Perceptual Hashing To Compare Images Explained

Поделиться
HTML-код
  • Опубликовано: 25 окт 2024

Комментарии • 14

  • @nathanlevig7732
    @nathanlevig7732 6 дней назад +1

    Was looking for a way to create hash values easily for a photographic project and this was invaluable

  • @account-zr7nm
    @account-zr7nm 2 года назад +3

    Very good video thanks !

  • @aethrya
    @aethrya 2 года назад +2

    Nils, I am always amazed with your videos. You are one of the most lucid teachers of this topic. You are really good at taking complex ideas and explaining them in a simple, yet effective, manner.
    I've enjoyed your channel for the past couple years. It's funny because you started your channel at almost the same time I got into cryptography.
    Those of us who are really into cryptography get _obsessed_ with it. I have spent _countless_ (literally thousands) hours and several hundred sheets of graph paper developing pencil-and-paper ciphers. My room looks like John Nash!
    I really really wish I could run CT2 on a Mac. I keep thinking of ways to break my ciphers and it would be awesome to have a real life model to see how my concepts and unique cryptoprimitives hold up against computers so I can keep improving them.
    I've watched all of your videos and have learned so much in the process! Thank you!
    (Also, I sent you an email [Jesse] a few months ago regarding pencil and paper ciphers some weird time travel stuff that I am developing for an ARG [so don't take it seriously lol]. I attached a couple pictures to that email of how crazy these papers are! I swear I am not a lunatic!)

    • @CryptographyForEverybody
      @CryptographyForEverybody  2 года назад +1

      Hiho,
      Thank you for the nice words! Happy you enjoy my videos :-)
      Concerning your cipher:
      I get a lot of emails and request like "please have a look at my cipher" even to "please help me with my homework".
      Clearly, if I would do that all, I would only spend my time doing that. Also, especially with homework, I wonder why people ask someone on RUclips instead of fellow students and/or the supervisors. I just don't have the time to do that.
      Since I get so many request of the "please have a look at my cipher" type, I thought, it could be interesting to host some kind of "hand cipher challenge", where people can send in their proposals (and have to follow some rules) and me and my colleagues make a first decision which ones to present (in a video). After that, all viewers may vote which one is the best proposal (or the first best three) and then they win a book :-) -- and we could host such a competition regularly.
      I am right now planning such a competition, but it will take some time.
      You also may submit a cipher proposal, and all accepted proposals will be presented in a video ;-)
      Greetings,
      Nils

    • @aethrya
      @aethrya 2 года назад

      @@CryptographyForEverybody Nils, ha! I figured that was the case, so I understand. After I sent that long email I thought "oh man, he probably gets a lot of these!" That totally makes sense.
      I would be very interested in your cipher contest/competition, as my passion is pencil and paper ciphers and would love to see what you come up with as far as rules and a platform!
      I always look forward to your videos and appreciate all that you do for the community!

  • @mattheww440
    @mattheww440 Год назад +1

    Awesome video, you explain it very well. Thanks!

  • @aethrya
    @aethrya 2 года назад +1

    Every time I hear that "Hello, and welcome!" it makes me happy to learn about the content of the video. You're awesome Nils! Thanks for taking the time to make these videos.
    I really wish I could actually use CT2, though. Unfortunately, I use a Mac, but the online tool is fun to play with too!
    Are there any plans for a Mac version at any time? I don't know how hard it would be to port or what language you use to develop it but it would be worth it to me to even install windows on my little netbook computer alongside Linux to be able to use it :)

    • @CryptographyForEverybody
      @CryptographyForEverybody  2 года назад +1

      Hiho,
      Thank you for your kind words! Really appreciate!
      And yes, we know that people want to use CT2 with Linux and Mac. Maybe, we will spend some time (again :-)) to have a look if we can get it running on these systems... Unfortunately, last time we had a look, mono was able to start it but when you opened a template it just crashed.
      Greetings,
      Nils

    • @aethrya
      @aethrya 2 года назад +1

      @@CryptographyForEverybody I see. Thanks!

  • @kattmonstret
    @kattmonstret 2 года назад +2

    This was a real fun one, watched it twice :) I suspect one weakness to this approach could be likeness discovery in cropped images. Is there some adaption or separate construct to take care of that scenario?

    • @CryptographyForEverybody
      @CryptographyForEverybody  2 года назад +2

      Thank you :-)
      Yes, I think that is a weakness. Since the paper is from 2011, there are probably approaches that can also cope with cropped images. But I am by far no expert for these algorithms. Would be interesting to have a look at the current state-of-the-art and implement a newer approach in CrypTool 2 :-)
      Greetings,
      Nils