No, because the second hash is only performed after the first hash has already matched, and so, using the threshold secret sharing crypto, the server has learned the escrowed encryption key for the image. (Well, for its “visual derivative”, at any rate.)
Which means all it takes now is one disillusioned Apple employee to leak the details of thay private hash function and the whole system is compromised.
That one can’t be figured out through this technique.