DocumentCode :
729724
Title :
Sift keypoint removal via convex relaxation
Author :
An Cheng ; Yuanman Li ; Jiantao Zhou
Author_Institution :
Dept. of Comput. & Inf. Sci., Univ. of Macau, Macau, China
fYear :
2015
fDate :
June 29 2015-July 3 2015
Firstpage :
1
Lastpage :
6
Abstract :
Due to the high robustness against various image transformations, Scale Invariant Feature Transform (SIFT) has been widely employed in many computer vision and multimedia security areas to extract image local features. Though SIFT has been extensively studied from various perspectives, its security against malicious attack has rarely been addressed. In this work, we demonstrate that the SIFT keypoints can be effectively removed, without introducing serious distortion on the image. This is achieved by formulating the SIFT keypoint removal as a constrained optimization problem, where the constraints are well-designed to suppress the existence of local extremum and prevent generating new keypoints within a local cuboid in the scale space. We show that such optimization problem in the ideal case is non-convex. To make the computation feasible, we propose a relaxation technique to convexify the original problem, while maximally preserving the solution space. As demonstrated experimentally, our proposed SIFT removal algorithm significantly outperforms the state-of-the-arts in terms of keypoint removal rate-distortion (KRR-D) performance. Our results imply that an authorization mechanism is required for SIFT-based systems to verify the validity of the input data, so as to achieve high reliability.
Keywords :
authorisation; convex programming; feature extraction; relaxation theory; transforms; KRR-D performance; SIFT keypoint removal; authorization mechanism; computer vision; constrained optimization problem; convex relaxation; image local feature extraction; image transformations; keypoint removal rate-distortion performance; local cuboid; malicious attack; multimedia security; nonconvex; relaxation technique; scale invariant feature transform; Distortion; Feature extraction; Forgery; Indexes; Optimization; Robustness; Security; SIFT; convex optimization; convex relaxation; keypoint removal;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Multimedia and Expo (ICME), 2015 IEEE International Conference on
Conference_Location :
Turin
Type :
conf
DOI :
10.1109/ICME.2015.7177423
Filename :
7177423
Link To Document :
بازگشت