Wallogit.com
2017 © Pedro Peláez
MD5 and SHA1 are common hashing function, which produce a binary or hex string. A visual hash works the same, but produces an image.
MD5 and SHA1 are common hashing function, which produce a binary or hex string. A visual hash works the same, but produces an image., (*1)
Like MD5 or SHA1:, (*2)
File comparison: If you need to compare files or commit hashes, comparing visual hashes is instant (much easier than comparing md5 or sha1)., (*3)
Avatars: VizHash can be used as an avatar in forums or blog comments. Simply hash the IP (or email) address and feed into VizHash and ou have a unique icon for each visitor, specific to its IP or email address. VizHash is used is ZeroBin discussions (example)., (*4)
Protection against TabJacking: VizHash could be used - for example - as a persona in Firefox to give a visual hint of the real domain the user is currently on., (*5)
Password check : Make sure you typed the right password without displaying it on screen (à la Lotus Notes)., (*6)
VisHash GD is an implementation of a visual hash in php. It is free software, under the zlib/libpng OSI licence., (*7)
Features:, (*8)
You can test it online., (*9)
There are implementation of VizHash in other languages:, (*10)
Note that these visual hashes are close to the php implementation, but may have some differences., (*11)
VizHash GD is under the zlib/libpng licence:, (*12)
This software is provided 'as-is', without any express or implied warranty. In no event will the authors be held liable for any damages arising from the use of this software., (*13)
Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:, (*14)
1. The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation would be appreciated but is not required. 2. Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software. 3. This notice may not be removed or altered from any source distribution.