Improved image analysis methodology for detecting changes in evidence positioning at crime scenes
- Authors: Petty, Mark , Teng, Shyh , Murshed, Manzur
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 2019 International Conference on Digital Image Computing: Techniques and Applications, DICTA 2019
- Full Text:
- Reviewed:
- Description: This paper proposed an improved methodology to assist forensic investigators in detecting positional change of objects due to crime scene contamination. Either intentionally or by accident, crime scene contamination can occur during the investigation and documentation process. This new proposed methodology utilises an ASIFT-based feature detection algorithm that compares pre- and post-contaminated images of the same scene, taken from different viewpoints. The contention is that the ASIFT registration technique is better suited to real world crime scene photography, being more robust to affine distortion that occurs when capturing images from different viewpoints. The proposed methodology was tested with both the SIFT and ASIFT registration techniques to show that (1) it could identify missing, planted and displaced objects using both SIFT and ASIFT and (2) ASIFT is superior to SIFT in terms of error in displacement estimation, especially for larger viewpoint discrepancies between the pre- and post-contamination images. This supports the contention that our proposed methodology in combination with ASIFT is better suited to handle real world crime scene photography. © 2019 IEEE.
- Description: E1
Increasing hydrogen energy efficiency by heat integration between fuel cell, hydride tank and electrolyzer
- Authors: Ghayur, Adeel , Verheyen, Vincent
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 2019 IEEE Asia-Pacific Conference on Computer Science and Data Engineering, CSDE 2019
- Full Text: false
- Reviewed:
- Description: Chemical processes offer untapped potential to increase overall system efficiencies by synergizing renewable hydrogen storage with dispatchable renewable energy facilities. In this study an Energy Storage Facility model is developed and simulation conducted to examine this potential. The model incorporates a Solid Oxide Fuel Cell (SOFC) integrated with a Magnesium Hydride (MgH2) Tank and an alkaline electrolyzer linked to the power grid. Surplus grid power is converted to hydrogen and stored as magnesium hydride. This storage process generates waste heat which is used to partially offset the water heating requirement of the electrolyzer. Simulation results demonstrate 20% reduction in parasitic heat energy consumption using this waste heat. Stored hydrogen provides power on demand via the SOFC. Waste heat from SOFC fulfils the desorption heat demand of the MgH2 Tank. Simulation results reveal waste heat from the SOFC is just enough to preheat oxygen and hydrogen and desorb hydrogen from the MgH2 tank. These results are encouraging, warranting further investigation into metal hydride storage to help Australia's transition towards renewable energy resources. © 2019 IEEE.
Integrating biological heuristics and gene expression data for gene regulatory network inference
- Authors: Zarnegar, Armita , Jelinek, Herbert , Vamplew, Peter , Stranieri, Andrew
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 2019 Australasian Computer Science Week Multiconference, ACSW 2019; Sydney, Australia; 29th-31st January 2019 p. 1-10
- Full Text: false
- Reviewed:
- Description: Gene Regulatory Networks (GRNs) offer enhanced insight into the biological functions and biochemical pathways of cells associated with gene regulatory mechanisms. However, obtaining accurate GRNs that explain gene expressions and functional associations remains a difficult task. Only a few studies have incorporated heuristics into a GRN discovery process. Doing so has the potential to improve accuracy and reduce the search space and computational time. A technique for GRN discovery that integrates heuristic information into the discovery process is advanced. The approach incorporates three elements: 1) a novel 2D visualized coexpression function that measures the association between genes; 2) a post-processing step that improves detection of up, down and self-regulation and 3) the application of heuristics to generate a Hub network as the backbone of the GRN. Using available microarray and next generation sequencing data from Escherichia coli, six synthetic benchmark GRN datasets were generated with the neighborhood addition and cluster addition methods available in SynTReN. Results of the novel 2D-visualization co-expression function were compared with results obtained using Pearson's correlation and mutual information. The performance of the biological genetics-based heuristics consisting of the 2D-Visualized Co-expression function, post-processing and Hub network was then evaluated by comparing the performance to the GRNs obtained by ARACNe and CLR. The 2D-Visualized Co-expression function significantly improved gene-gene association matching compared to Pearson's correlation coefficient (t = 3.46, df = 5, p = 0.02) and Mutual Information (t = 4.42, df = 5, p = 0.007). The heuristics model gave a 60% improvement against ARACNe (p = 0.02) and CLR (p = 0.019). Analysis of Escherichia coli data suggests that the GRN discovery technique proposed is capable of identifying significant transcriptional regulatory interactions and the corresponding regulatory networks.
Isolation set-kernel and its application to multi-instance learning
- Authors: Xu, Bi-Cun , Ting, Kaiming , Zhou, Zhi-Hua
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 25th ACM SIGKDD International Conferencce on Knowledge Discovery and Data Mining, KDD 2019; Anchorage, United States; 4th-8th August 2019 p. 941-949
- Full Text: false
- Reviewed:
- Description: Set-level problems are as important as instance-level problems. The core in solving set-level problems is: how to measure the similarity between two sets. This paper investigates data-dependent kernels that are derived directly from data. We introduce Isolation Set Kernel which is solely dependent on data distribution, requiring neither class information nor explicit learning. In contrast, most current set-similarities are not dependent on the underlying data distribution. We theoretically analyze the characteristic of Isolation Set-Kernel. As the set-kernel has a finite feature map, we show that it can be used to speed up the set-kernel computation significantly. We apply Isolation Set-Kernel to Multi-Instance Learning (MIL) using SVM classifier, and demonstrate that it outperforms other set-kernels or other solutions to the MIL problem.
Measuring soil strain using fibre optic sensors
- Authors: Costa, Susanga , Kahandawa, Gayan , Chen, Jian , Xue, Jianfeng
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 8th International Congress on Environmental Geotechnics, ICEG 2018; Hangzhou, China; 28th October-1st November 2018; part of the Environmental Science and Engineering book series p. 43-50
- Full Text:
- Reviewed:
- Description: Monitoring subsurface soil movement is important in many geotechnical engineering applications such as stability of slopes, road embankments and settlement in foundations. Soil displacement measurement is also helpful in understanding the formation of shrinkage cracks. Clay soils undergo shrinkage during drying and experience substantial stresses and strains, which results in shrinkage cracks. This paper presents a novel approach to measure soil strain using Fibre Bragg grating (FBG) sensors. In the experiments described, FBG sensors have been used to investigate the strain development in clay during drying. FBG sensors are fabricated in the core region of specially fabricated single mode low-loss germanium doped silicate optical fibres. The grating is the laser-inscribed region with a periodically varying refractive index, which reflects a specific light wavelength. Due to the applied strain, ε, there is a change in the wavelength which can be measured and is directly proposal to strain. Kaolin clay, mixed with water close to the liquid limit, was allowed to dry under room temperature. The specimens were prepared in thin, long linear shrinkage moulds. FBG sensors were placed inside soil at the centre of the specimen. The strain development during drying underwent four phases moving from compression to tension. An oscillating nature of strain was also observed throughout the drying process. Results obtained are useful to develop analytical solutions to describe stress-strain behavior of drying soil. © Springer Nature Singapore Pte Ltd. 2019.
Measuring trustworthiness of IoT image sensor data using other sensors' complementary multimodal data
- Authors: Islam, Mohammad , Karmakar, Gour , Kamruzzaman, Joarder , Murshed, Manzur
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019 p. 775-780
- Full Text: false
- Reviewed:
- Description: Trust of image sensor data is becoming increasingly important as the Internet of Things (IoT) applications grow from home appliances to surveillance. Up to our knowledge, there exists only one work in literature that estimates trustworthiness of digital images applied to forensic applications, based on a machine learning technique. The efficacy of this technique is heavily dependent on availability of an appropriate training set and adequate variation of IoT sensor data with noise, interference and environmental condition, but availability of such data cannot be assured always. Therefore, to overcome this limitation, a robust method capable of estimating trustworthy measure with high accuracy is needed. Lowering cost of sensors allow many IoT applications to use multiple types of sensors to observe the same event. In such cases, complementary multimodal data of one sensor can be exploited to measure trust level of another sensor data. In this paper, for the first time, we introduce a completely new approach to estimate the trustworthiness of an image sensor data using another sensor's numerical data. We develop a theoretical model using the Dempster-Shafer theory (DST) framework. The efficacy of the proposed model in estimating trust level of an image sensor data is analyzed by observing a fire event using IoT image and temperature sensor data in a residential setup under different scenarios. The proposed model produces highly accurate trust level in all scenarios with authentic and forged image data. © 2019 IEEE.
- Description: E1
Multi-source cyber-attacks detection using machine learning
- Authors: Taheri, Sona , Gondal, Iqbal , Bagirov, Adil , Harkness, Greg , Brown, Simon , Chi, Chihung
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 2019 IEEE International Conference on Industrial Technology, ICIT 2019; Melbourne, Australia; 13th-15th February 2019 Vol. 2019-February, p. 1167-1172
- Full Text:
- Reviewed:
- Description: The Internet of Things (IoT) has significantly increased the number of devices connected to the Internet ranging from sensors to multi-source data information. As the IoT continues to evolve with new technologies number of threats and attacks against IoT devices are on the increase. Analyzing and detecting these attacks originating from different sources needs machine learning models. These models provide proactive solutions for detecting attacks and their sources. In this paper, we propose to apply a supervised machine learning classification technique to identify cyber-attacks from each source. More precisely, we apply the incremental piecewise linear classifier that constructs boundary between sources/classes incrementally starting with one hyperplane and adding more hyperplanes at each iteration. The algorithm terminates when no further significant improvement of the separation of sources/classes is possible. The construction and usage of piecewise linear boundaries allows us to avoid any possible overfitting. We apply the incremental piecewise linear classifier on the multi-source real world cyber security data set to identify cyber-attacks and their sources.
- Description: Proceedings of the IEEE International Conference on Industrial Technology
Nano-structured photovoltaic cell design for high conversion efficiency by optimizing various parameters
- Authors: Shelat, Niraj , Das, Narottam , Khan, Masud , Islam, Syed
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 2019 29th Australasian Universities Power Engineering Conference; Momi Bay, Fiji; 26th-29th November 2019
- Full Text: false
- Reviewed:
- Description: This paper investigates the effect of different types of nano-grating structures embossed on top of the substrate of solar photovoltaic (PV) cell for high conversion efficiency. The simulation results for light reflection are obtained by using Opti-wave finite difference time-domain (Opti-FDTD) software. These nano-grating structures have different shapes, such as triangular, trapezoidal, pillar and parabolic. These nano-grating profiles work as a multilayer anti-reflective coating for GaAs solar cells and reduce the light reflection from the surface of the panel and increase the light trapping capacity inside the solar cell. These structures allow the gradual change in refractive index and provide a high transmission and less reflection of light that confirms excellent anti-reflective coating and increased light trapping capacity inside the cell substrate. For this simulation, different periodic shaped arrangements were made to obtain the higher conversion efficiency, the factors considered while develop the design are the aspect ratio (AR), thickness of the nano-grating structure and duty cycles. The simulation result shows that the light reflection loss in pillar shaped nano-grating structures having 150 nm of height and a 50% period (i.e., duty cycle) is ~0.5% only, which is the lowest reflection loss obtained, when compared with the triangular and trapezoidal shaped nano-grating structures, it is approximately 38% more efficient in trapping the incident light.
- Description: This research is supported by the School of Engineering and Technology, Melbourne, Victoria; Centre for Intelligent Systems, Brisbane, QLD, Central Queensland University, Australia.
One-shot malware outbreak detection using spatio-temporal isomorphic dynamic features
- Authors: Park, Sean , Gondal, Iqbal , Kamruzzaman, Joarder , Zhang, Leo
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019 p. 751-756
- Full Text: false
- Reviewed:
- Description: Fingerprinting the malware by its behavioural signature has been an attractive approach for malware detection due to the homogeneity of dynamic execution patterns across different variants of similar families. Although previous researches show reasonably good performance in dynamic detection using machine learning techniques on a large corpus of training set, decisions must be undertaken based upon a scarce number of observable samples in many practical defence scenarios. This paper demonstrates the effectiveness of generative adversarial autoencoder for dynamic malware detection under outbreak situations where in most cases a single sample is available for training the machine learning algorithm to detect similar samples that are in the wild. © 2019 IEEE.
- Description: E1
Privacy and Security of Connected Vehicles in Intelligent Transportation System
- Authors: Jolfaei, Alireza , Kant, Krishna
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume, DSN-S 2019, Portland, United States; 24-27 June 2019. p. 9-10
- Full Text:
- Reviewed:
- Description: The paper considers data security and privacy issues in intelligent transportation systems which involve data streams coming out from individual vehicles to road side units. In this environment, there are issues in regards to the scalability of key management and computation limitations at the edge of the network. To address these issues, we suggest the formation of groups in the vehicular layer, where a group leader is assigned to communicate with group members and the road side unit. We propose a lightweight permutation mechanism for preserving the confidentiality and privacy of sensory data. © 2019 IEEE.
- Description: E1
PU-shapelets : Towards pattern-based positive unlabeled classification of time series
- Authors: Liang, Shen , Zhang, Yanchun , Ma, Jiangang
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 24th International Conference on Database Systems for Advanced Applications, DASFAA 2019; Chiang Mai, Thailand; 22nd-25th April 2019; part of the Lecture Notes in Computer Science book series, also part of the Information Systems and Applications, incl. Internet/Web and HCI sub series Vol. 11446 LNCS, p. 87-103
- Full Text:
- Reviewed:
- Description: Real-world time series classification applications often involve positive unlabeled (PU) training data, where there are only a small set PL of positive labeled examples and a large set U of unlabeled ones. Most existing time series PU classification methods utilize all readings in the time series, making them sensitive to non-characteristic readings. Characteristic patterns named shapelets present a promising solution to this problem, yet discovering shapelets under PU settings is not easy. In this paper, we take on the challenging task of shapelet discovery with PU data. We propose a novel pattern ensemble technique utilizing both characteristic and non-characteristic patterns to rank U examples by their possibilities of being positive. We also present a novel stopping criterion to estimate the number of positive examples in U. These enable us to effectively label all U training examples and conduct supervised shapelet discovery. The shapelets are then used to build a one-nearest-neighbor classifier for online classification. Extensive experiments demonstrate the effectiveness of our method.
- Description: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Reversible data hiding in encrypted images based on image partition and spatial correlation
- Authors: Song, Chang , Zhang, Yifeng , Lu, Guojun
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 17th International Workshop on Digital Forensics and Watermarking, IWDW 2018; Jeju Island, South Korea; 22nd-24th October 2018; Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 11378 LNCS, p. 180-194
- Full Text: false
- Reviewed:
- Description: Recently, more and more attention is paid to reversible data hiding (RDH) in encrypted images because of its better protection of privacy compared with traditional RDH methods directly operated in original images. In several RDH algorithms, prediction-error expansion (PEE) is proved to be superior to other methods in terms of embedding capacity and distortion of marked image and multiple histograms modification (MHM) can realize adaptive selection of expansion bins which depends on image content in the modification of a sequence of histograms. Therefore, in this paper, we propose an efficient RDH method in encrypted images by combining PEE and MHM, and design corresponding mode of image partition. We first divide the image into three parts: W (for embedding secret data), B (for embedding the least significant bit(LSB) of W) and G (for generating prediction-error histograms). Then, we apply PEE and MHM to embed the LSB of W to reserve space for secret data. Next, we encrypt the image and change the LSB of W to realize the embedding of secret data. In the process of extraction, the reversibility of image and secret data can be guaranteed. The utilization of correlation between neighbor pixels and embedded order decided by the smoothness of pixel in part W contribute to the performance of our method. Compared to the existing algorithms, experimental results show that the proposed method can reduce distortion to the image at given embedding capacity especially at low embedding capacity.
Security hardening of implantable cardioverter defibrillators
- Authors: Jaffar, Iram , Usman, Muhammad , Jolfaei, Alireza
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 2019 IEEE International Conference on Industrial Technology, ICIT 2019; Melbourne, Australia; 13th-15th February 2019 Vol. 2019-February, p. 1173-1178
- Full Text:
- Reviewed:
- Description: Contemporary healthcare has witnessed a wide deployment of Implantable Cardioverter Defibrillators (ICDs), which have the capability to be controlled remotely, making them equally accessible from both home and hospitals. The therapeutic benefits of ICDs seem to outweigh potential security concerns, yet overlooking the presence of malicious attacks cannot be justified. This study investigates the scenario where an adversary falsifies a controller command and sends instructions to issue high electric shocks in succession. We propose a novel security hardening mechanism to protect data communications between ICD and controller from malicious data manipulations. Our proposed method verifies the correctness of an external command with respect to the history of heart rhythms. The proposed method is evaluated using real data. Multi-aspect analyses show the effectiveness of the proposed scheme.
- Description: Proceedings of the IEEE International Conference on Industrial Technology
Selective adversarial learning for mobile malware
- Authors: Khoda, Mahbub , Imam, Tasadduq , Kamruzzaman, Joarder , Gondal, Iqbal , Rahman, Ashfaqur
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019 p. 272-279
- Full Text: false
- Reviewed:
- Description: Machine learning models, including deep neural networks, have been shown to be vulnerable to adversarial attacks. Adversarial samples are crafted from legitimate inputs by carefully introducing small perturbation to the input so that the classifier is fooled. Adversarial retraining, which involves retraining the classifier using adversarial samples, has been shown to improve the robustness of the classifier against adversarial attacks. However, it has been also shown that retraining with too many samples can lead to performance degradation. Hence, a careful selection of the adversarial samples that are used to retrain the classifier is necessary, yet existing works select these samples in a randomized fashion. In our work, we propose two novel approaches for selecting adversarial samples: based on the distance from cluster center of malware and based on the probability derived from a kernel based learning (KBL). Our experiment results show that both of our selective mechanisms for adversarial retraining outperform the random selection technique and significantly improve the classifier performance against adversarial attacks. In particular, selection with KBL delivers above 6% improvement in detection accuracy compared to random selection. The method proposed here has greater impact in designing robust machine learning system for security applications. © 2019 IEEE.
- Description: E1
Semi-invasive system for detecting and monitoring dementia patients
- Authors: Yamsanwar, Yash , Patankar, Amol , Kulkarni, Siddhivinayak , Stratton, David , Stranieri, Andrew
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 5th IEEE International Conference for Convergence in Technolog, I2CT 2019
- Full Text: false
- Reviewed:
- Description: Dementia is one of the most prevalent conditions faced by the elderly caused by specific brain cell damage. Various effects of dementia include a loss of memory, reduction in problem solving ability, analytical skills, and decision making capability. Few systems have been developed for the early detection of dementia. Existing systems depend largely on hardware e.g. sensors, gateways. Factors like maintainability and sustainability compromise the efficiency of such systems. This paper presents a novel approach towards the early detection of dementia and aims at eliminating some of the challenges posed by these systems. It also provides a comparati ve study of the cognitive abilities of healthy old-age people and those afflicted by dementia. © 2019 IEEE.
- Description: E1
Trusted autonomous vehicle : measuring trust using on-board unit data
- Authors: Chowdhury, Abdullahi , Karmakar, Gour , Kamruzzaman, Joarder
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019 p. 787-792
- Full Text: false
- Reviewed:
- Description: Vehicular Ad-hoc Networks (VANETs) play an essential role in ensuring safe, reliable and faster transportation with the help of an Intelligent Transportation system. The trustworthiness of vehicles in VANETs is extremely important to ensure the authenticity of messages and traffic information transmitted in extremely dynamic topographical conditions where vehicles move at high speed. False or misleading information may cause substantial traffic congestions, road accidents and may even cost lives. Many approaches exist in literature to measure the trustworthiness of GPS data and messages of an Autonomous Vehicle (AV). To the best of our knowledge, they have not considered the trustworthiness of other On-Board Unit (OBU) components of an AV, along with GPS data and transmitted messages, though they have a substantial relevance in overall vehicle trust measurement. In this paper, we introduce a novel model to measure the overall trustworthiness of an AV considering four different OBU components additionally. The performance of the proposed method is evaluated with a traffic simulation model developed by Simulation of Urban Mobility (SUMO) using realistic traffic data and considering different levels of uncertainty. © 2019 IEEE.
- Description: E1
Verification of latency and delays related to a digital topology based on IEC 61850
- Authors: Kumar, Shantanu , Das, Narottam , Islam, Syed , Abu-Siada, Ahmed
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 2019 29th Australasian Universities Power Engineering Conference (AUPEC2019); Momi Bay, Fiji; 26th-29th November 2019
- Full Text: false
- Reviewed:
- Description: Digital Communication systems have matured to a point of acceptance in the last decade enormously based on IEC 61850 guidelines from Substation Automation System (SAS) perspective. However, these networks have issues related to latency, data clogging delays, errors etc. in the digital protection system. Measuring propagation delays and assessing the performance of IED's and other peripherals in an Ethernet topology play a critical role in relay coordination setting. This paper discusses issues associated with a digital network and addresses the problems that could mitigate spurious tripping or compromise the protection of the assets in the feeders leading to a reliable operation of the protection system. The discussion in this paper is carried out based on a case study related to a digital star topology using Optimized Network Engineering Tool (OPNET) software of a 132/22-kV zone substation. We report the practical case of measuring delay time during frame exchanges of Generic Object Oriented Substation Event (GOOSE) and Sampled Value (SV) messages amongst the IED' and peripherals.
Vulnerability modelling for hybrid IT systems
- Authors: Ur-Rehman, Attiq , Gondal, Iqbal , Kamruzzuman, Joarder , Jolfaei, Alireza
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 2019 IEEE International Conference on Industrial Technology, ICIT 2019; Melbourne, Australia; 13th-15th February 2019 Vol. 2019-February, p. 1186-1191
- Full Text:
- Reviewed:
- Description: Common vulnerability scoring system (CVSS) is an industry standard that can assess the vulnerability of nodes in traditional computer systems. The metrics computed by CVSS would determine critical nodes and attack paths. However, traditional IT security models would not fit IoT embedded networks due to distinct nature and unique characteristics of IoT systems. This paper analyses the application of CVSS for IoT embedded systems and proposes an improved vulnerability scoring system based on CVSS v3 framework. The proposed framework, named CVSSIoT, is applied to a realistic IT supply chain system and the results are compared with the actual vulnerabilities from the national vulnerability database. The comparison result validates the proposed model. CVSSIoT is not only effective, simple and capable of vulnerability evaluation for traditional IT system, but also exploits unique characteristics of IoT devices.
- Description: Proceedings of the IEEE International Conference on Industrial Technology
A kernel-based approach for content-based image retrieval
- Authors: Karmakar, Priyabrata , Teng, Shyh , Lu, Guojun , Zhang, Dengsheng
- Date: 2018
- Type: Text , Conference proceedings , Conference paper
- Relation: 2018 International Conference on Image and Vision Computing New Zealand; Auckland, New Zealand; 19th-21st November 2018 p. 1-6
- Full Text: false
- Reviewed:
- Description: Content-based image retrieval (CBIR) is a popular approach to retrieve images based on a query. In CBIR, retrieval is executed based on the properties of image contents (e.g. gradient, shape, color, texture) which are generally encoded into image descriptors. Among the various image descriptors, histogram-based descriptors are very popular. However, they suffer from the limitation of coarse quantization. In contrast, the use of kernel descriptors (KDES) is proven to be more effective than histogram-based descriptors in other applications, e.g. image classification. This is because, in the KDES framework, instead of the quantization of pixel attributes, each pixel equally takes part in the similarity measurement between two images. In this paper, we propose an approach for how the conventional KDES and its improved version can be used for CBIR. In addition, we have provided a detailed insight into the effectiveness of improved kernel descriptors. Finally, our experiment results will show that kernel descriptors are significantly more effective than histogram-based descriptors in CBIR.
A novel perceptual dissimilarity measure for image retrieval
- Authors: Shojanazeri, Hamid , Zhang, Dengsheng , Teng, Shyh , Aryal, Sunil , Lu, Guojun
- Date: 2018
- Type: Text , Conference proceedings , Conference paper
- Relation: 2018 International Conference on Image and Vision Computing New Zealand, IVCNZ 2018; Auckland, New Zealand; 19th-21st November 2018 Vol. 2018-November, p. 1-6
- Full Text: false
- Reviewed:
- Description: Similarity measure is an important research topic in image classification and retrieval. Given a type of image features, a good similarity measure should be able to retrieve similar images from the database while discard irrelevant images from the retrieval. Similarity measures in literature are typically distance based which measure the spatial distance between two feature vectors in high dimensional feature space. However, this type of similarity measures do not have any perceptual meaning and ignore the neighborhood influence in the similarity decision making process. In this paper, we propose a novel dissimilarity measure, which can measure both the distance and perceptual similarity of two image features in feature space. Results show the proposed similarity measure has a significant improvement over the traditional distance based similarity measure commonly used in literature.
- Description: International Conference Image and Vision Computing New Zealand