• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zou Fuhao, Li Xiaowei, Xu Zhihua, Ling Hefei, and Li Ping. Image Copy Detection with Rotation and Scaling Tolerance[J]. Journal of Computer Research and Development, 2009, 46(8): 1349-1356.
Citation: Zou Fuhao, Li Xiaowei, Xu Zhihua, Ling Hefei, and Li Ping. Image Copy Detection with Rotation and Scaling Tolerance[J]. Journal of Computer Research and Development, 2009, 46(8): 1349-1356.

Image Copy Detection with Rotation and Scaling Tolerance

More Information
  • Published Date: August 14, 2009
  • Currently, most of image copy detection methods can successfully resist to the noise-like distortion, but they are quite fragile to geometric distortion, such as rotation, shift, translate, scale, cropping and so on. Among the geometric distortions, rotation and scaling most commonly happen. In order to really resist against rotation, shift, scale and crop distortion, Wu et al. proposed an ellipse track division based image copy detection method in 2005 and 2007 respectively. However, because of ellipse shape without rotation invariance property, Wu's method didn't really address rotation distortion problem. To completely conquer the rotation and scale distortion issues, the authors propose a novel image copy detection scheme which combines cirque division strategy with ordinal measure method to extract compact image feature. It is well known that the content within cirque track region will be almost invariant before and after rotation and scale distortion, so the proposed method can successfully resist the above-mentioned two kinds of distortion. In addition, since the ordinal measure based feature vector is insensitive to local or global slight changes among image content, so the noise-like distortion can be effectively conquered. The experimental results show the proposed method is better than that of Wu at the aspect of rotation and scale distortion.
  • Related Articles

    [1]Wu Jian, Fu Yinjin, Fang Yanmei, Liu Yao, Fu Wei, Cao Xiaochun, Xiao Nong. A Review on Encrypted Data Deduplication Attacks and Countermeasures in Cloud Storage[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202440379
    [2]Li Haobo, Li Mohan, Chen Peng, Sun Yanbin, Tian Zhihong. A Corruption-resistant Data Identification Technology Based on Dataset Honeypoint[J]. Journal of Computer Research and Development, 2024, 61(10): 2417-2432. DOI: 10.7544/issn1000-1239.202440496
    [3]Kuang Boyu, Li Yuze, Gu Fangming, Su Mang, Fu Anmin. Review of Internet of Vehicle Security Research: Threats, Countermeasures, and Future Prospects[J]. Journal of Computer Research and Development, 2023, 60(10): 2304-2321. DOI: 10.7544/issn1000-1239.202330464
    [4]Wang Chong, Wei Shuai, Zhang Fan, Song Ke. A Survey of Cache-Based Side Channel Countermeasure[J]. Journal of Computer Research and Development, 2021, 58(4): 794-810. DOI: 10.7544/issn1000-1239.2021.20200500
    [5]Ji Zhong, Nie Linhong. Texture Image Classification with Noise-Tolerant Local Binary Pattern[J]. Journal of Computer Research and Development, 2016, 53(5): 1128-1135. DOI: 10.7544/issn1000-1239.2016.20148320
    [6]Wang Yonggang, Yan Hanbing, Xu Junfeng, Hu Jianbin, Chen Zhong. Research on Countermeasures Against Tag Spam[J]. Journal of Computer Research and Development, 2013, 50(10): 2029-2043.
    [7]Yue Daheng, Qi Shubo, Li Shaoqing, and Zhang Minxuan. A DPA Resistant Technology Based on Register Switching Time Randomization[J]. Journal of Computer Research and Development, 2012, 49(3): 491-498.
    [8]Tong Yuanman, Wang Zhiying, Dai Kui, and Lu Hongyi. Quantitative Evaluation of the Cryptographic Block’s Resistibility to Power Analysis Attack at Different Design Level[J]. Journal of Computer Research and Development, 2009, 46(6): 940-947.
    [9]Tong Yuanman, Wang Zhiying, Dai Kui, and Lu Hongyi. A DPA and HO-DPA Resistant Implementation of AES[J]. Journal of Computer Research and Development, 2009, 46(3): 377-383.
    [10]Zhao Jia, Zeng Xiaoyang, Han Jun, Wang Jing, and Chen Jun. VLSI Implementation of an AES Algorithm Resistant to Differential Power Analysis Attack[J]. Journal of Computer Research and Development, 2007, 44(3).

Catalog

    Article views (779) PDF downloads (674) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return