SECURE SIFT-BASED SPARSE REPRESENTATION FOR IMAGE COPY DETECTION AND RECOGNITION

被引:15
作者
Kang, Li-Wei [1 ]
Hsu, Chao-Yung [1 ]
Chen, Hung-Wei [1 ]
Lu, Chun-Shien [1 ]
机构
[1] Acad Sinica, Inst Informat Sci, Taipei, Taiwan
来源
2010 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO (ICME 2010) | 2010年
关键词
Sparse representation; secure SIFT; copy detection; image recognition; compressive sensing;
D O I
10.1109/ICME.2010.5582615
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this paper, we formulate the problems of image copy detection and image recognition in terms of sparse representation. To achieve robustness, security, and efficient storage of image features, we propose to extract compact local feature descriptors via constructing the basis of the SIFT-based feature vectors extracted from the secure SIFT domain of an image. Image copy detection can be efficiently accomplished based on the sparse representations and reconstruction errors of the features extracted from an image possibly manipulated by signal processing or geometric attacks. For image recognition, we show that the features of a query image can be represented as sparse linear combinations of the features extracted from the training images belonging to the same cluster. Hence, image recognition can also be cast as a sparse representation problem. Then, we formulate our sparse representation problem as an l(1)-minimization problem. Promising results regarding image copy detection and recognition have been verified, respectively, through the simulations conducted on several content-preserving attacks defined in the Stirmark benchmark and Caltech-101 dataset.
引用
收藏
页码:1248 / 1253
页数:6
相关论文
共 21 条
  • [1] K-SVD: An algorithm for designing overcomplete dictionaries for sparse representation
    Aharon, Michal
    Elad, Michael
    Bruckstein, Alfred
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2006, 54 (11) : 4311 - 4322
  • [2] [Anonymous], 2004, P CVPR WORKSH GEN MO
  • [3] [Anonymous], 2006, 2006 IEEE COMP SOC C
  • [4] [Anonymous], 2009, P CVPR
  • [5] [Anonymous], 2003, P ICCV
  • [6] [Anonymous], 2008, P CVPR
  • [7] Candès EJ, 2008, IEEE SIGNAL PROC MAG, V25, P21, DOI 10.1109/MSP.2007.914731
  • [8] Cossalter M., 2009, P IEEE INT C ADV VID
  • [9] HSU CY, 2009, P ACM INT C MULT CHI
  • [10] Geometric attacks on image watermarking systems
    Licks, V
    Jordan, R
    [J]. IEEE MULTIMEDIA, 2005, 12 (03) : 68 - 78