Improving search time for contentment based image retrieval via, LSH, MTRee, and EMD bounds
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 13, Issue 3
Abstract
Comparison of images requires a distance metric that is sensitive to the spatial location of objects and features. The Earth Mover’s Distance was introduced in Computer Vision to better approach human perceptual similarities. Its computation, however, is too complex for usage in interactive multimedia database scenarios. Nearest neighbor (NN) search in high dimensional space is an important problem in many applications, in particular if the method of similarity measure used be the EMD. Ideally, a practical solution (i) should be implementable in a relational database, and (ii) its query cost should grow sub-linearly with the dataset size, regardless of the data and query distributions. Despite the bulk of NN literature, no solution fulfills both requirements, except locality sensitive hashing (LSH). In this paper, we propose a new index structure, named LSH-LUBMTree, for efficient retrieval of multimedia objects. It combines the advantages of LSH [27,28], the technique used to embedding [33] the EMD, and the advantages, of LUBMTree [19]. Unlike the images of each bucket are stored in the LUBMTree
Authors and Affiliations
Bahri abdelkhalak
Finding New Trends in Public Twitter Streams using Link Anomaly Detection
Abstract: Social Network is a site where individual’s vocation and share data identified with the present occasions everywhere throughout the world. This specific conduct of users made us concentrate on this rationale th...
Image Steganography Based On Hill Cipher with Key Hiding Technique
In today’s digital world invisible ink and paper have been replaced by much more versatile and practical covers for hiding messages – digital documents, images, video, and audio files. As long as an electronic...
Cloud Based Global Pharma Solutions
Abstract: Cloud Technology consists of Software-As-A-Service (SAAS) model, which gives many users the freedom to use the single application in which the application will be hosted centrally for the customers. In Current...
A Secure Data Transmission by Embedding Marked Encrypted Image on Cloak Image
Abstract: A mobile WSN is considered as a collection of wireless mobile nodes and a base station forming an ad-hoc network. This type of network is used in various areas; such as underwater and underground. Each no...
Security in a Virtualised Computing
Do the security challenges posed by virtualisation make it a non-starter for your sensitive business applications? There is much debate about cloud computing, which promises to deliver utility-based virtual com...