Image retrieval: Ideas, influences, and trends of the new age

R Datta, D Joshi, J Li, JZ Wang - ACM Computing Surveys (Csur), 2008 - dl.acm.org
We have witnessed great interest and a wealth of promise in content-based image retrieval
as an emerging technology. While the last decade laid foundation to such promise, it also …

Glaze: Protecting artists from style mimicry by {Text-to-Image} models

S Shan, J Cryan, E Wenger, H Zheng… - 32nd USENIX Security …, 2023 - usenix.org
Recent text-to-image diffusion models such as MidJourney and Stable Diffusion threaten to
displace many in the professional artist community. In particular, models can learn to mimic …

Data deduplication techniques for efficient cloud storage management: a systematic review

R Kaur, I Chana, J Bhattacharya - The Journal of Supercomputing, 2018 - Springer
The exponential growth of digital data in cloud storage systems is a critical issue presently
as a large amount of duplicate data in the storage systems exerts an extra load on it …

Effective and efficient global context verification for image copy detection

Z Zhou, Y Wang, QMJ Wu, CN Yang… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
To detect illegal copies of copyrighted images, recent copy detection methods mostly rely on
the bag-of-visual-words (BOW) model, in which local features are quantized into visual …

Product quantization for nearest neighbor search

H Jegou, M Douze, C Schmid - IEEE transactions on pattern …, 2010 - ieeexplore.ieee.org
This paper introduces a product quantization-based approach for approximate nearest
neighbor search. The idea is to decompose the space into a Cartesian product of low …

The inverted multi-index

A Babenko, V Lempitsky - IEEE transactions on pattern …, 2014 - ieeexplore.ieee.org
A new data structure for efficient similarity search in very large datasets of high-dimensional
vectors is introduced. This structure called the inverted multi-index generalizes the inverted …

A survey on data leakage prevention systems

S Alneyadi, E Sithirasenan… - Journal of Network and …, 2016 - Elsevier
Protection of confidential data from being leaked to the public is a growing concern among
organisations and individuals. Traditionally, confidentiality of data has been preserved using …

Hawkes processes for events in social media

MA Rizoiu, Y Lee, S Mishra, L **e - Frontiers of multimedia research, 2017 - dl.acm.org
This chapter provides an accessible introduction for point processes, and especially Hawkes
processes, for modeling discrete, inter-dependent events over continuous time. We start by …

[PDF][PDF] Near duplicate image detection: Min-hash and TF-IDF weighting.

O Chum, J Philbin, A Zisserman - Bmvc, 2008 - robots.ox.ac.uk
This paper proposes two novel image similarity measures for fast indexing via locality
sensitive hashing. The similarity measures are applied and evaluated in the context of near …

Visualrank: Applying pagerank to large-scale image search

Y **g, S Baluja - IEEE Transactions on Pattern Analysis and …, 2008 - ieeexplore.ieee.org
Because of the relative ease in understanding and processing text, commercial image-
search systems often rely on techniques that are largely indistinguishable from text search …