Hashing Algorithm

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 7503 Experts worldwide ranked by ideXlab platform

Xiamu Niu - One of the best experts on this subject based on the ideXlab platform.

  • dwt based robust image Hashing Algorithm
    International Conference on Networked Computing, 2010
    Co-Authors: Xiamu Niu
    Abstract:

    JPEG 2000 is a wavelet-based image compression standard and coding system. It will supersede the original JPEG standard in the future. Compared with Counterlet transform or Gabor filter, wavelet transform used in JPEG 2000 is less effective to extract robust edge features. In this paper, a novel discrete wavelet transform (DWT) based image Hashing Algorithm is proposed. Robust bits of HL, LH and HH sub-band in the same middle-frequency scale are extracted first. Then, they are fused to generate the hash. Experimental results show that the proposed Algorithm is highly robust to content preserving operations as well as having an excellent performance on tampering localization. In addition, since robust features are extracted in the same scale, the generation of hash is only needed to decode JPEG 2000 image code stream partially.

  • a novel image hash Algorithm resistant to print scan
    Signal Processing, 2009
    Co-Authors: Xuebing Zhou, Xiamu Niu
    Abstract:

    With the rapid development of multimedia technology, how to establish the integrity of images has become an unavoidable problem. The transform between a digital image and its hard-copy makes the problem more complex. To simplify the content based authentication, we propose a print-scan resistant image Hashing Algorithm based on the Radon and wavelet transform. The Radon transforms an image to its luminance distribution, before the wavelet extracts the relationship of the different areas from the luminance distribution. Experimental results show that our Algorithm is not only robust to print-scan and other common content-preserving processing, but also discriminable to content changes.

  • a cyclic coding based perceptual Hashing Algorithm
    Intelligent Systems Design and Applications, 2008
    Co-Authors: Hui Zhang, Yanan Wang, Xiamu Niu
    Abstract:

    An arbitrarily rotated image should not be recognized as a different one, but the conventional image perceptual Hashing Algorithms can only deal with this partially. Different to watermarking, image perceptual Hashing does not need to embed information into the image content, this make it possible that perceptual Hashing can treat the synchronization problem in a new manner. In this paper, three cyclic coding based perceptual Hashing methods are proposed, and the performance under rotation is tested as well as other common attacks. Meanwhile, by dividing the image signal into three perceptual channels, we discuss which one is better for coding with in spatial domain.

Alan L. Tharp - One of the best experts on this subject based on the ideXlab platform.

  • gray code chaining a high performance Hashing Algorithm for limited storage applications
    International Journal of High Performance Systems Architecture, 2008
    Co-Authors: Mark Loeb, Alan L. Tharp
    Abstract:

    Hardware continues to evolve which implies that software and the data structures contained therein must also. Motes, Radio Frequency Identification (RFIDs) and embedded systems are examples of hardware which require updated software and storage structures because of limited amounts of storage. Even though processor speeds have increased significantly recently, access times for external storage have lagged. This paper introduces Gray Code Chaining (GCC), a Hashing scheme which provides the best retrieval performance to date when storage is limited. In fact, the performance approaches the theoretical limit but uses only 40% of the storage otherwise needed for the link fields. Unlike other methods, its retrieval performance actually improves as the file size increases. The method is also easier to implement than previous chaining methods.

  • gray code chaining a high performance Hashing Algorithm for limited storage applications
    International Conference on Information Technology, 2007
    Co-Authors: Mark Loeb, Alan L. Tharp
    Abstract:

    Hardware continues to evolve which implies that software and the data structures contained therein must also. Motes, RFIDs, and embedded system s are examples of hardware which require updated software and storage structures because of limited amounts of storage. Even though processor speeds have increased significantly recently, access times for external storage have lagged. This paper introduces gray code chaining, a Hashing scheme which provides the best retrieval performance to date when storage is limited. In fact, the performance approaches the theoretical limit but uses only 40% of the storage otherwise needed for the link fields. Unlike other methods, its retrieval performance actually improves as the file size increases. The method is also easier to implement than previous chaining methods

  • Tridirectional computed chaining: an efficient Hashing Algorithm for limited space applications
    29th Annual International Computer Software and Applications Conference (COMPSAC'05), 2005
    Co-Authors: Mark Loeb, Alan L. Tharp
    Abstract:

    Hardware innovations such as motes, RFIDs, embedded microprocessors, and wireless sensors, have provided the foundation for a plethora of new applications for business, government, industry, and individuals. These applications include connected cities, smart homes and appliances, improved security and surveillance, smart vehicles, business integration, and e-commerce. Rarely does a user complain about a software system being too fast. Even though processor speeds have increased significantly, access times for external storage have lagged, causing performance bottlenecks. This paper presents a new Hashing scheme, tridirectional computed chaining, which is especially relevant for applications in which space may be limited but fast access is important. The performance enhancements result primarily from using a pseudolink field with three-way branching rather than one allowing only a linear chain.

Giard Pascal - One of the best experts on this subject based on the ideXlab platform.

  • A Standalone FPGA-Based Miner for Lyra2REv2 Cryptocurrencies
    'Institute of Electrical and Electronics Engineers (IEEE)', 2020
    Co-Authors: Tetu Jean-francois, Trudeau Louis-charles, Van Beirendonck Michiel, Balatsoukas-stimming Alexios, Giard Pascal
    Abstract:

    Lyra2REv2 is a Hashing Algorithm that consists of a chain of individual Hashing Algorithms, and it is used as a proof-of-work function in several cryptocurrencies. The most crucial and exotic Hashing Algorithm in the Lyra2REv2 chain is a specific instance of the general Lyra2 Algorithm. This work presents the first hardware implementation of the specific instance of Lyra2 that is used in Lyra2REv2. Several properties of the aforementioned Algorithm are exploited in order to optimize the design. In addition, an FPGA-based hardware implementation of a standalone miner for Lyra2REv2 on a Xilinx Multi-Processor System on Chip is presented. The proposed Lyra2REv2 miner is shown to be significantly more energy efficient than both a GPU and a commercially available FPGA-based miner. Finally, we also explain how the simplified Lyra2 and Lyra2REv2 architectures can be modified with minimal effort to also support the recent Lyra2REv3 chained Hashing Algorithm

  • A Standalone FPGA-Based Miner for Lyra2REv2 Cryptocurrencies
    'Institute of Electrical and Electronics Engineers (IEEE)', 2020
    Co-Authors: Tetu, Jean Francois, Van Beirendonck Michiel, Balatsoukas-stimming Alexios, Trudeau, Louis Charles, Giard Pascal
    Abstract:

    \u3cp\u3eLyra2REv2 is a Hashing Algorithm that consists of a chain of individual Hashing Algorithms, and it is used as a proof-of-work function in several cryptocurrencies. The most crucial and exotic Hashing Algorithm in the Lyra2REv2 chain is a specific instance of the general Lyra2 Algorithm. This work presents the first hardware implementation of the specific instance of Lyra2 that is used in Lyra2REv2. Several properties of the aforementioned Algorithm are exploited in order to optimize the design. In addition, an FPGA-based hardware implementation of a standalone miner for Lyra2REv2 on a Xilinx Multi-Processor System on Chip is presented. The proposed Lyra2REv2 miner is shown to be significantly more energy efficient than both a GPU and a commercially available FPGA-based miner. Finally, we also explain how the simplified Lyra2 and Lyra2REv2 architectures can be modified with minimal effort to also support the recent Lyra2REv3 chained Hashing Algorithm.\u3c/p\u3

  • A Standalone FPGA-based Miner for Lyra2REv2 Cryptocurrencies
    2020
    Co-Authors: Tetu Jean-francois, Trudeau Louis-charles, Van Beirendonck Michiel, Balatsoukas-stimming Alexios, Giard Pascal
    Abstract:

    Lyra2REv2 is a Hashing Algorithm that consists of a chain of individual Hashing Algorithms, and it is used as a proof-of-work function in several cryptocurrencies. The most crucial and exotic Hashing Algorithm in the Lyra2REv2 chain is a specific instance of the general Lyra2 Algorithm. This work presents the first hardware implementation of the specific instance of Lyra2 that is used in Lyra2REv2. Several properties of the aforementioned Algorithm are exploited in order to optimize the design. In addition, an FPGA-based hardware implementation of a standalone miner for Lyra2REv2 on a Xilinx Multi-Processor System on Chip is presented. The proposed Lyra2REv2 miner is shown to be significantly more energy efficient than both a GPU and a commercially available FPGA-based miner. Finally, we also explain how the simplified Lyra2 and Lyra2REv2 architectures can be modified with minimal effort to also support the recent Lyra2REv3 chained Hashing Algorithm.Comment: 13 pages, accepted for publication in IEEE Trans. Circuits Syst. I. arXiv admin note: substantial text overlap with arXiv:1807.0576

  • A Lyra2 FPGA Core for Lyra2REv2-Based Cryptocurrencies
    'Institute of Electrical and Electronics Engineers (IEEE)', 2019
    Co-Authors: Van Beirendonck Michiel, Trudeau Louis-charles, Giard Pascal, Balatsoukas-stimming Alexios
    Abstract:

    Lyra2REv2 is a Hashing Algorithm that consists of a chain of individual Hashing Algorithms and it is used as a proof-of-work function in several cryptocurrencies that aim to be ASIC-resistant. The most crucial Hashing Algorithm in the Lyra2REv2 chain is a specific instance of the general Lyra2 Algorithm. In this work we present the first FPGA implementation of the aforementioned instance of Lyra2 and we explain how several properties of the Algorithm can be exploited in order to optimize the design

  • A Lyra2 FPGA Core for Lyra2REv2-Based Cryptocurrencies
    'Institute of Electrical and Electronics Engineers (IEEE)', 2019
    Co-Authors: Van Beirendonck Michiel, Trudeau Louis-charles, Giard Pascal, Balatsoukas-stimming Alexios
    Abstract:

    Lyra2REv2 is a Hashing Algorithm that consists of a chain of individual Hashing Algorithms and it is used as a proof-of-work function in several cryptocurrencies that aim to be ASIC-resistant. The most crucial Hashing Algorithm in the Lyra2REv2 chain is a specific instance of the general Lyra2 Algorithm. In this work we present the first FPGA implementation of the aforementioned instance of Lyra2 and we explain how several properties of the Algorithm can be exploited in order to optimize the design.Comment: 5 pages, to be presented at the IEEE International Symposium on Circuits and Systems (ISCAS) 201

Shinichi Satoh - One of the best experts on this subject based on the ideXlab platform.

  • commercial mining basedon temporal recurrence Hashing Algorithm and bag of fingerprints model
    International Conference on Image Processing, 2011
    Co-Authors: Shinichi Satoh
    Abstract:

    We propose two novel Algorithms for fully-unsupervised, super-fast, and cross-channel TV commercial mining in this paper. The tasks involved in the process include: 1) mining commercial clusters from streams of individual channels, and 2) grouping identical commercial clusters across multiple channels. The first process is achieved with a dual-stage Hashing Algorithm, which searches for recurring short segments by Hashing frames, and it assembles these short segments into sets of commercial sequences by Hashing temporal recurrences. The Algorithm mined commercials from a one-month stream in less than 42 minutes, which was ten times faster than that in related studies. A new bag-of-fingerprints model is proposed for the second process to encode the temporal clues of local fingerprints. The model is abundantly robust against framing and fingerprinting errors in recurring sequences, and discovers false matches of local fingerprints. A five-month database was used for comprehensively demonstrating the effectiveness and efficiency of the model.

  • temporal recurrence Hashing Algorithm for mining commercials from multimedia streams
    International Conference on Acoustics Speech and Signal Processing, 2011
    Co-Authors: Shinichi Satoh
    Abstract:

    We propose a dual-stage Algorithm for fully-unsupervised and super-fast TV commercial mining in this paper. The two stages involved in process include: 1) searching for recurring short segments, and 2) assembling these short segments into sets of long and complete commercial sequences. The first stage is achieved by frame Hashing. Different from the related studies that depend on brute-force pairwise matching, we propose applying a second-stage Hashing Algorithm for the recurring segment assemblage, which is the key idea in this paper. A large-scale archive containing a 10-hour and a 1-month stream was used for the experimentation. The Algorithm mined commercials from the 1-month stream in less than 50 minutes, which was ten times faster than that of related studies, with a 98.05% sequence-level and 97.39% frame-level accuracy. We demonstrate the performance consistency of the Algorithm on both audio and video streams, and investigate the computational cost from both the theoretical and experimental viewpoints.

  • commercial film detection and identification based on a dual stage temporal recurrence Hashing Algorithm
    Proceedings of the international workshop on Very-large-scale multimedia corpus mining and retrieval, 2010
    Co-Authors: Narongsak Putpuek, Shinichi Satoh
    Abstract:

    This paper proposes a dual-stage temporal recurrence Hashing Algorithm for fully unsupervised and super-fast Commercial Film (CF) mining in large-scale broadcast video archives. The first-stage Hashing Algorithm converts a large amount of video segments into a set of temporal occurrence patterns on the basis of a luminance-based fingerprinting strategy. During the second stage, each temporal recurrence of a certain segment is mapped to an inverted index to build a recurrence Hashing histogram, which is the key idea in this paper to achieve super-fast CF detection and identification. The detection and identification task is then converted into one of detecting local maximums from this Hashing histogram, with one local maximum corresponding to one pair of two identical CF segments. A large-scale archive, containing a 10-hour and a 1-month sequence, was used for experimentation. Our Algorithm performed CF detection and identification on the 1-month sequence in merely 87 minutes and had 90.59% detection accuracy and 98.06% localization accuracy.

Balatsoukas-stimming Alexios - One of the best experts on this subject based on the ideXlab platform.

  • A Standalone FPGA-Based Miner for Lyra2REv2 Cryptocurrencies
    'Institute of Electrical and Electronics Engineers (IEEE)', 2020
    Co-Authors: Tetu Jean-francois, Trudeau Louis-charles, Van Beirendonck Michiel, Balatsoukas-stimming Alexios, Giard Pascal
    Abstract:

    Lyra2REv2 is a Hashing Algorithm that consists of a chain of individual Hashing Algorithms, and it is used as a proof-of-work function in several cryptocurrencies. The most crucial and exotic Hashing Algorithm in the Lyra2REv2 chain is a specific instance of the general Lyra2 Algorithm. This work presents the first hardware implementation of the specific instance of Lyra2 that is used in Lyra2REv2. Several properties of the aforementioned Algorithm are exploited in order to optimize the design. In addition, an FPGA-based hardware implementation of a standalone miner for Lyra2REv2 on a Xilinx Multi-Processor System on Chip is presented. The proposed Lyra2REv2 miner is shown to be significantly more energy efficient than both a GPU and a commercially available FPGA-based miner. Finally, we also explain how the simplified Lyra2 and Lyra2REv2 architectures can be modified with minimal effort to also support the recent Lyra2REv3 chained Hashing Algorithm

  • A Standalone FPGA-Based Miner for Lyra2REv2 Cryptocurrencies
    'Institute of Electrical and Electronics Engineers (IEEE)', 2020
    Co-Authors: Tetu, Jean Francois, Van Beirendonck Michiel, Balatsoukas-stimming Alexios, Trudeau, Louis Charles, Giard Pascal
    Abstract:

    \u3cp\u3eLyra2REv2 is a Hashing Algorithm that consists of a chain of individual Hashing Algorithms, and it is used as a proof-of-work function in several cryptocurrencies. The most crucial and exotic Hashing Algorithm in the Lyra2REv2 chain is a specific instance of the general Lyra2 Algorithm. This work presents the first hardware implementation of the specific instance of Lyra2 that is used in Lyra2REv2. Several properties of the aforementioned Algorithm are exploited in order to optimize the design. In addition, an FPGA-based hardware implementation of a standalone miner for Lyra2REv2 on a Xilinx Multi-Processor System on Chip is presented. The proposed Lyra2REv2 miner is shown to be significantly more energy efficient than both a GPU and a commercially available FPGA-based miner. Finally, we also explain how the simplified Lyra2 and Lyra2REv2 architectures can be modified with minimal effort to also support the recent Lyra2REv3 chained Hashing Algorithm.\u3c/p\u3

  • A Standalone FPGA-based Miner for Lyra2REv2 Cryptocurrencies
    2020
    Co-Authors: Tetu Jean-francois, Trudeau Louis-charles, Van Beirendonck Michiel, Balatsoukas-stimming Alexios, Giard Pascal
    Abstract:

    Lyra2REv2 is a Hashing Algorithm that consists of a chain of individual Hashing Algorithms, and it is used as a proof-of-work function in several cryptocurrencies. The most crucial and exotic Hashing Algorithm in the Lyra2REv2 chain is a specific instance of the general Lyra2 Algorithm. This work presents the first hardware implementation of the specific instance of Lyra2 that is used in Lyra2REv2. Several properties of the aforementioned Algorithm are exploited in order to optimize the design. In addition, an FPGA-based hardware implementation of a standalone miner for Lyra2REv2 on a Xilinx Multi-Processor System on Chip is presented. The proposed Lyra2REv2 miner is shown to be significantly more energy efficient than both a GPU and a commercially available FPGA-based miner. Finally, we also explain how the simplified Lyra2 and Lyra2REv2 architectures can be modified with minimal effort to also support the recent Lyra2REv3 chained Hashing Algorithm.Comment: 13 pages, accepted for publication in IEEE Trans. Circuits Syst. I. arXiv admin note: substantial text overlap with arXiv:1807.0576

  • A Lyra2 FPGA Core for Lyra2REv2-Based Cryptocurrencies
    'Institute of Electrical and Electronics Engineers (IEEE)', 2019
    Co-Authors: Van Beirendonck Michiel, Trudeau Louis-charles, Giard Pascal, Balatsoukas-stimming Alexios
    Abstract:

    Lyra2REv2 is a Hashing Algorithm that consists of a chain of individual Hashing Algorithms and it is used as a proof-of-work function in several cryptocurrencies that aim to be ASIC-resistant. The most crucial Hashing Algorithm in the Lyra2REv2 chain is a specific instance of the general Lyra2 Algorithm. In this work we present the first FPGA implementation of the aforementioned instance of Lyra2 and we explain how several properties of the Algorithm can be exploited in order to optimize the design

  • A Lyra2 FPGA Core for Lyra2REv2-Based Cryptocurrencies
    'Institute of Electrical and Electronics Engineers (IEEE)', 2019
    Co-Authors: Van Beirendonck Michiel, Trudeau Louis-charles, Giard Pascal, Balatsoukas-stimming Alexios
    Abstract:

    Lyra2REv2 is a Hashing Algorithm that consists of a chain of individual Hashing Algorithms and it is used as a proof-of-work function in several cryptocurrencies that aim to be ASIC-resistant. The most crucial Hashing Algorithm in the Lyra2REv2 chain is a specific instance of the general Lyra2 Algorithm. In this work we present the first FPGA implementation of the aforementioned instance of Lyra2 and we explain how several properties of the Algorithm can be exploited in order to optimize the design.Comment: 5 pages, to be presented at the IEEE International Symposium on Circuits and Systems (ISCAS) 201