Using Redundant Bit Vectors for Near-Duplicate Image Detection

Size: px
Start display at page:

Download "Using Redundant Bit Vectors for Near-Duplicate Image Detection"

Transcription

1 Using Redundant Bit Vectors for Near-Duplicate Image Detection Jun Jie Foo and Ranjan Sinha School of Computer Science & IT RMIT University, Melbourne, Australia, 3001 Abstract. Images are amongst the most widely proliferated form of digital information due to affordable imaging technologies and the Web. In such an environment, the use of digital watermarking for image copyright infringement detection is a challenge. For such tasks, near-duplicate image detection is increasingly attractive due to its ability of automated content analysis; moreover, the application domain also extends to data management. The application of PCA-SIFT features and Locality- Sensitive Hashing (LSH) for indexing and retrieval has been shown to be highly effective for this task. In this work, we prune the number of PCA-SIFT features and introduce a modified Redundant Bit Vector (RBV) index. This is the first application of the RBV index that shows near-perfect effectiveness. Using the best parameters of our RBV approach, we observe an average recall and precision of 91% and 98%, respectively, with query response time of under 10 seconds on a collection of 20, 000 images. Compared to the baseline (the LSH index), the query response times and index size of the RBV index is 12 times faster and 126 times smaller, respectively. As compared to brute-force sequential scan, the RBV index rapidly reduces the search space to 1/80. Keywords: Near-duplicate Image Detection, Redundant Bit-Vectors, RBV. 1 Introduction Many digital images available on the Web are copies or variants of each other; these include the scaled-down thumbnails kept by web search engines and differing versions of a single image made available by different news portals. Online images can be appropriated without the acknowledgment of source and, accidentally or otherwise, disguised through simple processing. Common modifications include conversion to greyscale, change in color balance, rescaling, rotating, cropping, and filtering operations. For reasons such as copyright infringement detection [14] and collection management [5], it is attractive to identify such variants (near-duplicates) with a reasonable degree of reliability. In recent work, Qamra et al. [14] propose the Perceptual Distance Functions (PDF) for near-duplicate detection using color and texture image features. However, only mediocre effectiveness is observed when these functions are used with approximate indexing structures such as the Locality-Sensitive Hashing (LSH) R. Kotagiri et al. (Eds.): DASFAA 2007, LNCS 4443, pp , c Springer-Verlag Berlin Heidelberg 2007

2 Using Redundant Bit Vectors for Near-Duplicate Image Detection 473 index [6]. To our knowledge, the highest reported accuracy of a near-duplicate image detection system is that of Ke et al. [11] henceforth referred to as the KSH system that uses the PCA-SIFT descriptors [10] (an extension of the SIFT interest points [12]) and the LSH index. Near-perfect precision is reported for retrieval of various altered images cropped, scaled, rotated, and various affine transformation. While high precision has been reported, scalability has not been explored and the reported interactive query response times are observed on a tiny image collection. In this work, we use the KSH system as the baseline. In this paper, we propose pruning strategies on the SIFT interest points (characterized by the PCA-SIFT local descriptors) along with the use of modified Redundant Bit Vectors (RBV) [8] for this application domain. While RBV has been reported to be efficient for negative queries on audio fingerprint detection, it has yet to be demonstrated to work for positive queries. Here, we propose a novel scheme that extends the RBV index for positive queries. Using our proposed scheme on pruned PCA-SIFT descriptors, we report an almost lossless level of effectiveness for this particular application. We also demonstrate that this index can be highly compact as compared to the LSH index (as used in the KSH system). 2 Distinctive Interest Points Given an image, the idea of local descriptors is to detect image regions (centered around interest points) that possess properties invariant to geometric variation and photometric changes, so that distinctive local descriptors can be computed for each region [9,13]. In this work, we use the popular SIFT (scale invariant feature transform) detector [12] that has been demonstrated to outperform existing detectors [13]. We apply the PCA-SIFT descriptors on the SIFT interest points instead of the original SIFT descriptors, as they are shown to be both highly distinctive [10] and highly effective for near-duplicate image detection [11]. In this work, for convenience, the SIFT keypoint detector and the PCA-SIFT local descriptor are referred to as a PCA-SIFT feature. There are four major stages of computation in the SIFT detector for extracting a set of image features, namely the scale-space extrema detection, keypoint localization, orientation assignment, and generation of keypoint local descriptor. In the first phase of the SIFT keypoint detector, the difference-of-gaussian (DoG) function is used to identify candidate points in various locations and scales using a Gaussian pyramid. This is achieved by finding local peaks (keypoints) in a series of DoG images. In the second phase, poorly localized and unstable keypoints below a threshold level are rejected. After all stable keypoints are identified, each keypoint is assigned a dominant orientation for rotation invariance in the third phase. Additional keypoints are generated if there are multiple orientations within 80% threshold of the dominant orientation; thus, there can be multiple keypoints with identical scale, location, but different orientation. The PCA-SIFT descriptors are computed using the same information as the original SIFT descriptor, that is, location, scale, and dominant orientations. PCA-SIFT concatenates the horizontal and vertical gradient maps for the 41 41

3 474 J.J. Foo and R. Sinha region centered around the keypoint, rotated to align its orientation to a canonical direction to produce a = 3042 element local descriptor (feature vector). In cases where there are multiple dominant orientations, a separate vector is calculated for each. Each vector is then projected using principal component analysis, a common technique for dimensionality reduction to a lowdimensional feature space using a pre-computed eigenspace 1.Keetal.[11]have empirically determined that n = 36 feature spaces for the local descriptor performs well for near-duplicate image retrieval; wherein any two PCA-SIFT local descriptors are deemed similar (a match) within an Euclidean distance (L 2 -norm) of In this work, we use the same settings. The problem of applying PCA-SIFT features is that each image consists of hundreds to thousands of high-dimensional local descriptors, and a reliable match between two images requires at least 3 to 5 descriptor matches [12]. The KSH index uses Locality Sensitive Hashing (LSH) [6] for indexing these PCA-SIFT features. We refer interested readers to the work of Ke et al. [11] for further discussion. 3 Keypoint Reduction Querying in high-dimensional space is a challenging problem due to the curse of dimensionality [1]; indeed, this is further amplified as the evaluation of a query image using PCA-SIFT features requires multiple point matches in highdimensional space simulating multiple point queries. We observe an average of 1, 400 keypoints per image for our image collection, similar to the reported average of 1, 100 in the work of Ke et al. [11]. In practice, using PCA-SIFT features, each image can generate from a few hundred up to a few thousand local descriptors of 36 dimensions each depending on the complexity of an image. Hence, the reduction of keypoints that SIFT generates per image is key to a scalable system. Given that the SIFT interest point detector was originally proposed as a distinctive feature for matching objects or image scenes with high variance [12], it is apparent that all keypoints are required for robust matching. We hypothesize that near-duplicate image detection requires only a subset of the keypoints as we only consider images that are derived from the same source, where the level of variance is limited. In the second stage of the SIFT keypoint detector algorithm, Lowe [12] has empirically observed that a contrast threshold value of 0.03 used to eliminate keypoints with low contrast yields good results. This is an important parameter as a higher threshold will result in fewer keypoints being generated. To exploit this observation for our application, we select only the top N most significant keypoints by their contrast. By setting an upper bound on the number of keypoints that are selected in this phase, we immediately prune more than 80% (on average) of the keypoints required for each image. Images that do not have N detected keypoints are not pruned. Since some keypoints may share sub-pixel 1 The eigenspace used in this work is provided by Ke et al. [10].

4 Using Redundant Bit Vectors for Near-Duplicate Image Detection 475 location and scale information with multiple orientation, we expect approximately 15% additional keypoints to be generated in the subsequent phase [12]. This approach has been demonstrated to achieve comparable effectiveness to using all keypoints for this application, while simultaneously reducing response times considerably during query evaluation [4]. 4 Redundant Bit Vectors Goldstein et al. [8] propose Redundant Bit Vectors (RBV) for high-dimensionality search for multimedia data. The algorithm consists of three key ideas: 1) approximate high-dimensional spherical regions by tightened hyper-rectangles, 2) partition the query space to promote redundancy in the index, and 3) represent each partition with an efficient bit vector. The conventional nearest-neighbor matching problem is usually formulated as a point query over spheres of fixed or variable radius. The ɛ-range search can be applied to return all objects with distances within an ɛ threshold [1] if more than one object is required. The distances between two objects are commonly measured in some L p metric. Goldstein et al. [7] formulate this as a rectangle search problem, where each point p in a d-dimensional space is replaced by the smallest hypercube c enclosing the hyper-sphere with center point p. With this approach, the data space is searched using approximated rectangular regions instead of spheres. To create an RBV index, all data points are mapped onto data (hyper) rectangles, where each dimension of these rectangles are partitioned into m bins. The choice of m is determined by the number of disjoint intervals between the data rectangles [7]. Every dimension of the rectangle is projected onto its respective axis, where each partition is a bit vector that reflects the overlap test between the interval boundaries. Each bit in a spatial bit vector corresponds to a data rectangle within the collection. Each adjacent bit vector (within the same dimension) may have identical bits set to 1 if the data rectangle overlaps the interval boundaries, hence giving rise to redundant bit vectors. To search for approximated neighbors for a given point, a spatial bit vector for a given dimension is selected if the partition includes the query point has its corresponding bit set to 1. The resultant spatial bit vector after bitwise ANDing all selected vectors from every dimension will return the data rectangles that contains the query point. Goldstein et al. demonstrate that the RBV index excel at applications where there is a large fraction of negative queries. For such applications, they report significant gains in efficiency, and a reduction of memory requirement in comparison to LSH [8]. However, their approach is unsuitable for applications with a large fraction of positive queries given that accuracy is sacrificed considerably for efficiency gains; we propose a novel scheme that extends the current RBV index to cater for such applications. 5 Extending the RBV Index Using a similar scheme as Ke et al. [11], all indexed images are stored in a file table (FT), and each PCA-SIFT feature is mapped using a keypoint table (KT)

5 476 J.J. Foo and R. Sinha where each entry is 92 bytes and contains the location, scale, orientation, and local descriptor of a keypoint. For every keypoint in a query image or query keypoint we approximate the potential matching keypoints using an index and verify the short-listed matched pairs using geometric verification (RANSAC) [3]. The key differences are the employed indexing technique and the amount of features used. All query keypoints are read into memory during query evaluation, whereas every matched keypoint is fetched from disk. All disk reads are linearized for efficiency. Given a collection of images, we index only the 36 dimensional local descriptors (keypoints). Each keypoint can be represented by k i (x 1...x d ),i =1...N, where N is the total number of keypoints in the collection, and x d is the coordinate of dimension d. During RBV index construction, each point k i is mapped to a data rectangle using the smallest hypercube c that encloses the hyper-sphere centered on k i with radius of ɛ forɛ-range search. For two PCA-SIFT keypoint descriptors to be deemed a match, an L 2 norm ranging from 2, 200 to 3, 000 (ɛ) yields high effectiveness [10,11]. Hence, each keypoint is converted into a hypercube, with a hypercube half-sidelength (HCS) of ɛ where c =2ɛ. We use m i =(x irange )/ɛ partitions to create the desired number of disjoint intervals that cover the entire axis of a single dimension, where x irange = x imax x imin for dimension i. Thus, the choice of HCS is critical given that it determines the granularity of the partitioning scheme. To create the partitions, we first sort the boundaries of all data hypercube in a given dimension along its axis. Each partition is represented using a bit vector where each bit reflects the index position in KT. Following [8], we then select m i 1 dividers from the sorted hypercube boundary values and partition the dimension using the overlap test for each interval, where each bit in a bit vector reflects the predicate (1 or 0). The collection of data hypercube (keypoints) can be represented efficiently, as each integer can store up to 32 or 64 keypoint IDs, depending on the system architecture (machine word size). Each bit vector is represented using an array of integers, where the bit vectors are constructed in memory and written to disk, one dimension at a time. Each bit vector is stored using an array of N/32 (4- byte) integers, where N is the total number of keypoints in our collection. We also store m i 1 (4-byte) dividers for the axes of each dimension for query evaluation. Thus, the size of the index for the entire image collection is approximately D m i (4 N (m i 1)) bytes i=1 where D is the number of dimensions; in our application D is 36. In the original RBV indexing scheme, for efficiency gains, Goldstein et al. [8] sort the data points in ascending order of the most selective dimension (smallest amount of overlap) prior to constructing the bit vectors. This is done to organize the RBV index such that the first dimension will have data hypercubes closely located along the axis of its dimension, resulting in tightly packed bits of 1 s between the low and high range. Since the number of bitwise AND operations can be reduced to the number of integers between this range, the most selective dimension is used as the first queried dimension. The ordering of dimensions

6 Using Redundant Bit Vectors for Near-Duplicate Image Detection 477 in which to query is important since the first dimension always dictates the resultant list of matching keypoints using the bitwise AND operation. Querying the most selective dimension first will short-list the number of potential matching keypoints rapidly. However, given that each dimension is a very coarse approximation of the distance in the hypercube space, retrieval accuracy suffers. As our aim is to maximize the number of positive matches, the index is modified to be less restrictive for this application. In our proposed scheme, the most selective dimension is not pre-determined, and requires no prior sorting of the data points; consequently, we do not utilize the low and high range for bit vector processing. A summary of the process for constructing the modified RBV index is as follows: Require: Database of N D-dimensional local descriptors x in KT, ɛ = HCS. for i =1toD do for k =1toN do Calculate hypercube boundaries x ki ± ɛ. Sort boundaries on i-axis; calculate m i =(i max i min)/ɛ. Select m i 1 dividers from sorted boundaries. for i =1toD do for k =1toN do Create overlap tests to create m i partitions (bit-vectors). Store m i 1 dividers and m i bit-vectors to disk. Querying the modified RBV index. Instead of querying with the most selective dimension during index construction, we determine the order of dimensions dynamically during query evaluation, thereby eliminating the need for pre-processing the data points. For each x i,i =1...d of a query keypoint, we determine the normalized distance to mean using x μ x i /x μ.wesortthe distances in ascending order, and use the sorted order of dimensions for query evaluation. Thus, the dimensions are dynamically selected to maximize the potential keypoint matches to the query coordinates. In this approach, the search space is not immediately pruned with the first queried dimension but is instead narrowed progressively by processing each subsequent dimension. During query evaluation, the required partition for each dimension can be calculated in memory by using the m 1 dividers of each dimension to determine which partitions to retrieve from disk. Given that each bit vector is bitwise ANDed one dimension at a time, and that the ordering of dimensions can be pre-processed, we can bulk-process the query keypoints simultaneously. This is achieved by using a temporary resultant bit vector in memory for each query keypoint. Hence the order in which the required partitions are read can also be sorted to allow sequential access to disk. Bulk-processing of keypoints in memory is enabled by keypoint reduction since the feature space of the query images are pruned, without which the memory requirement would be high.

7 478 J.J. Foo and R. Sinha Compared to the original RBV indexing scheme [8], we tradeoff speed to maximize the potential matches (candidate pool) and perform bitwise AND operation on the entire bit vector. This results in a larger number of false positives in the pool of candidate keypoint matches and consequently results in more computation. To reduce the cost of CPU computation (bitwise operation), we prune the number of processed dimensions during query evaluation to narrow the search space gradually while minimizing the number of false negatives. The number of dimensions to prune depends on the partition granularity (HCS) since these two parameters are coupled, that is, a change in one parameter will inevitably affect the other. We empirically evaluate the effects of varying HCS and the number of dimensions pruned on retrieval speed and accuracy in Section 7. A summary of the process for querying the modified RBV index (henceforth referred as just RBV index) is as follows: Require: Database of N items, Q local descriptors q of query, D dimensions i of m i 1 dividers and m i bit-vectors, temporary resultant bit vectors R Q (one for each q), temporary container T [D]. for j =1toQ do for k =1toD do T [k] = q jμ q jk /q jμ Sort T in ascending order. for k =1toT (or <T if pruned) do Get partition p using m k 1 dividers; calculate R j = R j&m p. Perform L 2 verification on matches (ON bits) in resultant bit vector. 6 Evaluation Methodology We demonstrate the effectiveness of our approach using a series of experiments. First, we evaluate the effectiveness of keypoint reduction on matching nearduplicate images, by varying the number of detected keypoints between 1, 400 (original number of keypoints), and using a subset of 500 and 100 most significant keypoints. We report the percentage of keypoint matches relative to the keypoints in the query image between a query image and each of its image alterations. For accurate evaluation, we use the sequential scan for the nearestneighbor search on the collection of keypoints as both LSH and RBV indexes are approximate nearest-neighbor algorithms. For this experiment, due to exhaustive computation involved with using several keypoint thresholds, we use only 100 random queries on 10, 000 images (Image Collection B as described below). Second, we compare our approach keypoint reduction with the modified RBV index against the KSH system 2. We evaluate both efficiency and effectiveness of these approaches on a much larger collection of 20, 000 images (Image 2 The authors have provided their source code, allowing us to perform a direct comparison to their approach.

8 Using Redundant Bit Vectors for Near-Duplicate Image Detection 479 Collection A as described below). We use an identical framework as Ke et al. [11], the only differences being the index structure and the amount of PCA-SIFT features used. The original dataset 3 is not used as it was not available, however, we generate a dataset using the same set of alterations as used in their work. A small number of images are selected at random from the collection as queries; the relevant answers are generated by transforming each query image using the set of alterations. Only altered versions of their respective original images are considered relevant answers; everything else in the collection is treated as noise. We evaluate our approach using the standard recall and precision metrics. All experiments are run on a two-processor Xeon 3 GHz machine with 3.8 GBof main memory running Linux 2.4. Image Dataset. To generate our dataset, we select 250 images at random from Volume Twelve of the Corel Photo CD collection [2]; each image is altered using 40 alterations, creating a total of 10, 000 images. We also include 10, 000 images from the TRECVID 2005 collection, which consists of keyframes from various news broadcast. We scale all images to 512 pixels in the longer edge. Together with 10, 000 altered images, we create a test collection of 20, 000 images forming Image Collection A. Image Collection B is created using half of Image Collection A; consequently, we use 125 queries for this collection. As the PCA-SIFT algorithm does not use color information, all images are converted to greyscale after the altered image set is created. As in the work of Ke et al. [11] and Qamra et al. [14], the list of alterations are as follows : colorize (3), contrast (2), severe contrast (2), crop (3), frame (4), scale up (3), scale down (3), despeckle (1), saturation (4), intensity (6), shear (3), resize (3), and rotate (3). Note that the number in the parentheses indicate the alteration variants. 7 Results and Analysis In Table 1, the effects of keypoint reduction at every keypoint threshold value on 40 unique alterations are shown; the percentages are an average over 100 queries. Columns 1, 5, and 9 indicate the different types of alteration. The rest of the columns show the percentage of matching nearest-neighbors within the L 2 norm of 3, 000 between the original image and its corresponding near-duplicate image. The average number of keypoints per image is close to 1, 400. We experiment with a threshold of 500 and 100, reducing the average keypoints per image to 550 and 128, respectively. The last columns of each alteration (4, 9,and 12) show the percentage of matches using the same criterion with approximately 10% of the keypoints. The variation in percentages between image alterations in Table 1 is expected given that some alterations severely affect the properties of the local descriptors. The reason for the slight increase observed with threshold values of 500 and 100 as compared to the original number of keypoints is that the percentage of keypoint matches is relative to number of detected keypoints in the image (that is 550 and 128) indicating that most of the matching 3

9 480 J.J. Foo and R. Sinha Table 1. Percentage of keypoint matches within L 2 norm threshold at every level of reduction. Columns 1, 5, 9 indicate the different alterations (Alt). Keypoint thresholds of 500, and 100 are used. Default indicates the original number of keypoints (average of 1, 400). Alt Default Alt Default Alt Default Alt Default Average Recall (%) HCS=1,000 HCS=1,500 HCS=2,000 HCS=2500 LSH Average Precision (%) HCS=1,000 HCS=1,500 HCS=2,000 HCS=2500 LSH Number of dimensions Number of dimensions (a) Fig. 1. Average (a) Recall and (b) Precision (over 250 queries) of the modified RBV index for variations of HCS and number of dimensions. LSH is the baseline. (b) keypoints within the L 2 -norm of the set of alterations share similar contrast values. This is an important finding as it is the criterion by which both the LSH and RBV indexes approximate matching keypoints. The relatively similar percentages of matching keypoints for different levels of reduction across all alterations, leads us to believe that even a small subset of keypoints is sufficient for this application. Subsequent experiments on the RBV index incorporate keypoint reduction with a threshold of 100 on the number of indexed features. In Figures 1a and 1b, the effectiveness of the RBV index is measured using recall and precision, averaged over 250 queries. We experiment with varying the HCS parameter and the number of pruned dimensions; each increment of four dimensions is shown. LSH is used as a baseline with recall and precision of 99% and 98%, respectively. The highest observed recall and precision with RBV is 97% and 99% respectively, with an HCS of 1, 500 when only one dimension is processed. We observe that even after processing 16 dimensions, recall remains at 91% and

10 Using Redundant Bit Vectors for Near-Duplicate Image Detection 481 Average elapsed time (in secs) HCS=1,000 HCS=1,500 HCS=2,000 HCS=2500 LSH Number of dimensions Average keypoint pairs examined (base 10) HCS=1,000 HCS=1,500 HCS=2,000 HCS=2500 SScan Number of dimensions (a) (b) Fig. 2. (a) Average running time (over 250 queries) of the RBV index for variations of HCS and number of dimensions. LSH is the baseline. (b) Effectiveness (250 queries) of search space reduction of the RBV index. Sequential scan is the baseline. precision at 98%. We do not experiment with smaller number of dimensions for HCS of 2, 000, and 2, 500 as we achieve near-perfect recall and precision after processing 24 dimensions. HCS of 2, 500 achieves recall and precision of 88% and 99% respectively, even after processing all 36 dimensions. As expected, using HCS of 1, 000, we observe a dramatic drop in recall and precision if more than 4 dimensions are processed, which implies that the boundaries in hypercube space is too tight resulting in high partition granularity. Hence, the choice of HCS is critical for the RBV index. We observe that given a large enough HCS, the drop in recall and precision is less abrupt, since the majority of the answers are still within the hypercube boundary of a single dimension resulting in fewer eliminated matches. We have thus shown that our modified RBV index is highly effective given a suitable HCS value. Retrieval Efficiency. The timing results for query evaluation using the modified RBV index is presented in Figure 2a. The total running (elapsed) time for evaluating a single query is measured; all timings are averaged over the 250 queries. They are compared against the KSH baseline, which is observed to have an average running time of approximately 124 seconds. Since the KSH implementation of LSH, and our RBV implementation can be further optimized in terms of in-memory data structures we do not emphasize on the factors of improvement from the baseline. With our RBV index, the fastest recorded running time is approximately 9 seconds with an HCS of 1, 500, and 16 dimensions; this was also observed to have high effectiveness. As expected, the running time reduces as more dimensions are processed; the pool of candidate matches becomes smaller, requiring fewer keypoints to be retrieved from disk. This is evident from the much higher running time of 136 seconds with HCS of 1, 500 and processing only one dimension; this effectively reduces to an on-disk sequential scan. Using HCS of 1, 000, we observe that there is a slight increase in running time from 5 to 8 seconds when the number of dimensions is more than 12. We

11 482 J.J. Foo and R. Sinha Index Size (MB) LSH Index (Baseline) RBV Index Growth factor candidate pool size query response time HCS Length Number of dimensions (a) (b) Fig. 3. (a) Effects of HCS on the RBV index size. LSH is the baseline. (b) Growth factors of candidate pool size and query run-time between image collections B and A (observed using HCS of 1,500). believe this is due to the increased cost of processing (CPU operations required for bitwise ANDing and fetching bit vectors from disk) more dimensions without a corresponding decrease in the number of keypoint pairs. Finally, for HCS of 3, 000 the running time for processing all 36 dimensions is comparable to that of the HCS of 1, 500 while still showing high effectiveness. Further Studies. It is instructive to examine the effectiveness of the RBV index in reducing the search space. Figure 2b shows the total number of keypoints being processed by the RBV index. This is an independent study on the RBV index on the same collection; no comparisons are made against the LSH index since we do not experiment with keypoint reduction on the KSH system. Instead, we compare it to sequential scan to illustrate the reductions in search space using the RBV index. All numbers are reported as an average over 250 queries. The sequential scan always requires the worst-case number of keypoints, as it performs a brute-force search to find k-nearest-neighbors within the L 2 threshold. Using HCS of 1, 500, the candidate pool is quickly reduced from approximately 260 million to 120 million keypoints after processing only 4 dimensions. For 16 dimensions only 4 million keypoints remain in the candidate pool. Naturally, a smaller number of candidate matches translates to higher efficiency, since fewer keypoints need to be fetched and examined. Indeed, this result shows that the RBV index is effective at reducing the search space using only a few dimensions, while minimizing the number of false negatives. As in Figure 3a, we show the effects on index size using different HCS values; these sizes are observed for an index of 20, 000 images. This clearly shows that HCS dictates the number of partitions, which determines the number of bit vectors that are stored on disk. It is also interesting to note that using the baseline method without keypoint reduction as described in the work of Ke et al. [11], the size of the index is considerably larger than that of RBV. Finally, as shown in Figure 3b, we observe that the candidate pool size increase by only a factor of 1.4(using16dimensions),

12 Using Redundant Bit Vectors for Near-Duplicate Image Detection 483 even though the collection size increases by a factor of 2 (Image Collections B to A); the slight growth of the query response time is attributed to the increase in in-memory bitwise processing. 8 Conclusion We have presented an approach to near-duplicate image detection with pruned SIFT keypoints (using PCA-SIFT local descriptors) using our proposed modified RBV indexing scheme. An almost lossless retrieval performance is observed using only 10% of the original keypoint features, thereby reducing index size and improving scalability. We show that, unlike the original approach that was initially designed for negative queries, near-perfect effectiveness can be achieved using our modified approach for positive queries as well. We demonstrate that this indexing scheme performs as well as the KSH system in terms of effectiveness and runs in a little under ten seconds on average for a single query, on a collection of 20, 000 images. Importantly, the RBV index is highly compact over 100 times smaller than that of the original LSH index as used in the KSH system. As observed in our experiments, our approach has shown the highest efficiency a factor-of-12 speed-up over the KSH system thus far, in this domain. Hence, this approach offers a promising and viable alternative indexing strategy to the predominant LSH approach. We intend to explore the limitations and scalability of these schemes in future work. Acknowledgments This project was supported by Australian Research Council. We thank Justin Zobel for his suggestions. References 1. C. Böhm, S. Berchtold, and D. A. Keim. Searching in high-dimensional spaces: Index structures for improving the performance of multimedia databases. ACM Computing Surveys, 33(3): , Corel Corporation. Corel professional photos CD-ROMs, M. A. Fischler and R. C. Bolles. Random sample consensus: A paradigm for model fitting with applications to image analysis and automated cartography. Commun. ACM, 24(6): , J. J. Foo and R. Sinha. Pruning sift for scalable near-duplicate image matching. In Proc. ADC Australian Database Conference, January J. J. Foo, R. Sinha, and J. Zobel. Discovery of image versions in large collections. In Proc. MMM Int. Conf. on Multimedia Modelling. Springer, Januuary A. Gionis, P. Indyk, and R. Motwani. Similarity search in high dimensions via hashing. In Proc. VLDB Int. Conf. on Very Large Data Bases, pages , Edinburgh, Scotland, UK, September Morgan Kaufmann.

13 484 J.J. Foo and R. Sinha 7. J. Goldstein, J. C. Platt, and C. J. C. Burges. Indexing high dimensional rectangles for fast multimedia identification. Technical report, Microsoft Research, Redmond, WA, USA, J. Goldstein, J. C. Platt, and C. J. C. Burges. Redundant bit vectors for quickly searching high-dimensional regions. In Deterministic and Statistical Methods in Machine Learning, First International Workshop, Sheffield, UK, September 7-10, 2004, Revised Lectures, pages Springer, K. Grauman and T. Darrell. Efficient image matching with distributions of local invariant features. In Proc. CVPR Int. Conf. on Computer Vision and Pattern Recognition, pages , June Y. Ke and R. Sukthankar. PCA-sift: A more distinctive representation for local image descriptors. In Proc. CVPR Int. Conf. on Computer Vision and Pattern Recognition, pages , Washington, DC, USA, June July IEEE Computer Society. 11. Y. Ke, R. Sukthankar, and L. Huston. An efficient parts-based near-duplicate and sub-image retrieval system. In Proc. MM Int. Conf. on Multimedia, pages , New York, NY, USA, October ACM Press. 12. D. G. Lowe. Distinctive image features from scale-invariant keypoints. Int. Journal of Computer Vision, 60(2):91 110, K. Mikolajczyk and C. Schmid. A performance evaluation of local descriptors. In Proc. CVPR Int. Conf. on Computer Vision and Pattern Recognition, pages , June A. Qamra, Y. Meng, and E. Y. Chang. Enhanced perceptual distance functions and indexing for image replica recognition. IEEE Trans. Pattern Analysis and Machine Intelligence, 27(3): , 2005.

Detecting Printed and Handwritten Partial Copies of Line Drawings Embedded in Complex Backgrounds

Detecting Printed and Handwritten Partial Copies of Line Drawings Embedded in Complex Backgrounds 9 1th International Conference on Document Analysis and Recognition Detecting Printed and Handwritten Partial Copies of Line Drawings Embedded in Complex Backgrounds Weihan Sun, Koichi Kise Graduate School

More information

Speeding up the Detection of Line Drawings Using a Hash Table

Speeding up the Detection of Line Drawings Using a Hash Table Speeding up the Detection of Line Drawings Using a Hash Table Weihan Sun, Koichi Kise 2 Graduate School of Engineering, Osaka Prefecture University, Japan sunweihan@m.cs.osakafu-u.ac.jp, 2 kise@cs.osakafu-u.ac.jp

More information

A Comparison of SIFT, PCA-SIFT and SURF

A Comparison of SIFT, PCA-SIFT and SURF A Comparison of SIFT, PCA-SIFT and SURF Luo Juan Computer Graphics Lab, Chonbuk National University, Jeonju 561-756, South Korea qiuhehappy@hotmail.com Oubong Gwun Computer Graphics Lab, Chonbuk National

More information

Scale Invariant Feature Transform

Scale Invariant Feature Transform Scale Invariant Feature Transform Why do we care about matching features? Camera calibration Stereo Tracking/SFM Image moiaicing Object/activity Recognition Objection representation and recognition Image

More information

Local Features: Detection, Description & Matching

Local Features: Detection, Description & Matching Local Features: Detection, Description & Matching Lecture 08 Computer Vision Material Citations Dr George Stockman Professor Emeritus, Michigan State University Dr David Lowe Professor, University of British

More information

A NEW FEATURE BASED IMAGE REGISTRATION ALGORITHM INTRODUCTION

A NEW FEATURE BASED IMAGE REGISTRATION ALGORITHM INTRODUCTION A NEW FEATURE BASED IMAGE REGISTRATION ALGORITHM Karthik Krish Stuart Heinrich Wesley E. Snyder Halil Cakir Siamak Khorram North Carolina State University Raleigh, 27695 kkrish@ncsu.edu sbheinri@ncsu.edu

More information

Scale Invariant Feature Transform

Scale Invariant Feature Transform Why do we care about matching features? Scale Invariant Feature Transform Camera calibration Stereo Tracking/SFM Image moiaicing Object/activity Recognition Objection representation and recognition Automatic

More information

SIFT: SCALE INVARIANT FEATURE TRANSFORM SURF: SPEEDED UP ROBUST FEATURES BASHAR ALSADIK EOS DEPT. TOPMAP M13 3D GEOINFORMATION FROM IMAGES 2014

SIFT: SCALE INVARIANT FEATURE TRANSFORM SURF: SPEEDED UP ROBUST FEATURES BASHAR ALSADIK EOS DEPT. TOPMAP M13 3D GEOINFORMATION FROM IMAGES 2014 SIFT: SCALE INVARIANT FEATURE TRANSFORM SURF: SPEEDED UP ROBUST FEATURES BASHAR ALSADIK EOS DEPT. TOPMAP M13 3D GEOINFORMATION FROM IMAGES 2014 SIFT SIFT: Scale Invariant Feature Transform; transform image

More information

K-Means Based Matching Algorithm for Multi-Resolution Feature Descriptors

K-Means Based Matching Algorithm for Multi-Resolution Feature Descriptors K-Means Based Matching Algorithm for Multi-Resolution Feature Descriptors Shao-Tzu Huang, Chen-Chien Hsu, Wei-Yen Wang International Science Index, Electrical and Computer Engineering waset.org/publication/0007607

More information

Chapter 3 Image Registration. Chapter 3 Image Registration

Chapter 3 Image Registration. Chapter 3 Image Registration Chapter 3 Image Registration Distributed Algorithms for Introduction (1) Definition: Image Registration Input: 2 images of the same scene but taken from different perspectives Goal: Identify transformation

More information

SUMMARY: DISTINCTIVE IMAGE FEATURES FROM SCALE- INVARIANT KEYPOINTS

SUMMARY: DISTINCTIVE IMAGE FEATURES FROM SCALE- INVARIANT KEYPOINTS SUMMARY: DISTINCTIVE IMAGE FEATURES FROM SCALE- INVARIANT KEYPOINTS Cognitive Robotics Original: David G. Lowe, 004 Summary: Coen van Leeuwen, s1460919 Abstract: This article presents a method to extract

More information

CS 4495 Computer Vision A. Bobick. CS 4495 Computer Vision. Features 2 SIFT descriptor. Aaron Bobick School of Interactive Computing

CS 4495 Computer Vision A. Bobick. CS 4495 Computer Vision. Features 2 SIFT descriptor. Aaron Bobick School of Interactive Computing CS 4495 Computer Vision Features 2 SIFT descriptor Aaron Bobick School of Interactive Computing Administrivia PS 3: Out due Oct 6 th. Features recap: Goal is to find corresponding locations in two images.

More information

Image Features: Local Descriptors. Sanja Fidler CSC420: Intro to Image Understanding 1/ 58

Image Features: Local Descriptors. Sanja Fidler CSC420: Intro to Image Understanding 1/ 58 Image Features: Local Descriptors Sanja Fidler CSC420: Intro to Image Understanding 1/ 58 [Source: K. Grauman] Sanja Fidler CSC420: Intro to Image Understanding 2/ 58 Local Features Detection: Identify

More information

III. VERVIEW OF THE METHODS

III. VERVIEW OF THE METHODS An Analytical Study of SIFT and SURF in Image Registration Vivek Kumar Gupta, Kanchan Cecil Department of Electronics & Telecommunication, Jabalpur engineering college, Jabalpur, India comparing the distance

More information

Fast Image Matching Using Multi-level Texture Descriptor

Fast Image Matching Using Multi-level Texture Descriptor Fast Image Matching Using Multi-level Texture Descriptor Hui-Fuang Ng *, Chih-Yang Lin #, and Tatenda Muindisi * Department of Computer Science, Universiti Tunku Abdul Rahman, Malaysia. E-mail: nghf@utar.edu.my

More information

CS 223B Computer Vision Problem Set 3

CS 223B Computer Vision Problem Set 3 CS 223B Computer Vision Problem Set 3 Due: Feb. 22 nd, 2011 1 Probabilistic Recursion for Tracking In this problem you will derive a method for tracking a point of interest through a sequence of images.

More information

Introduction. Introduction. Related Research. SIFT method. SIFT method. Distinctive Image Features from Scale-Invariant. Scale.

Introduction. Introduction. Related Research. SIFT method. SIFT method. Distinctive Image Features from Scale-Invariant. Scale. Distinctive Image Features from Scale-Invariant Keypoints David G. Lowe presented by, Sudheendra Invariance Intensity Scale Rotation Affine View point Introduction Introduction SIFT (Scale Invariant Feature

More information

Local Features Tutorial: Nov. 8, 04

Local Features Tutorial: Nov. 8, 04 Local Features Tutorial: Nov. 8, 04 Local Features Tutorial References: Matlab SIFT tutorial (from course webpage) Lowe, David G. Distinctive Image Features from Scale Invariant Features, International

More information

Feature Detection and Matching

Feature Detection and Matching and Matching CS4243 Computer Vision and Pattern Recognition Leow Wee Kheng Department of Computer Science School of Computing National University of Singapore Leow Wee Kheng (CS4243) Camera Models 1 /

More information

Implementing the Scale Invariant Feature Transform(SIFT) Method

Implementing the Scale Invariant Feature Transform(SIFT) Method Implementing the Scale Invariant Feature Transform(SIFT) Method YU MENG and Dr. Bernard Tiddeman(supervisor) Department of Computer Science University of St. Andrews yumeng@dcs.st-and.ac.uk Abstract The

More information

CS 231A Computer Vision (Fall 2012) Problem Set 3

CS 231A Computer Vision (Fall 2012) Problem Set 3 CS 231A Computer Vision (Fall 2012) Problem Set 3 Due: Nov. 13 th, 2012 (2:15pm) 1 Probabilistic Recursion for Tracking (20 points) In this problem you will derive a method for tracking a point of interest

More information

Mobile Human Detection Systems based on Sliding Windows Approach-A Review

Mobile Human Detection Systems based on Sliding Windows Approach-A Review Mobile Human Detection Systems based on Sliding Windows Approach-A Review Seminar: Mobile Human detection systems Njieutcheu Tassi cedrique Rovile Department of Computer Engineering University of Heidelberg

More information

CAP 5415 Computer Vision Fall 2012

CAP 5415 Computer Vision Fall 2012 CAP 5415 Computer Vision Fall 01 Dr. Mubarak Shah Univ. of Central Florida Office 47-F HEC Lecture-5 SIFT: David Lowe, UBC SIFT - Key Point Extraction Stands for scale invariant feature transform Patented

More information

Evaluation and comparison of interest points/regions

Evaluation and comparison of interest points/regions Introduction Evaluation and comparison of interest points/regions Quantitative evaluation of interest point/region detectors points / regions at the same relative location and area Repeatability rate :

More information

Implementation and Comparison of Feature Detection Methods in Image Mosaicing

Implementation and Comparison of Feature Detection Methods in Image Mosaicing IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p-ISSN: 2278-8735 PP 07-11 www.iosrjournals.org Implementation and Comparison of Feature Detection Methods in Image

More information

EE368 Project Report CD Cover Recognition Using Modified SIFT Algorithm

EE368 Project Report CD Cover Recognition Using Modified SIFT Algorithm EE368 Project Report CD Cover Recognition Using Modified SIFT Algorithm Group 1: Mina A. Makar Stanford University mamakar@stanford.edu Abstract In this report, we investigate the application of the Scale-Invariant

More information

Feature descriptors. Alain Pagani Prof. Didier Stricker. Computer Vision: Object and People Tracking

Feature descriptors. Alain Pagani Prof. Didier Stricker. Computer Vision: Object and People Tracking Feature descriptors Alain Pagani Prof. Didier Stricker Computer Vision: Object and People Tracking 1 Overview Previous lectures: Feature extraction Today: Gradiant/edge Points (Kanade-Tomasi + Harris)

More information

Accelerating Pattern Matching or HowMuchCanYouSlide?

Accelerating Pattern Matching or HowMuchCanYouSlide? Accelerating Pattern Matching or HowMuchCanYouSlide? Ofir Pele and Michael Werman School of Computer Science and Engineering The Hebrew University of Jerusalem {ofirpele,werman}@cs.huji.ac.il Abstract.

More information

Real-Time Document Image Retrieval for a 10 Million Pages Database with a Memory Efficient and Stability Improved LLAH

Real-Time Document Image Retrieval for a 10 Million Pages Database with a Memory Efficient and Stability Improved LLAH 2011 International Conference on Document Analysis and Recognition Real-Time Document Image Retrieval for a 10 Million Pages Database with a Memory Efficient and Stability Improved LLAH Kazutaka Takeda,

More information

A Simple but Effective Approach to Video Copy Detection

A Simple but Effective Approach to Video Copy Detection A Simple but Effective Approach to Video Copy Detection Gerhard Roth, Robert Laganière, Patrick Lambert, Ilias Lakhmiri, and Tarik Janati gerhardroth@rogers.com, laganier@site.uottawa.ca, patrick.lambert@univ-savoie.fr

More information

Partial Copy Detection for Line Drawings by Local Feature Matching

Partial Copy Detection for Line Drawings by Local Feature Matching THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. E-mail: 599-31 1-1 sunweihan@m.cs.osakafu-u.ac.jp, kise@cs.osakafu-u.ac.jp MSER HOG HOG MSER SIFT Partial

More information

Enhanced Perceptual Distance Functions and Indexing. for Near-Replica Image Recognition

Enhanced Perceptual Distance Functions and Indexing. for Near-Replica Image Recognition Enhanced Perceptual Distance Functions and Indexing for Near-Replica Image Recognition Arun Qamra Department of Computer Science Yan Meng, Edward Y. Chang Electrical & Computer Engineering Department University

More information

A Graph Theoretic Approach to Image Database Retrieval

A Graph Theoretic Approach to Image Database Retrieval A Graph Theoretic Approach to Image Database Retrieval Selim Aksoy and Robert M. Haralick Intelligent Systems Laboratory Department of Electrical Engineering University of Washington, Seattle, WA 98195-2500

More information

SIFT - scale-invariant feature transform Konrad Schindler

SIFT - scale-invariant feature transform Konrad Schindler SIFT - scale-invariant feature transform Konrad Schindler Institute of Geodesy and Photogrammetry Invariant interest points Goal match points between images with very different scale, orientation, projective

More information

2D Image Processing Feature Descriptors

2D Image Processing Feature Descriptors 2D Image Processing Feature Descriptors Prof. Didier Stricker Kaiserlautern University http://ags.cs.uni-kl.de/ DFKI Deutsches Forschungszentrum für Künstliche Intelligenz http://av.dfki.de 1 Overview

More information

Features Points. Andrea Torsello DAIS Università Ca Foscari via Torino 155, Mestre (VE)

Features Points. Andrea Torsello DAIS Università Ca Foscari via Torino 155, Mestre (VE) Features Points Andrea Torsello DAIS Università Ca Foscari via Torino 155, 30172 Mestre (VE) Finding Corners Edge detectors perform poorly at corners. Corners provide repeatable points for matching, so

More information

Feature Based Registration - Image Alignment

Feature Based Registration - Image Alignment Feature Based Registration - Image Alignment Image Registration Image registration is the process of estimating an optimal transformation between two or more images. Many slides from Alexei Efros http://graphics.cs.cmu.edu/courses/15-463/2007_fall/463.html

More information

Specular 3D Object Tracking by View Generative Learning

Specular 3D Object Tracking by View Generative Learning Specular 3D Object Tracking by View Generative Learning Yukiko Shinozuka, Francois de Sorbier and Hideo Saito Keio University 3-14-1 Hiyoshi, Kohoku-ku 223-8522 Yokohama, Japan shinozuka@hvrl.ics.keio.ac.jp

More information

IN THE LAST decade, the amount of video contents digitally

IN THE LAST decade, the amount of video contents digitally IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 18, NO. 7, JULY 2008 983 Robust Video Fingerprinting for Content-Based Video Identification Sunil Lee, Member, IEEE, and Chang D. Yoo,

More information

Performance Evaluation of Scale-Interpolated Hessian-Laplace and Haar Descriptors for Feature Matching

Performance Evaluation of Scale-Interpolated Hessian-Laplace and Haar Descriptors for Feature Matching Performance Evaluation of Scale-Interpolated Hessian-Laplace and Haar Descriptors for Feature Matching Akshay Bhatia, Robert Laganière School of Information Technology and Engineering University of Ottawa

More information

Key properties of local features

Key properties of local features Key properties of local features Locality, robust against occlusions Must be highly distinctive, a good feature should allow for correct object identification with low probability of mismatch Easy to etract

More information

Outline 7/2/201011/6/

Outline 7/2/201011/6/ Outline Pattern recognition in computer vision Background on the development of SIFT SIFT algorithm and some of its variations Computational considerations (SURF) Potential improvement Summary 01 2 Pattern

More information

Clustering Billions of Images with Large Scale Nearest Neighbor Search

Clustering Billions of Images with Large Scale Nearest Neighbor Search Clustering Billions of Images with Large Scale Nearest Neighbor Search Ting Liu, Charles Rosenberg, Henry A. Rowley IEEE Workshop on Applications of Computer Vision February 2007 Presented by Dafna Bitton

More information

A Survey on Face-Sketch Matching Techniques

A Survey on Face-Sketch Matching Techniques A Survey on Face-Sketch Matching Techniques Reshma C Mohan 1, M. Jayamohan 2, Arya Raj S 3 1 Department of Computer Science, SBCEW 2 Department of Computer Science, College of Applied Science 3 Department

More information

SURF applied in Panorama Image Stitching

SURF applied in Panorama Image Stitching Image Processing Theory, Tools and Applications SURF applied in Panorama Image Stitching Luo Juan 1, Oubong Gwun 2 Computer Graphics Lab, Computer Science & Computer Engineering, Chonbuk National University,

More information

A Novel Extreme Point Selection Algorithm in SIFT

A Novel Extreme Point Selection Algorithm in SIFT A Novel Extreme Point Selection Algorithm in SIFT Ding Zuchun School of Electronic and Communication, South China University of Technolog Guangzhou, China zucding@gmail.com Abstract. This paper proposes

More information

Selective Search for Object Recognition

Selective Search for Object Recognition Selective Search for Object Recognition Uijlings et al. Schuyler Smith Overview Introduction Object Recognition Selective Search Similarity Metrics Results Object Recognition Kitten Goal: Problem: Where

More information

Fast Similarity Search for High-Dimensional Dataset

Fast Similarity Search for High-Dimensional Dataset Fast Similarity Search for High-Dimensional Dataset Quan Wang and Suya You Computer Science Department University of Southern California {quanwang,suyay}@graphics.usc.edu Abstract This paper addresses

More information

Object Recognition with Invariant Features

Object Recognition with Invariant Features Object Recognition with Invariant Features Definition: Identify objects or scenes and determine their pose and model parameters Applications Industrial automation and inspection Mobile robots, toys, user

More information

Video annotation based on adaptive annular spatial partition scheme

Video annotation based on adaptive annular spatial partition scheme Video annotation based on adaptive annular spatial partition scheme Guiguang Ding a), Lu Zhang, and Xiaoxu Li Key Laboratory for Information System Security, Ministry of Education, Tsinghua National Laboratory

More information

CEE598 - Visual Sensing for Civil Infrastructure Eng. & Mgmt.

CEE598 - Visual Sensing for Civil Infrastructure Eng. & Mgmt. CEE598 - Visual Sensing for Civil Infrastructure Eng. & Mgmt. Section 10 - Detectors part II Descriptors Mani Golparvar-Fard Department of Civil and Environmental Engineering 3129D, Newmark Civil Engineering

More information

Feature Detection. Raul Queiroz Feitosa. 3/30/2017 Feature Detection 1

Feature Detection. Raul Queiroz Feitosa. 3/30/2017 Feature Detection 1 Feature Detection Raul Queiroz Feitosa 3/30/2017 Feature Detection 1 Objetive This chapter discusses the correspondence problem and presents approaches to solve it. 3/30/2017 Feature Detection 2 Outline

More information

Local invariant features

Local invariant features Local invariant features Tuesday, Oct 28 Kristen Grauman UT-Austin Today Some more Pset 2 results Pset 2 returned, pick up solutions Pset 3 is posted, due 11/11 Local invariant features Detection of interest

More information

CS 558: Computer Vision 4 th Set of Notes

CS 558: Computer Vision 4 th Set of Notes 1 CS 558: Computer Vision 4 th Set of Notes Instructor: Philippos Mordohai Webpage: www.cs.stevens.edu/~mordohai E-mail: Philippos.Mordohai@stevens.edu Office: Lieb 215 Overview Keypoint matching Hessian

More information

Bundling Features for Large Scale Partial-Duplicate Web Image Search

Bundling Features for Large Scale Partial-Duplicate Web Image Search Bundling Features for Large Scale Partial-Duplicate Web Image Search Zhong Wu, Qifa Ke, Michael Isard, and Jian Sun Microsoft Research Abstract In state-of-the-art image retrieval systems, an image is

More information

Recognition of Multiple Characters in a Scene Image Using Arrangement of Local Features

Recognition of Multiple Characters in a Scene Image Using Arrangement of Local Features 2011 International Conference on Document Analysis and Recognition Recognition of Multiple Characters in a Scene Image Using Arrangement of Local Features Masakazu Iwamura, Takuya Kobayashi, and Koichi

More information

Classification of objects from Video Data (Group 30)

Classification of objects from Video Data (Group 30) Classification of objects from Video Data (Group 30) Sheallika Singh 12665 Vibhuti Mahajan 12792 Aahitagni Mukherjee 12001 M Arvind 12385 1 Motivation Video surveillance has been employed for a long time

More information

Computer Vision for HCI. Topics of This Lecture

Computer Vision for HCI. Topics of This Lecture Computer Vision for HCI Interest Points Topics of This Lecture Local Invariant Features Motivation Requirements, Invariances Keypoint Localization Features from Accelerated Segment Test (FAST) Harris Shi-Tomasi

More information

X-tree. Daniel Keim a, Benjamin Bustos b, Stefan Berchtold c, and Hans-Peter Kriegel d. SYNONYMS Extended node tree

X-tree. Daniel Keim a, Benjamin Bustos b, Stefan Berchtold c, and Hans-Peter Kriegel d. SYNONYMS Extended node tree X-tree Daniel Keim a, Benjamin Bustos b, Stefan Berchtold c, and Hans-Peter Kriegel d a Department of Computer and Information Science, University of Konstanz b Department of Computer Science, University

More information

Computer Vision. Recap: Smoothing with a Gaussian. Recap: Effect of σ on derivatives. Computer Science Tripos Part II. Dr Christopher Town

Computer Vision. Recap: Smoothing with a Gaussian. Recap: Effect of σ on derivatives. Computer Science Tripos Part II. Dr Christopher Town Recap: Smoothing with a Gaussian Computer Vision Computer Science Tripos Part II Dr Christopher Town Recall: parameter σ is the scale / width / spread of the Gaussian kernel, and controls the amount of

More information

Pivoting M-tree: A Metric Access Method for Efficient Similarity Search

Pivoting M-tree: A Metric Access Method for Efficient Similarity Search Pivoting M-tree: A Metric Access Method for Efficient Similarity Search Tomáš Skopal Department of Computer Science, VŠB Technical University of Ostrava, tř. 17. listopadu 15, Ostrava, Czech Republic tomas.skopal@vsb.cz

More information

The SIFT (Scale Invariant Feature

The SIFT (Scale Invariant Feature The SIFT (Scale Invariant Feature Transform) Detector and Descriptor developed by David Lowe University of British Columbia Initial paper ICCV 1999 Newer journal paper IJCV 2004 Review: Matt Brown s Canonical

More information

Model-based segmentation and recognition from range data

Model-based segmentation and recognition from range data Model-based segmentation and recognition from range data Jan Boehm Institute for Photogrammetry Universität Stuttgart Germany Keywords: range image, segmentation, object recognition, CAD ABSTRACT This

More information

A Robust Visual Identifier Using the Trace Transform

A Robust Visual Identifier Using the Trace Transform A Robust Visual Identifier Using the Trace Transform P. Brasnett*, M.Z. Bober* *Mitsubishi Electric ITE VIL, Guildford, UK. paul.brasnett@vil.ite.mee.com, miroslaw.bober@vil.ite.mee.com Keywords: image

More information

Textural Features for Image Database Retrieval

Textural Features for Image Database Retrieval Textural Features for Image Database Retrieval Selim Aksoy and Robert M. Haralick Intelligent Systems Laboratory Department of Electrical Engineering University of Washington Seattle, WA 98195-2500 {aksoy,haralick}@@isl.ee.washington.edu

More information

Object detection using non-redundant local Binary Patterns

Object detection using non-redundant local Binary Patterns University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2010 Object detection using non-redundant local Binary Patterns Duc Thanh

More information

Motion Estimation and Optical Flow Tracking

Motion Estimation and Optical Flow Tracking Image Matching Image Retrieval Object Recognition Motion Estimation and Optical Flow Tracking Example: Mosiacing (Panorama) M. Brown and D. G. Lowe. Recognising Panoramas. ICCV 2003 Example 3D Reconstruction

More information

A Novel Algorithm for Color Image matching using Wavelet-SIFT

A Novel Algorithm for Color Image matching using Wavelet-SIFT International Journal of Scientific and Research Publications, Volume 5, Issue 1, January 2015 1 A Novel Algorithm for Color Image matching using Wavelet-SIFT Mupuri Prasanth Babu *, P. Ravi Shankar **

More information

Image Features: Detection, Description, and Matching and their Applications

Image Features: Detection, Description, and Matching and their Applications Image Features: Detection, Description, and Matching and their Applications Image Representation: Global Versus Local Features Features/ keypoints/ interset points are interesting locations in the image.

More information

Local features and image matching. Prof. Xin Yang HUST

Local features and image matching. Prof. Xin Yang HUST Local features and image matching Prof. Xin Yang HUST Last time RANSAC for robust geometric transformation estimation Translation, Affine, Homography Image warping Given a 2D transformation T and a source

More information

A Method of Annotation Extraction from Paper Documents Using Alignment Based on Local Arrangements of Feature Points

A Method of Annotation Extraction from Paper Documents Using Alignment Based on Local Arrangements of Feature Points A Method of Annotation Extraction from Paper Documents Using Alignment Based on Local Arrangements of Feature Points Tomohiro Nakai, Koichi Kise, Masakazu Iwamura Graduate School of Engineering, Osaka

More information

Human Motion Detection and Tracking for Video Surveillance

Human Motion Detection and Tracking for Video Surveillance Human Motion Detection and Tracking for Video Surveillance Prithviraj Banerjee and Somnath Sengupta Department of Electronics and Electrical Communication Engineering Indian Institute of Technology, Kharagpur,

More information

A Comparison and Matching Point Extraction of SIFT and ISIFT

A Comparison and Matching Point Extraction of SIFT and ISIFT A Comparison and Matching Point Extraction of SIFT and ISIFT A. Swapna A. Geetha Devi M.Tech Scholar, PVPSIT, Vijayawada Associate Professor, PVPSIT, Vijayawada bswapna.naveen@gmail.com geetha.agd@gmail.com

More information

TA Section 7 Problem Set 3. SIFT (Lowe 2004) Shape Context (Belongie et al. 2002) Voxel Coloring (Seitz and Dyer 1999)

TA Section 7 Problem Set 3. SIFT (Lowe 2004) Shape Context (Belongie et al. 2002) Voxel Coloring (Seitz and Dyer 1999) TA Section 7 Problem Set 3 SIFT (Lowe 2004) Shape Context (Belongie et al. 2002) Voxel Coloring (Seitz and Dyer 1999) Sam Corbett-Davies TA Section 7 02-13-2014 Distinctive Image Features from Scale-Invariant

More information

Tensor Decomposition of Dense SIFT Descriptors in Object Recognition

Tensor Decomposition of Dense SIFT Descriptors in Object Recognition Tensor Decomposition of Dense SIFT Descriptors in Object Recognition Tan Vo 1 and Dat Tran 1 and Wanli Ma 1 1- Faculty of Education, Science, Technology and Mathematics University of Canberra, Australia

More information

Biometrics Technology: Image Processing & Pattern Recognition (by Dr. Dickson Tong)

Biometrics Technology: Image Processing & Pattern Recognition (by Dr. Dickson Tong) Biometrics Technology: Image Processing & Pattern Recognition (by Dr. Dickson Tong) References: [1] http://homepages.inf.ed.ac.uk/rbf/hipr2/index.htm [2] http://www.cs.wisc.edu/~dyer/cs540/notes/vision.html

More information

An Image Search System for UAVs *

An Image Search System for UAVs * National Research Council Canada Institute for Information Technology Conseil national de recherches Canada Institut de technologie de l'information An Image Search System for UAVs * Roth, G., and Scott,

More information

COSC160: Detection and Classification. Jeremy Bolton, PhD Assistant Teaching Professor

COSC160: Detection and Classification. Jeremy Bolton, PhD Assistant Teaching Professor COSC160: Detection and Classification Jeremy Bolton, PhD Assistant Teaching Professor Outline I. Problem I. Strategies II. Features for training III. Using spatial information? IV. Reducing dimensionality

More information

Face detection and recognition. Detection Recognition Sally

Face detection and recognition. Detection Recognition Sally Face detection and recognition Detection Recognition Sally Face detection & recognition Viola & Jones detector Available in open CV Face recognition Eigenfaces for face recognition Metric learning identification

More information

Classification. Vladimir Curic. Centre for Image Analysis Swedish University of Agricultural Sciences Uppsala University

Classification. Vladimir Curic. Centre for Image Analysis Swedish University of Agricultural Sciences Uppsala University Classification Vladimir Curic Centre for Image Analysis Swedish University of Agricultural Sciences Uppsala University Outline An overview on classification Basics of classification How to choose appropriate

More information

Large-scale visual recognition Efficient matching

Large-scale visual recognition Efficient matching Large-scale visual recognition Efficient matching Florent Perronnin, XRCE Hervé Jégou, INRIA CVPR tutorial June 16, 2012 Outline!! Preliminary!! Locality Sensitive Hashing: the two modes!! Hashing!! Embedding!!

More information

SHOT-BASED OBJECT RETRIEVAL FROM VIDEO WITH COMPRESSED FISHER VECTORS. Luca Bertinetto, Attilio Fiandrotti, Enrico Magli

SHOT-BASED OBJECT RETRIEVAL FROM VIDEO WITH COMPRESSED FISHER VECTORS. Luca Bertinetto, Attilio Fiandrotti, Enrico Magli SHOT-BASED OBJECT RETRIEVAL FROM VIDEO WITH COMPRESSED FISHER VECTORS Luca Bertinetto, Attilio Fiandrotti, Enrico Magli Dipartimento di Elettronica e Telecomunicazioni, Politecnico di Torino (Italy) ABSTRACT

More information

Journal of Asian Scientific Research FEATURES COMPOSITION FOR PROFICIENT AND REAL TIME RETRIEVAL IN CBIR SYSTEM. Tohid Sedghi

Journal of Asian Scientific Research FEATURES COMPOSITION FOR PROFICIENT AND REAL TIME RETRIEVAL IN CBIR SYSTEM. Tohid Sedghi Journal of Asian Scientific Research, 013, 3(1):68-74 Journal of Asian Scientific Research journal homepage: http://aessweb.com/journal-detail.php?id=5003 FEATURES COMPOSTON FOR PROFCENT AND REAL TME RETREVAL

More information

6. Parallel Volume Rendering Algorithms

6. Parallel Volume Rendering Algorithms 6. Parallel Volume Algorithms This chapter introduces a taxonomy of parallel volume rendering algorithms. In the thesis statement we claim that parallel algorithms may be described by "... how the tasks

More information

SURF. Lecture6: SURF and HOG. Integral Image. Feature Evaluation with Integral Image

SURF. Lecture6: SURF and HOG. Integral Image. Feature Evaluation with Integral Image SURF CSED441:Introduction to Computer Vision (2015S) Lecture6: SURF and HOG Bohyung Han CSE, POSTECH bhhan@postech.ac.kr Speed Up Robust Features (SURF) Simplified version of SIFT Faster computation but

More information

Histograms of Oriented Gradients

Histograms of Oriented Gradients Histograms of Oriented Gradients Carlo Tomasi September 18, 2017 A useful question to ask of an image is whether it contains one or more instances of a certain object: a person, a face, a car, and so forth.

More information

A Rapid Automatic Image Registration Method Based on Improved SIFT

A Rapid Automatic Image Registration Method Based on Improved SIFT Available online at www.sciencedirect.com Procedia Environmental Sciences 11 (2011) 85 91 A Rapid Automatic Image Registration Method Based on Improved SIFT Zhu Hongbo, Xu Xuejun, Wang Jing, Chen Xuesong,

More information

SCALE INVARIANT FEATURE TRANSFORM (SIFT)

SCALE INVARIANT FEATURE TRANSFORM (SIFT) 1 SCALE INVARIANT FEATURE TRANSFORM (SIFT) OUTLINE SIFT Background SIFT Extraction Application in Content Based Image Search Conclusion 2 SIFT BACKGROUND Scale-invariant feature transform SIFT: to detect

More information

Geometric Consistency Checking for Local-Descriptor Based Document Retrieval

Geometric Consistency Checking for Local-Descriptor Based Document Retrieval Geometric Consistency Checking for Local-Descriptor Based Document Retrieval Eduardo Valle, David Picard, Matthieu Cord To cite this version: Eduardo Valle, David Picard, Matthieu Cord. Geometric Consistency

More information

Perception IV: Place Recognition, Line Extraction

Perception IV: Place Recognition, Line Extraction Perception IV: Place Recognition, Line Extraction Davide Scaramuzza University of Zurich Margarita Chli, Paul Furgale, Marco Hutter, Roland Siegwart 1 Outline of Today s lecture Place recognition using

More information

Object Detection by Point Feature Matching using Matlab

Object Detection by Point Feature Matching using Matlab Object Detection by Point Feature Matching using Matlab 1 Faishal Badsha, 2 Rafiqul Islam, 3,* Mohammad Farhad Bulbul 1 Department of Mathematics and Statistics, Bangladesh University of Business and Technology,

More information

arxiv: v1 [cs.cv] 28 Sep 2018

arxiv: v1 [cs.cv] 28 Sep 2018 Camera Pose Estimation from Sequence of Calibrated Images arxiv:1809.11066v1 [cs.cv] 28 Sep 2018 Jacek Komorowski 1 and Przemyslaw Rokita 2 1 Maria Curie-Sklodowska University, Institute of Computer Science,

More information

Spatial Topology of Equitemporal Points on Signatures for Retrieval

Spatial Topology of Equitemporal Points on Signatures for Retrieval Spatial Topology of Equitemporal Points on Signatures for Retrieval D.S. Guru, H.N. Prakash, and T.N. Vikram Dept of Studies in Computer Science,University of Mysore, Mysore - 570 006, India dsg@compsci.uni-mysore.ac.in,

More information

Large scale object/scene recognition

Large scale object/scene recognition Large scale object/scene recognition Image dataset: > 1 million images query Image search system ranked image list Each image described by approximately 2000 descriptors 2 10 9 descriptors to index! Database

More information

Image-Space-Parallel Direct Volume Rendering on a Cluster of PCs

Image-Space-Parallel Direct Volume Rendering on a Cluster of PCs Image-Space-Parallel Direct Volume Rendering on a Cluster of PCs B. Barla Cambazoglu and Cevdet Aykanat Bilkent University, Department of Computer Engineering, 06800, Ankara, Turkey {berkant,aykanat}@cs.bilkent.edu.tr

More information

Computer vision: models, learning and inference. Chapter 13 Image preprocessing and feature extraction

Computer vision: models, learning and inference. Chapter 13 Image preprocessing and feature extraction Computer vision: models, learning and inference Chapter 13 Image preprocessing and feature extraction Preprocessing The goal of pre-processing is to try to reduce unwanted variation in image due to lighting,

More information

Instance-level recognition

Instance-level recognition Instance-level recognition 1) Local invariant features 2) Matching and recognition with local features 3) Efficient visual search 4) Very large scale indexing Matching of descriptors Matching and 3D reconstruction

More information

AN EFFECTIVE APPROACH FOR VIDEO COPY DETECTION USING SIFT FEATURES

AN EFFECTIVE APPROACH FOR VIDEO COPY DETECTION USING SIFT FEATURES AN EFFECTIVE APPROACH FOR VIDEO COPY DETECTION USING SIFT FEATURES Miss. S. V. Eksambekar 1 Prof. P.D.Pange 2 1, 2 Department of Electronics & Telecommunication, Ashokrao Mane Group of Intuitions, Wathar

More information

Face detection and recognition. Many slides adapted from K. Grauman and D. Lowe

Face detection and recognition. Many slides adapted from K. Grauman and D. Lowe Face detection and recognition Many slides adapted from K. Grauman and D. Lowe Face detection and recognition Detection Recognition Sally History Early face recognition systems: based on features and distances

More information

Instance-level recognition

Instance-level recognition Instance-level recognition 1) Local invariant features 2) Matching and recognition with local features 3) Efficient visual search 4) Very large scale indexing Matching of descriptors Matching and 3D reconstruction

More information