원문정보
초록
영어
There is a similar image retrieval method which uses a normalized histogram of the pixel values of the original image and that of the pixel values of the illegally copied search target image. In this method, when the correlation coefficient between the two histograms is greater than a predetermined threshold value, the target image is to determine to be similar to the original image. However, the contents of the image that has received ornament attack is different from the contents of the original image, this means that it is searching for images similar to the original image is very difficult. In general, ornament processing of the image is applied to the peripheral region of the image. Therefore, if only the pixels to limit in the ROI (region of interest) which are not affected by the ornament attack are used to create the normalized histogram, it may be effective. We, in order to extract only the pixels included in the ROI, have proposed a method of using a mask image. In this paper, it describes some detailed study about the element techniques including using the mask image and normalization histogram. Moreover, the computer simulations show the effectiveness of these element techniques.
목차
1. Introduction
2. Pre-search in Two-Stage Image Search Model
2.1. Two-Stage Image Search Model
2.2. Basic Algorithm for the Pre-search
3. Elemental Techniques
3.1. Histogram Normalization
3.2. Filtering for Normalized Histogram
3.3. Proposal of Mask Image Use for the Ornaments Attack Image
4. Proposal of Evaluation Method of Arbitrary Amount of Attack for Rotation and Scaling
5. Simulation and Results for a Case of any Rotation and Scaling Attack
6. Conclusions
Acknowledgements
References