Medical image retrieval is still mainly a research domain with a large variety of applications and techniques. With the ImageCLEF 2004 benchmark, an evaluation framework has been created that includes a database, query topics and ground truth data. Eleven systems (with a total of more than 50 runs) compared their performance in various configurations. The results show that there is not any one feature that performs well on all query tasks. Key to successful retrieval is rather the selection of features and feature weights based on a specific set of input features, thus on the query task. In this paper we propose a novel method based on query topic dependent image features (QTDIF) for content-based medical image retrieval. These feature sets are designed to capture both inter-category and intra-category statistical variations to achieve good retrieval performance in terms of recall and precision. We have used Gaussian Mixture Models (GMM) and blob representation to model medical images and construct the proposed novel QTDIF for CBIR. Finally, trained multi-class support vector machines (SVM) are used for image similarity ranking. The proposed methods have been tested over the Casimage database with around 9000 images, for the given 26 image topics, used for imageCLEF 2004. The retrieval performance has been compared with the medGIFT system, which is based on the GNU Image Finding Tool (GIFT). The experimental results show that the proposed QTDIF-based CBIR can provide significantly better performance than systems based general features only.
This paper describes an attack on semi-fragile image authentication schemes proposed in papers. In this attack, the adversary manipulates an authentic image and queries a verifier with the corrupted image. According to the answers from the verifier, the adversary can disclose the secret relationship graphs used to produce a signature. With the disclosed relationship graphs, the adversary can impersonate an innocent person to forge authentic images easily. A
countermeasure to this attack is to change scheme parameters with the relationship edges so that the relationship graphs reconstructed by the attacker are different from the original one. Sequentially, the attacker is hard to forge an authentic image without correct relationship graphs.
KEYWORDS: Digital watermarking, Signal processing, Signal detection, Image registration, Distortion, Image processing, Medical imaging, Nonlinear optics, Lithium, Image segmentation
An audio registration method based on dynamic time-warping (DTW) technique was described in this paper. DTW technique can register two audio signals whose type of misalignment in time domain is unknown. By measuring the frame dissimilarities in two audio signals, the best alignment between a pair of audio signals can be obtained to register the two audio signals. This method can solve the registration problem for audio signal which is processed by re-scaling in the time domain. It is useful in many audio applications and has been applied to digital audio watermarking detection.
This paper present a method to distribute the security key used to encrypt digital content by embedding the security key as a watermark into a digital sample that is appended to the encrypted digital content. The security key embedded into the sample is imperceptible and can not be detected by attackers. To play or read digital content, a portable device will extract the security key from the sample, then use the detected key to decrypt the encrypted content. This paper also present a method to generate and transfer right between clearing hose and portable device and between two portable devices. In order to prevent digital content from being illegally used, authentication, and verification between clearing house and portable device and between two portable devices are employed. The right information is tamper-resistent when it is transferred to portable devices. This method can maximally protect the usage of digital contents even if the portable device is breached.
KEYWORDS: Fermium, Frequency modulation, Neural networks, Manufacturing, Artificial intelligence, Computer simulations, Evolutionary algorithms, Control systems, Decision support systems, Computing systems
In this paper, scheduling problems, including description, solving, and rescheduling, are presented in detail. The scheduling flexibility is an important factor to affect the system flexibility.
Conference Committee Involvement (3)
Multimedia Content Access: Algorithms and Systems VII
4 February 2013 | Burlingame, California, United States
Multimedia Content Access: Algorithms and Systems VI
23 January 2012 | Burlingame, California, United States
Multimedia Content Access: Algorithms and Systems V
25 January 2011 | San Francisco Airport, California, United States
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.