Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Private Content Based Image Retrieval Shashank J, Kowshik P, Kannan Srinathan and C.V. Jawahar Is it possible for an image database to respond accurately without any knowledge of the query image. Objective: Quadratic Residuosity Assumption Retrieve results from an image database, while maintaining complete privacy of the query image from the database. • Consider a natural number N = p. q where p, q are large prime numbers. Applications: • Construct a set Z : Z • Medical Image Databases • Surveillance Systems • Logo Patent Search • Defense Systems • Web 2.0 • Image based query retrieval * N * N x | 1 x N , gcd N , x 1 . • `y` is called a Quadratic Residue (QR), if x | y = x2 and x, y else `y` is called a Quadratic NonResidue (QNR). • Construct a set YN with equal number of QRs and QNRs Quadratic Residuosity Assumption: Extension to other Hierarchical Structures • Hierarchical Structures vary in: – Number of nodes at each level. – Information at a node. Results and Discussions • KD Tree and Corel Dataset – Color Histogram (768 dimensions) – Retrieval Time: 0.596 secs • Any number of nodes can be converted into a ‘m x n’ matrix. • Any information can be represented in binary format. • If the user has the data about the indexing structure and the format of the information stored at a node, the algorithm can be simulated for any hierarchical structure. • Vocabulary Tree and Nister Dataset – SIFT features – Vocabulary of 10000 visual words. – Retrieval Time: 0.320 secs Given a number `y` YN, it is predictably hard to decide whether `y` is a QR or a QNR. Basic Properties: PCBIR Algorithm • KD Tree – Similar to binary tree – Each node contains split dimension and split value. QNR x QNR = QR QNR x QR = QNR QR x QR = QR 2. The user first asks the database to send the information at the root node. Q1 fquery, f(A1) A1 3. Using fquery and the information received, the user decides whether to access the left subtree or the right subtree. Q2 …….. fquery, f(A2) A2 Related Work • Blind Vision by S. Avidan and M. Butman • Apply secure multi-party techniques to vision algorithms. PCBIR on a Binary Search Tree 1 ….. 1 QR 1 0 ….. 1 1 0 ….. 1 QNR 1 0 ….. 1 1 0 ….. 1 QR QR mxn QR2 ….. QR2 QNR2 QR2 …. mxn QNR2 QNR2 QNR ….. QNR2 QR ….. QR2 QR2 QR ….. QR2 QR QNR ….. QR …. Ai …. ….. …. QNR …. QR QR2 …. …. ….. QR2 • Multi-party protocols are inefficient compared to our tailor made solution. …. 0 …. 1 …. ….. …. 1 …. 0 …. 6. The user using the data obtained from Ai and fquery decides which subtree to move next to. – Branch factor depends on vocabulary size. – Each node contains representative visual words of its children. Root Info Feature vector (fquery) 5. The database returns a reply Ai for the query Qi. – Used to achieve partial privacy. – 90 Hash functions with 450 bins each. – Retrieval Time: 0.221 secs • Vocabulary Tree 1. Extract feature vector of the query image say fquery. 4. In order to get the data at the node to be accessed, the user frames a query Qi where i indicates the level in which the node occurs. • LSH and Corel Database Formulation of Qi and Ai Center for Visual Information Technology International Institute of Information Technology, Hyderabad, INDIA http://cvit.iiit.ac.in • They need privacy in both directions while PCBIR demands in one direction only.