Reconstructing shredded documents through feature matching Authors: Edson Justino, Luiz S. Oliveira, Cinthia Freitas Source: Forensic Science International.

Slides:



Advertisements
Similar presentations
Animosaics Kaleigh Smith, Yunjun Liu, and Allison Klein McGill University Eurographics Symposium on Computer Animation 2005.
Advertisements

Junzhou Huang, Shaoting Zhang, Dimitris Metaxas CBIM, Dept. Computer Science, Rutgers University Efficient MR Image Reconstruction for Compressed MR Imaging.
Date: 2014/05/06 Author: Michael Schuhmacher, Simon Paolo Ponzetto Source: WSDM’14 Advisor: Jia-ling Koh Speaker: Chen-Yu Huang Knowledge-based Graph Document.
Word Spotting DTW.
SUPPORTING LANDMARK IMAGE RETRIEVAL WITH SKYLINE EXTRACTION TECHNIQUES Date : 2012 / 04 / 12 資訊碩一 LAB603.
A Novel Approach of Assisting the Visually Impaired to Navigate Path and Avoiding Obstacle-Collisions.
1 A robust detection algorithm for copy- move forgery in digital images Source: Forensic Science International, Volume 214, Issues 1–3, 10 January 2012.
1 Building a Dictionary of Image Fragments Zicheng Liao Ali Farhadi Yang Wang Ian Endres David Forsyth Department of Computer Science, University of Illinois.
An Introduction to Sparse Coding, Sparse Sensing, and Optimization Speaker: Wei-Lun Chao Date: Nov. 23, 2011 DISP Lab, Graduate Institute of Communication.
A Low-cost Attack on a Microsoft CAPTCHA Yan Qiang,
Chih-Hsing Lin, Jia-Shiuan Tsai, and Ching-Te Chiu
Sketch Tokens: A Learned Mid-level Representation for Contour and Object Detection CVPR2013 POSTER.
Intelligent Database Systems Lab 國立雲林科技大學 National Yunlin University of Science and Technology A novel document similarity measure based on earth mover’s.
Tracking a moving object with real-time obstacle avoidance Chung-Hao Chen, Chang Cheng, David Page, Andreas Koschan and Mongi Abidi Imaging, Robotics and.
FAST MULTI-BLOCK SELECTION FOR H.264 VIDEO CODING Chang, A.; Wong, P.H.W.; Yeung, Y.M.; Au, O.C.; Circuits and Systems, ISCAS '04. Proceedings of.
Novel Self-Configurable Positioning Technique for Multihop Wireless Networks Authors : Hongyi Wu Chong Wang Nian-Feng Tzeng IEEE/ACM TRANSACTIONS ON NETWORKING,
Artistic Edge and Corner Enhancing Smoothing
SUDOKU PUZZLE EXTRACTION PROJECT BY: BORIS SPEKTOR.
Fast vector quantization image coding by mean value predictive algorithm Authors: Yung-Gi Wu, Kuo-Lun Fan Source: Journal of Electronic Imaging 13(2),
Presented by: Kamakhaya Argulewar Guided by: Prof. Shweta V. Jain
1 Template-Based Classification Method for Chinese Character Recognition Presenter: Tienwei Tsai Department of Informaiton Management, Chihlee Institute.
Intelligent Database Systems Lab 國立雲林科技大學 National Yunlin University of Science and Technology Human eye sclera detection and tracking using a modified.
Block-level 3D IC Design with Through-Silicon-Via Planning Dae Hyun Kim, Rasit Onur Topaloglu, and Sung Kyu Lim Department of Electrical and Computer Engineering,
Presented by Tienwei Tsai July, 2005
A Low-Power CAM Design for LZ Data Compression Kun-Jin Lin and Cheng-Wen Wu, IEEE Trans. On computers, Vol. 49, No. 10, Oct Presenter: Ming-Hsien.
Bayesian Extension to the Language Model for Ad Hoc Information Retrieval Hugo Zaragoza, Djoerd Hiemstra, Michael Tipping Presented by Chen Yi-Ting.
Co-clustering Documents and Words Using Bipartite Spectral Graph Partitioning Jinghe Zhang 10/28/2014 CS 6501 Information Retrieval.
EDGE DETECTION USING MINMAX MEASURES SOUNDARARAJAN EZEKIEL Matthew Lang Department of Computer Science Indiana University of Pennsylvania Indiana, PA.
Bara Lilla Nyíri Gergely Piotr Czekański Kovács Laura Team H: Automatic Poker Player.
Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng.
Cristian Andrades M. Andrea Rodr´ıguez Charles C. Chiang Signature Indexing of Design Layouts for Hotspot Detection DATE’14.
Presenter : Lin, Shu-Han Authors : Jeen-Shing Wang, Jen-Chieh Chiang
NTIT IMD 1 Speaker: Ching-Hao Lai( 賴璟皓 ) Author: Hongliang Bai, Junmin Zhu and Changping Liu Source: Proceedings of IEEE on Intelligent Transportation.
Computer-based identification and tracking of Antarctic icebergs in SAR images Department of Geography, University of Sheffield, 2004 Computer-based identification.
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
Imaged Document Text Retrieval without OCR IEEE Trans. on PAMI vol.24, no.6 June, 2002 報告人:周遵儒.
A New Temporal Pattern Identification Method for Characterization and Prediction of Complex Time Series Events Advisor : Dr. Hsu Graduate : You-Cheng Chen.
A New Spatial Index Structure for Efficient Query Processing in Location Based Services Speaker: Yihao Jhang Adviser: Yuling Hsueh 2010 IEEE International.
CS212: Object Oriented Analysis and Design Lecture 32: Use case and Class diagrams.
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
School of Computer Science 1 Information Extraction with HMM Structures Learned by Stochastic Optimization Dayne Freitag and Andrew McCallum Presented.
Mihir Choudhury, Kartik Mohanram (ICCAD’10 best paper nominee) Presentor: ABert Liu.
An Effective Three-step Search Algorithm for Motion Estimation
A Hardware Accelerator for the Fast Retrieval of DIALIGN Biological Sequence Alignments in Linear Space Author: Azzedine Boukerche, Jan M. Correa, Alba.
Improved Census Transforms for Resource-Optimized Stereo Vision
Paper Title Authors names Conference and Year Presented by Your Name Date.
Speaker : Yu-Hui Chen Authors : Dinuka A. Soysa, Denis Guangyin Chen, Oscar C. Au, and Amine Bermak From : 2013 IEEE Symposium on Computational Intelligence.
Detection of closed sharp edges in point clouds Speaker: Liuyu Time:
Content-Based Image Retrieval Using Color Space Transformation and Wavelet Transform Presented by Tienwei Tsai Department of Information Management Chihlee.
Pixel Parallel Vessel Tree Extraction for a Personal Authentication System 2010/01/14 學生:羅國育.
A Coverage-Preserving and Hole Tolerant Based Scheme for the Irregular Sensing Range in WSNs Azzedine Boukerche, Xin Fei PARADISE Research Lab Univeristy.
1 A Statistical Matching Method in Wavelet Domain for Handwritten Character Recognition Presented by Te-Wei Chiang July, 2005.
ORec : An Opinion-Based Point-of-Interest Recommendation Framework
An Image Database Retrieval Scheme Based Upon Multivariate Analysis and Data Mining Presented by C.C. Chang Dept. of Computer Science and Information.
Source: Pattern Recognition, 37(5), P , 2004
Lossy Compression of DNA Microarray Images
Image camouflage by reversible image transformation
Fourier Transform: Real-World Images
A new data transfer method via signal-rich-art code images captured by mobile devices Source: IEEE Transactions on Circuits and Systems for Video Technology,
Name of the Authors and Affiliations
Bellwork 8/13 &14/2014 Take out a piece of notebook paper
Color Image Retrieval based on Primitives of Color Moments
Speaker: YI-JIA HUANG Date: 2011/12/08 Authors: C. N
Author: Minoru Kuribayashi, Hatsukazu Tanaka
Data hiding method using image interpolation
Reverse Seam Carving 2011 Sixth International conference on Image and Graphics Gang Pan, Weishu Li, Wei Bai, Jinyan Chen, and Luyuan Li Speaker: Hon-Hang.
Perimeters of Polygons
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
Predictive Grayscale Image Coding Scheme Using VQ and BTC
Color Image Retrieval based on Primitives of Color Moments
Presentation transcript:

Reconstructing shredded documents through feature matching Authors: Edson Justino, Luiz S. Oliveira, Cinthia Freitas Source: Forensic Science International 160 (2006), pp. 140–147 Date: Speaker: Meng-Jing Tsai

Different Kinds of Shredding 2

Outline ҉ Introductions ҉ Proposed Method ҉ Experimental Result ҉ Conclusions 3

Introductions The amount of time necessary to reconstruct a document depends on the size and the number of fragments, and it can be measured in days or even weeks. Traditional puzzle solving algorithms usually take into account smooth edges and well defined corners. The act of shredding a piece of paper by hand often produces some irregularities in the boundaries. 4

Proposed Method The block diagram of the proposed methodology

Proposed Method Pre-processing – In order to overcome this kind of problem, we have tested different algorithms, and the one that brought the best results was the well-known Douglas–Peucker (DP) algorithm. 6

Proposed Method Douglas-Peucker Algorithm 7

Proposed Method Pre-processing 8

Proposed Method Feature extraction Fig. 1 Angle features extracted from the polygon (180,110) (180,0) (10,110) (10,70) (55,67) (67,25) ° 9

Proposed Method Matching – Computing the similarity between polygons – Global search 10

Proposed Method Computing the similarity between polygons – If the complementarity is verified like in Fig. 2, then W angles =1. Fig. 2 Similarity between angles 11

Proposed Method Computing the similarity between polygons Fig. 3 Distance features extracted from the polygon 12

Proposed Method We consider the relevance of the matching regarding the perimeter of the fragment using the following rules: – If the contour matched represents more than 1/5 of the perimeter of the fragment, then W matching = W matching +2. – If the contour matched represents more than 1/10 of the perimeter of the fragment, then W matching = W matching +1. – Otherwise, W matching is not increased. 13

Proposed Method Global search – Let us consider a shredded document D = {F 1, F 2,..., F n } composed of n fragments. – The algorithm compares the fragment F 1 with all the other fragments searching for the best matching. Fig. 4 Best matching (a) fragments i and j and (b) new fragment F ij where three vertices were removed 14

Proposed Method Steps of the document reconstruction 15

Experimental Result Examples of a document totally reconstructed: (a) fragments and (b) document reconstructed. 16

Experimental Result Performance of the proposed methodology in reconstructing documents shredded by hand. The fragments size range from 1cm × 1cm to 5cm × 5cm. 17

Conclusions This paper proposed a method for document reconstruction based on feature matching. It can be addressed by choosing the most important aspects for the application. 18

Thank you for your listening. 19