{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T12:41:42Z","timestamp":1763728902871,"version":"3.41.0"},"reference-count":22,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T00:00:00Z","timestamp":1746057600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T00:00:00Z","timestamp":1746057600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T00:00:00Z","timestamp":1746057600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Secur. Privacy"],"published-print":{"date-parts":[[2025,5]]},"DOI":"10.1109\/msec.2024.3485497","type":"journal-article","created":{"date-parts":[[2024,11,21]],"date-time":"2024-11-21T19:25:08Z","timestamp":1732217108000},"page":"64-73","source":"Crossref","is-referenced-by-count":2,"title":["Perceptual Hash Inversion Attacks on Image-Based Sexual Abuse Removal Tools"],"prefix":"10.1109","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-6063-3939","authenticated-orcid":false,"given":"Sophie","family":"Hawkes","sequence":"first","affiliation":[{"name":"Cyber Security, Royal Holloway, University of London, Egham, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4906-6871","authenticated-orcid":false,"given":"Christian","family":"Weinert","sequence":"additional","affiliation":[{"name":"Information Security Group, Royal Holloway, University of London, Egham, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7393-3379","authenticated-orcid":false,"given":"Teresa","family":"Almeida","sequence":"additional","affiliation":[{"name":"Department of Informatics, Ume&#x00E5; University, Ume&#x00E5;, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4223-6885","authenticated-orcid":false,"given":"Maryam","family":"Mehrnezhad","sequence":"additional","affiliation":[{"name":"Information Security Group, Royal Holloway, University of London, Egham, U.K."}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1177\/2372732220941534"},{"article-title":"Adversarial collision attacks on image hashing functions","year":"2020","author":"Dolhansky","key":"ref2"},{"key":"ref3","first-page":"2317","article-title":"Adversarial detection avoidance attacks: Evaluating the robustness of perceptual hashing-based client-side scanning","volume-title":"Proc. USENIX Secur. Symp.","author":"Jain","year":"2022"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3531146.3533073"},{"article-title":"Exploiting and defending against the approximate linearity of apples NeuralHash","year":"2022","author":"Bhatia","key":"ref5"},{"key":"ref6","first-page":"211","article-title":"Squint hard enough: Attacking perceptual hashing with adversarial machine learning,","volume-title":"Proc. USENIX Secur. Symp.","author":"Prokos","year":"2023"},{"key":"ref7","first-page":"55","article-title":"Did they fing consent to that?: Safer digital intimacy via proactive protection against image-based sexual abuse,","volume-title":"Proc. USENIX Secur. Symp.","author":"Qin","year":"2024"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/sp46215.2023.10179310"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/sp46215.2023.10179349"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.54501\/jots.v1i1.24"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.23919\/mipro.2017.7973569"},{"article-title":"Re-purposing perceptual hashing based client side scanning for physical surveillance","year":"2022","author":"Hooda","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.632"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr52688.2022.00757"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2023.100567"},{"volume-title":"CyberTipline 2023 report.","year":"2024","key":"ref16"},{"volume-title":"Apples decision to kill its CSAM photo-scanning tool sparks fresh controversy","year":"2023","key":"ref17"},{"volume-title":"UK pulls back from clash with Big Tech over private messaging","year":"2024","key":"ref18"},{"journal-title":"Black-Box Attacks on Perceptual Image Hashes with GANs.","year":"2024","key":"ref19"},{"volume-title":"PhotoDNA and Limitations","year":"2021","key":"ref20"},{"volume-title":"Inverting PhotoDNA.","year":"2024","author":"Athalye","key":"ref21"},{"volume-title":"International law enforcement agencies issue joint warning about global financial sextortion crisis","year":"2023","key":"ref22"}],"container-title":["IEEE Security &amp; Privacy"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8013\/11038964\/10762793.pdf?arnumber=10762793","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:20:16Z","timestamp":1750224016000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10762793\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5]]},"references-count":22,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/msec.2024.3485497","relation":{},"ISSN":["1540-7993","1558-4046"],"issn-type":[{"type":"print","value":"1540-7993"},{"type":"electronic","value":"1558-4046"}],"subject":[],"published":{"date-parts":[[2025,5]]}}}