Evaluating keypoint methods for content-based copyright protection of digital images

被引:0
作者
Huston, L [1 ]
Sukthankar, R [1 ]
Ke, Y [1 ]
机构
[1] Intel Res, Pittsburgh, PA USA
来源
2005 IEEE International Conference on Multimedia and Expo (ICME), Vols 1 and 2 | 2005年
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper evaluates the effectiveness of keypoint methods for content-based protection of digital images. These methods identify a set of "distinctive" regions (termed keypoints) in an image and encode them using descriptors that are robust to expected image transformations. To determine whether a particular image were derived from a protected image, the keypoints for both images are generated and their descriptors matched. We describe a comprehensive set of experiments to examine how keypoint methods cope with three real-world challenges: ( 1) loss of keypoints due to cropping; (2) matching failures caused by approximate nearest-neighbor indexing schemes; (3) degraded descriptors due to significant image distortions. While keypoint methods perform very well in general, this paper identifies cases where the accuracy of such methods degrades.
引用
收藏
页码:1087 / 1090
页数:4
相关论文
共 12 条
[1]  
[Anonymous], P S THEOR COMP
[2]  
[Anonymous], 2004, INT J COMPUTER VISIO
[3]  
[Anonymous], 2003, P ACM WORKSH MULT DA
[4]  
[Anonymous], 1999, P INT C VER LARG DAT
[5]  
Berrani S., 2003, P ACM WORKSH MULT DA
[6]  
Chang E., 1998, P SPIE
[7]  
Cox I., 2001, Digital Watermarking
[8]  
EBE N, 1999, P ACM C MULT
[9]  
KE Y, 2004, P ACM C MULT
[10]  
Ke Y., 2004, P IEEE COMP VIS PATT