Attacks on Copyright Marking Systems
Proceedings of the Second International Workshop on Information Hiding
Distinctive Image Features from Scale-Invariant Keypoints
International Journal of Computer Vision
An efficient parts-based near-duplicate and sub-image retrieval system
Proceedings of the 12th annual ACM international conference on Multimedia
Efficient Image Matching with Distributions of Local Invariant Features
CVPR '05 Proceedings of the 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05) - Volume 2 - Volume 02
Pruning SIFT for scalable near-duplicate image matching
ADC '07 Proceedings of the eighteenth conference on Australasian database - Volume 63
Detection of near-duplicate images for web search
Proceedings of the 6th ACM international conference on Image and video retrieval
Speeded-Up Robust Features (SURF)
Computer Vision and Image Understanding
Near-duplicate keyframe retrieval by nonrigid image matching
MM '08 Proceedings of the 16th ACM international conference on Multimedia
MM '09 Proceedings of the 17th ACM international conference on Multimedia
Geometric distortion insensitive image watermarking in affine covariant regions
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Understanding the security and robustness of SIFT
Proceedings of the international conference on Multimedia
Video based mobile location search with large set of SIFT points in cloud
Proceedings of the 2010 ACM multimedia workshop on Mobile cloud media computing
Deluding image recognition in sift-based cbir systems
Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence
Efficient Image Copy Detection Using Multiscale Fingerprints
IEEE MultiMedia
Adaptation of SIFT features for robust face recognition
ICIAR'10 Proceedings of the 7th international conference on Image Analysis and Recognition - Volume Part I
Structural digital signature for image authentication: an incidental distortion resistant scheme
IEEE Transactions on Multimedia
Feature-Based Sparse Representation for Image Similarity Assessment
IEEE Transactions on Multimedia
Personalized image recommendation and retrieval via latent SVM based model
Proceedings of the Fifth International Conference on Internet Multimedia Computing and Service
Hi-index | 0.00 |
Scale-space image feature extraction (SSIFE) has been widely adopted in broad areas due to its powerful resilience to attacks. However, the security threat to SSIFE-based applications, which will be addressed in this paper, is relatively unexplored. The security threat to SSIFT (called ST-SSIFE), composed of a constrained-optimization keypoint inhibition attack (KIHA) and a keypoint insertion attack (KISA), is specifically designed in this paper for scale-space feature extraction methods, such as SIFT and SURF. In ST-SSIFE, KIHA aims at making a fool of feature extraction protocols in that the detection rules are purposely violated so as to suppress the existence of a local maximum around a local region. We show that KIHA can be accomplished quickly via Lagrange multiplier but the resultant new keypoint generation (NKG) problem can be solved via Karush Kuhn Tucker (KKT) conditions. In order to leverage among keypoint removal with minimum distortion, suppression of NKG, and complexity, we further present a hybrid scheme of integrating Lagrange multiplier and KKT conditions. On the other hand, KISA is designed via an efficient coarse-to-fine descriptor matching strategy to yield fake feature points so as to create false positives. Experiments, conducted on keypoint removal rate evaluation and an image copy detection method operating on a web-scale image database as a case study, demonstrate the feasibility of our method.