Efficient Image Retrieval using Dense-SIFT for Enhanced Object Segmentation and Key Point Localization
DOI:
https://doi.org/10.22399/ijcesen.2507Keywords:
CBIR, SIFT, Feature, Vision programming, Descriptors, D-SIFTAbstract
In this paper a new technique for image retrieval is used. Traditional methods used for image retrieval are not supported for large set of databases. By using the features of the image such as color, shape and texture image can be retrieved efficiently. The Content Based image retrieval (CBIR) technique is the traditional technique used for image retrieval . Several kinds of detectors and descriptors such as SIFT, SURF, FAST, BRIEF, ORB, BRISK, FREAK are used for image retrieval. Among these techniques SIFT is quite powerful. The main drawback of the existing system is that it computes only at the interest points. The proposed system addresses about the D- SIFT algorithm in which the SIFT is computed at every pixel, or every kth pixel. The Density- Scale Invariant Feature Transform (D-SIFT) is a stand out amongst the most locally feature detector and descriptors which is utilized as a part of the majority of the vision programming. The main advantage of using Dense SIFT over SIFT is speed. The main goal is to segment the similar object from the two images. As the result of the proposed system the poorly localized points are removed by key point localization.
References
[1] Li-Wei Kang, Member, IEEE, Chao-Yung Hsu, Hung-Wei Chen, Chun- Shien Lu, Member, IEEE, Chih -Yang Lin, Member, IEEE, and Soo -Chang Pei, (2011). Feature-Based Sparse Representation for Image Similarity Assessment, IEEE Transactions on Multimedia, 13(5).
[2] Sivic J and Zisserman A, (2003). Video Google: A text retrieval approach to object matching in videos, Proc. IEEE Int. Conf. Computer Vision, Nice, France, 2; 1470–1477.
[3] C. Kim, Content-based image copy detection, Signal Process.: Image Commun., vol. 18, pp. 169–184, 2003
[4] Lowe D. G, (2004) Distinctive image features from scale-invariant keypoints, Int. J. Compute. Vision, vol. 60(2), 91–110.
[5] Maheshwari, R.U., B.Paulchamy, Pandey, B.K. et al(2024). Enhancing Sensing and Imaging Capabilities Through Surface Plasmon Resonance for Deepfake Image Detection. Plasmonics. https://doi.org/10.1007/s11468-024-02492-1
[6] Maheshwari, Uma, and Kalpanaka Silingam(2020). Multimodal Image Fusion in Biometric Authentication. Fusion: Practice and Applications 1(2); 7991.
[7] S. S, S. S and U. M. R(2022), Soft Computing based Brain Tumor Categorization with Machine Learning Techniques, International Conference on Advanced Computing Technologies and Applications (ICACTA), Coimbatore, India, pp. 1-9, doi: 10.1109/ICACTA54488.2022.9752880.
[8] R. Uma Maheshwari, B. Paulchamy, Arun M, Vairaprakash Selvaraj, Dr. N. Naga Saranya and Dr . Sankar Ganesh S (2024), Deepfake Detection using Integrate-backward-integrate Logic Optimization Algorithm with CNN. IJEER 12(2), 696-710. DOI: 10.37391/IJEER.120248.
[9] Rajendran, U. M., & Paulchamy, J. (2021). Analysis and classification of gait characteristics. Iconic Research and Engineering Journals, 4(12).
[10] Paulchamy, B., Chidambaram, S., Jaya, J., & Maheshwari, R. U. (2021). Diagnosis of Retinal Disease Using Retinal Blood Vessel Extraction. In International Conference on Mobile Computing and Sustainable Informatics: ICMCSI 2020. pp. 343-359. Springer International Publishing.
[11] Boiman O., Shechtman E., and Irani M, (2008) In defense of nearest neighbor based image classification, in Proc. IEEE Conf. Computer Vision and Pattern Recognition.
[12] Yang J., Yu K., Gong Y., and Huang T., (2009) Linear spatial pyramid matching using sparse coding for image classification, in Proc. IEEE Conf. Computer Vision and Pattern Recognition.
[13] Hsu C. Y., Lu C.S and Pei S. C, (2009) “Secure and robust SIFT,” in Proc. ACM Int. Conf. Multimedia, pp. 637–640.
[14] Wright S. J., Nowak R.D and Figueiredo M. A. T, (2009) Sparse reconstruction by separable approximation, IEEE Trans. Signal Process., 57(7), 2479–2493,.
[15] Zhao W. L and Ngo C. W, (2009) Scale-rotation invariant pattern entropy for keypoint-based near-duplicate detection, IEEE Trans. Image Process., vol. 18(2), pp. 412–423.
[16] Chandrasekhar V., Makar M., Takacs G., Chen D. M., Tsai S. S., Grzeszczuk R and Girod B, (2010) Survey of SIFT compression schemes, in Proc. Int. Workshop Mobile Multimedia Processing, Turkey.
[17] Yang A., Ganesh A., Ma Y and Sastry S, (2010) Fast l -minimization algorithms and an application in robust face recognition: A review, in Proc. IEEE Int. Conf. Image Process., Hong Kong.
[18] Kang L. W., Hsu C. Y., Chen H. W and Lu C. S, (2010) Secure SIFT based sparse representation for image copy detection and recognition, in Proc. IEEE Int. Conf. Multimedia and Expo, Singapore.
[19] Mairal J., Bach F., Ponce J and Sapiro G., (2010) Online learning for matrix factorization and sparse coding, J. Mach. Learn. Res., vol. 11; 19–60.
[20] Hsu C. Y., Lu C. S and S. C. Pei S., C, (2011) Homomorphic encryption-based secure SIFT for privacy-preserving feature extraction, in Proc. IS&T/ SPIE Media Watermarking, Forensics, and Security.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 International Journal of Computational and Experimental Science and Engineering

This work is licensed under a Creative Commons Attribution 4.0 International License.