9 research outputs found

    Image mining: issues, frameworks and techniques

    Get PDF
    [Abstract]: Advances in image acquisition and storage technology have led to tremendous growth in significantly large and detailed image databases. These images, if analyzed, can reveal useful information to the human users. Image mining deals with the extraction of implicit knowledge, image data relationship, or other patterns not explicitly stored in the images. Image mining is more than just an extension of data mining to image domain. It is an interdisciplinary endeavor that draws upon expertise in computer vision, image processing, image retrieval, data mining, machine learning, database, and artificial intelligence. Despite the development of many applications and algorithms in the individual research fields cited above, research in image mining is still in its infancy. In this paper, we will examine the research issues in image mining, current developments in image mining, particularly, image mining frameworks, state-of-the-art techniques and systems. We will also identify some future research directions for image mining at the end of this paper

    Image mining: trends and developments

    Get PDF
    [Abstract]: Advances in image acquisition and storage technology have led to tremendous growth in very large and detailed image databases. These images, if analyzed, can reveal useful information to the human users. Image mining deals with the extraction of implicit knowledge, image data relationship, or other patterns not explicitly stored in the images. Image mining is more than just an extension of data mining to image domain. It is an interdisciplinary endeavor that draws upon expertise in computer vision, image processing, image retrieval, data mining, machine learning, database, and artificial intelligence. In this paper, we will examine the research issues in image mining, current developments in image mining, particularly, image mining frameworks, state-of-the-art techniques and systems. We will also identify some future research directions for image mining

    An overview of NuDetective Forensic Tool and its usage to combat child pornography in Brazil

    Get PDF
    In many countries, the possession of files containing child and teen pornography is a heinous crime and is desirable for law enforcement be able to detect such files in a timely manner at crime scenes. However, mainly at crime scenes, it is impossible to manually examine all files that can be stored in digital storage devices. The NuDetective Forensic Tool was developed to assist forensic examiners to identify child pornography at crime scenes. NuDetective uses automatic nudity detection in images and videos, file name comparison and also uses hash values to reduce the files to be analyzed by forensic examiners. Despite the high detection rates achieved in past experiments, the authors did not get any formal feedback of NuDetective users about its performance in real forensic cases. So, this work presents a detailed review of the four main features of NuDetective Forensic Tool, including all techniques and methods implemented, and also the results of an unpublished survey conducted to evaluate the real effectiveness of NuDetective by its Brazilian users. The results obtained showed that NuDetective is helping to arrest pedophiles and to combat the child sexual exploitation in the digital era.Sociedad Argentina de Informática e Investigación Operativa (SADIO

    An overview of NuDetective Forensic Tool and its usage to combat child pornography in Brazil

    Get PDF
    In many countries, the possession of files containing child and teen pornography is a heinous crime and is desirable for law enforcement be able to detect such files in a timely manner at crime scenes. However, mainly at crime scenes, it is impossible to manually examine all files that can be stored in digital storage devices. The NuDetective Forensic Tool was developed to assist forensic examiners to identify child pornography at crime scenes. NuDetective uses automatic nudity detection in images and videos, file name comparison and also uses hash values to reduce the files to be analyzed by forensic examiners. Despite the high detection rates achieved in past experiments, the authors did not get any formal feedback of NuDetective users about its performance in real forensic cases. So, this work presents a detailed review of the four main features of NuDetective Forensic Tool, including all techniques and methods implemented, and also the results of an unpublished survey conducted to evaluate the real effectiveness of NuDetective by its Brazilian users. The results obtained showed that NuDetective is helping to arrest pedophiles and to combat the child sexual exploitation in the digital era.Sociedad Argentina de Informática e Investigación Operativa (SADIO

    Survey On Nudity Detection: Opportunities And Challenges Based On ‘Awrah Concept In Islamic Shari’a

    Get PDF
    The nudity or nakedness which known as awrah in Islam is part of the human body which in principle should not be seen by other people except those qualified to be her or his mahram or in an emergency or urgent need.Nudity detection technique has long been receiving a lot of attention by researchers worldwide due to its importance particularly to the global Muslim community. In this paper, the techniques were separated into four classifications namely methods based on body structure, image retrieval, the features of skin region, and bag-of-visual-words (BoVW). All of these techniques are applicable to some areas of skin on the body as well as on the sexual organs that should be visible to determine nude or not. While the concept of nakedness in Islamic Shari'a has different rules between men and women, such as the limit of male ‘awrah is between the navel and the knees, while the limit of female ‘awrah is the entire body except the face and hands which should be closed using the hijab. In general, existing techniques can be used to detect nakedness concerned bythe Islamic Shari'a. The selection ofhese techniques are employed based on the areas of skin on the body as well as or the sexual organs to indicate whether it falls to thenude category or not. While in Islamic Shari'a, different 'awrah rules are required for men and women such as the limit 'awrah, the requirements of clothes as cover awrah, and kinds of shapes and shades of Hijabs in various countries (for women only). These problems are the opportunities and challenges for the researcher to propose an ‘awrah detection technique in accordance with the Islamic Shari'a

    A four-dimensional probabilistic atlas of the human brain

    Get PDF
    The authors describe the development of a four-dimensional atlas and reference system that includes both macroscopic and microscopic information on structure and function of the human brain in persons between the ages of 18 and 90 years. Given the presumed large but previously unquantified degree of structural and functional variance among normal persons in the human population, the basis for this atlas and reference system is probabilistic. Through the efforts of the International Consortium for Brain Mapping (ICBM), 7,000 subjects will be included in the initial phase of database and atlas development. For each subject, detailed demographic, clinical, behavioral, and imaging information is being collected. In addition, 5,800 subjects will contribute DNA for the purpose of determining genotype-phenotype-behavioral correlations. The process of developing the strategies, algorithms, data collection methods, validation approaches, database structures, and distribution of results is described in this report. Examples of applications of the approach are described for the normal brain in both adults and children as well as in patients with schizophrenia. This project should provide new insights into the relationship between microscopic and macroscopic structure and function in the human brain and should have important implications in basic neuroscience, clinical diagnostics, and cerebral disorders

    Efficient image duplicate detection based on image analysis

    Get PDF
    This thesis is about the detection of duplicated images. More precisely, the developed system is able to discriminate possibly modified copies of original images from other unrelated images. The proposed method is referred to as content-based since it relies only on content analysis techniques rather than using image tagging as done in watermarking. The proposed content-based duplicate detection system classifies a test image by associating it with a label that corresponds to one of the original known images. The classification is performed in four steps. In the first step, the test image is described by using global statistics about its content. In the second step, the most likely original images are efficiently selected using a spatial indexing technique called R-Tree. The third step consists in using binary detectors to estimate the probability that the test image is a duplicate of the original images selected in the second step. Indeed, each original image known to the system is associated with an adapted binary detector, based on a support vector classifier, that estimates the probability that a test image is one of its duplicate. Finally, the fourth and last step consists in choosing the most probable original by picking that with the highest estimated probability. Comparative experiments have shown that the proposed content-based image duplicate detector greatly outperforms detectors using the same image description but based on a simpler distance functions rather than using a classification algorithm. Additional experiments are carried out so as to compare the proposed system with existing state of the art methods. Accordingly, it also outperforms the perceptual distance function method, which uses similar statistics to describe the image. While the proposed method is slightly outperformed by the key points method, it is five to ten times less complex in terms of computational requirements. Finally, note that the nature of this thesis is essentially exploratory since it is one of the first attempts to apply machine learning techniques to the relatively recent field of content-based image duplicate detection

    Efficient image duplicate detection based on image analysis

    Get PDF
    This thesis is about the detection of duplicated images. More precisely, the developed system is able to discriminate possibly modified copies of original images from other unrelated images. The proposed method is referred to as content-based since it relies only on content analysis techniques rather than using image tagging as done in watermarking. The proposed content-based duplicate detection system classifies a test image by associating it with a label that corresponds to one of the original known images. The classification is performed in four steps. In the first step, the test image is described by using global statistics about its content. In the second step, the most likely original images are efficiently selected using a spatial indexing technique called R-Tree. The third step consists in using binary detectors to estimate the probability that the test image is a duplicate of the original images selected in the second step. Indeed, each original image known to the system is associated with an adapted binary detector, based on a support vector classifier, that estimates the probability that a test image is one of its duplicate. Finally, the fourth and last step consists in choosing the most probable original by picking that with the highest estimated probability. Comparative experiments have shown that the proposed content-based image duplicate detector greatly outperforms detectors using the same image description but based on a simpler distance functions rather than using a classification algorithm. Additional experiments are carried out so as to compare the proposed system with existing state of the art methods. Accordingly, it also outperforms the perceptual distance function method, which uses similar statistics to describe the image. While the proposed method is slightly outperformed by the key points method, it is five to ten times less complex in terms of computational requirements. Finally, note that the nature of this thesis is essentially exploratory since it is one of the first attempts to apply machine learning techniques to the relatively recent field of content-based image duplicate detection
    corecore