Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








19,356 Hits in 6.7 sec

An Evaluation Approach for Image Copy Detection Based on Verification of Scale invariant Feature Transform (SIFT) Matches

Sushma B, Nagaveni.B Biradar
2018 IJARCCE  
The So-called image copy detection based on an image and pasting in another location of the same image is common way to manipulate the image content and difficult to detect illegal copies of copyrighted  ...  To address this problem Scale-Invarient Feature Transform (SIFT) matches between the images where the technique used is mainly based on BOW Quantization where global context regions is done to filter false  ...  CONCLUSION In this paper we present efficient and efficiency global context verification scheme for image copy detection using SIFT feature Descriptor .  ... 
doi:10.17148/ijarcce.2018.71206 fatcat:xeczz33ejzfd3k3rsjimuckofu

Large scale image search with geometric coding

Wengang Zhou, Houqiang Li, Yijuan Lu, Qi Tian
2011 Proceedings of the 19th ACM international conference on Multimedia - MM '11  
To fully explore geometric context of all visual words in images, efficient global geometric verification methods are demanded.  ...  Our approach is not only computationally efficient, but also can effectively detect duplicate images with rotation, scale changes, occlusion, and background clutter with low computational cost.  ...  Our approach can efficiently and effectively address images with free rotation changes.  ... 
doi:10.1145/2072298.2072012 dblp:conf/mm/ZhouLLT11 fatcat:fwau3pjitng2zmih7qqgdawgve

Evaluation of GIST descriptors for web-scale image search

Matthijs Douze, Hervé Jégou, Harsimrat Sandhawalia, Laurent Amsaleg, Cordelia Schmid
2009 Proceeding of the ACM International Conference on Image and Video Retrieval - CIVR '09  
copy detection.  ...  In this paper we evaluate the search accuracy and complexity of the global GIST descriptor for two applications, for which a local description is usually preferred: same location/object recognition and  ...  Acknowledgments We would like to thank Rob Fergus, Antonio Torralba and William Freeman for kindly providing the entire tiny image dataset of 80 million images.  ... 
doi:10.1145/1646396.1646421 dblp:conf/civr/DouzeJSAS09 fatcat:g5mt7zs7pzabdkrsvp767qof74

Visual Mis/disinformation in Journalism and Public Communications: Current Verification Practices, Challenges, and Future Opportunities

T.J. Thomson, Dan Angus, Paula Dootson, Edward Hurcombe, Adam Smith
2020 figshare.com  
With the goal of equipping journalists with the mechanisms, skills, and knowledge to be effective gatekeepers and stewards of the public trust, this study reviews current journalistic image verification  ...  practices, examines a number of existing and emerging image verification technologies that could be deployed or adapted to aid in this endeavour, and identifies the strengths and limitations of the most  ...  effectiveness on copy- moves or splices with identical noise -Limited effectiveness in JPEG- compressed images -Vulnerable to attacks that add global noise Convolutional neural networks Copy-move  ... 
doi:10.6084/m9.figshare.13120214.v1 fatcat:orgmdsd3sbhlhh27oo6rs4vev4

Study on the Features of Clinical Imaging Diagnosis of Arteriosclerotic Encephalopathy

Wenbo Tang, Xiaoying Du, Wei Wang, Erbo Shan, Zhonglin Nie, Chaowen Yu, Yong Gao, Osamah Ibrahim Khalaf
2022 Computational and Mathematical Methods in Medicine  
model and global context verification.  ...  Moreover, this paper proposes a clinical imaging copy detection algorithm that combines the BOW model and spatial context embedding and a clinical imaging copy detection algorithm that combines the BOW  ...  Image Feature Extraction of Clinical Images This paper proposes a reliable and efficient global context verification mode for feature extraction of clinical images.  ... 
doi:10.1155/2022/3802560 pmid:35572835 pmcid:PMC9095381 fatcat:iibe6igbbzdc7dlfpksnow6xay

Image Hashing Through Spatio-triad Relationship

Sowmya K. N., Department of ISE, JSS Academy of Technical Education, Bangalore, Karnataka, India, H. R. Chennamma
2022 International Journal of Computer Network and Information Security  
Content based image signature obtained is used to verify authenticity of image and for retrieval of video from database.  ...  and have found satisfactory results for the same.  ...  Acknowledgement We wish to thank JSS Mahavidyapeetha for their constant support and encouragement in our work.  ... 
doi:10.5815/ijcnis.2022.05.05 fatcat:4nbq3gcrt5djfetloda75leeja

The 2021 Image Similarity Dataset and Challenge [article]

Matthijs Douze and Giorgos Tolias and Ed Pizzi and Zoë Papakipos and Lowik Chanussot and Filip Radenovic and Tomas Jenicek and Maxim Maximov and Laura Leal-Taixé and Ismail Elezi and Ondřej Chum and Cristian Canton Ferrer
2022 arXiv   pre-print
We expect the DISC21 benchmark to promote image copy detection as an important and challenging computer vision task and refresh the state of the art.  ...  This paper introduces a new benchmark for large-scale image similarity detection. This benchmark is used for the Image Similarity Challenge at NeurIPS'21 (ISC2021).  ...  Such approach is less effective for detecting partial copies.  ... 
arXiv:2106.09672v4 fatcat:cqeu7wkmp5djtac453t5ao5ix4

Non-Overlapping Block-based Parametric Forgery Detection Model

Kusam Sharma, Pawanesh Abrol
2016 International Journal of Computer Applications  
The results obtained can be used as the initial verification of the images for forgery and to enhance the forgery detection process by identifying most likely cases of possible image forgeries.  ...  The proposed model is tested with large domain of images having different dimensions and for detecting forgery within an image.  ...  A novel image hashing method used for image forgery detection which employs both the local and global features of an image is given by Sundaram et al.  ... 
doi:10.5120/ijca2016907773 fatcat:2eveejtnxvdzjmdlparfrndoma

Binary SIFT

Wengang Zhou, Houqiang Li, Meng Wang, Yijuan Lu, Qi Tian
2012 Proceedings of the 4th International Conference on Internet Multimedia Computing and Service - ICIMCS '12  
With our binary SIFT, most false positive matches can be effectively and efficiently identified and removed, which greatly improves the accuracy of large-scale image search.  ...  We evaluate the proposed approach by conducting partialduplicate image search on a one-million image database. The experimental results demonstrate the effectiveness and efficiency of our scheme.  ...  Lu by Research Enhancement Program (REP), start-up funding from the Texas State University and DoD HBCU/MI grant W911NF-12-1-0057, and in part to Dr.  ... 
doi:10.1145/2382336.2382338 dblp:conf/icimcs/ZhouLWLT12 fatcat:4aolapxt2zcqjmmzaopluictey

OC-0455: Development of activity pencil beam algorithm using nuclear reaction for innovative proton therapy

A. Nishio-Miyatake, T.N. Teiji Nishio
2016 Radiotherapy and Oncology  
To use this radiotherapy efficiently in a clinical context, it is necessary to evaluate the clinical proton-irradiated volume accurately.  ...  The 5-year rates of overall survival (OS) were 20.5% and 62.9% for the patients with post-RT viral load ³ and < 100 copies/mL (HR, 0.22; 95% CI, 0.12 to 0.38; P<0.0001).  ... 
doi:10.1016/s0167-8140(16)31704-2 fatcat:blhi63fi2vewnp7ckdszywoz7e

VIREO/DVMM at TRECVID 2009: High-Level Feature Extraction, Automatic Video Search, and Content-Based Copy Detection

Chong-Wah Ngo, Yu-Gang Jiang, Xiao-Yong Wei, Wanlei Zhao, Yang Liu, Shiai Zhu, Jun Wang, Shih-Fu Chang
2009 TREC Video Retrieval Evaluation  
This paper presents overview and comparative analysis of our systems designed for 3 TRECVID 2009 tasks: high-level feature extraction, automatic search, and content-based copy detection.  ...  ) while also considers the domain-shift-of-context to improve concept detection accuracy.  ...  Acknowledgment The work described in this paper was fully supported by two grants from the Research Grants Council of the Hong Kong Special Administrative Region, China (CityU 119508 and CityU 119709).  ... 
dblp:conf/trecvid/NgoJWZLZWC09 fatcat:2xcs2usjszh6zjdkiilqronbm4

Evolution of a Web-Scale Near Duplicate Image Detection System

Andrey Gusev, Jiajing Xu
2020 Proceedings of The Web Conference 2020  
In this paper, we present an efficient system for detecting near duplicate images across 8 billion images.  ...  Detecting near duplicate images is fundamental to the content ecosystem of photo sharing web applications.  ...  Jacob Hanger for their help throughout the work.  ... 
doi:10.1145/3366423.3380031 dblp:conf/www/GusevX20 fatcat:d577bgtggbganfq2ftalrlq3uq

Verification techniques for cache coherence protocols

Fong Pong, Michel Dubois
1997 ACM Computing Surveys  
We compare the efficiency and discuss the limitations of each technique in terms of memory and computation time.  ...  In this article we present a comprehensive survey of various approaches for the verification of cache coherence protocols based on state enumeration, (symbolic) model checking, and symbolic state models  ...  Nevertheless, a state enumeration approach applied to a small model is capable of detecting a large number of errors and is very effective as a debugging tool.  ... 
doi:10.1145/248621.248624 fatcat:neylws7pgfe2jlwxuezr5unigm

Formal automatic verification of cache coherence in multiprocessors with relaxed memory models

Fong Pong, M. Dubois
2000 IEEE Transactions on Parallel and Distributed Systems  
First, we demonstrate how to model and verify cache coherence under a relaxed memory model in the context of state-based verification methods.  ...  Moreover, because caches can hold inconsistent copies of the same data for long periods of time, coherence cannot be verified by simply checking that cached copies are identical at all times.  ...  Verification based on M r is at least as accurate as verification runs based on M for the detection of data inconsistencies.  ... 
doi:10.1109/71.879780 fatcat:n5hdt5qxczaxjleqn5j4qc44n4

A Self-Supervised Descriptor for Image Copy Detection [article]

Ed Pizzi, Sreya Dutta Roy, Sugosh Nagavara Ravindra, Priya Goyal, Matthijs Douze
2022 arXiv   pre-print
On the recent DISC2021 benchmark, SSCD is shown to outperform both baseline copy detection models and self-supervised architectures designed for image classification by huge margins, in all settings.  ...  Image copy detection is an important task for content moderation. We introduce SSCD, a model that builds on a recent self-supervised contrastive training objective.  ...  In a copy detection context, these augmentations model partial copies, where part of an image is included in a composite image.  ... 
arXiv:2202.10261v2 fatcat:p2r44nuxyzg5tc5g7wxng5wb7e
« Previous Showing results 1 — 15 out of 19,356 results