SlideShare une entreprise Scribd logo
1  sur  8
1 
“Secure Image Retrieval based on Hybrid Features and 
Hashes” 
Ranjit R. Banshpal 
11
OUTLINES 
• Introduction 
• Scenario of work 
• Methodology to be employed 
• References
Introduction 
 Scalable image search based on visual similarity has been an active 
topic of research in recent years. 
 Here introduces an approach that enables query-adaptive ranking of 
images for avoiding identical image.
ADMIN 
(secure by 
password 
authentication) 
Scenario of work 
Feature 
extraction( Ripplet Trns. ) 
Color Feature 
Shape Feature 
Texture Feature 
Collection 
of images 
Management using 
Hashing 
(TCH + SIFT) 
Similarity 
measurement 
0 
Attribute 
Database 
Ranking based on 
distance and 
weightage 
Extracted similar 
Images 
Feature 
extraction 
Authentication using AES 
User Query by image
Methodology 
Sr 
No. 
Name of Algorithm Advantages Dataset 
Used 
1. HASHING (TCH)  Performance does not 
decrease as the database 
size increases 
 Space is conserved by adding 
and removing as necessary 
Flickr images with 
tags ,NUS WIDE 
2. SIFT (Scale Invariant Feature 
Transform) 
Locality: features are local, so 
robust to blocking and clutter 
(no prior segmentation) 
Distinctiveness: individual 
features can be matched to a 
large database of objects. 
Quantity: many features can be 
generated for even small objects. 
Extensibility: can easily be 
extended to wide range of 
differing feature.
REFERENCES 
1. Yu-Gng Jiang, Jun Wang, Member, IEEE, Xiangyang Xue, Member, IEEE, and Shih-Fu 
Chang, Fellow, IEEE, "Query-Adaptive Image Search with Hash Codes”, IEEE 
TRANSACTIONS ON MULTIMEDIA, VOL. 15, NO. 2, FEBRUARY 2013. 
2. Soo-Chang Pei, Senior Member, IEEE, and Ching-Min Cheng." Extracting Color Features 
and Dynamic Matching for Image Data-Base Retrieval". IEEE ransactions On circuits and 
systems for video technology, VOL. 9, NO. 3, APRIL 1999. 
3. Amitava Nag, Jyoti Prakash Singh, Srabani Khan, Saswati Ghosh, Sushanta Biswas, D. 
Sarkar Partha Pratim Sarkar, Image Encryption Using Affine Transform and XOR 
Operation‖,International Conference on Signal Processing , Communication, Computing and 
Networking Technologies (ICSCCN 2011). 
4. Silpa-Anan and R. Hartley, “Optimised KD-trees for fast image descriptor matching,” in 
Proc. IEEE Conf. Computer Vision and Pattern Recognition, 2008. 
5. Bin Li, Delie Ming, Wenwen Yan, Xiao Sun, Tian Tian, and Jinwen Tian, “Image Matching 
Based on Two-Column Histogram Hashing and Improved RANSAC”, IEEE GEOSCIENCE 
AND REMOTE SENSING LETTERS, VOL. 11, NO. 8, AUGUST 2014.
6. David Nist´er and Henrik Stew´enius, “Scalable Recognition with a Vocabulary Tree”, 
Computer Society Conference on Computer Vision and Pattern Recognition (CVPR’06) IEEE 
2006. 
7. K. Mikolajczyk and J. Matas. “Improving descriptors for fast tree matching by optimal linear 
projection”,. In ICCV, pages 1–8, 2007. 
8. T. Liu, A. W. Moore, A. G. Gray, and K. Yang. “An investigation of practical approximate 
nearest neighbor algorithms”. In NIPS, 2004. 
9. H. Jegou, M. Douze, and C. Schmid, “Improving bag-of-features for Large scale image 
search,” Int. J. Comput. Vision, vol. 87, pp. 191–212, 2010.
Secure Image Retrieval based on Hybrid Features and Hashes

Contenu connexe

Tendances

Tendances (19)

62 328-337
62 328-33762 328-337
62 328-337
 
Color and texture based image retrieval
Color and texture based image retrievalColor and texture based image retrieval
Color and texture based image retrieval
 
CONTENT BASED IMAGE RETRIEVAL SYSTEM
CONTENT BASED IMAGE RETRIEVAL SYSTEMCONTENT BASED IMAGE RETRIEVAL SYSTEM
CONTENT BASED IMAGE RETRIEVAL SYSTEM
 
Object tracking
Object trackingObject tracking
Object tracking
 
CBIR by deep learning
CBIR by deep learningCBIR by deep learning
CBIR by deep learning
 
Web Image Retrieval Using Visual Dictionary
Web Image Retrieval Using Visual DictionaryWeb Image Retrieval Using Visual Dictionary
Web Image Retrieval Using Visual Dictionary
 
research paper
research paperresearch paper
research paper
 
Query Image Searching With Integrated Textual and Visual Relevance Feedback f...
Query Image Searching With Integrated Textual and Visual Relevance Feedback f...Query Image Searching With Integrated Textual and Visual Relevance Feedback f...
Query Image Searching With Integrated Textual and Visual Relevance Feedback f...
 
Fd36957962
Fd36957962Fd36957962
Fd36957962
 
Automatic dominant region segmentation for natural images
Automatic dominant region segmentation for natural imagesAutomatic dominant region segmentation for natural images
Automatic dominant region segmentation for natural images
 
Content based image retrieval (cbir) using
Content based image retrieval (cbir) usingContent based image retrieval (cbir) using
Content based image retrieval (cbir) using
 
Multilabel Image Retreval Using Hashing
Multilabel Image Retreval Using HashingMultilabel Image Retreval Using Hashing
Multilabel Image Retreval Using Hashing
 
82 348-355
82 348-35582 348-355
82 348-355
 
Image Indexing and Retrieval
Image Indexing and RetrievalImage Indexing and Retrieval
Image Indexing and Retrieval
 
Content Based Image Retrieval
Content Based Image Retrieval Content Based Image Retrieval
Content Based Image Retrieval
 
CBIR with RF
CBIR with RFCBIR with RF
CBIR with RF
 
F0343545
F0343545F0343545
F0343545
 
SEMANTIC IMAGE RETRIEVAL USING MULTIPLE FEATURES
SEMANTIC IMAGE RETRIEVAL USING MULTIPLE FEATURESSEMANTIC IMAGE RETRIEVAL USING MULTIPLE FEATURES
SEMANTIC IMAGE RETRIEVAL USING MULTIPLE FEATURES
 
A Mat Lab built software application for similar image retrieval
A Mat Lab built software application for similar image retrievalA Mat Lab built software application for similar image retrieval
A Mat Lab built software application for similar image retrieval
 

En vedette

Некоторые алгоритмы многомерной обработки изображений
Некоторые алгоритмы многомерной обработки изображенийНекоторые алгоритмы многомерной обработки изображений
Некоторые алгоритмы многомерной обработки изображений
MSU GML VideoGroup
 
Introduction to Image Editing
Introduction to Image EditingIntroduction to Image Editing
Introduction to Image Editing
barc300
 
lecture_01.pptx - PowerPoint Presentation
lecture_01.pptx - PowerPoint Presentationlecture_01.pptx - PowerPoint Presentation
lecture_01.pptx - PowerPoint Presentation
butest
 
Common Digital Advertising Formats of 2012
Common Digital Advertising Formats of 2012Common Digital Advertising Formats of 2012
Common Digital Advertising Formats of 2012
MarcusThomasLLC
 
JPG vs. GIF vs. PNG
JPG vs. GIF vs. PNGJPG vs. GIF vs. PNG
JPG vs. GIF vs. PNG
kay2
 

En vedette (20)

Ppt present mageia group1
Ppt present mageia group1Ppt present mageia group1
Ppt present mageia group1
 
Google Chrome - OS & BROWSER
Google Chrome - OS & BROWSERGoogle Chrome - OS & BROWSER
Google Chrome - OS & BROWSER
 
File types pro forma(1)
File types pro forma(1)File types pro forma(1)
File types pro forma(1)
 
Finding and Editing Images Online
Finding and Editing Images OnlineFinding and Editing Images Online
Finding and Editing Images Online
 
Digital photo preservation in brief 20150617
Digital photo preservation in brief 20150617 Digital photo preservation in brief 20150617
Digital photo preservation in brief 20150617
 
Kai Weber & Chris Atherton - Pattern recognition for technical communicators ...
Kai Weber & Chris Atherton - Pattern recognition for technical communicators ...Kai Weber & Chris Atherton - Pattern recognition for technical communicators ...
Kai Weber & Chris Atherton - Pattern recognition for technical communicators ...
 
Как делается Яндекс.Браузер — Михаил Лопаткин
Как делается Яндекс.Браузер — Михаил ЛопаткинКак делается Яндекс.Браузер — Михаил Лопаткин
Как делается Яндекс.Браузер — Михаил Лопаткин
 
Некоторые алгоритмы многомерной обработки изображений
Некоторые алгоритмы многомерной обработки изображенийНекоторые алгоритмы многомерной обработки изображений
Некоторые алгоритмы многомерной обработки изображений
 
Introduction to Image Editing
Introduction to Image EditingIntroduction to Image Editing
Introduction to Image Editing
 
lecture_01.pptx - PowerPoint Presentation
lecture_01.pptx - PowerPoint Presentationlecture_01.pptx - PowerPoint Presentation
lecture_01.pptx - PowerPoint Presentation
 
What is pattern_recognition (lecture 1 of 6)
What is pattern_recognition (lecture 1 of 6)What is pattern_recognition (lecture 1 of 6)
What is pattern_recognition (lecture 1 of 6)
 
Common Digital Advertising Formats of 2012
Common Digital Advertising Formats of 2012Common Digital Advertising Formats of 2012
Common Digital Advertising Formats of 2012
 
Depth image recognition using isomorphic graph theory
Depth image recognition using isomorphic graph theoryDepth image recognition using isomorphic graph theory
Depth image recognition using isomorphic graph theory
 
Digital graphics pro forma
Digital graphics pro formaDigital graphics pro forma
Digital graphics pro forma
 
Csc446: Pattren Recognition (LN1)
Csc446: Pattren Recognition (LN1)Csc446: Pattren Recognition (LN1)
Csc446: Pattren Recognition (LN1)
 
7 3-2
7 3-27 3-2
7 3-2
 
Digital imaging
Digital imagingDigital imaging
Digital imaging
 
Портрет по фото на заказ
Портрет по фото на заказПортрет по фото на заказ
Портрет по фото на заказ
 
JPG vs. GIF vs. PNG
JPG vs. GIF vs. PNGJPG vs. GIF vs. PNG
JPG vs. GIF vs. PNG
 
CSC446: Pattern Recognition (LN6)
CSC446: Pattern Recognition (LN6)CSC446: Pattern Recognition (LN6)
CSC446: Pattern Recognition (LN6)
 

Similaire à Secure Image Retrieval based on Hybrid Features and Hashes

Ijarcet vol-2-issue-7-2287-2291
Ijarcet vol-2-issue-7-2287-2291Ijarcet vol-2-issue-7-2287-2291
Ijarcet vol-2-issue-7-2287-2291
Editor IJARCET
 
Ijarcet vol-2-issue-7-2287-2291
Ijarcet vol-2-issue-7-2287-2291Ijarcet vol-2-issue-7-2287-2291
Ijarcet vol-2-issue-7-2287-2291
Editor IJARCET
 
Integrated Hidden Markov Model and Kalman Filter for Online Object Tracking
Integrated Hidden Markov Model and Kalman Filter for Online Object TrackingIntegrated Hidden Markov Model and Kalman Filter for Online Object Tracking
Integrated Hidden Markov Model and Kalman Filter for Online Object Tracking
ijsrd.com
 
Mri brain image retrieval using multi support vector machine classifier
Mri brain image retrieval using multi support vector machine classifierMri brain image retrieval using multi support vector machine classifier
Mri brain image retrieval using multi support vector machine classifier
srilaxmi524
 
Smart camera monitoring system
Smart camera monitoring systemSmart camera monitoring system
Smart camera monitoring system
Arvind Krishnaa
 
Adithya Rajan_Jan_2016
Adithya Rajan_Jan_2016Adithya Rajan_Jan_2016
Adithya Rajan_Jan_2016
Adithya Rajan
 

Similaire à Secure Image Retrieval based on Hybrid Features and Hashes (20)

07 data structures_and_representations
07 data structures_and_representations07 data structures_and_representations
07 data structures_and_representations
 
September 2021 - Top 10 Read Articles in Signal & Image Processing
September 2021 - Top 10 Read Articles in Signal & Image ProcessingSeptember 2021 - Top 10 Read Articles in Signal & Image Processing
September 2021 - Top 10 Read Articles in Signal & Image Processing
 
June 2021: Top Read Articles in Signal & Image Processing
June 2021: Top Read Articles in Signal & Image ProcessingJune 2021: Top Read Articles in Signal & Image Processing
June 2021: Top Read Articles in Signal & Image Processing
 
November 2021: Top Read Articles in Signal & Image Processing
November 2021: Top Read Articles in Signal & Image ProcessingNovember 2021: Top Read Articles in Signal & Image Processing
November 2021: Top Read Articles in Signal & Image Processing
 
December 2021: Top Read Articles in Signal & Image Processing
December 2021: Top Read Articles in Signal & Image ProcessingDecember 2021: Top Read Articles in Signal & Image Processing
December 2021: Top Read Articles in Signal & Image Processing
 
July 2021: Top Read Articles in Signal & Image Processing
July 2021: Top Read Articles in Signal & Image ProcessingJuly 2021: Top Read Articles in Signal & Image Processing
July 2021: Top Read Articles in Signal & Image Processing
 
Weave-D - 2nd Progress Evaluation Presentation
Weave-D - 2nd Progress Evaluation PresentationWeave-D - 2nd Progress Evaluation Presentation
Weave-D - 2nd Progress Evaluation Presentation
 
A Review on Matching For Sketch Technique
A Review on Matching For Sketch TechniqueA Review on Matching For Sketch Technique
A Review on Matching For Sketch Technique
 
Ijarcet vol-2-issue-7-2287-2291
Ijarcet vol-2-issue-7-2287-2291Ijarcet vol-2-issue-7-2287-2291
Ijarcet vol-2-issue-7-2287-2291
 
Ijarcet vol-2-issue-7-2287-2291
Ijarcet vol-2-issue-7-2287-2291Ijarcet vol-2-issue-7-2287-2291
Ijarcet vol-2-issue-7-2287-2291
 
Integrated Hidden Markov Model and Kalman Filter for Online Object Tracking
Integrated Hidden Markov Model and Kalman Filter for Online Object TrackingIntegrated Hidden Markov Model and Kalman Filter for Online Object Tracking
Integrated Hidden Markov Model and Kalman Filter for Online Object Tracking
 
Image Steganography: An Inevitable Need for Data Security, Authors: Sneh Rach...
Image Steganography: An Inevitable Need for Data Security, Authors: Sneh Rach...Image Steganography: An Inevitable Need for Data Security, Authors: Sneh Rach...
Image Steganography: An Inevitable Need for Data Security, Authors: Sneh Rach...
 
APPLICATIONS OF SPATIAL FEATURES IN CBIR : A SURVEY
APPLICATIONS OF SPATIAL FEATURES IN CBIR : A SURVEYAPPLICATIONS OF SPATIAL FEATURES IN CBIR : A SURVEY
APPLICATIONS OF SPATIAL FEATURES IN CBIR : A SURVEY
 
Applications of spatial features in cbir a survey
Applications of spatial features in cbir  a surveyApplications of spatial features in cbir  a survey
Applications of spatial features in cbir a survey
 
Object recognition
Object recognitionObject recognition
Object recognition
 
Mri brain image retrieval using multi support vector machine classifier
Mri brain image retrieval using multi support vector machine classifierMri brain image retrieval using multi support vector machine classifier
Mri brain image retrieval using multi support vector machine classifier
 
Texture based image retrieval system
Texture based image retrieval system Texture based image retrieval system
Texture based image retrieval system
 
C OMPARATIVE S TUDY OF D IMENSIONALITY R EDUCTION T ECHNIQUES U SING PCA AND ...
C OMPARATIVE S TUDY OF D IMENSIONALITY R EDUCTION T ECHNIQUES U SING PCA AND ...C OMPARATIVE S TUDY OF D IMENSIONALITY R EDUCTION T ECHNIQUES U SING PCA AND ...
C OMPARATIVE S TUDY OF D IMENSIONALITY R EDUCTION T ECHNIQUES U SING PCA AND ...
 
Smart camera monitoring system
Smart camera monitoring systemSmart camera monitoring system
Smart camera monitoring system
 
Adithya Rajan_Jan_2016
Adithya Rajan_Jan_2016Adithya Rajan_Jan_2016
Adithya Rajan_Jan_2016
 

Plus de ranjit banshpal

using big-data methods analyse the Cross platform aviation
 using big-data methods analyse the Cross platform aviation using big-data methods analyse the Cross platform aviation
using big-data methods analyse the Cross platform aviation
ranjit banshpal
 

Plus de ranjit banshpal (14)

Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
 
LCT in day2 day life
LCT in day2 day lifeLCT in day2 day life
LCT in day2 day life
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
“Web crawler”
“Web crawler”“Web crawler”
“Web crawler”
 
Data mining technique for classification and feature evaluation using stream ...
Data mining technique for classification and feature evaluation using stream ...Data mining technique for classification and feature evaluation using stream ...
Data mining technique for classification and feature evaluation using stream ...
 
Parallelization using open mp
Parallelization using open mpParallelization using open mp
Parallelization using open mp
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
using big-data methods analyse the Cross platform aviation
 using big-data methods analyse the Cross platform aviation using big-data methods analyse the Cross platform aviation
using big-data methods analyse the Cross platform aviation
 
E mail image spam filtering techniques
E mail image spam filtering techniquesE mail image spam filtering techniques
E mail image spam filtering techniques
 
Hybrid encryption
Hybrid encryption Hybrid encryption
Hybrid encryption
 
Autocorrelators1
Autocorrelators1Autocorrelators1
Autocorrelators1
 
Static Networks
Static NetworksStatic Networks
Static Networks
 
Ranjitbanshpal
RanjitbanshpalRanjitbanshpal
Ranjitbanshpal
 
Ranjitbanshpal1
Ranjitbanshpal1Ranjitbanshpal1
Ranjitbanshpal1
 

Dernier

Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 

Dernier (20)

Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 

Secure Image Retrieval based on Hybrid Features and Hashes

  • 1. 1 “Secure Image Retrieval based on Hybrid Features and Hashes” Ranjit R. Banshpal 11
  • 2. OUTLINES • Introduction • Scenario of work • Methodology to be employed • References
  • 3. Introduction  Scalable image search based on visual similarity has been an active topic of research in recent years.  Here introduces an approach that enables query-adaptive ranking of images for avoiding identical image.
  • 4. ADMIN (secure by password authentication) Scenario of work Feature extraction( Ripplet Trns. ) Color Feature Shape Feature Texture Feature Collection of images Management using Hashing (TCH + SIFT) Similarity measurement 0 Attribute Database Ranking based on distance and weightage Extracted similar Images Feature extraction Authentication using AES User Query by image
  • 5. Methodology Sr No. Name of Algorithm Advantages Dataset Used 1. HASHING (TCH)  Performance does not decrease as the database size increases  Space is conserved by adding and removing as necessary Flickr images with tags ,NUS WIDE 2. SIFT (Scale Invariant Feature Transform) Locality: features are local, so robust to blocking and clutter (no prior segmentation) Distinctiveness: individual features can be matched to a large database of objects. Quantity: many features can be generated for even small objects. Extensibility: can easily be extended to wide range of differing feature.
  • 6. REFERENCES 1. Yu-Gng Jiang, Jun Wang, Member, IEEE, Xiangyang Xue, Member, IEEE, and Shih-Fu Chang, Fellow, IEEE, "Query-Adaptive Image Search with Hash Codes”, IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 15, NO. 2, FEBRUARY 2013. 2. Soo-Chang Pei, Senior Member, IEEE, and Ching-Min Cheng." Extracting Color Features and Dynamic Matching for Image Data-Base Retrieval". IEEE ransactions On circuits and systems for video technology, VOL. 9, NO. 3, APRIL 1999. 3. Amitava Nag, Jyoti Prakash Singh, Srabani Khan, Saswati Ghosh, Sushanta Biswas, D. Sarkar Partha Pratim Sarkar, Image Encryption Using Affine Transform and XOR Operation‖,International Conference on Signal Processing , Communication, Computing and Networking Technologies (ICSCCN 2011). 4. Silpa-Anan and R. Hartley, “Optimised KD-trees for fast image descriptor matching,” in Proc. IEEE Conf. Computer Vision and Pattern Recognition, 2008. 5. Bin Li, Delie Ming, Wenwen Yan, Xiao Sun, Tian Tian, and Jinwen Tian, “Image Matching Based on Two-Column Histogram Hashing and Improved RANSAC”, IEEE GEOSCIENCE AND REMOTE SENSING LETTERS, VOL. 11, NO. 8, AUGUST 2014.
  • 7. 6. David Nist´er and Henrik Stew´enius, “Scalable Recognition with a Vocabulary Tree”, Computer Society Conference on Computer Vision and Pattern Recognition (CVPR’06) IEEE 2006. 7. K. Mikolajczyk and J. Matas. “Improving descriptors for fast tree matching by optimal linear projection”,. In ICCV, pages 1–8, 2007. 8. T. Liu, A. W. Moore, A. G. Gray, and K. Yang. “An investigation of practical approximate nearest neighbor algorithms”. In NIPS, 2004. 9. H. Jegou, M. Douze, and C. Schmid, “Improving bag-of-features for Large scale image search,” Int. J. Comput. Vision, vol. 87, pp. 191–212, 2010.