An efficient signature file strategy for similarity retrieval from large iconic image databases

被引:14
作者
Chang, YI [1 ]
Ann, HY
Yeh, WH
机构
[1] Natl Sun Yat Sen Univ, Dept Comp Sci & Engn, Kaohsiung, Taiwan
[2] Natl Sun Yat Sen Univ, Dept Appl Math, Kaohsiung, Taiwan
关键词
access methods; content-based retrieval; 2D strings; iconic indexing; image databases; signatures; similarity retrieval;
D O I
10.1006/jvlc.2001.0212
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In the previous signature-based approaches to retrieve symbolic pictures from a large iconic image database, only pictures of type-2 similarity are considered, where a picture A is of type-2 similarity with picture B when both pictures have the same spatial relationship between any two objects in the pictures. When queries of objects, type-0 similarity and type-1 similarity are asked, signatures for objects, type-0 similarity and type-1 similarity are required. Note that a picture is of type-0 similarity when all the spatial category relationships of each object pair are the same to the query picture, and a picture is of type-1 similarity when the picture is of type-0 similarity and all the orthogonal relationships of each object pair are the same to the query picture. Although these four kinds of signatures can be constructed and stored in advance to speed up answering such kinds of queries as in the approach of Lee et al. [1], such a large signature file containing those four kinds of signatures really wastes space. In this paper, we first present the revised version of Y. I. Chang and Yang's bit-string-based access strategy [2], which constructs type-2 signatures. Based on the revised version, we then propose algorithms to dynamically convert those type-2 signatures into object signatures, type-0 signatures and type-1 signatures at run time so that we can answer queries of object similarity, type-0 similarity, type-1 similarity and type-2 similarity by storing only one type of signatures, i.e. the type-2 signatures. While in the Lee et al. signature file strategy based on the 2D B-string representation [1], they have to construct and store four types of signatures in the database to achieve the same goal. From our simulation, we show that our approach can provide a higher rate of a correct match and has a smaller storage requirement than the approach of Lee et al. (C) 2002 Elsevier Science Ltd. All rights reserved.
引用
收藏
页码:117 / 147
页数:31
相关论文
共 42 条
[31]  
JUNGERT E, 1988, LECT NOTES COMPUT SC, V301, P343
[32]  
JUNGERT E, 1992, 11TH IAPR INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, PROCEEDINGS, VOL I, P461, DOI 10.1109/ICPR.1992.201600
[33]  
Lee S.-Y., 1990, International Journal of Pattern Recognition and Artificial Intelligence, V4, P27, DOI 10.1142/S0218001490000034
[34]   2D C-STRING - A NEW SPATIAL KNOWLEDGE REPRESENTATION FOR IMAGE DATABASE-SYSTEMS [J].
LEE, SY ;
HSU, FJ .
PATTERN RECOGNITION, 1990, 23 (10) :1077-1087
[35]  
LEE SY, 1992, J VISUAL LANG COMPUT, V3, P373
[36]   Next-generation web searches for visual content [J].
Lew, MS .
COMPUTER, 2000, 33 (11) :46-+
[37]  
Li XB, 1998, INT C PATT RECOG, P1230, DOI 10.1109/ICPR.1998.711921
[38]   Picture similarity retrieval using the 2D Projection Interval representation [J].
Nabil, M ;
Ngu, AHH ;
Shepherd, J .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 1996, 8 (04) :533-539
[39]   MULTIKEY ACCESS METHODS BASED ON SUPERIMPOSED CODING TECHNIQUES [J].
SACKSDAVIS, R ;
KENT, A ;
RAMAMOHANARAO, K .
ACM TRANSACTIONS ON DATABASE SYSTEMS, 1987, 12 (04) :655-696
[40]  
Soffer A., 1996, Proceedings of the 13th International Conference on Pattern Recognition, P114, DOI 10.1109/ICPR.1996.546805