A Method For Detecting Duplicate And Near-Duplicate Images Penetration

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    A method for detection of duplicate or near-duplicate image penetration from images in the similar group by distribution of color and other attributes of the image. Distinctive sceneries of the images penetration are identified. Each couple of images penetration with at least one distictive scenary is mutual; the distictive scenary of each image penetration is allied to normalize whether the couple is duplicates or near-duplicates.


  • Keywords


    Duplicate or near-duplicate, image penetration, distinctive sceneries.

  • References


      [1] Chuan Xiao, Wei Wang, Xuemin Lin, Jeffrey Xu Yu , “Efficient Similarity Joins for Near Duplicate Detection”, Proceeding of the 17th international conference on World Wide Web, pp:131--140, 2008.

      [2] Zhewang, William Josephson, Qin Lv,Moses Charikar, Kai Li,”Filtering Image Spam with Near-Duplicate Detection”,Computer Science department, Princeton University,USA.

      [3] Yan Ke, Rahul Sukhthankar, Larry Huston,” Efficient Near-duplicate Detection and Sub-image Retrieval”, School of Computer Science Carnegie Mellon University,Pittsburgh,USA.

      [4] J. G. Conrad, X. S. Guo, and C. P. Schriber. “Online duplicate document detection: signature reliability in a dynamic retrieval environment”. In CIKM, 2003.

      [5] M. Henzinger, "Finding near-duplicate web pages: a large-scale evaluation of algorithms," Proceedings of the 29th annual international ACM SIGIR conference on Research and development in information retrieval, pp. 284-291, 2006.

      [6] D. Fetterly, M. Manasse, and M. Najork. “On the evolution of clusters of near-duplicate web pages”. In LA-WEB, 2003.

      [7] A. Z. Broder, S. C. Glassman, M. S. Manasse, and G. Zweig. “Syntactic clustering of the web”. Computer Networks, 29(8-13):1157–1166, 1997.

      [8] J. Cho, N. Shivakumar, and H. Garcia-Molina. “Finding replicated web collections”. In SIGMOD, 2000.

      [9] T. C. Hoad and J. Zobel. “Methods for identifying versioned and plagiarized documents”. JASIST, 54(3):203–215, 2003.

      [10] E. Chang, J. Wang, C. Li, and G. Wiederhold. RIME: A replicated image detector for the world-wide web. In Proceedings of SPIE, 1998.

      [11] J. Fridrich, D. Soukal, and J. Lukas. Detection of copy-move forgery in digital images. In Digital Forensic Research Workshop, 2003.

      [12] A. Loui and M. Wood. A software system for automatic albuming of consumer pictures. In Proceedings of ACM International Conference on Multimedia, 1999.

      [13] J. Luo and M. Nascimento. Content based sub-image retrieval via hierarchical tree matching. In Proceedings of ACM Workshop on Multimedia Databases, 2003.

      [14] S. Berrani, L. Amsaleg, and P. Gros. Robust content-based image searches for copyright protection. In Proceedings of ACM Workshop on Multimedia Databases, 2003.

      [15] A. Ramachandran and N. Feamster. Unerstanding the nework-level behavior of spammers. ACM SIGCOMM Computer Communication Review, 36(4), Oct. 2006.

      [16] Y. Rui, A. C. She, and T. S. Huang, Modified fourier descriptors for shape representation—a practical approach, in Proc. of First International Workshop on Image Databases and Multi Media Search, 1996.

      [17] C. Carson, S. Belongie, H. Greenspan, and J. Malik, Region-based image querying, in Proc. of IEEE Workshop on Content-Based Access of Image and Video Libraries, in Conjuction with IEEE CVPR’97, 1997.

      [18] L. Schiff, N. Van House, and M. H. Butler. Unpublished study of image database users.


 

View

Download

Article ID: 20438
 
DOI: 10.14419/ijet.v7i4.6.20438




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.