Assessing the Adversarial Security of Perceptual Hashing Algorithms