Performance Enhancement of Patch-based Descriptors for Image Copy Detection
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 3
Abstract
Images have become main sources for the informa-tion, learning, and entertainment, but due to the advancement and progress in multimedia technologies, millions of images are shared on Internet daily which can be easily duplicated and redistributed. Distribution of these duplicated and transformed images cause a lot of problems and challenges such as piracy, redundancy, and content-based image indexing and retrieval. To address these problems, copy detection system based on local features are widely used. Initially, keypoints are detected and represented by some robust descriptors. The descriptors are computed over the affine patches around the keypoints, these patches should be repeatable under photometric and geometric transformations. However, there exist two main challenges with patch based descriptors, (1) the affine patch over the keypoint can produce similar descriptors under entirely different scene or the context which causes “ambiguity”, and (2) the descriptors are not enough “distinctive” under image noise. Due to these limitations, the copy detection systems suffer in performance. We present a framework that makes descriptor more distinguishable and robust by influencing them with the texture and gradients in vicinity. The experimental evaluation on keypoints matching and image copy detection under severe transformations shows the effectiveness of the proposed framework.
Authors and Affiliations
Junaid Baber, Maheen Bakhtyar, Waheed Noor, Abdul Basit, Ihsan Ullah
Density based Clustering Algorithm for Distributed Datasets using Mutual k-Nearest Neighbors
Privacy and security have always been a concern that prevents the sharing of data and impedes the success of many projects. Distributed knowledge computing, if done correctly, plays a key role in solving such a problem....
Mobile Arabchat: An Arabic Mobile-Based Conversational Agent
The conversation automation/simulation between a user and machine evolved during the last years. A number of research-based systems known as conversational agents has been developed to address this challenge. A conversat...
Video Authentication using PLEXUS Method
Digital Video authentication is very important issue in day to day life. A lot of devices have got the ability of recording or capturing digital videos and all these videos can be passed through the internet as well as m...
Applying Floyd’s Inductive Assertions Method for Verification of Generalized Net Models Without Temporal Components
Generalized Nets are extensions of Petri Nets. They are a suitable tool for describing real sequential and parallel processes in different areas. The implementation of correct Generalized Nets models is a task of great i...
A Group Decision-Making Method for Selecting Cloud Computing Service Model
Cloud computing is a new technology that has great potential for the business world. Many business firms have implemented, are implementing, or planning to implement cloud computing technology. The cloud computing resour...