SlideShare a Scribd company logo
1 of 23
Download to read offline
Paper ID: 1570186597
imPlag: Detecting Image Plagiarism Using
Hierarchical Near Duplicate Retrieval
Siddharth Srivastava, Prerana Mukherjee, Brejesh Lall
Indian Institute of Technology, Delhi
IEEE India Council
Department of Electrical Engineering
Faculty of Engineering & Technology
Jamia Millia Islamia, New Delhi, India
Introduction
The key characteristic of image plagiarism is that it may involve the
reproduction of the original image using an entirely different mode
such as hand made sketches. Image Plagiarism can be posed as a
superset of image copy detection problems.
Fig. 1. (a) Original Image (b) Plagiarised image (reproduction of the source image) (c) Copied image (considered as
strong attack by copy detection algorithms but an expected case for Image Plagiarism)
IEEE India Council
Department of Electrical Engineering
Faculty of Engineering & Technology
Jamia Millia Islamia, New Delhi, India
Problems ?
• Detection of similar images – Huge Databases, Interactive Time
• Plagiarism brings in innovation
• Hence involves both Research and Engineering Challenges
- Stitched from 3888 images
- One column/row pixel from each
image
So knowing your limits is
necessary
Image Courtesy:Eirik Solheim
(Image has been used for demonstrating
the extent of deformation possible in
images)
IEEE India Council
Department of Electrical Engineering
Faculty of Engineering & Technology
Jamia Millia Islamia, New Delhi, India
KEY CONTRIBUTIONS
Development of a hierarchical feature extraction and feature indexing
technique.
Evaluation of recent feature extraction techniques against simple,
moderate and extreme deformations.
Dataset construction for testing image plagiarism algorithms.
IEEE India Council
Department of Electrical Engineering
Faculty of Engineering & Technology
Jamia Millia Islamia, New Delhi, India
Dataset
• Natural Images – mountains, rivers, animals, birds etc.
• Actual scenario – too many images can be similar but might not be
plagiarized (synthetically transformed)
• So for evaluation, dataset was created since detecting image
plagiarism is not really only Content Based Image Retrieval
• Search for images on Flickr, ukbench dataset
• Find similar images using Google Reverse Image Search (Google doesn’t index
Flickr !!)
• Transformed Images – Affine, Grayscale, Color channel separation
etc. (30 transformations)
IEEE India Council
Department of Electrical Engineering
Faculty of Engineering & Technology
Jamia Millia Islamia, New Delhi, India
Methodology
Heirarchical
Feature
Extraction
Feature
Indexing
Search
Query
NN
Match/Exact
Matching
Ranking or
Verification
Fingerprint the image
- Perceptual Hash
- SIFT > SURF, ORB, FREAK, PCA-SIFT
Store for retrieval
- Database
- Apache Lucene
- Locality Sensitive
Hashing
Search the index
- Search LSH Index
Relevant Results ranked
at the top
- Bag of Visual Words
Histogram matching
IEEE India Council
Department of Electrical Engineering
Faculty of Engineering & Technology
Jamia Millia Islamia, New Delhi, India
Hierarchical Indexing
Lucene Index
Perceptual Hash
Locality Sensitive Hashing
SIFT Features
Bag of Visual Words
Images
Lucene Index Traditional
Database
IEEE India Council
Department of Electrical Engineering
Faculty of Engineering & Technology
Jamia Millia Islamia, New Delhi, India
Layered Retrieval
Input Image
Calculate
Perceptual Hash
of input Image
Search LSH Index
for nearest
neighbours
Rank images based
on BoVW
histogram
matching
IEEE India Council
Department of Electrical Engineering
Faculty of Engineering & Technology
Jamia Millia Islamia, New Delhi, India
Perceptual Hash
• Can be used for multimedia content (audio, video, images)
• Similar images have similar hash values
Scale
image to
32x32
Convert
to
grayscale
Compute
DCT
Keep first
8x8
coefficie
nts
Take
Average
(no DC
Term)
Coeff > Avg
=> 1
Coeff <= Avg
=> 0
Flatten to
64bit vector
IEEE India Council
Department of Electrical Engineering
Faculty of Engineering & Technology
Jamia Millia Islamia, New Delhi, India
Bag of Visual Words
• SIFT features converted to Bag of Visual Words
• More efficient than direct keypoint matching
• Observations:
• Large vocabulary size may increase false negatives
• Small vocabulary size may increase false positives
• Though there is no definite pattern on what should the vocabulary
size be
IEEE India Council
Department of Electrical Engineering
Faculty of Engineering & Technology
Jamia Millia Islamia, New Delhi, India
Results
• Accuracy: 81%
• Scalability
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
0 1000 2000 3000 4000 5000 6000 7000
Time(sec)
Number of images in the dataset
top-60 results
IEEE India Council
Department of Electrical Engineering
Faculty of Engineering & Technology
Jamia Millia Islamia, New Delhi, India
Conclusion
• We perform evaluations to choose best criteria and techniques for
detecting image plagiarism.
• A method is proposed, consisting of perceptual hashing and SIFT with
hierarchical approximate matching scheme.
• This scheme was able to maintain the tradeoff between time and
accuracy.
IEEE India Council
Department of Electrical Engineering
Faculty of Engineering & Technology
Jamia Millia Islamia, New Delhi, India
References
• E. Chalom, E. Asa, and E. Biton, “Measuring image similarity: an overview of some useful applications,”
Instrumentation & Measurement Magazine, IEEE, vol. 16, no. 1, pp. 24–28, 2013.
• C. Zauner, M. Steinebach, and E. Hermann, “Rihamark: perceptual image hash benchmarking,” in IS&T/SPIE
Electronic Imaging. International Society for Optics and Photonics, 2011, pp. 78 800X–78 800X.
• V. Voronin, V. Frantc, V. Marchuk, and K. Egiazarian, “Fast texture and structure image reconstruction using
the perceptual hash,” Image Processing: Algorithms and Systems XI, 2013.
• A. Kumar, A. Anand, A. Akella, A. Balachandran, V. Sekar, and S. Seshan, “Flexible multimedia content
retrieval using infonames,” ACM SIGCOMM Computer Communication Review, vol. 41, no. 4, pp. 455–456,
2011
• A. Gionis, P. Indyk, R. Motwani et al., “Similarity search in high dimensions via hashing,” in VLDB, vol. 99,
1999, pp. 518–529.
• V. Christlein, C. Riess, J. Jordan, and E. Angelopoulou, “An evaluation of popular copy-move forgery detection
approaches,” Information Forensics and Security, IEEE Transactions on, vol. 7, no. 6, pp. 1841– 1854, 2012.
• M. Lux and S. A. Chatzichristofis, “Lire: lucene image retrieval: an extensible java cbir library,” in Proceedings
of the 16th ACM international conference on Multimedia. ACM, 2008, pp. 1085–1088.
IEEE India Council
Department of Electrical Engineering
Faculty of Engineering & Technology
Jamia Millia Islamia, New Delhi, India
THANKYOU
IEEE India Council
Department of Electrical Engineering
Faculty of Engineering & Technology
Jamia Millia Islamia, New Delhi, India
Appendix: Dataset Images
Perceptually Similar ?
IEEE India Council
Department of Electrical Engineering
Faculty of Engineering & Technology
Jamia Millia Islamia, New Delhi, India
Appendix: Nature is not always greenish
IEEE India Council
Department of Electrical Engineering
Faculty of Engineering & Technology
Jamia Millia Islamia, New Delhi, India
Appendix: Accuracy
0
10
20
30
40
50
60
70
80
90
100
60 100 150 200 250
Accuracy(%)
Number of Results(top-N)
Accuracy(%)
IEEE India Council
Department of Electrical Engineering
Faculty of Engineering & Technology
Jamia Millia Islamia, New Delhi, India
Appendix: Results
Fig 2. Comparison of Feature matching techniques Fig 3. Average time taken by SIFT, SURF and Perceptual Hash
PH
SURF
SIFT
IEEE India Council
Department of Electrical Engineering
Faculty of Engineering & Technology
Jamia Millia Islamia, New Delhi, India
Appendix: Results
Fig 4. Comparison of ranked retrieval Fig 5. Ranked V/s Non Ranked Retrieval
IEEE India Council
Department of Electrical Engineering
Faculty of Engineering & Technology
Jamia Millia Islamia, New Delhi, India
Appendix: Results
Fig 6. Time vs Number of results Fig 7. Time vs Number of Images in the dataset
IEEE India Council
Department of Electrical Engineering
Faculty of Engineering & Technology
Jamia Millia Islamia, New Delhi, India
Appendix: Results
Fig 8. Lucene v/s Database Retrieval time
IEEE India Council
Department of Electrical Engineering
Faculty of Engineering & Technology
Jamia Millia Islamia, New Delhi, India
Locality Sensitive Hashing
• Similar features hashed to same hash values
• Parameters
• No of bits (k)
• No of tables (l)
• Maximum Bucket capacity (usually unlimited)
• Empirical Analysis needed for determining parameters as per the
dataset
• varying number of bits, varies bucket size (small hash, more collisions
and vice versa)
IEEE India Council
Department of Electrical Engineering
Faculty of Engineering & Technology
Jamia Millia Islamia, New Delhi, India
Lucene
• Very efficient in document indexing and retrieval
• Bag of Visual words histograms are indexed
• Allows for random access of documents
• Histograms are fetched from Lucene index and ranked (Filtering)
IEEE India Council
Department of Electrical Engineering
Faculty of Engineering & Technology
Jamia Millia Islamia, New Delhi, India

More Related Content

What's hot

CV_Salim_August-2016
CV_Salim_August-2016CV_Salim_August-2016
CV_Salim_August-2016SALIM ISTYAQ
 
Indian Internship at HumanIT
Indian Internship at HumanITIndian Internship at HumanIT
Indian Internship at HumanITJakob Svensson
 
IRJET - A Review on Text Recognition for Visually Blind People
IRJET - A Review on Text Recognition for Visually Blind PeopleIRJET - A Review on Text Recognition for Visually Blind People
IRJET - A Review on Text Recognition for Visually Blind PeopleIRJET Journal
 
IJSRED-V2I1P12
IJSRED-V2I1P12IJSRED-V2I1P12
IJSRED-V2I1P12IJSRED
 
IRJET - A Review on Face Recognition using Deep Learning Algorithm
IRJET -  	  A Review on Face Recognition using Deep Learning AlgorithmIRJET -  	  A Review on Face Recognition using Deep Learning Algorithm
IRJET - A Review on Face Recognition using Deep Learning AlgorithmIRJET Journal
 
Table of contenets dec 2018
Table of contenets dec 2018Table of contenets dec 2018
Table of contenets dec 2018ijesajournal
 
Robust Tracking Via Feature Mapping Method and Support Vector Machine
Robust Tracking Via Feature Mapping Method and Support Vector MachineRobust Tracking Via Feature Mapping Method and Support Vector Machine
Robust Tracking Via Feature Mapping Method and Support Vector MachineIRJET Journal
 
06108870 analytical study of parallel and distributed image processing 2011
06108870 analytical study of parallel and distributed image processing 201106108870 analytical study of parallel and distributed image processing 2011
06108870 analytical study of parallel and distributed image processing 2011Kiran Verma
 
IRJET-A Review on User Personalized Tag Based Image Search by Tag Relevance
IRJET-A Review on User Personalized Tag Based Image Search by Tag RelevanceIRJET-A Review on User Personalized Tag Based Image Search by Tag Relevance
IRJET-A Review on User Personalized Tag Based Image Search by Tag RelevanceIRJET Journal
 
Gabriel Bianconi - Introduction to Face Processing with Computer Vision
Gabriel Bianconi - Introduction to Face Processing with Computer VisionGabriel Bianconi - Introduction to Face Processing with Computer Vision
Gabriel Bianconi - Introduction to Face Processing with Computer VisionPyCon Odessa
 
IRJET- Development of a Face Recognition System with Deep Learning and Py...
IRJET-  	  Development of a Face Recognition System with Deep Learning and Py...IRJET-  	  Development of a Face Recognition System with Deep Learning and Py...
IRJET- Development of a Face Recognition System with Deep Learning and Py...IRJET Journal
 
TOP 10 Cited Computer Science & Information Technology Research Articles From...
TOP 10 Cited Computer Science & Information Technology Research Articles From...TOP 10 Cited Computer Science & Information Technology Research Articles From...
TOP 10 Cited Computer Science & Information Technology Research Articles From...AIRCC Publishing Corporation
 
IRJET - A Review on: Face Recognition using Laplacianface
IRJET - A Review on: Face Recognition using LaplacianfaceIRJET - A Review on: Face Recognition using Laplacianface
IRJET - A Review on: Face Recognition using LaplacianfaceIRJET Journal
 
Automatic Attendance System using Deep Learning Framework
Automatic Attendance System using Deep Learning FrameworkAutomatic Attendance System using Deep Learning Framework
Automatic Attendance System using Deep Learning FrameworkPinaki Ranjan Sarkar
 
Brv vardhan 2013
Brv vardhan 2013Brv vardhan 2013
Brv vardhan 2013Anup Pravin
 
IRJET- Automated Student’s Attendance Management using Convolutional Neural N...
IRJET- Automated Student’s Attendance Management using Convolutional Neural N...IRJET- Automated Student’s Attendance Management using Convolutional Neural N...
IRJET- Automated Student’s Attendance Management using Convolutional Neural N...IRJET Journal
 
Internation Journal Conference
Internation Journal ConferenceInternation Journal Conference
Internation Journal ConferenceHemanth Kumar
 
Sagar_Lachure_resume-new
Sagar_Lachure_resume-newSagar_Lachure_resume-new
Sagar_Lachure_resume-newSagar Lachure
 
Achieving Scalability in Software Testing with Machine Learning and Metaheuri...
Achieving Scalability in Software Testing with Machine Learning and Metaheuri...Achieving Scalability in Software Testing with Machine Learning and Metaheuri...
Achieving Scalability in Software Testing with Machine Learning and Metaheuri...Lionel Briand
 

What's hot (19)

CV_Salim_August-2016
CV_Salim_August-2016CV_Salim_August-2016
CV_Salim_August-2016
 
Indian Internship at HumanIT
Indian Internship at HumanITIndian Internship at HumanIT
Indian Internship at HumanIT
 
IRJET - A Review on Text Recognition for Visually Blind People
IRJET - A Review on Text Recognition for Visually Blind PeopleIRJET - A Review on Text Recognition for Visually Blind People
IRJET - A Review on Text Recognition for Visually Blind People
 
IJSRED-V2I1P12
IJSRED-V2I1P12IJSRED-V2I1P12
IJSRED-V2I1P12
 
IRJET - A Review on Face Recognition using Deep Learning Algorithm
IRJET -  	  A Review on Face Recognition using Deep Learning AlgorithmIRJET -  	  A Review on Face Recognition using Deep Learning Algorithm
IRJET - A Review on Face Recognition using Deep Learning Algorithm
 
Table of contenets dec 2018
Table of contenets dec 2018Table of contenets dec 2018
Table of contenets dec 2018
 
Robust Tracking Via Feature Mapping Method and Support Vector Machine
Robust Tracking Via Feature Mapping Method and Support Vector MachineRobust Tracking Via Feature Mapping Method and Support Vector Machine
Robust Tracking Via Feature Mapping Method and Support Vector Machine
 
06108870 analytical study of parallel and distributed image processing 2011
06108870 analytical study of parallel and distributed image processing 201106108870 analytical study of parallel and distributed image processing 2011
06108870 analytical study of parallel and distributed image processing 2011
 
IRJET-A Review on User Personalized Tag Based Image Search by Tag Relevance
IRJET-A Review on User Personalized Tag Based Image Search by Tag RelevanceIRJET-A Review on User Personalized Tag Based Image Search by Tag Relevance
IRJET-A Review on User Personalized Tag Based Image Search by Tag Relevance
 
Gabriel Bianconi - Introduction to Face Processing with Computer Vision
Gabriel Bianconi - Introduction to Face Processing with Computer VisionGabriel Bianconi - Introduction to Face Processing with Computer Vision
Gabriel Bianconi - Introduction to Face Processing with Computer Vision
 
IRJET- Development of a Face Recognition System with Deep Learning and Py...
IRJET-  	  Development of a Face Recognition System with Deep Learning and Py...IRJET-  	  Development of a Face Recognition System with Deep Learning and Py...
IRJET- Development of a Face Recognition System with Deep Learning and Py...
 
TOP 10 Cited Computer Science & Information Technology Research Articles From...
TOP 10 Cited Computer Science & Information Technology Research Articles From...TOP 10 Cited Computer Science & Information Technology Research Articles From...
TOP 10 Cited Computer Science & Information Technology Research Articles From...
 
IRJET - A Review on: Face Recognition using Laplacianface
IRJET - A Review on: Face Recognition using LaplacianfaceIRJET - A Review on: Face Recognition using Laplacianface
IRJET - A Review on: Face Recognition using Laplacianface
 
Automatic Attendance System using Deep Learning Framework
Automatic Attendance System using Deep Learning FrameworkAutomatic Attendance System using Deep Learning Framework
Automatic Attendance System using Deep Learning Framework
 
Brv vardhan 2013
Brv vardhan 2013Brv vardhan 2013
Brv vardhan 2013
 
IRJET- Automated Student’s Attendance Management using Convolutional Neural N...
IRJET- Automated Student’s Attendance Management using Convolutional Neural N...IRJET- Automated Student’s Attendance Management using Convolutional Neural N...
IRJET- Automated Student’s Attendance Management using Convolutional Neural N...
 
Internation Journal Conference
Internation Journal ConferenceInternation Journal Conference
Internation Journal Conference
 
Sagar_Lachure_resume-new
Sagar_Lachure_resume-newSagar_Lachure_resume-new
Sagar_Lachure_resume-new
 
Achieving Scalability in Software Testing with Machine Learning and Metaheuri...
Achieving Scalability in Software Testing with Machine Learning and Metaheuri...Achieving Scalability in Software Testing with Machine Learning and Metaheuri...
Achieving Scalability in Software Testing with Machine Learning and Metaheuri...
 

Similar to imPlag: Detecting Image Plagiarism Using Hierarchical Near Duplicate Retrieval

H2O with Erin LeDell at Portland R User Group
H2O with Erin LeDell at Portland R User GroupH2O with Erin LeDell at Portland R User Group
H2O with Erin LeDell at Portland R User GroupSri Ambati
 
An Enhance Image Retrieval of User Interest Using Query Specific Approach and...
An Enhance Image Retrieval of User Interest Using Query Specific Approach and...An Enhance Image Retrieval of User Interest Using Query Specific Approach and...
An Enhance Image Retrieval of User Interest Using Query Specific Approach and...IJSRD
 
A Graph-based Web Image Annotation for Large Scale Image Retrieval
A Graph-based Web Image Annotation for Large Scale Image RetrievalA Graph-based Web Image Annotation for Large Scale Image Retrieval
A Graph-based Web Image Annotation for Large Scale Image RetrievalIRJET Journal
 
Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...researchinventy
 
Research Inventy: International Journal of Engineering and Science
Research Inventy: International Journal of Engineering and ScienceResearch Inventy: International Journal of Engineering and Science
Research Inventy: International Journal of Engineering and Scienceresearchinventy
 
2014 IEEE JAVA DATA MINING PROJECT Mining weakly labeled web facial images fo...
2014 IEEE JAVA DATA MINING PROJECT Mining weakly labeled web facial images fo...2014 IEEE JAVA DATA MINING PROJECT Mining weakly labeled web facial images fo...
2014 IEEE JAVA DATA MINING PROJECT Mining weakly labeled web facial images fo...IEEEFINALYEARSTUDENTPROJECT
 
2014 IEEE JAVA DATA MINING PROJECT Mining weakly labeled web facial images fo...
2014 IEEE JAVA DATA MINING PROJECT Mining weakly labeled web facial images fo...2014 IEEE JAVA DATA MINING PROJECT Mining weakly labeled web facial images fo...
2014 IEEE JAVA DATA MINING PROJECT Mining weakly labeled web facial images fo...IEEEMEMTECHSTUDENTSPROJECTS
 
IEEE 2014 JAVA DATA MINING PROJECTS Mining weakly labeled web facial images f...
IEEE 2014 JAVA DATA MINING PROJECTS Mining weakly labeled web facial images f...IEEE 2014 JAVA DATA MINING PROJECTS Mining weakly labeled web facial images f...
IEEE 2014 JAVA DATA MINING PROJECTS Mining weakly labeled web facial images f...IEEEFINALYEARSTUDENTPROJECTS
 
Multivariate feature descriptor based cbir model to query large image databases
Multivariate feature descriptor based cbir model to query large image databasesMultivariate feature descriptor based cbir model to query large image databases
Multivariate feature descriptor based cbir model to query large image databasesIJARIIT
 
IRJET-Semi-Supervised Collaborative Image Retrieval using Relevance Feedback
IRJET-Semi-Supervised Collaborative Image Retrieval using Relevance FeedbackIRJET-Semi-Supervised Collaborative Image Retrieval using Relevance Feedback
IRJET-Semi-Supervised Collaborative Image Retrieval using Relevance FeedbackIRJET Journal
 
Proto Spiral.ppt Proto Spiral.ppt Proto Spiral.ppt Proto Spiral.ppt
Proto Spiral.ppt Proto Spiral.ppt Proto Spiral.ppt Proto Spiral.pptProto Spiral.ppt Proto Spiral.ppt Proto Spiral.ppt Proto Spiral.ppt
Proto Spiral.ppt Proto Spiral.ppt Proto Spiral.ppt Proto Spiral.pptAnirbanBhar3
 
A Literature Survey on Image Linguistic Visual Question Answering
A Literature Survey on Image Linguistic Visual Question AnsweringA Literature Survey on Image Linguistic Visual Question Answering
A Literature Survey on Image Linguistic Visual Question AnsweringIRJET Journal
 
Tag based image retrieval (tbir) using automatic image annotation
Tag based image retrieval (tbir) using automatic image annotationTag based image retrieval (tbir) using automatic image annotation
Tag based image retrieval (tbir) using automatic image annotationeSAT Journals
 
Tag based image retrieval (tbir) using automatic image annotation
Tag based image retrieval (tbir) using automatic image annotationTag based image retrieval (tbir) using automatic image annotation
Tag based image retrieval (tbir) using automatic image annotationeSAT Publishing House
 
AI In Actuarial Science
AI In Actuarial ScienceAI In Actuarial Science
AI In Actuarial ScienceAudrey Britton
 
CBIR For Medical Imaging...
CBIR For Medical  Imaging...CBIR For Medical  Imaging...
CBIR For Medical Imaging...Isha Sharma
 
Machine Learning 2 deep Learning: An Intro
Machine Learning 2 deep Learning: An IntroMachine Learning 2 deep Learning: An Intro
Machine Learning 2 deep Learning: An IntroSi Krishan
 

Similar to imPlag: Detecting Image Plagiarism Using Hierarchical Near Duplicate Retrieval (20)

CBIR with RF
CBIR with RFCBIR with RF
CBIR with RF
 
H2O with Erin LeDell at Portland R User Group
H2O with Erin LeDell at Portland R User GroupH2O with Erin LeDell at Portland R User Group
H2O with Erin LeDell at Portland R User Group
 
An Enhance Image Retrieval of User Interest Using Query Specific Approach and...
An Enhance Image Retrieval of User Interest Using Query Specific Approach and...An Enhance Image Retrieval of User Interest Using Query Specific Approach and...
An Enhance Image Retrieval of User Interest Using Query Specific Approach and...
 
A Graph-based Web Image Annotation for Large Scale Image Retrieval
A Graph-based Web Image Annotation for Large Scale Image RetrievalA Graph-based Web Image Annotation for Large Scale Image Retrieval
A Graph-based Web Image Annotation for Large Scale Image Retrieval
 
Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...
 
Research Inventy: International Journal of Engineering and Science
Research Inventy: International Journal of Engineering and ScienceResearch Inventy: International Journal of Engineering and Science
Research Inventy: International Journal of Engineering and Science
 
2014 IEEE JAVA DATA MINING PROJECT Mining weakly labeled web facial images fo...
2014 IEEE JAVA DATA MINING PROJECT Mining weakly labeled web facial images fo...2014 IEEE JAVA DATA MINING PROJECT Mining weakly labeled web facial images fo...
2014 IEEE JAVA DATA MINING PROJECT Mining weakly labeled web facial images fo...
 
2014 IEEE JAVA DATA MINING PROJECT Mining weakly labeled web facial images fo...
2014 IEEE JAVA DATA MINING PROJECT Mining weakly labeled web facial images fo...2014 IEEE JAVA DATA MINING PROJECT Mining weakly labeled web facial images fo...
2014 IEEE JAVA DATA MINING PROJECT Mining weakly labeled web facial images fo...
 
IEEE 2014 JAVA DATA MINING PROJECTS Mining weakly labeled web facial images f...
IEEE 2014 JAVA DATA MINING PROJECTS Mining weakly labeled web facial images f...IEEE 2014 JAVA DATA MINING PROJECTS Mining weakly labeled web facial images f...
IEEE 2014 JAVA DATA MINING PROJECTS Mining weakly labeled web facial images f...
 
Multivariate feature descriptor based cbir model to query large image databases
Multivariate feature descriptor based cbir model to query large image databasesMultivariate feature descriptor based cbir model to query large image databases
Multivariate feature descriptor based cbir model to query large image databases
 
IRJET-Semi-Supervised Collaborative Image Retrieval using Relevance Feedback
IRJET-Semi-Supervised Collaborative Image Retrieval using Relevance FeedbackIRJET-Semi-Supervised Collaborative Image Retrieval using Relevance Feedback
IRJET-Semi-Supervised Collaborative Image Retrieval using Relevance Feedback
 
Proto Spiral.ppt Proto Spiral.ppt Proto Spiral.ppt Proto Spiral.ppt
Proto Spiral.ppt Proto Spiral.ppt Proto Spiral.ppt Proto Spiral.pptProto Spiral.ppt Proto Spiral.ppt Proto Spiral.ppt Proto Spiral.ppt
Proto Spiral.ppt Proto Spiral.ppt Proto Spiral.ppt Proto Spiral.ppt
 
A Literature Survey on Image Linguistic Visual Question Answering
A Literature Survey on Image Linguistic Visual Question AnsweringA Literature Survey on Image Linguistic Visual Question Answering
A Literature Survey on Image Linguistic Visual Question Answering
 
Tag based image retrieval (tbir) using automatic image annotation
Tag based image retrieval (tbir) using automatic image annotationTag based image retrieval (tbir) using automatic image annotation
Tag based image retrieval (tbir) using automatic image annotation
 
Tag based image retrieval (tbir) using automatic image annotation
Tag based image retrieval (tbir) using automatic image annotationTag based image retrieval (tbir) using automatic image annotation
Tag based image retrieval (tbir) using automatic image annotation
 
AI In Actuarial Science
AI In Actuarial ScienceAI In Actuarial Science
AI In Actuarial Science
 
CBIR For Medical Imaging...
CBIR For Medical  Imaging...CBIR For Medical  Imaging...
CBIR For Medical Imaging...
 
Machine Learning 2 deep Learning: An Intro
Machine Learning 2 deep Learning: An IntroMachine Learning 2 deep Learning: An Intro
Machine Learning 2 deep Learning: An Intro
 
TiMetmay10
TiMetmay10TiMetmay10
TiMetmay10
 
Ti met may10
Ti met may10Ti met may10
Ti met may10
 

More from Prerana Mukherjee

SALPROP: SALIENT OBJECT PROPOSALS VIA AGGREGATED EDGE CUES
SALPROP: SALIENT OBJECT PROPOSALS VIA AGGREGATED EDGE CUESSALPROP: SALIENT OBJECT PROPOSALS VIA AGGREGATED EDGE CUES
SALPROP: SALIENT OBJECT PROPOSALS VIA AGGREGATED EDGE CUESPrerana Mukherjee
 
SALIENCY MAP BASED IMPROVED SEGMENTATION
SALIENCY MAP BASED IMPROVED SEGMENTATIONSALIENCY MAP BASED IMPROVED SEGMENTATION
SALIENCY MAP BASED IMPROVED SEGMENTATIONPrerana Mukherjee
 
AUTOMATED BALL TRACKING IN TENNIS VIDEO
AUTOMATED BALL TRACKING IN TENNIS VIDEOAUTOMATED BALL TRACKING IN TENNIS VIDEO
AUTOMATED BALL TRACKING IN TENNIS VIDEOPrerana Mukherjee
 
A real-time ball trajectory follower using Robot Operating System
A real-time ball trajectory follower using Robot Operating SystemA real-time ball trajectory follower using Robot Operating System
A real-time ball trajectory follower using Robot Operating SystemPrerana Mukherjee
 
Enhanced characterness for text detection in the wild
Enhanced characterness for text detection in the wildEnhanced characterness for text detection in the wild
Enhanced characterness for text detection in the wildPrerana Mukherjee
 
Adaptive Image Compression Using Saliency and KAZE Features
Adaptive Image Compression Using Saliency and KAZE FeaturesAdaptive Image Compression Using Saliency and KAZE Features
Adaptive Image Compression Using Saliency and KAZE FeaturesPrerana Mukherjee
 
ADAPTIVE CRYPTO-STEGANOSYSTEM FOR VIDEOS BASED ON INFORMATION CONTENT AND VIS...
ADAPTIVE CRYPTO-STEGANOSYSTEM FOR VIDEOS BASED ON INFORMATION CONTENT AND VIS...ADAPTIVE CRYPTO-STEGANOSYSTEM FOR VIDEOS BASED ON INFORMATION CONTENT AND VIS...
ADAPTIVE CRYPTO-STEGANOSYSTEM FOR VIDEOS BASED ON INFORMATION CONTENT AND VIS...Prerana Mukherjee
 
ADAPTIVE CRYPTO-STEGANOSYSTEM FOR VIDEOS BASED ON INFORMATION CONTENT AND VIS...
ADAPTIVE CRYPTO-STEGANOSYSTEM FOR VIDEOS BASED ON INFORMATION CONTENT AND VIS...ADAPTIVE CRYPTO-STEGANOSYSTEM FOR VIDEOS BASED ON INFORMATION CONTENT AND VIS...
ADAPTIVE CRYPTO-STEGANOSYSTEM FOR VIDEOS BASED ON INFORMATION CONTENT AND VIS...Prerana Mukherjee
 
Salient KeypointSelection for Object Representation
Salient KeypointSelection for Object RepresentationSalient KeypointSelection for Object Representation
Salient KeypointSelection for Object RepresentationPrerana Mukherjee
 
DRIZY- Collaborative Driver Assistance Over Wireless Networks
DRIZY- Collaborative Driver Assistance Over Wireless NetworksDRIZY- Collaborative Driver Assistance Over Wireless Networks
DRIZY- Collaborative Driver Assistance Over Wireless NetworksPrerana Mukherjee
 

More from Prerana Mukherjee (10)

SALPROP: SALIENT OBJECT PROPOSALS VIA AGGREGATED EDGE CUES
SALPROP: SALIENT OBJECT PROPOSALS VIA AGGREGATED EDGE CUESSALPROP: SALIENT OBJECT PROPOSALS VIA AGGREGATED EDGE CUES
SALPROP: SALIENT OBJECT PROPOSALS VIA AGGREGATED EDGE CUES
 
SALIENCY MAP BASED IMPROVED SEGMENTATION
SALIENCY MAP BASED IMPROVED SEGMENTATIONSALIENCY MAP BASED IMPROVED SEGMENTATION
SALIENCY MAP BASED IMPROVED SEGMENTATION
 
AUTOMATED BALL TRACKING IN TENNIS VIDEO
AUTOMATED BALL TRACKING IN TENNIS VIDEOAUTOMATED BALL TRACKING IN TENNIS VIDEO
AUTOMATED BALL TRACKING IN TENNIS VIDEO
 
A real-time ball trajectory follower using Robot Operating System
A real-time ball trajectory follower using Robot Operating SystemA real-time ball trajectory follower using Robot Operating System
A real-time ball trajectory follower using Robot Operating System
 
Enhanced characterness for text detection in the wild
Enhanced characterness for text detection in the wildEnhanced characterness for text detection in the wild
Enhanced characterness for text detection in the wild
 
Adaptive Image Compression Using Saliency and KAZE Features
Adaptive Image Compression Using Saliency and KAZE FeaturesAdaptive Image Compression Using Saliency and KAZE Features
Adaptive Image Compression Using Saliency and KAZE Features
 
ADAPTIVE CRYPTO-STEGANOSYSTEM FOR VIDEOS BASED ON INFORMATION CONTENT AND VIS...
ADAPTIVE CRYPTO-STEGANOSYSTEM FOR VIDEOS BASED ON INFORMATION CONTENT AND VIS...ADAPTIVE CRYPTO-STEGANOSYSTEM FOR VIDEOS BASED ON INFORMATION CONTENT AND VIS...
ADAPTIVE CRYPTO-STEGANOSYSTEM FOR VIDEOS BASED ON INFORMATION CONTENT AND VIS...
 
ADAPTIVE CRYPTO-STEGANOSYSTEM FOR VIDEOS BASED ON INFORMATION CONTENT AND VIS...
ADAPTIVE CRYPTO-STEGANOSYSTEM FOR VIDEOS BASED ON INFORMATION CONTENT AND VIS...ADAPTIVE CRYPTO-STEGANOSYSTEM FOR VIDEOS BASED ON INFORMATION CONTENT AND VIS...
ADAPTIVE CRYPTO-STEGANOSYSTEM FOR VIDEOS BASED ON INFORMATION CONTENT AND VIS...
 
Salient KeypointSelection for Object Representation
Salient KeypointSelection for Object RepresentationSalient KeypointSelection for Object Representation
Salient KeypointSelection for Object Representation
 
DRIZY- Collaborative Driver Assistance Over Wireless Networks
DRIZY- Collaborative Driver Assistance Over Wireless NetworksDRIZY- Collaborative Driver Assistance Over Wireless Networks
DRIZY- Collaborative Driver Assistance Over Wireless Networks
 

Recently uploaded

Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 

Recently uploaded (20)

Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 

imPlag: Detecting Image Plagiarism Using Hierarchical Near Duplicate Retrieval

  • 1. Paper ID: 1570186597 imPlag: Detecting Image Plagiarism Using Hierarchical Near Duplicate Retrieval Siddharth Srivastava, Prerana Mukherjee, Brejesh Lall Indian Institute of Technology, Delhi IEEE India Council Department of Electrical Engineering Faculty of Engineering & Technology Jamia Millia Islamia, New Delhi, India
  • 2. Introduction The key characteristic of image plagiarism is that it may involve the reproduction of the original image using an entirely different mode such as hand made sketches. Image Plagiarism can be posed as a superset of image copy detection problems. Fig. 1. (a) Original Image (b) Plagiarised image (reproduction of the source image) (c) Copied image (considered as strong attack by copy detection algorithms but an expected case for Image Plagiarism) IEEE India Council Department of Electrical Engineering Faculty of Engineering & Technology Jamia Millia Islamia, New Delhi, India
  • 3. Problems ? • Detection of similar images – Huge Databases, Interactive Time • Plagiarism brings in innovation • Hence involves both Research and Engineering Challenges - Stitched from 3888 images - One column/row pixel from each image So knowing your limits is necessary Image Courtesy:Eirik Solheim (Image has been used for demonstrating the extent of deformation possible in images) IEEE India Council Department of Electrical Engineering Faculty of Engineering & Technology Jamia Millia Islamia, New Delhi, India
  • 4. KEY CONTRIBUTIONS Development of a hierarchical feature extraction and feature indexing technique. Evaluation of recent feature extraction techniques against simple, moderate and extreme deformations. Dataset construction for testing image plagiarism algorithms. IEEE India Council Department of Electrical Engineering Faculty of Engineering & Technology Jamia Millia Islamia, New Delhi, India
  • 5. Dataset • Natural Images – mountains, rivers, animals, birds etc. • Actual scenario – too many images can be similar but might not be plagiarized (synthetically transformed) • So for evaluation, dataset was created since detecting image plagiarism is not really only Content Based Image Retrieval • Search for images on Flickr, ukbench dataset • Find similar images using Google Reverse Image Search (Google doesn’t index Flickr !!) • Transformed Images – Affine, Grayscale, Color channel separation etc. (30 transformations) IEEE India Council Department of Electrical Engineering Faculty of Engineering & Technology Jamia Millia Islamia, New Delhi, India
  • 6. Methodology Heirarchical Feature Extraction Feature Indexing Search Query NN Match/Exact Matching Ranking or Verification Fingerprint the image - Perceptual Hash - SIFT > SURF, ORB, FREAK, PCA-SIFT Store for retrieval - Database - Apache Lucene - Locality Sensitive Hashing Search the index - Search LSH Index Relevant Results ranked at the top - Bag of Visual Words Histogram matching IEEE India Council Department of Electrical Engineering Faculty of Engineering & Technology Jamia Millia Islamia, New Delhi, India
  • 7. Hierarchical Indexing Lucene Index Perceptual Hash Locality Sensitive Hashing SIFT Features Bag of Visual Words Images Lucene Index Traditional Database IEEE India Council Department of Electrical Engineering Faculty of Engineering & Technology Jamia Millia Islamia, New Delhi, India
  • 8. Layered Retrieval Input Image Calculate Perceptual Hash of input Image Search LSH Index for nearest neighbours Rank images based on BoVW histogram matching IEEE India Council Department of Electrical Engineering Faculty of Engineering & Technology Jamia Millia Islamia, New Delhi, India
  • 9. Perceptual Hash • Can be used for multimedia content (audio, video, images) • Similar images have similar hash values Scale image to 32x32 Convert to grayscale Compute DCT Keep first 8x8 coefficie nts Take Average (no DC Term) Coeff > Avg => 1 Coeff <= Avg => 0 Flatten to 64bit vector IEEE India Council Department of Electrical Engineering Faculty of Engineering & Technology Jamia Millia Islamia, New Delhi, India
  • 10. Bag of Visual Words • SIFT features converted to Bag of Visual Words • More efficient than direct keypoint matching • Observations: • Large vocabulary size may increase false negatives • Small vocabulary size may increase false positives • Though there is no definite pattern on what should the vocabulary size be IEEE India Council Department of Electrical Engineering Faculty of Engineering & Technology Jamia Millia Islamia, New Delhi, India
  • 11. Results • Accuracy: 81% • Scalability 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0 1000 2000 3000 4000 5000 6000 7000 Time(sec) Number of images in the dataset top-60 results IEEE India Council Department of Electrical Engineering Faculty of Engineering & Technology Jamia Millia Islamia, New Delhi, India
  • 12. Conclusion • We perform evaluations to choose best criteria and techniques for detecting image plagiarism. • A method is proposed, consisting of perceptual hashing and SIFT with hierarchical approximate matching scheme. • This scheme was able to maintain the tradeoff between time and accuracy. IEEE India Council Department of Electrical Engineering Faculty of Engineering & Technology Jamia Millia Islamia, New Delhi, India
  • 13. References • E. Chalom, E. Asa, and E. Biton, “Measuring image similarity: an overview of some useful applications,” Instrumentation & Measurement Magazine, IEEE, vol. 16, no. 1, pp. 24–28, 2013. • C. Zauner, M. Steinebach, and E. Hermann, “Rihamark: perceptual image hash benchmarking,” in IS&T/SPIE Electronic Imaging. International Society for Optics and Photonics, 2011, pp. 78 800X–78 800X. • V. Voronin, V. Frantc, V. Marchuk, and K. Egiazarian, “Fast texture and structure image reconstruction using the perceptual hash,” Image Processing: Algorithms and Systems XI, 2013. • A. Kumar, A. Anand, A. Akella, A. Balachandran, V. Sekar, and S. Seshan, “Flexible multimedia content retrieval using infonames,” ACM SIGCOMM Computer Communication Review, vol. 41, no. 4, pp. 455–456, 2011 • A. Gionis, P. Indyk, R. Motwani et al., “Similarity search in high dimensions via hashing,” in VLDB, vol. 99, 1999, pp. 518–529. • V. Christlein, C. Riess, J. Jordan, and E. Angelopoulou, “An evaluation of popular copy-move forgery detection approaches,” Information Forensics and Security, IEEE Transactions on, vol. 7, no. 6, pp. 1841– 1854, 2012. • M. Lux and S. A. Chatzichristofis, “Lire: lucene image retrieval: an extensible java cbir library,” in Proceedings of the 16th ACM international conference on Multimedia. ACM, 2008, pp. 1085–1088. IEEE India Council Department of Electrical Engineering Faculty of Engineering & Technology Jamia Millia Islamia, New Delhi, India
  • 14. THANKYOU IEEE India Council Department of Electrical Engineering Faculty of Engineering & Technology Jamia Millia Islamia, New Delhi, India
  • 15. Appendix: Dataset Images Perceptually Similar ? IEEE India Council Department of Electrical Engineering Faculty of Engineering & Technology Jamia Millia Islamia, New Delhi, India
  • 16. Appendix: Nature is not always greenish IEEE India Council Department of Electrical Engineering Faculty of Engineering & Technology Jamia Millia Islamia, New Delhi, India
  • 17. Appendix: Accuracy 0 10 20 30 40 50 60 70 80 90 100 60 100 150 200 250 Accuracy(%) Number of Results(top-N) Accuracy(%) IEEE India Council Department of Electrical Engineering Faculty of Engineering & Technology Jamia Millia Islamia, New Delhi, India
  • 18. Appendix: Results Fig 2. Comparison of Feature matching techniques Fig 3. Average time taken by SIFT, SURF and Perceptual Hash PH SURF SIFT IEEE India Council Department of Electrical Engineering Faculty of Engineering & Technology Jamia Millia Islamia, New Delhi, India
  • 19. Appendix: Results Fig 4. Comparison of ranked retrieval Fig 5. Ranked V/s Non Ranked Retrieval IEEE India Council Department of Electrical Engineering Faculty of Engineering & Technology Jamia Millia Islamia, New Delhi, India
  • 20. Appendix: Results Fig 6. Time vs Number of results Fig 7. Time vs Number of Images in the dataset IEEE India Council Department of Electrical Engineering Faculty of Engineering & Technology Jamia Millia Islamia, New Delhi, India
  • 21. Appendix: Results Fig 8. Lucene v/s Database Retrieval time IEEE India Council Department of Electrical Engineering Faculty of Engineering & Technology Jamia Millia Islamia, New Delhi, India
  • 22. Locality Sensitive Hashing • Similar features hashed to same hash values • Parameters • No of bits (k) • No of tables (l) • Maximum Bucket capacity (usually unlimited) • Empirical Analysis needed for determining parameters as per the dataset • varying number of bits, varies bucket size (small hash, more collisions and vice versa) IEEE India Council Department of Electrical Engineering Faculty of Engineering & Technology Jamia Millia Islamia, New Delhi, India
  • 23. Lucene • Very efficient in document indexing and retrieval • Bag of Visual words histograms are indexed • Allows for random access of documents • Histograms are fetched from Lucene index and ranked (Filtering) IEEE India Council Department of Electrical Engineering Faculty of Engineering & Technology Jamia Millia Islamia, New Delhi, India