共 41 条
- [1] Evaluating Perceptual Hashing Algorithms in Detecting Image Manipulation Over Social Media Platforms [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2022, : 149 - 156
- [2] Apple, 2022, Csam Detection Technical Summary
- [3] Athalye A., 2021, inverting PhotoDNA
- [4] Beebe N., 2005, International Federation for Information Processing, V2005, P3, DOI DOI 10.1007/0-387-31163-7_1
- [5] Towards a Process Model for Hash Functions in Digital Forensics [J]. DIGITAL FORENSICS AND CYBER CRIME, (ICDF2C 2013), 2014, 132 : 170 - 186
- [6] FRASH: A framework to test algorithms of similarity hashing [J]. DIGITAL INVESTIGATION, 2013, 10 : S50 - S58
- [7] Buchner J., Image hash
- [8] Rethinking the Detection of Child Sexual Abuse Imagery on the Internet [J]. WEB CONFERENCE 2019: PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE (WWW 2019), 2019, : 2601 - 2607
- [10] Drmic A, 2017, 2017 40TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), P995, DOI 10.23919/MIPRO.2017.7973569