skip to main content
10.1145/1631058.1631075acmconferencesArticle/Chapter ViewAbstractPublication PagesmmConference Proceedingsconference-collections
poster

An efficient key point quantization algorithm for large scale image retrieval

Authors Info & Claims
Published:23 October 2009Publication History

ABSTRACT

We focus on the problem of large-scale near duplicate image retrieval. Recent studies have shown that local image features, often referred to as key points, are effective for near duplicate image retrieval. The most popular approach for key point based image matching is the clustering-based bag-of-words model. It maps each key point to a visual word in a code-book that is constructed by a clustering algorithm, and represents each image by a histogram of visual words. Despite its success, there are two main shortcomings of the clustering-based bag-of-words model: (i) it is computationally expensive to cluster millions of key points into thousands of visual words; (ii) there is no theoretical analysis on the performance of the bag-of-words model. We propose a new scheme for key point quantization that addresses these shortcomings. Instead of clustering, the proposed scheme quantizes each key point into a binary vector using a collection of randomly generated hyper-spheres, and a bag-of-words model is constructed based on such randomized quantization.

Our theoretical analysis shows that the resulting image similarity provides an upper bound for the similarity based on the optimal partial matching between two sets of key points. Empirical study on a database of 100,000 images shows that the proposed scheme is not only more efficient but also more effective than the clustering-based approach for near duplicate image retrieval.

References

  1. ANSI/NIST-ITL 1-2007 standard: Data Format for the Interchange of Fingerprint, Facial,&Other Biometric Information. 2007.Google ScholarGoogle Scholar
  2. S. Boughhorbel, J.-P. Tarel, and F. Fleuret. Non-mercer kernels for svm object recognition. In British Machine Vision Conference, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  3. O. Chum, J. Philbin, and A. Zisserman. Near duplicate image detection: min-hash and tf-idf weighting. In Proceedings of the British Machine Vision Conference, 2008.Google ScholarGoogle ScholarCross RefCross Ref
  4. G. Csurka, C. R. Dance, L. Fan, J. Willamowski, and C. Bray. Visual categorization with bags of keypoints. In Workshop on Statistical Learning in Computer Vision, ECCV, pages 1--22, 2004.Google ScholarGoogle Scholar
  5. M. Datar, N. Immorlica, P. Indyk, and V. S. Mirrokni. Locality-sensitive hashing scheme based on p-stable distributions. In Proceedings of the twentieth annual symposium on Computational geometry, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. W. Dong, Z. Wang, M. Charikar, and K. Li. Efficiently matching sets of features with random histograms. In Proceeding of ACM Multimedia, pages 179--188, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. R. O. Duda, P. E. Hart, and D. G. Stork. Pattern Classification. Wiley-Interscience Publication, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. K. Grauman and T. Darrell. The pyramid match kernel: Efficient learning with sets of features. J. Mach. Learn. Res., 8:725--760, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. W. Hoeffding. Probability inequalities for sums of bounded random variables. Journal of the American Statistical Association, 58(301):13--30, 1963.Google ScholarGoogle ScholarCross RefCross Ref
  10. Y. Ke, R. Sukthankar, and L. Huston. Efficient near-duplicate detection and sub-image retrieval. In Proceeding of ACM Multimedia, pages 869--876, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. R. Kondor and T. Jebara. A kernel between sets of vectors. In Proceedings of the International Conference on Machine Learning, pages 361--368, 2003.Google ScholarGoogle Scholar
  12. J.-E. Lee, A. K. Jain, and R. Jin. Scars, marks and tattoos (SMT): Soft biometric for suspect and victim identification. In Biometric Consortium Conference and Technology Expo, 2008.Google ScholarGoogle ScholarCross RefCross Ref
  13. V. Lepetit, P. Lagger, and P. Fua. Randomized trees for real-time keypoint recognition. In CVPR, pages 775--781, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. E. Lipton and J. Glanz. Limits of DNA research pushed to identify the dead of sept. 11. New York Times, April 2002.Google ScholarGoogle Scholar
  15. T. Liu, A. Moore, A. Gray, and K. Yang. An investigation of practical approximate nearest neighbor algorithms. In Neural Information Processing Systems, pages 825--832, 2004.Google ScholarGoogle Scholar
  16. T. Liu, C. Rosenberg, and H. Rowley. Clustering billions of images with large scale nearest neighbor search. In IEEE Workshop on Applications of Computer Vision (WACV), page 28, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. D. Lowe. Distinctive image features form scale-invariant keypoints. In International Journal of Computer Vision, volume 60, pages 91--110, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. S. Lyu. Mercer kernels for object recognition with local features. In CVPR, pages 223--229, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. H. Moon and P. J. Phillips. Computational and performance aspects of pca--based face recognition algorithms. Perception, 30:303--321, 2001.Google ScholarGoogle ScholarCross RefCross Ref
  20. P. Moreno, P. Ho, and N. Vasconcelos. A kullback-leibler divergence based kernel for svm classification in multimedia applications. In Neural Information Processing Systems, 2003.Google ScholarGoogle Scholar
  21. M. Muja and D. G. Lowe. Fast approximate nearest neighbors with automatic algorithm configuration. In VISSAPP (1), pages 331--340, 2009.Google ScholarGoogle Scholar
  22. D. Nister and H. Stewenius. Scalable recognition with a vocabulary tree. In CVPR, pages 2161--2168, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. T. Pavlidis. Limitations of cbir. In ICPR, 2008.Google ScholarGoogle Scholar
  24. J. Philbin, O. Chum, M. Isard, J. Sivic, and A. Zisserman. Object retrieval with large vocabularies and fast spatial matching. In CVPR, pages 1--8, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  25. S. E. Robertson, S. Walker, and M. Hancock-Beaulieu. Okapi at trec-7. In Proceedings of the Seventh Text REtrieval Conference, 1998.Google ScholarGoogle Scholar
  26. G. Shakhnarovich, T. Darrell, and P. Indyk. Nearest-Neighbor Methods in Learning and Vision: Theory and Practice. MIT Press, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. C. Silpa-Anan and R. Hartley. Localization using an imagemap. In Proceedings of the 2004 Australasian Conference on Robotics&Automation, 2004.Google ScholarGoogle Scholar
  28. C. Silpa-Anan and R. Hartley. Optimised kd-trees for fast image descriptor matching. In CVPR, pages 1--8, 2008.Google ScholarGoogle ScholarCross RefCross Ref
  29. J. Sivic and A. Zisserman. Video Google: A text retrieval approach to object matching in videos. In ICCV, pages 1470--1477, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. C. Wallraven, B. Caputo, and A. Graf. Recognition with local features: the kernel recipe. In CVPR, pages 257--264, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. B. Wang, Z. Li, M. Li, and W.-Y. Ma. Large-scale duplicate detection for web image search. In ICME, pages 353--356, 2006.Google ScholarGoogle ScholarCross RefCross Ref
  32. L. Wolf and A. Shashua. Learning over sets using kernel principal angles. Journal of Machine Learning Research, 4:913--931, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. An efficient key point quantization algorithm for large scale image retrieval

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        LS-MMRM '09: Proceedings of the First ACM workshop on Large-scale multimedia retrieval and mining
        October 2009
        144 pages
        ISBN:9781605587561
        DOI:10.1145/1631058

        Copyright © 2009 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 23 October 2009

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • poster

        Upcoming Conference

        MM '24
        MM '24: The 32nd ACM International Conference on Multimedia
        October 28 - November 1, 2024
        Melbourne , VIC , Australia

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader