dc.contributor.author | Companioni-Brito, Claudia | |
dc.contributor.author | Mariano, Zygred | |
dc.contributor.author | Elawady, Mohamed | |
dc.contributor.author | Yildirim Yayilgan, Sule | |
dc.date.accessioned | 2019-04-11T06:48:02Z | |
dc.date.available | 2019-04-11T06:48:02Z | |
dc.date.created | 2018-04-17T09:53:07Z | |
dc.date.issued | 2018 | |
dc.identifier.citation | Lecture Notes in Computer Science. 2018, 10882 278-284. | nb_NO |
dc.identifier.issn | 0302-9743 | |
dc.identifier.uri | http://hdl.handle.net/11250/2594114 | |
dc.description.abstract | In paintings or artworks, sharing a photo of a painting using mobile phone is simple and fast. However, searching for information about specific captured photo of an unknown painting takes time and is not easy. No previous developments were introduced in the content-based indexing and retrieval (CBIR) field to ease the inconvenience of knowing the name and other information about an unknown painting through capturing photos by mobile phones. This work introduces an image retrieval framework on art paintings using shape, texture and color properties. With existing state-of-the-art developments, the proposed framework focuses on utilizing a feature combination of: generic Fourier descriptors (GFD), local binary patterns (LBP), Gray-level co-occurrence matrix (GLCM), and HSV histograms. After that, Locality Sensitive Hashing (LSH) method is used for image indexing and retrieval of paintings. The results are validated over a public database of seven different categories. | nb_NO |
dc.language.iso | eng | nb_NO |
dc.publisher | Springer | nb_NO |
dc.title | Mobile-Based Painting Photo Retrieval using Combined Features | nb_NO |
dc.type | Journal article | nb_NO |
dc.type | Peer reviewed | nb_NO |
dc.description.version | acceptedVersion | nb_NO |
dc.source.pagenumber | 278-284 | nb_NO |
dc.source.volume | 10882 | nb_NO |
dc.source.journal | Lecture Notes in Computer Science | nb_NO |
dc.identifier.doi | 10.1007/978-3-319-93000-8_32 | |
dc.identifier.cristin | 1579710 | |
dc.description.localcode | This is a post-peer-review, pre-copyedit version of an article published in Lecture Notes in Computer Science. Locked until 6 June 2019 due to copyright restrictions. The final authenticated version is available online at: https://doi.org/10.1007/978-3-319-93000-8_32 | nb_NO |
cristin.unitcode | 194,63,30,0 | |
cristin.unitname | Institutt for informasjonssikkerhet og kommunikasjonsteknologi | |
cristin.ispublished | true | |
cristin.fulltext | preprint | |
cristin.qualitycode | 1 | |