• English
  • Deutsch
  • Log In
    Password Login
    Research Outputs
    Fundings & Projects
    Researchers
    Institutes
    Statistics
Repository logo
Fraunhofer-Gesellschaft
  1. Home
  2. Fraunhofer-Gesellschaft
  3. Konferenzschrift
  4. Robust Hashing Meets Inpainting
 
  • Details
  • Full
Options
2025
Conference Paper
Title

Robust Hashing Meets Inpainting

Abstract
Robust image hashing algorithms are designed to produce similar or equal hash values for image variants despite benign transformations like resizing or compression. However, modern generative techniques like image inpainting undermine this robustness by introducing semantically meaningful content changes that are imperceptible at the pixel level. This paper demonstrates how such inpainting attacks can exploit perceptual hash functions, causing significant semantic alterations to go undetected or, conversely, generating false positives that overload detection systems. We evaluate several widely used hashing schemes including Blockhash, rHash, ISCC, and PhotoDNA and show that they struggle to detect inpainting-based manipulations while remaining overly sensitive to trivial changes like cropping. These findings reveal a critical trade-off in hash function design: the balance between robustness to benign edits and sensitivity to malicious content alteration. We discuss the implications for systems relying on hash-based content detection, such as those targeting child sexual abuse material (CSAM), and highlight the potential for denial-of-service and strike inflation attacks. Our results underscore the urgent need for semantically aware image hashing solutions capable of withstanding adversarial generative modifications.
Author(s)
Steinebach, Martin  
Fraunhofer-Institut für Sichere Informationstechnologie SIT  
Yannikos, York  
Fraunhofer-Institut für Sichere Informationstechnologie SIT  
Mainwork
Availability, Reliability and Security. ARES 2025 International Workshops. Proceedings. Part III  
Conference
International Conference on Availability, Reliability and Security 2025  
International Workshop on Cyber Use of Information Hiding 2025  
DOI
10.1007/978-3-032-00635-6_15
Language
English
Fraunhofer-Institut für Sichere Informationstechnologie SIT  
  • Cookie settings
  • Imprint
  • Privacy policy
  • Api
  • Contact
© 2024