":"https://ror.org/02t0qr014","country_code":"US","type":"education","lineage":["https://openalex.org/I153901656"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sima Jafarikhah","raw_affiliation_strings":["UNCW,Computer Science,Wilmington,USA"],"affiliations":[{"raw_affiliation_string":"UNCW,Computer Science,Wilmington,USA","institution_ids":["https://openalex.org/I153901656"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5037287342","display_name":"Hossein Siadati","orcid":"https://orcid.org/0000-0002-5293-8450"},"institutions":[{"id":"https://openalex.org/I153901656","display_name":"University of North Carolina Wilmington","ror":"https://ror.org/02t0qr014","country_code":"US","type":"education","lineage":["https://openalex.org/I153901656"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hossein Siadati","raw_affiliation_strings":["UNCW,Computer Science,Wilmington,USA"],"affiliations":[{"raw_affiliation_string":"UNCW,Computer Science,Wilmington,USA","institution_ids":["https://openalex.org/I153901656"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5116254252"],"corresponding_institution_ids":["https://openalex.org/I143150842"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.28294014,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.743399977684021,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.743399977684021,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7946341037750244},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.7425829172134399},{"id":"https://openalex.org/keywords/secure-hash-algorithm","display_name":"Secure Hash Algorithm","score":0.5418283939361572},{"id":"https://openalex.org/keywords/perception","display_name":"Perception","score":0.524034321308136},{"id":"https://openalex.org/keywords/sha-2","display_name":"SHA-2","score":0.5143471956253052},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3776359558105469},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3536902070045471},{"id":"https://openalex.org/keywords/hash-chain","display_name":"Hash chain","score":0.2922782301902771},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.22751662135124207},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.07762181758880615}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7946341037750244},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.7425829172134399},{"id":"https://openalex.org/C9661340","wikidata":"https://www.wikidata.org/wiki/Q257799","display_name":"Secure Hash Algorithm","level":5,"score":0.5418283939361572},{"id":"https://openalex.org/C26760741","wikidata":"https://www.wikidata.org/wiki/Q160402","display_name":"Perception","level":2,"score":0.524034321308136},{"id":"https://openalex.org/C190157925","wikidata":"https://www.wikidata.org/wiki/Q1968605","display_name":"SHA-2","level":4,"score":0.5143471956253052},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3776359558105469},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3536902070045471},{"id":"https://openalex.org/C135783594","wikidata":"https://www.wikidata.org/wiki/Q5678864","display_name":"Hash chain","level":3,"score":0.2922782301902771},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.22751662135124207},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.07762181758880615},{"id":"https://openalex.org/C169760540","wikidata":"https://www.wikidata.org/wiki/Q207011","display_name":"Neuroscience","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/sin63213.2024.10871542","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sin63213.2024.10871542","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 17th International Conference on Security of Information and Networks (SIN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W33955517","https://openalex.org/W1544327602","https://openalex.org/W1974962771","https://openalex.org/W1982991855","https://openalex.org/W1986024748","https://openalex.org/W1992919533","https://openalex.org/W2001108668","https://openalex.org/W2026343519","https://openalex.org/W2032793816","https://openalex.org/W2046180645","https://openalex.org/W2048393261","https://openalex.org/W2069165391","https://openalex.org/W2069750383","https://openalex.org/W2097483157","https://openalex.org/W2109190643","https://openalex.org/W2114550641","https://openalex.org/W2132172731","https://openalex.org/W2134396947","https://openalex.org/W2135188079","https://openalex.org/W2147121845","https://openalex.org/W2152740857","https://openalex.org/W2183964636","https://openalex.org/W2190207313","https://openalex.org/W2245255658","https://openalex.org/W2407561938","https://openalex.org/W2518397542","https://openalex.org/W2607777488","https://openalex.org/W2609249292","https://openalex.org/W2621165238","https://openalex.org/W2758925446","https://openalex.org/W2789971502","https://openalex.org/W2889255787","https://openalex.org/W2901822673","https://openalex.org/W2990502263","https://openalex.org/W3082956701","https://openalex.org/W3172835673","https://openalex.org/W6604972231"],"related_works":["https://openalex.org/W2020037908","https://openalex.org/W2011214054","https://openalex.org/W2170400499","https://openalex.org/W2087509157","https://openalex.org/W2142358564","https://openalex.org/W4327727005","https://openalex.org/W4200497776","https://openalex.org/W2540242501","https://openalex.org/W2103190493","https://openalex.org/W4387913918"],"abstract_inverted_index":{"Image":[0],"manipulation":[1],"threatens":[2],"data":[3,104],"integrity":[4],"and":[5,72,79,111],"public":[6],"trust,":[7],"making":[8],"reliable":[9],"authenticity":[10],"tools":[11],"essential.":[12],"The":[13],"development":[14],"of":[15,36,47,61,87,114],"a":[16,38],"publicly":[17],"evaluatable":[18],"perceptual":[19,49,64,95,115],"hash":[20,50,65],"framework":[21],"enables":[22],"various":[23,48],"applications,":[24],"including":[25,67],"private":[26],"image":[27,31,77],"search":[28],"resilient":[29],"to":[30],"alterations.":[32],"Despite":[33],"the":[34,45,59,85,88,108,121],"potential":[35],"such":[37],"framework,":[39],"little":[40],"research":[41],"has":[42],"systematically":[43],"analyzed":[44],"performance":[46,60],"algorithms":[51],"within":[52,120],"it.":[53],"In":[54],"this":[55,98],"paper,":[56],"we":[57],"assess":[58],"several":[62],"leading":[63],"methods,":[66],"aHash,":[68],"pHash,":[69],"dHash,":[70],"wHash,":[71],"DCT,":[73],"across":[74],"five":[75],"diverse":[76],"datasets":[78],"examine":[80],"how":[81],"cryptographic":[82],"techniques":[83,93],"impact":[84],"effectiveness":[86],"algorithms.":[89],"Integrating":[90],"advanced":[91],"encryption":[92],"with":[94],"hashing":[96],"in":[97,102],"approach":[99],"is":[100],"instrumental":[101],"advancing":[103],"security.":[105],"It":[106],"improves":[107],"security,":[109],"privacy,":[110],"computational":[112],"efficiency":[113],"hashing,":[116],"solidifying":[117],"its":[118],"importance":[119],"overall":[122],"methodology.":[123]},"counts_by_year":[],"updated_date":"2025-12-28T23:10:05.387466","created_date":"2025-10-10T00:00:00"}
