Patent attributes
In an approach to securing data using visual hashing, one or more computer processors receive a user access request for hashed image. The one or more computer processors identify one or more access request parameters for the hashed image. The one or more computer processors determine whether the user access request for the hashed image meets the one or more access request parameters. Responsive to determining that the user access request for the hashed image meets the one or more access request parameters, the one or more computer processors identify one or more user access permissions. The one or more computer processors prepare a modified image of the hashed image corresponding to the identified one or more user access permissions. The one or more computer processors send the modified image of the hashed image corresponding to the one or more user access permissions to a requesting user.