A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
An Evaluation Approach for Image Copy Detection Based on Verification of Scale invariant Feature Transform (SIFT) Matches
2018
IJARCCE
The So-called image copy detection based on an image and pasting in another location of the same image is common way to manipulate the image content and difficult to detect illegal copies of copyrighted ...
To address this problem Scale-Invarient Feature Transform (SIFT) matches between the images where the technique used is mainly based on BOW Quantization where global context regions is done to filter false ...
CONCLUSION In this paper we present efficient and efficiency global context verification scheme for image copy detection using SIFT feature Descriptor . ...
doi:10.17148/ijarcce.2018.71206
fatcat:xeczz33ejzfd3k3rsjimuckofu
Large scale image search with geometric coding
2011
Proceedings of the 19th ACM international conference on Multimedia - MM '11
To fully explore geometric context of all visual words in images, efficient global geometric verification methods are demanded. ...
Our approach is not only computationally efficient, but also can effectively detect duplicate images with rotation, scale changes, occlusion, and background clutter with low computational cost. ...
Our approach can efficiently and effectively address images with free rotation changes. ...
doi:10.1145/2072298.2072012
dblp:conf/mm/ZhouLLT11
fatcat:fwau3pjitng2zmih7qqgdawgve
Evaluation of GIST descriptors for web-scale image search
2009
Proceeding of the ACM International Conference on Image and Video Retrieval - CIVR '09
copy detection. ...
In this paper we evaluate the search accuracy and complexity of the global GIST descriptor for two applications, for which a local description is usually preferred: same location/object recognition and ...
Acknowledgments We would like to thank Rob Fergus, Antonio Torralba and William Freeman for kindly providing the entire tiny image dataset of 80 million images. ...
doi:10.1145/1646396.1646421
dblp:conf/civr/DouzeJSAS09
fatcat:g5mt7zs7pzabdkrsvp767qof74
Visual Mis/disinformation in Journalism and Public Communications: Current Verification Practices, Challenges, and Future Opportunities
2020
figshare.com
With the goal of equipping journalists with the mechanisms, skills, and knowledge to be effective gatekeepers and stewards of the public trust, this study reviews current journalistic image verification ...
practices, examines a number of existing and emerging image verification technologies that could be deployed or adapted to aid in this endeavour, and identifies the strengths and limitations of the most ...
effectiveness on copy-
moves or splices with
identical noise
-Limited effectiveness in JPEG-
compressed images
-Vulnerable to attacks that add
global noise
Convolutional
neural networks
Copy-move ...
doi:10.6084/m9.figshare.13120214.v1
fatcat:orgmdsd3sbhlhh27oo6rs4vev4
Study on the Features of Clinical Imaging Diagnosis of Arteriosclerotic Encephalopathy
2022
Computational and Mathematical Methods in Medicine
model and global context verification. ...
Moreover, this paper proposes a clinical imaging copy detection algorithm that combines the BOW model and spatial context embedding and a clinical imaging copy detection algorithm that combines the BOW ...
Image Feature Extraction of Clinical Images This paper proposes a reliable and efficient global context verification mode for feature extraction of clinical images. ...
doi:10.1155/2022/3802560
pmid:35572835
pmcid:PMC9095381
fatcat:iibe6igbbzdc7dlfpksnow6xay
Image Hashing Through Spatio-triad Relationship
2022
International Journal of Computer Network and Information Security
Content based image signature obtained is used to verify authenticity of image and for retrieval of video from database. ...
and have found satisfactory results for the same. ...
Acknowledgement We wish to thank JSS Mahavidyapeetha for their constant support and encouragement in our work. ...
doi:10.5815/ijcnis.2022.05.05
fatcat:4nbq3gcrt5djfetloda75leeja
The 2021 Image Similarity Dataset and Challenge
[article]
2022
arXiv
pre-print
We expect the DISC21 benchmark to promote image copy detection as an important and challenging computer vision task and refresh the state of the art. ...
This paper introduces a new benchmark for large-scale image similarity detection. This benchmark is used for the Image Similarity Challenge at NeurIPS'21 (ISC2021). ...
Such approach is less effective for detecting partial copies. ...
arXiv:2106.09672v4
fatcat:cqeu7wkmp5djtac453t5ao5ix4
Non-Overlapping Block-based Parametric Forgery Detection Model
2016
International Journal of Computer Applications
The results obtained can be used as the initial verification of the images for forgery and to enhance the forgery detection process by identifying most likely cases of possible image forgeries. ...
The proposed model is tested with large domain of images having different dimensions and for detecting forgery within an image. ...
A novel image hashing method used for image forgery detection which employs both the local and global features of an image is given by Sundaram et al. ...
doi:10.5120/ijca2016907773
fatcat:2eveejtnxvdzjmdlparfrndoma
Binary SIFT
2012
Proceedings of the 4th International Conference on Internet Multimedia Computing and Service - ICIMCS '12
With our binary SIFT, most false positive matches can be effectively and efficiently identified and removed, which greatly improves the accuracy of large-scale image search. ...
We evaluate the proposed approach by conducting partialduplicate image search on a one-million image database. The experimental results demonstrate the effectiveness and efficiency of our scheme. ...
Lu by Research Enhancement Program (REP), start-up funding from the Texas State University and DoD HBCU/MI grant W911NF-12-1-0057, and in part to Dr. ...
doi:10.1145/2382336.2382338
dblp:conf/icimcs/ZhouLWLT12
fatcat:4aolapxt2zcqjmmzaopluictey
OC-0455: Development of activity pencil beam algorithm using nuclear reaction for innovative proton therapy
2016
Radiotherapy and Oncology
To use this radiotherapy efficiently in a clinical context, it is necessary to evaluate the clinical proton-irradiated volume accurately. ...
The 5-year rates of overall survival (OS) were 20.5% and 62.9% for the patients with post-RT viral load ³ and < 100 copies/mL (HR, 0.22; 95% CI, 0.12 to 0.38; P<0.0001). ...
doi:10.1016/s0167-8140(16)31704-2
fatcat:blhi63fi2vewnp7ckdszywoz7e
VIREO/DVMM at TRECVID 2009: High-Level Feature Extraction, Automatic Video Search, and Content-Based Copy Detection
2009
TREC Video Retrieval Evaluation
This paper presents overview and comparative analysis of our systems designed for 3 TRECVID 2009 tasks: high-level feature extraction, automatic search, and content-based copy detection. ...
) while also considers the domain-shift-of-context to improve concept detection accuracy. ...
Acknowledgment The work described in this paper was fully supported by two grants from the Research Grants Council of the Hong Kong Special Administrative Region, China (CityU 119508 and CityU 119709). ...
dblp:conf/trecvid/NgoJWZLZWC09
fatcat:2xcs2usjszh6zjdkiilqronbm4
Evolution of a Web-Scale Near Duplicate Image Detection System
2020
Proceedings of The Web Conference 2020
In this paper, we present an efficient system for detecting near duplicate images across 8 billion images. ...
Detecting near duplicate images is fundamental to the content ecosystem of photo sharing web applications. ...
Jacob Hanger for their help throughout the work. ...
doi:10.1145/3366423.3380031
dblp:conf/www/GusevX20
fatcat:d577bgtggbganfq2ftalrlq3uq
Verification techniques for cache coherence protocols
1997
ACM Computing Surveys
We compare the efficiency and discuss the limitations of each technique in terms of memory and computation time. ...
In this article we present a comprehensive survey of various approaches for the verification of cache coherence protocols based on state enumeration, (symbolic) model checking, and symbolic state models ...
Nevertheless, a state enumeration approach applied to a small model is capable of detecting a large number of errors and is very effective as a debugging tool. ...
doi:10.1145/248621.248624
fatcat:neylws7pgfe2jlwxuezr5unigm
Formal automatic verification of cache coherence in multiprocessors with relaxed memory models
2000
IEEE Transactions on Parallel and Distributed Systems
First, we demonstrate how to model and verify cache coherence under a relaxed memory model in the context of state-based verification methods. ...
Moreover, because caches can hold inconsistent copies of the same data for long periods of time, coherence cannot be verified by simply checking that cached copies are identical at all times. ...
Verification based on M r is at least as accurate as verification runs based on M for the detection of data inconsistencies. ...
doi:10.1109/71.879780
fatcat:n5hdt5qxczaxjleqn5j4qc44n4
A Self-Supervised Descriptor for Image Copy Detection
[article]
2022
arXiv
pre-print
On the recent DISC2021 benchmark, SSCD is shown to outperform both baseline copy detection models and self-supervised architectures designed for image classification by huge margins, in all settings. ...
Image copy detection is an important task for content moderation. We introduce SSCD, a model that builds on a recent self-supervised contrastive training objective. ...
In a copy detection context, these augmentations model partial copies, where part of an image is included in a composite image. ...
arXiv:2202.10261v2
fatcat:p2r44nuxyzg5tc5g7wxng5wb7e
« Previous
Showing results 1 — 15 out of 19,356 results