A Method For Detecting Duplicate And Near-Duplicate Images Penetration
-
https://doi.org/10.14419/ijet.v7i4.6.20438
Received date: September 29, 2018
Accepted date: September 29, 2018
Published date: September 25, 2018
-
Duplicate or near-duplicate, image penetration, distinctive sceneries. -
Abstract
A method for detection of duplicate or near-duplicate image penetration from images in the similar group by distribution of color and other attributes of the image. Distinctive sceneries of the images penetration are identified. Each couple of images penetration with at least one distictive scenary is mutual; the distictive scenary of each image penetration is allied to normalize whether the couple is duplicates or near-duplicates.
-
References
- Chuan Xiao, Wei Wang, Xuemin Lin, Jeffrey Xu Yu , “Efficient Similarity Joins for Near Duplicate Detection”, Proceeding of the 17th international conference on World Wide Web, pp:131--140, 2008.
- Zhewang, William Josephson, Qin Lv,Moses Charikar, Kai Li,”Filtering Image Spam with Near-Duplicate Detec-tion”,Computer Science department, Princeton University,USA.
- Yan Ke, Rahul Sukhthankar, Larry Huston,” Efficient Near-duplicate Detection and Sub-image Retrieval”, School of Computer Science Carnegie Mellon University,Pittsburgh,USA.
- J. G. Conrad, X. S. Guo, and C. P. Schriber. “Online duplicate doc-ument detection: signature reliability in a dynamic retrieval envi-ronment”. In CIKM, 2003.
- M. Henzinger, "Finding near-duplicate web pages: a large-scale evaluation of algorithms," Proceedings of the 29th annual interna-tional ACM SIGIR conference on Research and development in in-formation retrieval, pp. 284-291, 2006.
- D. Fetterly, M. Manasse, and M. Najork. “On the evolution of clus-ters of near-duplicate web pages”. In LA-WEB, 2003.
- A. Z. Broder, S. C. Glassman, M. S. Manasse, and G. Zweig. “Syn-tactic clustering of the web”. Computer Networks, 29(8-13):1157–1166, 1997.
- J. Cho, N. Shivakumar, and H. Garcia-Molina. “Finding replicated web collections”. In SIGMOD, 2000.
- T. C. Hoad and J. Zobel. “Methods for identifying versioned and plagiarized documents”. JASIST, 54(3):203–215, 2003.
- E. Chang, J. Wang, C. Li, and G. Wiederhold. RIME: A replicated image detector for the world-wide web. In Proceedings of SPIE, 1998.
- J. Fridrich, D. Soukal, and J. Lukas. Detection of copy-move forgery in digital images. In Digital Forensic Research Workshop, 2003.
- A. Loui and M. Wood. A software system for automatic albuming of consumer pictures. In Proceedings of ACM International Confer-ence on Multimedia, 1999.
- J. Luo and M. Nascimento. Content based sub-image retrieval via hierarchical tree matching. In Proceedings of ACM Workshop on Multimedia Databases, 2003.
- S. Berrani, L. Amsaleg, and P. Gros. Robust content-based image searches for copyright protection. In Proceedings of ACM Work-shop on Multimedia Databases, 2003.
- A. Ramachandran and N. Feamster. Unerstanding the nework-level behavior of spammers. ACM SIGCOMM Computer Communica-tion Review, 36(4), Oct. 2006.
- Y. Rui, A. C. She, and T. S. Huang, Modified fourier descriptors for shape representation—a practical approach, in Proc. of First Inter-national Workshop on Image Databases and Multi Media Search, 1996.
- C. Carson, S. Belongie, H. Greenspan, and J. Malik, Region-based image querying, in Proc. of IEEE Workshop on Content-Based Ac-cess of Image and Video Libraries, in Conjuction with IEEE CVPR’97, 1997.
- L. Schiff, N. Van House, and M. H. Butler. Unpublished study of image database users.
-
Downloads
-
How to Cite
Ramesh Shahabadkar, D., S Sai Satyanarayana Reddy, D., & Devika, P. (2018). A Method For Detecting Duplicate And Near-Duplicate Images Penetration. International Journal of Engineering and Technology, 7(4.6), 96-99. https://doi.org/10.14419/ijet.v7i4.6.20438
