SlideShare a Scribd company logo
Paper ID: 1570186597
imPlag: Detecting Image Plagiarism Using
Hierarchical Near Duplicate Retrieval
Siddharth Srivastava, Prerana Mukherjee, Brejesh Lall
Indian Institute of Technology, Delhi
IEEE India Council
Department of Electrical Engineering
Faculty of Engineering & Technology
Jamia Millia Islamia, New Delhi, India
Introduction
The key characteristic of image plagiarism is that it may involve the
reproduction of the original image using an entirely different mode
such as hand made sketches. Image Plagiarism can be posed as a
superset of image copy detection problems.
Fig. 1. (a) Original Image (b) Plagiarised image (reproduction of the source image) (c) Copied image (considered as
strong attack by copy detection algorithms but an expected case for Image Plagiarism)
IEEE India Council
Department of Electrical Engineering
Faculty of Engineering & Technology
Jamia Millia Islamia, New Delhi, India
Problems ?
• Detection of similar images – Huge Databases, Interactive Time
• Plagiarism brings in innovation
• Hence involves both Research and Engineering Challenges
- Stitched from 3888 images
- One column/row pixel from each
image
So knowing your limits is
necessary
Image Courtesy:Eirik Solheim
(Image has been used for demonstrating
the extent of deformation possible in
images)
IEEE India Council
Department of Electrical Engineering
Faculty of Engineering & Technology
Jamia Millia Islamia, New Delhi, India
KEY CONTRIBUTIONS
Development of a hierarchical feature extraction and feature indexing
technique.
Evaluation of recent feature extraction techniques against simple,
moderate and extreme deformations.
Dataset construction for testing image plagiarism algorithms.
IEEE India Council
Department of Electrical Engineering
Faculty of Engineering & Technology
Jamia Millia Islamia, New Delhi, India
Dataset
• Natural Images – mountains, rivers, animals, birds etc.
• Actual scenario – too many images can be similar but might not be
plagiarized (synthetically transformed)
• So for evaluation, dataset was created since detecting image
plagiarism is not really only Content Based Image Retrieval
• Search for images on Flickr, ukbench dataset
• Find similar images using Google Reverse Image Search (Google doesn’t index
Flickr !!)
• Transformed Images – Affine, Grayscale, Color channel separation
etc. (30 transformations)
IEEE India Council
Department of Electrical Engineering
Faculty of Engineering & Technology
Jamia Millia Islamia, New Delhi, India
Methodology
Heirarchical
Feature
Extraction
Feature
Indexing
Search
Query
NN
Match/Exact
Matching
Ranking or
Verification
Fingerprint the image
- Perceptual Hash
- SIFT > SURF, ORB, FREAK, PCA-SIFT
Store for retrieval
- Database
- Apache Lucene
- Locality Sensitive
Hashing
Search the index
- Search LSH Index
Relevant Results ranked
at the top
- Bag of Visual Words
Histogram matching
IEEE India Council
Department of Electrical Engineering
Faculty of Engineering & Technology
Jamia Millia Islamia, New Delhi, India
Hierarchical Indexing
Lucene Index
Perceptual Hash
Locality Sensitive Hashing
SIFT Features
Bag of Visual Words
Images
Lucene Index Traditional
Database
IEEE India Council
Department of Electrical Engineering
Faculty of Engineering & Technology
Jamia Millia Islamia, New Delhi, India
Layered Retrieval
Input Image
Calculate
Perceptual Hash
of input Image
Search LSH Index
for nearest
neighbours
Rank images based
on BoVW
histogram
matching
IEEE India Council
Department of Electrical Engineering
Faculty of Engineering & Technology
Jamia Millia Islamia, New Delhi, India
Perceptual Hash
• Can be used for multimedia content (audio, video, images)
• Similar images have similar hash values
Scale
image to
32x32
Convert
to
grayscale
Compute
DCT
Keep first
8x8
coefficie
nts
Take
Average
(no DC
Term)
Coeff > Avg
=> 1
Coeff <= Avg
=> 0
Flatten to
64bit vector
IEEE India Council
Department of Electrical Engineering
Faculty of Engineering & Technology
Jamia Millia Islamia, New Delhi, India
Bag of Visual Words
• SIFT features converted to Bag of Visual Words
• More efficient than direct keypoint matching
• Observations:
• Large vocabulary size may increase false negatives
• Small vocabulary size may increase false positives
• Though there is no definite pattern on what should the vocabulary
size be
IEEE India Council
Department of Electrical Engineering
Faculty of Engineering & Technology
Jamia Millia Islamia, New Delhi, India
Results
• Accuracy: 81%
• Scalability
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
0 1000 2000 3000 4000 5000 6000 7000
Time(sec)
Number of images in the dataset
top-60 results
IEEE India Council
Department of Electrical Engineering
Faculty of Engineering & Technology
Jamia Millia Islamia, New Delhi, India
Conclusion
• We perform evaluations to choose best criteria and techniques for
detecting image plagiarism.
• A method is proposed, consisting of perceptual hashing and SIFT with
hierarchical approximate matching scheme.
• This scheme was able to maintain the tradeoff between time and
accuracy.
IEEE India Council
Department of Electrical Engineering
Faculty of Engineering & Technology
Jamia Millia Islamia, New Delhi, India
References
• E. Chalom, E. Asa, and E. Biton, “Measuring image similarity: an overview of some useful applications,”
Instrumentation & Measurement Magazine, IEEE, vol. 16, no. 1, pp. 24–28, 2013.
• C. Zauner, M. Steinebach, and E. Hermann, “Rihamark: perceptual image hash benchmarking,” in IS&T/SPIE
Electronic Imaging. International Society for Optics and Photonics, 2011, pp. 78 800X–78 800X.
• V. Voronin, V. Frantc, V. Marchuk, and K. Egiazarian, “Fast texture and structure image reconstruction using
the perceptual hash,” Image Processing: Algorithms and Systems XI, 2013.
• A. Kumar, A. Anand, A. Akella, A. Balachandran, V. Sekar, and S. Seshan, “Flexible multimedia content
retrieval using infonames,” ACM SIGCOMM Computer Communication Review, vol. 41, no. 4, pp. 455–456,
2011
• A. Gionis, P. Indyk, R. Motwani et al., “Similarity search in high dimensions via hashing,” in VLDB, vol. 99,
1999, pp. 518–529.
• V. Christlein, C. Riess, J. Jordan, and E. Angelopoulou, “An evaluation of popular copy-move forgery detection
approaches,” Information Forensics and Security, IEEE Transactions on, vol. 7, no. 6, pp. 1841– 1854, 2012.
• M. Lux and S. A. Chatzichristofis, “Lire: lucene image retrieval: an extensible java cbir library,” in Proceedings
of the 16th ACM international conference on Multimedia. ACM, 2008, pp. 1085–1088.
IEEE India Council
Department of Electrical Engineering
Faculty of Engineering & Technology
Jamia Millia Islamia, New Delhi, India
THANKYOU
IEEE India Council
Department of Electrical Engineering
Faculty of Engineering & Technology
Jamia Millia Islamia, New Delhi, India
Appendix: Dataset Images
Perceptually Similar ?
IEEE India Council
Department of Electrical Engineering
Faculty of Engineering & Technology
Jamia Millia Islamia, New Delhi, India
Appendix: Nature is not always greenish
IEEE India Council
Department of Electrical Engineering
Faculty of Engineering & Technology
Jamia Millia Islamia, New Delhi, India
Appendix: Accuracy
0
10
20
30
40
50
60
70
80
90
100
60 100 150 200 250
Accuracy(%)
Number of Results(top-N)
Accuracy(%)
IEEE India Council
Department of Electrical Engineering
Faculty of Engineering & Technology
Jamia Millia Islamia, New Delhi, India
Appendix: Results
Fig 2. Comparison of Feature matching techniques Fig 3. Average time taken by SIFT, SURF and Perceptual Hash
PH
SURF
SIFT
IEEE India Council
Department of Electrical Engineering
Faculty of Engineering & Technology
Jamia Millia Islamia, New Delhi, India
Appendix: Results
Fig 4. Comparison of ranked retrieval Fig 5. Ranked V/s Non Ranked Retrieval
IEEE India Council
Department of Electrical Engineering
Faculty of Engineering & Technology
Jamia Millia Islamia, New Delhi, India
Appendix: Results
Fig 6. Time vs Number of results Fig 7. Time vs Number of Images in the dataset
IEEE India Council
Department of Electrical Engineering
Faculty of Engineering & Technology
Jamia Millia Islamia, New Delhi, India
Appendix: Results
Fig 8. Lucene v/s Database Retrieval time
IEEE India Council
Department of Electrical Engineering
Faculty of Engineering & Technology
Jamia Millia Islamia, New Delhi, India
Locality Sensitive Hashing
• Similar features hashed to same hash values
• Parameters
• No of bits (k)
• No of tables (l)
• Maximum Bucket capacity (usually unlimited)
• Empirical Analysis needed for determining parameters as per the
dataset
• varying number of bits, varies bucket size (small hash, more collisions
and vice versa)
IEEE India Council
Department of Electrical Engineering
Faculty of Engineering & Technology
Jamia Millia Islamia, New Delhi, India
Lucene
• Very efficient in document indexing and retrieval
• Bag of Visual words histograms are indexed
• Allows for random access of documents
• Histograms are fetched from Lucene index and ranked (Filtering)
IEEE India Council
Department of Electrical Engineering
Faculty of Engineering & Technology
Jamia Millia Islamia, New Delhi, India

More Related Content

PDF
Using optimized features for modified optical backpropagation
PDF
Mining of Images Based on Structural Features Correlation for Facial Annotation
PDF
IRJET- Spot Me - A Smart Attendance System based on Face Recognition
PDF
Genetic Algorithm for optimization on IRIS Dataset presentation ppt
PDF
Genetic Algorithm for optimization on IRIS Dataset REPORT pdf
PDF
Face Annotation using Co-Relation based Matching for Improving Image Mining ...
PDF
A Parallel Architecture for Multiple-Face Detection Technique Using AdaBoost ...
PDF
Dynamic hand gesture recognition using cbir
Using optimized features for modified optical backpropagation
Mining of Images Based on Structural Features Correlation for Facial Annotation
IRJET- Spot Me - A Smart Attendance System based on Face Recognition
Genetic Algorithm for optimization on IRIS Dataset presentation ppt
Genetic Algorithm for optimization on IRIS Dataset REPORT pdf
Face Annotation using Co-Relation based Matching for Improving Image Mining ...
A Parallel Architecture for Multiple-Face Detection Technique Using AdaBoost ...
Dynamic hand gesture recognition using cbir

What's hot (19)

PDF
CV_Salim_August-2016
PDF
Indian Internship at HumanIT
PDF
IRJET - A Review on Text Recognition for Visually Blind People
PDF
IJSRED-V2I1P12
PDF
IRJET - A Review on Face Recognition using Deep Learning Algorithm
PDF
Table of contenets dec 2018
PDF
Robust Tracking Via Feature Mapping Method and Support Vector Machine
PDF
06108870 analytical study of parallel and distributed image processing 2011
PDF
IRJET-A Review on User Personalized Tag Based Image Search by Tag Relevance
PPTX
Gabriel Bianconi - Introduction to Face Processing with Computer Vision
PDF
IRJET- Development of a Face Recognition System with Deep Learning and Py...
PDF
TOP 10 Cited Computer Science & Information Technology Research Articles From...
PDF
IRJET - A Review on: Face Recognition using Laplacianface
PDF
Automatic Attendance System using Deep Learning Framework
PDF
Brv vardhan 2013
PDF
IRJET- Automated Student’s Attendance Management using Convolutional Neural N...
PDF
Internation Journal Conference
DOC
Sagar_Lachure_resume-new
PDF
Achieving Scalability in Software Testing with Machine Learning and Metaheuri...
CV_Salim_August-2016
Indian Internship at HumanIT
IRJET - A Review on Text Recognition for Visually Blind People
IJSRED-V2I1P12
IRJET - A Review on Face Recognition using Deep Learning Algorithm
Table of contenets dec 2018
Robust Tracking Via Feature Mapping Method and Support Vector Machine
06108870 analytical study of parallel and distributed image processing 2011
IRJET-A Review on User Personalized Tag Based Image Search by Tag Relevance
Gabriel Bianconi - Introduction to Face Processing with Computer Vision
IRJET- Development of a Face Recognition System with Deep Learning and Py...
TOP 10 Cited Computer Science & Information Technology Research Articles From...
IRJET - A Review on: Face Recognition using Laplacianface
Automatic Attendance System using Deep Learning Framework
Brv vardhan 2013
IRJET- Automated Student’s Attendance Management using Convolutional Neural N...
Internation Journal Conference
Sagar_Lachure_resume-new
Achieving Scalability in Software Testing with Machine Learning and Metaheuri...
Ad

Similar to imPlag: Detecting Image Plagiarism Using Hierarchical Near Duplicate Retrieval (20)

PPT
SECURE IMAGE RETRIEVAL BASED ON HYBRID FEATURES AND HASHES
PPTX
Secure Image Retrieval based on Hybrid Features and Hashes
PDF
Visual Search
PDF
Techniques Used For Extracting Useful Information From Images
PDF
Image similarity using fourier transform
PDF
Authenticate Aadhar Card Picture with Current Image using Content Based Image...
PPT
Near Duplicate Image Detection: min-Hash and tf-idf weighting
PPTX
Evolving a Medical Image Similarity Search
PDF
Similarity-based retrieval of multimedia content
PDF
A Review on Matching For Sketch Technique
PDF
Web Image Retrieval Using Visual Dictionary
PDF
Web Image Retrieval Using Visual Dictionary
PDF
Web Image Retrieval Using Visual Dictionary
PDF
Image retrieval and re ranking techniques - a survey
PDF
Paper id 25201471
PDF
Flickr Image Classification using SIFT Algorism
PDF
Ijcet 06 06_006
PDF
IRJET- A Survey on Image Forgery Detection and Removal
PDF
A tutorial review of automatic image tagging technique using text mining
PDF
A tutorial review of automatic image tagging technique using text mining
SECURE IMAGE RETRIEVAL BASED ON HYBRID FEATURES AND HASHES
Secure Image Retrieval based on Hybrid Features and Hashes
Visual Search
Techniques Used For Extracting Useful Information From Images
Image similarity using fourier transform
Authenticate Aadhar Card Picture with Current Image using Content Based Image...
Near Duplicate Image Detection: min-Hash and tf-idf weighting
Evolving a Medical Image Similarity Search
Similarity-based retrieval of multimedia content
A Review on Matching For Sketch Technique
Web Image Retrieval Using Visual Dictionary
Web Image Retrieval Using Visual Dictionary
Web Image Retrieval Using Visual Dictionary
Image retrieval and re ranking techniques - a survey
Paper id 25201471
Flickr Image Classification using SIFT Algorism
Ijcet 06 06_006
IRJET- A Survey on Image Forgery Detection and Removal
A tutorial review of automatic image tagging technique using text mining
A tutorial review of automatic image tagging technique using text mining
Ad

More from Prerana Mukherjee (10)

PDF
SALPROP: SALIENT OBJECT PROPOSALS VIA AGGREGATED EDGE CUES
PDF
SALIENCY MAP BASED IMPROVED SEGMENTATION
PDF
AUTOMATED BALL TRACKING IN TENNIS VIDEO
PDF
A real-time ball trajectory follower using Robot Operating System
PDF
Enhanced characterness for text detection in the wild
PDF
Adaptive Image Compression Using Saliency and KAZE Features
PDF
ADAPTIVE CRYPTO-STEGANOSYSTEM FOR VIDEOS BASED ON INFORMATION CONTENT AND VIS...
PDF
ADAPTIVE CRYPTO-STEGANOSYSTEM FOR VIDEOS BASED ON INFORMATION CONTENT AND VIS...
PDF
Salient KeypointSelection for Object Representation
PDF
DRIZY- Collaborative Driver Assistance Over Wireless Networks
SALPROP: SALIENT OBJECT PROPOSALS VIA AGGREGATED EDGE CUES
SALIENCY MAP BASED IMPROVED SEGMENTATION
AUTOMATED BALL TRACKING IN TENNIS VIDEO
A real-time ball trajectory follower using Robot Operating System
Enhanced characterness for text detection in the wild
Adaptive Image Compression Using Saliency and KAZE Features
ADAPTIVE CRYPTO-STEGANOSYSTEM FOR VIDEOS BASED ON INFORMATION CONTENT AND VIS...
ADAPTIVE CRYPTO-STEGANOSYSTEM FOR VIDEOS BASED ON INFORMATION CONTENT AND VIS...
Salient KeypointSelection for Object Representation
DRIZY- Collaborative Driver Assistance Over Wireless Networks

Recently uploaded (20)

PPTX
Lesson notes of climatology university.
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
A systematic review of self-coping strategies used by university students to ...
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PDF
01-Introduction-to-Information-Management.pdf
PDF
RMMM.pdf make it easy to upload and study
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
Pharma ospi slides which help in ospi learning
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
Institutional Correction lecture only . . .
Lesson notes of climatology university.
202450812 BayCHI UCSC-SV 20250812 v17.pptx
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
A systematic review of self-coping strategies used by university students to ...
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
01-Introduction-to-Information-Management.pdf
RMMM.pdf make it easy to upload and study
Final Presentation General Medicine 03-08-2024.pptx
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Chinmaya Tiranga quiz Grand Finale.pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Pharma ospi slides which help in ospi learning
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Anesthesia in Laparoscopic Surgery in India
Abdominal Access Techniques with Prof. Dr. R K Mishra
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Institutional Correction lecture only . . .

imPlag: Detecting Image Plagiarism Using Hierarchical Near Duplicate Retrieval

  • 1. Paper ID: 1570186597 imPlag: Detecting Image Plagiarism Using Hierarchical Near Duplicate Retrieval Siddharth Srivastava, Prerana Mukherjee, Brejesh Lall Indian Institute of Technology, Delhi IEEE India Council Department of Electrical Engineering Faculty of Engineering & Technology Jamia Millia Islamia, New Delhi, India
  • 2. Introduction The key characteristic of image plagiarism is that it may involve the reproduction of the original image using an entirely different mode such as hand made sketches. Image Plagiarism can be posed as a superset of image copy detection problems. Fig. 1. (a) Original Image (b) Plagiarised image (reproduction of the source image) (c) Copied image (considered as strong attack by copy detection algorithms but an expected case for Image Plagiarism) IEEE India Council Department of Electrical Engineering Faculty of Engineering & Technology Jamia Millia Islamia, New Delhi, India
  • 3. Problems ? • Detection of similar images – Huge Databases, Interactive Time • Plagiarism brings in innovation • Hence involves both Research and Engineering Challenges - Stitched from 3888 images - One column/row pixel from each image So knowing your limits is necessary Image Courtesy:Eirik Solheim (Image has been used for demonstrating the extent of deformation possible in images) IEEE India Council Department of Electrical Engineering Faculty of Engineering & Technology Jamia Millia Islamia, New Delhi, India
  • 4. KEY CONTRIBUTIONS Development of a hierarchical feature extraction and feature indexing technique. Evaluation of recent feature extraction techniques against simple, moderate and extreme deformations. Dataset construction for testing image plagiarism algorithms. IEEE India Council Department of Electrical Engineering Faculty of Engineering & Technology Jamia Millia Islamia, New Delhi, India
  • 5. Dataset • Natural Images – mountains, rivers, animals, birds etc. • Actual scenario – too many images can be similar but might not be plagiarized (synthetically transformed) • So for evaluation, dataset was created since detecting image plagiarism is not really only Content Based Image Retrieval • Search for images on Flickr, ukbench dataset • Find similar images using Google Reverse Image Search (Google doesn’t index Flickr !!) • Transformed Images – Affine, Grayscale, Color channel separation etc. (30 transformations) IEEE India Council Department of Electrical Engineering Faculty of Engineering & Technology Jamia Millia Islamia, New Delhi, India
  • 6. Methodology Heirarchical Feature Extraction Feature Indexing Search Query NN Match/Exact Matching Ranking or Verification Fingerprint the image - Perceptual Hash - SIFT > SURF, ORB, FREAK, PCA-SIFT Store for retrieval - Database - Apache Lucene - Locality Sensitive Hashing Search the index - Search LSH Index Relevant Results ranked at the top - Bag of Visual Words Histogram matching IEEE India Council Department of Electrical Engineering Faculty of Engineering & Technology Jamia Millia Islamia, New Delhi, India
  • 7. Hierarchical Indexing Lucene Index Perceptual Hash Locality Sensitive Hashing SIFT Features Bag of Visual Words Images Lucene Index Traditional Database IEEE India Council Department of Electrical Engineering Faculty of Engineering & Technology Jamia Millia Islamia, New Delhi, India
  • 8. Layered Retrieval Input Image Calculate Perceptual Hash of input Image Search LSH Index for nearest neighbours Rank images based on BoVW histogram matching IEEE India Council Department of Electrical Engineering Faculty of Engineering & Technology Jamia Millia Islamia, New Delhi, India
  • 9. Perceptual Hash • Can be used for multimedia content (audio, video, images) • Similar images have similar hash values Scale image to 32x32 Convert to grayscale Compute DCT Keep first 8x8 coefficie nts Take Average (no DC Term) Coeff > Avg => 1 Coeff <= Avg => 0 Flatten to 64bit vector IEEE India Council Department of Electrical Engineering Faculty of Engineering & Technology Jamia Millia Islamia, New Delhi, India
  • 10. Bag of Visual Words • SIFT features converted to Bag of Visual Words • More efficient than direct keypoint matching • Observations: • Large vocabulary size may increase false negatives • Small vocabulary size may increase false positives • Though there is no definite pattern on what should the vocabulary size be IEEE India Council Department of Electrical Engineering Faculty of Engineering & Technology Jamia Millia Islamia, New Delhi, India
  • 11. Results • Accuracy: 81% • Scalability 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0 1000 2000 3000 4000 5000 6000 7000 Time(sec) Number of images in the dataset top-60 results IEEE India Council Department of Electrical Engineering Faculty of Engineering & Technology Jamia Millia Islamia, New Delhi, India
  • 12. Conclusion • We perform evaluations to choose best criteria and techniques for detecting image plagiarism. • A method is proposed, consisting of perceptual hashing and SIFT with hierarchical approximate matching scheme. • This scheme was able to maintain the tradeoff between time and accuracy. IEEE India Council Department of Electrical Engineering Faculty of Engineering & Technology Jamia Millia Islamia, New Delhi, India
  • 13. References • E. Chalom, E. Asa, and E. Biton, “Measuring image similarity: an overview of some useful applications,” Instrumentation & Measurement Magazine, IEEE, vol. 16, no. 1, pp. 24–28, 2013. • C. Zauner, M. Steinebach, and E. Hermann, “Rihamark: perceptual image hash benchmarking,” in IS&T/SPIE Electronic Imaging. International Society for Optics and Photonics, 2011, pp. 78 800X–78 800X. • V. Voronin, V. Frantc, V. Marchuk, and K. Egiazarian, “Fast texture and structure image reconstruction using the perceptual hash,” Image Processing: Algorithms and Systems XI, 2013. • A. Kumar, A. Anand, A. Akella, A. Balachandran, V. Sekar, and S. Seshan, “Flexible multimedia content retrieval using infonames,” ACM SIGCOMM Computer Communication Review, vol. 41, no. 4, pp. 455–456, 2011 • A. Gionis, P. Indyk, R. Motwani et al., “Similarity search in high dimensions via hashing,” in VLDB, vol. 99, 1999, pp. 518–529. • V. Christlein, C. Riess, J. Jordan, and E. Angelopoulou, “An evaluation of popular copy-move forgery detection approaches,” Information Forensics and Security, IEEE Transactions on, vol. 7, no. 6, pp. 1841– 1854, 2012. • M. Lux and S. A. Chatzichristofis, “Lire: lucene image retrieval: an extensible java cbir library,” in Proceedings of the 16th ACM international conference on Multimedia. ACM, 2008, pp. 1085–1088. IEEE India Council Department of Electrical Engineering Faculty of Engineering & Technology Jamia Millia Islamia, New Delhi, India
  • 14. THANKYOU IEEE India Council Department of Electrical Engineering Faculty of Engineering & Technology Jamia Millia Islamia, New Delhi, India
  • 15. Appendix: Dataset Images Perceptually Similar ? IEEE India Council Department of Electrical Engineering Faculty of Engineering & Technology Jamia Millia Islamia, New Delhi, India
  • 16. Appendix: Nature is not always greenish IEEE India Council Department of Electrical Engineering Faculty of Engineering & Technology Jamia Millia Islamia, New Delhi, India
  • 17. Appendix: Accuracy 0 10 20 30 40 50 60 70 80 90 100 60 100 150 200 250 Accuracy(%) Number of Results(top-N) Accuracy(%) IEEE India Council Department of Electrical Engineering Faculty of Engineering & Technology Jamia Millia Islamia, New Delhi, India
  • 18. Appendix: Results Fig 2. Comparison of Feature matching techniques Fig 3. Average time taken by SIFT, SURF and Perceptual Hash PH SURF SIFT IEEE India Council Department of Electrical Engineering Faculty of Engineering & Technology Jamia Millia Islamia, New Delhi, India
  • 19. Appendix: Results Fig 4. Comparison of ranked retrieval Fig 5. Ranked V/s Non Ranked Retrieval IEEE India Council Department of Electrical Engineering Faculty of Engineering & Technology Jamia Millia Islamia, New Delhi, India
  • 20. Appendix: Results Fig 6. Time vs Number of results Fig 7. Time vs Number of Images in the dataset IEEE India Council Department of Electrical Engineering Faculty of Engineering & Technology Jamia Millia Islamia, New Delhi, India
  • 21. Appendix: Results Fig 8. Lucene v/s Database Retrieval time IEEE India Council Department of Electrical Engineering Faculty of Engineering & Technology Jamia Millia Islamia, New Delhi, India
  • 22. Locality Sensitive Hashing • Similar features hashed to same hash values • Parameters • No of bits (k) • No of tables (l) • Maximum Bucket capacity (usually unlimited) • Empirical Analysis needed for determining parameters as per the dataset • varying number of bits, varies bucket size (small hash, more collisions and vice versa) IEEE India Council Department of Electrical Engineering Faculty of Engineering & Technology Jamia Millia Islamia, New Delhi, India
  • 23. Lucene • Very efficient in document indexing and retrieval • Bag of Visual words histograms are indexed • Allows for random access of documents • Histograms are fetched from Lucene index and ranked (Filtering) IEEE India Council Department of Electrical Engineering Faculty of Engineering & Technology Jamia Millia Islamia, New Delhi, India