A NOVEL REPLICA DETECTION SYSTEM USING BINARY CLASSIFIERS, R-TREES, AND PCA
#1

A NOVEL REPLICA DETECTION SYSTEM USING
BINARY CLASSIFIERS, R-TREES, AND PCA



.pdf   BINARY CLASSIFIERS, R-TREES, AND PCA.pdf (Size: 80.41 KB / Downloads: 0)

ABSTRACT

Replica detection is a prerequisite for the discovery of copyright infringement
and detection of illicit content. For this purpose, contentbased
systems can be an efficient alternative to watermarking. Rather
than imperceptibly embedding a signal, content-based systems rely
on image similarity. Certain content-based systems use adaptive
classifiers to detect replicas. In such systems, a suspect image is
tested against every original, which can become computationally
prohibitive as the number of original images grows.

INTRODUCTION

The recent progress in multimedia technologies and the advent of the
WorldWideWeb (Web) have permitted to process and distribute digital
content at negligible costs. Unfortunately, many valuable digital
images are now illegally redistributed. In this context, both content
protection and detection of copyright infringements becomes important.
In this paper, we propose a system to detect image replicas. By
the term replica, we refer not only to a bit exact copy of a given original
image, but also to modified versions of the image after certain
manipulations, malicious or not, as long as these manipulations do
not change the perceptual meaning of the image content. In particular,
replicas include all variants of the original image obtained after
common image processing manipulations such as compression, filtering,
adjustments of contrast, or geometric manipulations.

REPLICA DETECTION SYSTEM
The main idea behind the proposed replica detection system is to use
a binary classifier to determine whether the suspect image is a replica
of an image contained in a database of originals. Although the number
of originals is quite small compared to that of all images on the
Web, it can still be fairly large depending on the application (for example
in the thousands or even millions). When using a set of binary
classifiers, each being able to detect whether a suspect image is a
replica of a specific image in the database, the entire database has to
be sequentially scanned, which becomes quickly cumbersome as the
number of originals grows. Therefore, we propose to use a preprocessing
step based on an indexing structure where, given a suspect
image, the most likely original images are efficiently selected. We
denote the set of likely originals, or candidates, C. Ideally, C contains
few elements and, includes the correct original if the suspect
image is indeed a replica of one of the images in the database.

R-tree Performance

The R-tree performance is assessed by measuring the miss-rate (i.e.
the average probability that the R-tree does not return among its results
the corresponding original when the test image is a replica) and
the average number of returned candidates. For this purpose, the
subsets Q∗ and S∗ (of Q and S respectively), that do not include the
non-replica images, are used. Note that in general, the average number
of returned candidates for non-replica images is one less than for
replica images.

CONCLUSION

In this work, a replica detection system capable of retrieving from a
database of originals the one that corresponds to a given suspect image
was presented. Since binary classifiers are used by the system,
the suspect image has to be tested against every original contained in
the database.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: binary multiplier and divider, pca in image fusion ppt, binary tree file system, simple pca algorithm implementation, anti logging of trees using radio frequency and vibration sensor for detection and intimation, human face recognition using pca on wavelet subband abstract, code pca matlab fault detection,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  OBJECT TRACKING AND DETECTION full report project topics 9 30,919 06-10-2018, 12:20 PM
Last Post: jntuworldforum
  Host-Based Intrusion Detection Using user signatures nit_cal 2 2,386 06-10-2016, 10:27 AM
Last Post: ijasti
  DETECTION OF THE MALARIAL PARASITE INFECTED BLOOD IMAGES BY 3D-ANALYSIS project report tiger 2 2,387 26-09-2016, 10:55 AM
Last Post: ijasti
  ULTRA SONIC TECHNIQUES FOR THE DETECTION OF HIDDEN CORROSION IN AIR CRAFT WING SKIN seminar projects crazy 5 6,097 15-04-2016, 08:04 PM
Last Post: knagpur
  ARTIFICIAL INTELLIGENCE IN VIRUS DETECTION AND RECOGNITION seminar project explorer 2 3,349 22-07-2013, 11:44 AM
Last Post: computer topic
Brick Face Recognition using the Techniques Base on Principal Component Analysis (PCA) computer science crazy 3 2,968 04-03-2013, 01:21 PM
Last Post: Guest
  Layered Approach Using Conditional Random Fields for Intrusion Detection project report helper 11 7,751 01-03-2013, 11:58 AM
Last Post: [email protected]
  Security System using Biometrics ( Download Full Seminar Report ) computer science crazy 7 10,346 02-02-2013, 03:56 PM
Last Post: seminar details
  TWO WAY STUDENT INFORMATION SYSTEM USING CELLULAR TECHNOLOGY smart paper boy 3 3,483 24-12-2012, 11:24 AM
Last Post: seminar details
  A Secure Mobile Healthcare System using Trust-Based Multicast Scheme seminar class 3 7,959 22-12-2012, 10:54 AM
Last Post: seminar details

Forum Jump: