Evaluating Perceptual Hashing Algorithms in Detecting Image Manipulation Over Social Media Platforms

2022 IEEE International Conference on Cyber Security and Resilience (CSR)(2022)

引用 3|浏览15
暂无评分
摘要
Perceptual hash is a fingerprint of features of multimedia content. Compared with crypto hash, perceptual hash shows many advantages when defending against image-based fake news attacks in terms of detecting deliberate image manipulation while still tolerating normal format or resolution changes conducted on user-uploaded images by content-hosting providers such as social media platforms. Previous research into perceptual hash has studied general image manipulation without considering legitimate image transformation by social media platforms. This paper evaluates and analyzes six state-of-the-art perceptual hash algorithms for detecting image manipulation over two major social media platforms: Facebook and Twitter. Our real-world image evaluation shows differences in the two platforms’ image processing and how the six algorithms perform in detecting image manipulation over these platforms. We also present a new approach to finding the optimal detection threshold for each perceptual hash algorithm in distinguishing the platform’s standard image processing from deliberate image manipulation.
更多
查看译文
关键词
Perceptual hashing,Computer security,Social media,Fake news,Digital forensics
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要