Tampering detection and localization in images from social networks : A CBIR approach - Inria - Institut national de recherche en sciences et technologies du numérique Accéder directement au contenu
Poster Année : 2017

Tampering detection and localization in images from social networks : A CBIR approach

Résumé

Step 1 : Content-based image retrieval system • Goal : Find the best image in our database for a comparaison with the query • Method : 1. Find the 10 most similar images with a dot product using the de-scriptors explain below. Research is accelerated with a KD-Tree approach 2. Reorder these 10 candidates in order to find the best candidate. Define an homography between the image query and each candidate in order to found the best homography Descriptors used based on VGG19 [1] • Two sizes used : training images size or based on a kernelization step like [2] • Three vectors are analyzed based on the output of three layers: last convolutional layer C 5 with a output lenght of 512 and the fully-connected layers C 6 and C 7 with a output lenght of 4096 for both • A mean or max pooling have to be apply in the case of C 5 when we used the standard training images size and the three outputs in case of kernelized approach.
Fichier principal
Vignette du fichier
main.pdf (59.74 Mo) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-01844033 , version 1 (19-07-2018)

Identifiants

  • HAL Id : hal-01844033 , version 1

Citer

Cédric Maigrot, Ewa Kijak, Ronan Sicre, Vincent Claveau. Tampering detection and localization in images from social networks : A CBIR approach. ICIAP 2017 - International Conference on Image Analysis and Processing, Oct 2017, Catane, Italy. pp.1. ⟨hal-01844033⟩
104 Consultations
185 Téléchargements

Partager

Gmail Facebook X LinkedIn More