{"id":"https://openalex.org/W4408164030","doi":"https://doi.org/10.1109/tifs.2025.3547566","title":"Generative Collision Attack on Deep Image Hashing","display_name":"Generative Collision Attack on Deep Image Hashing","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4408164030","doi":"https://doi.org/10.1109/tifs.2025.3547566"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2025.3547566","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3547566","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022321726","display_name":"Lingjun Ying","orcid":"https://orcid.org/0000-0003-2348-3212"},"institutions":[{"id":"https://openalex.org/I148128674","display_name":"University of Shanghai for Science and Technology","ror":"https://ror.org/00ay9v204","country_code":"CN","type":"education","lineage":["https://openalex.org/I148128674"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Luyang Ying","raw_affiliation_strings":["School of Optical-Electrical and Computer Engineering, University of Shanghai for Science and Technology, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Optical-Electrical and Computer Engineering, University of Shanghai for Science and Technology, Shanghai, China","institution_ids":["https://openalex.org/I148128674"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101657327","display_name":"Cheng Xiong","orcid":"https://orcid.org/0000-0002-6201-2520"},"institutions":[{"id":"https://openalex.org/I148128674","display_name":"University of Shanghai for Science and Technology","ror":"https://ror.org/00ay9v204","country_code":"CN","type":"education","lineage":["https://openalex.org/I148128674"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Cheng Xiong","raw_affiliation_strings":["School of Optical-Electrical and Computer Engineering, University of Shanghai for Science and Technology, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Optical-Electrical and Computer Engineering, University of Shanghai for Science and Technology, Shanghai, China","institution_ids":["https://openalex.org/I148128674"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072469414","display_name":"Chuan Qin","orcid":"https://orcid.org/0000-0002-0370-4623"},"institutions":[{"id":"https://openalex.org/I148128674","display_name":"University of Shanghai for Science and Technology","ror":"https://ror.org/00ay9v204","country_code":"CN","type":"education","lineage":["https://openalex.org/I148128674"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chuan Qin","raw_affiliation_strings":["School of Optical-Electrical and Computer Engineering, University of Shanghai for Science and Technology, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Optical-Electrical and Computer Engineering, University of Shanghai for Science and Technology, Shanghai, China","institution_ids":["https://openalex.org/I148128674"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102018721","display_name":"Xiangyang Luo","orcid":"https://orcid.org/0000-0001-6062-2950"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xiangyang Luo","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054324316","display_name":"Zhenxing Qian","orcid":"https://orcid.org/0000-0003-1622-0561"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhenxing Qian","raw_affiliation_strings":["School of Computer Science, Fudan University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Fudan University, Shanghai, China","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101889358","display_name":"Xinpeng Zhang","orcid":"https://orcid.org/0000-0002-0212-3501"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xinpeng Zhang","raw_affiliation_strings":["School of Computer Science, Fudan University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Fudan University, Shanghai, China","institution_ids":["https://openalex.org/I24943067"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5022321726"],"corresponding_institution_ids":["https://openalex.org/I148128674"],"apc_list":null,"apc_paid":null,"fwci":1.319,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.77663218,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"20","issue":null,"first_page":"2748","last_page":"2762"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11448","display_name":"Face recognition and analysis","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11448","display_name":"Face recognition and analysis","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9909999966621399,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10627","display_name":"Advanced Image and Video Retrieval Techniques","score":0.9891999959945679,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8426176309585571},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.7152796983718872},{"id":"https://openalex.org/keywords/collision","display_name":"Collision","score":0.5509074926376343},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.532975435256958},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.4996216297149658},{"id":"https://openalex.org/keywords/collision-attack","display_name":"Collision attack","score":0.46642833948135376},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.3902391493320465},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3737923502922058},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.25986984372138977},{"id":"https://openalex.org/keywords/hash-table","display_name":"Hash table","score":0.21144023537635803},{"id":"https://openalex.org/keywords/double-hashing","display_name":"Double hashing","score":0.10172861814498901}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8426176309585571},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.7152796983718872},{"id":"https://openalex.org/C121704057","wikidata":"https://www.wikidata.org/wiki/Q352070","display_name":"Collision","level":2,"score":0.5509074926376343},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.532975435256958},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.4996216297149658},{"id":"https://openalex.org/C87538441","wikidata":"https://www.wikidata.org/wiki/Q389463","display_name":"Collision attack","level":5,"score":0.46642833948135376},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3902391493320465},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3737923502922058},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.25986984372138977},{"id":"https://openalex.org/C67388219","wikidata":"https://www.wikidata.org/wiki/Q207440","display_name":"Hash table","level":3,"score":0.21144023537635803},{"id":"https://openalex.org/C138111711","wikidata":"https://www.wikidata.org/wiki/Q478351","display_name":"Double hashing","level":4,"score":0.10172861814498901}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2025.3547566","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3547566","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Climate action","id":"https://metadata.un.org/sdg/13","score":0.4699999988079071}],"awards":[{"id":"https://openalex.org/G2976755415","display_name":null,"funder_award_id":"2023YFF0905000","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":43,"referenced_works":["https://openalex.org/W1861492603","https://openalex.org/W2007972815","https://openalex.org/W2068142860","https://openalex.org/W2096733369","https://openalex.org/W2117539524","https://openalex.org/W2183964636","https://openalex.org/W2293824885","https://openalex.org/W2375255548","https://openalex.org/W2464915613","https://openalex.org/W2494160329","https://openalex.org/W2621165238","https://openalex.org/W2737553646","https://openalex.org/W2911013958","https://openalex.org/W2962770929","https://openalex.org/W2963213486","https://openalex.org/W2964280870","https://openalex.org/W2990502263","https://openalex.org/W3034239448","https://openalex.org/W3108980562","https://openalex.org/W3117076822","https://openalex.org/W3175328093","https://openalex.org/W3198892687","https://openalex.org/W3200993057","https://openalex.org/W3214430180","https://openalex.org/W4378473107","https://openalex.org/W4381162472","https://openalex.org/W4385153810","https://openalex.org/W4385847577","https://openalex.org/W4386076017","https://openalex.org/W4386078112","https://openalex.org/W4387969331","https://openalex.org/W4390938717","https://openalex.org/W4392356417","https://openalex.org/W4399357306","https://openalex.org/W6678815747","https://openalex.org/W6718379498","https://openalex.org/W6725923168","https://openalex.org/W6745560452","https://openalex.org/W6752378368","https://openalex.org/W6755312952","https://openalex.org/W6765779288","https://openalex.org/W6785580544","https://openalex.org/W6853010469"],"related_works":["https://openalex.org/W2168552221","https://openalex.org/W2523169838","https://openalex.org/W2949594640","https://openalex.org/W1656731780","https://openalex.org/W3161956247","https://openalex.org/W3029735976","https://openalex.org/W1524653655","https://openalex.org/W2141664386","https://openalex.org/W2131212920","https://openalex.org/W2001339186"],"abstract_inverted_index":{"Due":[0],"to":[1,109,208],"the":[2,19,59,70,110,125,128,135,173,177,181,198,206,214,218,221,225,248,257],"powerful":[3],"feature":[4],"extraction":[5],"capabilities":[6],"of":[7,47,62,72,120,130,153,176,252],"deep":[8,12,48,63,144,261],"neural":[9],"networks":[10],"(DNNs),":[11],"image":[13,23,49,64,145,179],"hashing":[14,50,65,77,146,262],"has":[15],"extensive":[16],"applications":[17],"in":[18],"fields":[20],"such":[21],"as":[22,43],"authentication,":[24],"copy":[25],"detection":[26],"and":[27,75,112,165,180,200,256],"content":[28],"retrieval,":[29],"making":[30],"its":[31],"security":[32,38],"a":[33,44,84,157,161,166,187],"critical":[34],"concern.":[35],"Among":[36],"various":[37,143,192],"metrics,":[39],"collision":[40,54,87,118,138,215,254],"resistance":[41],"serves":[42],"crucial":[45],"indicator":[46],"methods.":[51,78,147,263],"Research":[52],"on":[53,99],"attacks":[55],"not":[56],"only":[57],"reveals":[58],"potential":[60],"vulnerabilities":[61],"but":[66],"also":[67],"can":[68,113,238],"promote":[69],"development":[71],"more":[73],"robust":[74],"secure":[76],"In":[79],"this":[80,133,203],"paper,":[81],"we":[82],"propose":[83],"novel":[85],"generative":[86,137],"attack":[88,96,139,150,255],"scheme,":[89],"which":[90],"achieves":[91],"several":[92],"advantages":[93],"over":[94],"existing":[95],"schemes":[97],"based":[98],"adversarial":[100],"examples.":[101],"Our":[102],"scheme":[103,140,237],"requires":[104],"no":[105],"additional":[106],"perturbations":[107],"added":[108],"image,":[111],"simultaneously":[114],"generate":[115,210,240],"multiple":[116,241],"hash":[117,174,193,253],"images":[119,211,227,243],"different":[121],"classes":[122],"specified":[123],"by":[124],"attacker.":[126],"To":[127],"best":[129],"our":[131,149,236],"knowledge,":[132],"is":[134],"first":[136],"effective":[141],"across":[142,259],"Specifically,":[148],"framework":[151],"consists":[152],"three":[154],"parts,":[155],"i.e.,":[156],"Hash-to-Noise":[158],"Network":[159],"(HTNN),":[160],"pretrained":[162],"BigGAN":[163],"generator":[164,207],"conditional":[167],"discriminator.":[168],"The":[169],"designed":[170],"HTNN":[171],"embeds":[172],"code":[175],"target":[178,201],"attacker-specified":[182,245],"generation":[183],"class":[184],"information":[185],"into":[186],"\u201cnoise\u201d":[188,204],"vector.":[189],"By":[190],"optimizing":[191],"distance":[194],"loss":[195],"functions":[196],"between":[197],"generated":[199,226],"images,":[202],"guides":[205],"directly":[209],"that":[212,224,235],"meet":[213],"requirement.":[216],"At":[217],"same":[219],"time,":[220],"discriminator":[222],"ensures":[223],"are":[228],"visually":[229],"realistic.":[230],"Extensive":[231],"experimental":[232],"results":[233],"verify":[234],"effectively":[239],"high-quality":[242],"with":[244],"classes,":[246],"achieving":[247],"high":[249],"success":[250],"rate":[251],"applicability":[258],"state-of-the-art":[260]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-28T23:10:05.387466","created_date":"2025-10-10T00:00:00"}
