A Method For Detecting Duplicate And Near-Duplicate Images Penetration


  • Dr. Ramesh Shahabadkar
  • Dr. S Sai Satyanarayana Reddy
  • P. Devika






Duplicate or near-duplicate, image penetration, distinctive sceneries.


A method for detection of duplicate or near-duplicate image penetration from images in the similar group by distribution of color and other attributes of the image. Distinctive sceneries of the images penetration are identified. Each couple of images penetration with at least one distictive scenary is mutual; the distictive scenary of each image penetration is allied to normalize whether the couple is duplicates or near-duplicates.


[1] Chuan Xiao, Wei Wang, Xuemin Lin, Jeffrey Xu Yu , “Efficient Similarity Joins for Near Duplicate Detectionâ€, Proceeding of the 17th international conference on World Wide Web, pp:131--140, 2008.

[2] Zhewang, William Josephson, Qin Lv,Moses Charikar, Kai Li,â€Filtering Image Spam with Near-Duplicate Detectionâ€,Computer Science department, Princeton University,USA.

[3] Yan Ke, Rahul Sukhthankar, Larry Huston,†Efficient Near-duplicate Detection and Sub-image Retrievalâ€, School of Computer Science Carnegie Mellon University,Pittsburgh,USA.

[4] J. G. Conrad, X. S. Guo, and C. P. Schriber. “Online duplicate document detection: signature reliability in a dynamic retrieval environmentâ€. In CIKM, 2003.

[5] M. Henzinger, "Finding near-duplicate web pages: a large-scale evaluation of algorithms," Proceedings of the 29th annual international ACM SIGIR conference on Research and development in information retrieval, pp. 284-291, 2006.

[6] D. Fetterly, M. Manasse, and M. Najork. “On the evolution of clusters of near-duplicate web pagesâ€. In LA-WEB, 2003.

[7] A. Z. Broder, S. C. Glassman, M. S. Manasse, and G. Zweig. “Syntactic clustering of the webâ€. Computer Networks, 29(8-13):1157–1166, 1997.

[8] J. Cho, N. Shivakumar, and H. Garcia-Molina. “Finding replicated web collectionsâ€. In SIGMOD, 2000.

[9] T. C. Hoad and J. Zobel. “Methods for identifying versioned and plagiarized documentsâ€. JASIST, 54(3):203–215, 2003.

[10] E. Chang, J. Wang, C. Li, and G. Wiederhold. RIME: A replicated image detector for the world-wide web. In Proceedings of SPIE, 1998.

[11] J. Fridrich, D. Soukal, and J. Lukas. Detection of copy-move forgery in digital images. In Digital Forensic Research Workshop, 2003.

[12] A. Loui and M. Wood. A software system for automatic albuming of consumer pictures. In Proceedings of ACM International Conference on Multimedia, 1999.

[13] J. Luo and M. Nascimento. Content based sub-image retrieval via hierarchical tree matching. In Proceedings of ACM Workshop on Multimedia Databases, 2003.

[14] S. Berrani, L. Amsaleg, and P. Gros. Robust content-based image searches for copyright protection. In Proceedings of ACM Workshop on Multimedia Databases, 2003.

[15] A. Ramachandran and N. Feamster. Unerstanding the nework-level behavior of spammers. ACM SIGCOMM Computer Communication Review, 36(4), Oct. 2006.

[16] Y. Rui, A. C. She, and T. S. Huang, Modified fourier descriptors for shape representation—a practical approach, in Proc. of First International Workshop on Image Databases and Multi Media Search, 1996.

[17] C. Carson, S. Belongie, H. Greenspan, and J. Malik, Region-based image querying, in Proc. of IEEE Workshop on Content-Based Access of Image and Video Libraries, in Conjuction with IEEE CVPR’97, 1997.

[18] L. Schiff, N. Van House, and M. H. Butler. Unpublished study of image database users.

View Full Article: