Distributed Image Indexing and Retrieval with Mobile Agents

Similar documents
Content Based Image Retrieval Using Mobile Agents and Steganography

User Interface Techniques for Mobile Agents

Holistic Correlation of Color Models, Color Features and Distance Metrics on Content-Based Image Retrieval

Architecture Proposal for an Internet Services Charging Platform

Image Mining Using Image Feature

Improving Adaptive Hypermedia by Adding Semantics

An Application of Mobile Agents as Personal Assistents in Electronic Commerce

Unsupervised Clustering of Web Sessions to Detect Malicious and Non-malicious Website Users

Simulating a Finite State Mobile Agent System

Mobile Agents as an Architectural Concept for Internet-based Distributed Applications

Web Image Retrieval Using Visual Dictionary

RobustmageRetrievalusingDominantColourwithBinarizedPatternFeatureExtractionandFastCorrelation

C H A P T E R Introduction

Creating and Running Mobile Agents with XJ DOME

Crises Management in Multiagent Workflow Systems

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Extended Identity for Social Networks

Adding Usability to Web Engineering Models and Tools

AUTHENTICATION AND LOOKUP FOR NETWORK SERVICES

Distributed Implementation of a Self-Organizing. Appliance Middleware

AN ASSOCIATIVE TERNARY CACHE FOR IP ROUTING. 1. Introduction. 2. Associative Cache Scheme

General Image Database Model

Performance Evaluation of Mobile Agents for E-Commerce Applications

An RDF NetAPI. Andy Seaborne. Hewlett-Packard Laboratories, Bristol

International Roaming Charges: Frequently Asked Questions

CONTENT BASED IMAGE RETRIEVAL SYSTEM USING IMAGE CLASSIFICATION

Middleware for Ubiquitous Computing

Content Based Image Retrieval with Semantic Features using Object Ontology

Factors Influencing the Quality of the User Experience in Ubiquitous Recommender Systems

Research on 3G Terminal-Based Agricultural Information Service

A Scalable Location Aware Service Platform for Mobile Applications Based on Java RMI

Data Hiding in Video

Advanced M&S Methodologies: Multimodels and Multisimulations*

Mission Critical Mobile Broadband:

Towards a Framework for Distributed User Modelling for Ubiquitous Computing

Workshops. 1. SIGMM Workshop on Social Media. 2. ACM Workshop on Multimedia and Security

A Rough Set Approach for Generation and Validation of Rules for Missing Attribute Values of a Data Set

Perceptually-driven moment thresholds for shape description in image databases

A Mechanism to Avoid Collusion Attacks Based on Code Passing in Mobile Agent Systems

Micro-Communication Element System

On Supporting HCOME-3O Ontology Argumentation Using Semantic Wiki Technology

Performance comparison of implementation mechanisms for e-commerce applications: Towards a hybrid approach

EPC Tag Authentication with Randomized Characteristics for Strong Privacy

UNICORE Globus: Interoperability of Grid Infrastructures

An Approach to Resolve Data Model Heterogeneities in Multiple Data Sources


A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol

Shape Retrieval with Flat Contour Segments

Implementation of Security in Cloud Systems Based using Encryption and Steganography

DATA- FILE SECURITY ENCRYPTION ALGORITHM

A model of information searching behaviour to facilitate end-user support in KOS-enhanced systems

Oleksandr Kuzomin, Bohdan Tkachenko

Visualizing semantic table annotations with TableMiner+

1. Discovering Important Nodes through Graph Entropy The Case of Enron Database

High Capacity Reversible Watermarking Scheme for 2D Vector Maps

Covert Identity Information in Direct Anonymous Attestation (DAA)

Improved Delegation Of Computation Using Somewhat Homomorphic Encryption To Reduce Storage Space

DEVELOPING A NEW MECHANISM FOR LOCATING AND MANAGING MOBILE AGENTS

Mobile Process Resumption In Java Without Bytecode Rewriting

Aalborg Universitet. Just-In-Place Information for Mobile Device Interfaces Kjeldskov, Jesper. Published in: Paterno, F. (ed.)

Resource and Service Trading in a Heterogeneous Large Distributed

OASIS: Architecture, Model and Management of Policy

Querying by Color Regions using the VisualSEEk Content-Based Visual Query System

3. Agent-Oriented Methodologies Part 2: The PROMETHEUS methodology.

Brian Hamrick. October 26, 2009

Preserving Rich User Interface State in Web Applications across Various Platforms

Use of Mobile Agents for IPR Management and Negotiation

A Survey on Various Techniques of Recommendation System in Web Mining

Enriching Lifelong User Modelling with the Social e- Networking and e-commerce Pieces of the Puzzle

DISCOVERING INFORMATIVE KNOWLEDGE FROM HETEROGENEOUS DATA SOURCES TO DEVELOP EFFECTIVE DATA MINING

Doctoral Studies and Research Proposition. Diversity in Peer-to-Peer Networks. Mikko Pervilä. Helsinki 24 November 2008 UNIVERSITY OF HELSINKI

Mobile Agent Systems, Recent Security Threats and Counter Measures

Edinburgh Research Explorer

Handling URL Links on Web Diagrams

System and method for encoding and decoding data files

Model-Driven Iterative Development of 3D Web-Applications Using SSIML, X3D and JavaScript

Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology

Context-based Navigational Support in Hypermedia

NYSVMS WEBSITE PRIVACY POLICY

RMI-P4. Harsimrankaur PDMCEW, Bahadurgarh

Web Application Development: Java,.Net and Lamp at the Same Time *

An Admission Control and Deployment Optimization Algorithm for an Implemented Distributed Bandwidth Broker in a Simulation Environment

Crossing the Archival Borders

Predicates for Boolean web service policy languages Anne H. Anderson Sun Microsystems Laboratories Burlington, MA

Achieving IEC Standard Compliance for Fiber Optic Connector Quality through Automation of the Systematic Proactive End Face Inspection Process

USING LDAP FOR NETWORK TOPOLOGY AND SERVICE MANAGEMENT APPLICATIONS INTEGRATION

Next, we compare procedures for certain feature scenarios. In the IS-41 approach, features are handled in three ways: by the HLR upon receiving a

Figure 1. Overview of a semantic-based classification-driven image retrieval framework. image comparison; and (3) Adaptive image retrieval captures us

An Introduction to Overlay Networks PlanetLab: A Virtual Overlay Network Testbed

Stable Model-View-Mapping (MVM) Architectural Pattern

Ontology Extraction from Heterogeneous Documents

A Framework for Reliability Assessment of Software Components

Modelling of Adaptive Hypermedia Systems

Clean Living: Eliminating Near-Duplicates in Lifetime Personal Storage

A novel stateless authentication protocol

General Data Protection Regulation (GDPR)

QUERY PROCESSING IN A RELATIONAL DATABASE MANAGEMENT SYSTEM

Extraction of Web Image Information: Semantic or Visual Cues?

Video Inter-frame Forgery Identification Based on Optical Flow Consistency

A Proposed Method in Agile Practices to Create Requirements Documentation and Test Cases

Transcription:

Distributed Image ing and Retrieval with Mobile Agents Volker Roth Fraunhofer Institut für Graphische Datenverarbeitung, Rundeturmstraße 6, 64283 Darmstadt, Germany, Phone +49 6151 155-536, Fax +49 6151 155-499 vroth@igd.fhg.de 1 Context and Current Approaches At present, the de-facto platform for providing contents in the Internet is the World Wide Web. A technology, which is now emerging on the Web, is content-based retrieval (CBR). A content-based query matches examples or prototypes to known instances of a certain media type based on a measure of similarity. For efficiency, similarity measures are frequently computed on sets of discriminant features (so-called feature vectors) being extracted a-priori from the stored media. A number of CBR systems have already been developed. Hardly any article related to CBR fails to acknowledge IBM s QBIC system [6] and MIT s Photobook [8]. Both operate on images available locally, though. Smith et al. [12, 13] developed a CBR system for the World Wide Web. Scarloff et al. [11] developed a content-based image query system including a gatherer collecting images from the Web. Beigi et al. [2] already applied the principle of meta-searching to a number of available image search engines. 2 Drawbacks Although a start has been made, the present approaches towards supporting a market for digital images suffer from a number of disadvantages: Image indexing is centralized; all images have to be transfered across the network to some indexing process, or a group of processes distributed over a set of hosts. Image gatherers such as the one presented by Sclaroff et al. [11] request images using HTTP requests. Robot etiquette protocols mandate that a site must not be flooded with requests. Therefor, the gatherer needs to wait between requests, which increases the time required for requesting and receiving an image. This time is identified as a performance bottleneck. The introduction of new CBR models, such as models applying domain-specific knowledge, remains inflexible. As a rule of thumb, systems applying domain-specific knowledge achieve higher precision at the price of being applicable only to a focused domain of images [8]. Once, images are transferred to a remote indexing process, all control on the distribution of the image data is lost. In this article, we address these problems by proposing an alternative architecture and model for distributed indexation and searching of images (the essentials are outlined in Figures 1 and 2) that combines CBR, mobile agent technology [17, 16, 9], and digital watermarking (see for instance [1]).

3 CBR with Mobile Agents Mobile agents [10, 9, 16, 17] push the flexibility of distributed systems to their limits since not only computations are dynamically distributed but also the code that performs them. A number of mobile agent systems are in existence at present; basic information on about 60 such systems (including ours) was collected in the run-up to the ASA/MA 99 Conference that took place beginning of October in Palm Springs, USA. We anticipate image brokers running a CBR service. This service is queried using example images or feature vectors already extracted from them. The CBR service returns a list of image descriptors of images matching the query in the order of similarity. Each image descriptor consists at least of a thumbnail, the image identifier of that image (unique within the domain of the image provider), a measure of similarity to the original query image, and the URL of the provider s agent server from which the image can be retrieved. The images themselves must be retrieved from the providers. This ensures that providers may identify customers and may apply digital watermarks to retrieved images. Image indexation is done with mobile agents, which transport the CBR feature vector extraction and collection algorithm to the servers of image providers. ing agents may compute and collect indexes of multiple image archives, which are sent back and merged to the broker s main index. This model is illustrated in Figure 1; triangles stand for agents. As an alternative, the agents may offer CBR services directly from the image provider s host, which completely eliminates the need to transfer indexes. In this case, brokers provide a directory service from which the locations of the index agents can be retrieved by search agents (see Figure 2 for an illustration of this model). Content providers run an image service that returns image data based on a ID. While retrieving thumbnails is free, retrieving full images is subject to access control. In accordance to agreements between brokers and providers, index agents are authorised to read full images for the purpose of indexing. Search agents are allowed to retrieve full images only if appropriate licenses were purchased beforehand. The mobile agent approach can complement Web-based approaches. We developed a mobile agent platform featuring a service that allows mobile agents to register Servlets at a HTTP Daemon agent (which can in principle be mobile itself). Agents may thus communicate results to human users through ordinary browsers. 4 Security Considerations Providing adequate security is crucial for the applicability of the model presented in this article. The security of mobile agents in general plays an important role, since agents may threaten hosting machines (denial-of-service, viruses, covert channels) and other agents (privacy, integrity). On the other hand, hosts may deceive or defraud visiting agents. This is particularly critical if agents are to negotiate license terms on behalf or their owners. Providers may also be tempted to peek on images collected by visiting agents from competitors, or to reduce the quality of such images, or to remove them altogether. In summary:

Broker Provider Migration Datentransfer Fig. 1. The model with a centralized index. Broker Status Status Fig. 2. The distributed index model.

1. agents must be protected against malicious hosts, 2. hosts must be protected against malicious agents, 3. agents must be protected against other agents, 4. both agents and hosts must be protected against the rest of the world. Item 4 can be dealt with in ways known from any Client/Server system operated in the Internet, for instance by using transport layer security and putting proper security policies into effect. However, mobile agents invalidate certain assumptions on which Client/Server security is based, as described nicely by David Chess [4]. Item 1 is generally recognised as being particularly challenging. Despite advances in conceptual mobile agent security issues [14, 15], few agent systems actually seem to offer security mechanisms beyond transport layer security. For this reason we develop a mobile agent server that we use to explore practical security issues for mobile agents. The title of this server Secure Mobile Agents (SeMoA) was chosen to reflect this focus. The SeMoA server is the basis of our CBR application. The CBR application itself imposes further security requirements, one of the most prominent ones being the illicit export of image data. Belmon et al. [3] propose to compensate potential losses due to covert channels by charging agents with the anticipated value, regardless whether agents use the channel or not; an approach that we think is not user-friendly and acceptable. We still favour tracing of digital watermarks as the mechanism of choice. Delegating negotiation to agents, be they mobile or static, requires on one hand sound technical security, and on the other hand a proper legal framework. Our goal is to investigate and thrive to solve security implications of the described framework involving indexation, search, purchase and payment of image (licenses) with mobile agents (see for instance [15] for a good coverage of mobile agent security issues). 5 Conclusions The mobile agent approach has a number of advantages. Multiple (complementary) indexing and retrieval mechanisms are be supported in a single framework; such mechanisms are easily replaceable as the field of CBR evolves towards more robust and applicable mechanisms. Software distribution, installation and removal is easy and painless. Image indexing is decentralized. It is computed near the image database by index agents migrating to the agent servers of image providers. Images must not be transported across networks for index generation any more. Retrieved images can be personalized by watermarking them with the identity of the purchaser. Presently, we are implementing a prototype based on the (yet unpublished) SeMoA (Secure Mobile Agents) platform and a watermarking system developed by the Institut für Graphische Datenverarbeitung in Darmstadt [5], and a content based retrieval mechanism based on color coherence vectors [7]. References 1. ANDERSON, R., Ed. Information hiding: first international workshop, Cambridge, U.K., May 30-June 1, 1996: proceedings (New York, NY, USA, 1996), vol. 1174 of Lecture Notes in Computer Science, Springer-Verlag Inc.

2. BEIGI, M., BENITEZ, A. B., AND CHANG, S.-F. MetaSEEk: A content based meta search engine for images. In Proc. Storage and Retrieval for Image and Video Databases VI (SPIE) (San Jose, CA, USA, January 1998). 3. BELMON, S. G., AND YEE, B. S. Mobile agents and intellectual property protection. In Rothermel and Hohl [9], pp. 172 182. 4. CHESS, D. M. Security issues in mobile code systems. In Vigna [14], pp. 1 14. 5. KOCH, E., AND ZHAO, J. Towards robust and hidden image copyright labeling. In Proc. of 1995 IEEE Workshop on Nonlinear Signal and Image Processing (Halkidiki, Greece, June 1995), pp. 452 455. 6. M. FLICKNER ET. AL. Query by image and video content: The QBIC System. IEEE Computer 28, 9 (Sep. 1995). 7. PASS, G., ZABIH, R., AND MILLER, J. Comparing images using color coherence vectors. In Proc. ACM Conference on Multimedia (Boston, Massachusetts, U. S. A., November 1996). 8. PENTLAND, A., PICARD, R. W., AND SCLAROFF, S. Photobook: Content based manipulation of image databases. International Journal of Computer Vision 18, 3 (1996), 233 254. 9. ROTHERMEL, K., AND HOHL, F., Eds. Proceedings of the Second International Workshop on Mobile Agents (MA 98), vol. 1477 of Lecture Notes in Computer Science. Springer Verlag, Berlin Heidelberg, September 1998. 10. ROTHERMEL, K., AND POPESCU-ZELETIN, R., Eds. Mobile Agents (MA 97), vol. 1219 of Lecture Notes in Computer Science. Springer Verlag, Berlin Heidelberg, 1997. 11. SCLAROFF, S., TAYCHER, L., AND CASCIA, M. L. ImageRover: A content-based image browser for the world wide web. In Proc. IEEE Workshop on Content-based Access of Image and Video Libraries (San Juan, Puerto Rico, June 1997). 12. SMITH, J. R., AND CHANG, S.-F. VisualSEEk: a fully automated content-based image query system. In Proc. ACM Multimedia 96 Conference (Boston, MA, USA, November 1996). 13. SMITH, J.R.,AND CHANG, S.-F. An image and video search engine for the world wide web. In Proc. Storage and Retrieval for Image and Video Databases V (SPIE) (San Jose, CA, USA, February 1997). 14. VIGNA, G., Ed. Mobile Agents and Security, vol. 1419 of Lecture Notes in Computer Science. Springer Verlag, Berlin Heidelberg, 1998. 15. VITEK, J.,AND JENSEN, C.Secure Internet Programming: Security Issues for Mobile and Distributed Objects, vol. 1603 of Lecture Notes in Computer Science. Springer-Verlag Inc., New York, NY, USA, 1999. 16. VITEK, J., AND TSCHUDIN, C., Eds. Mobile Object Systems: Towards the Programmable Internet, vol. 1222 of Lecture Notes in Computer Science. Springer Verlag, Berlin Heidelberg, 1997. 17. WHITE, J.E.Mobile Agents. AAAI/MIT Press, 1997, ch. 18.