{"title":"PhotoDNA的分析","authors":"M. Steinebach","doi":"10.1145/3600160.3605048","DOIUrl":null,"url":null,"abstract":"PhotoDNA is a popular hash used to combat CSAM. So far, only limited information has been provided about this hash in terms of its performance. In this paper, we provide an overview of robustness and false positives, as well as some basic observations about its structure. We show that it is robust against typical image processing such as lossy compression. On the other hand, it is only of limited robustness against cropping. We also give some suggestions for improving the algorithm or its use.","PeriodicalId":107145,"journal":{"name":"Proceedings of the 18th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2023-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An Analysis of PhotoDNA\",\"authors\":\"M. Steinebach\",\"doi\":\"10.1145/3600160.3605048\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"PhotoDNA is a popular hash used to combat CSAM. So far, only limited information has been provided about this hash in terms of its performance. In this paper, we provide an overview of robustness and false positives, as well as some basic observations about its structure. We show that it is robust against typical image processing such as lossy compression. On the other hand, it is only of limited robustness against cropping. We also give some suggestions for improving the algorithm or its use.\",\"PeriodicalId\":107145,\"journal\":{\"name\":\"Proceedings of the 18th International Conference on Availability, Reliability and Security\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-08-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 18th International Conference on Availability, Reliability and Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3600160.3605048\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 18th International Conference on Availability, Reliability and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3600160.3605048","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
PhotoDNA is a popular hash used to combat CSAM. So far, only limited information has been provided about this hash in terms of its performance. In this paper, we provide an overview of robustness and false positives, as well as some basic observations about its structure. We show that it is robust against typical image processing such as lossy compression. On the other hand, it is only of limited robustness against cropping. We also give some suggestions for improving the algorithm or its use.