Image retrieval and authentication using enhanced expectation maximization (EEM)
First Claim
1. A method for employing an Enhanced Expectation Maximization (EEM) to determine data uniqueness and similarity, the method comprising:
- receiving data to be analyzed;
employing, a realization of uniform distribution in an initialization of the EEM on the received data to prevent a convergence to a local maximum and to allow another convergence to a global maximum;
employing a positive perturbation scheme to avoid boundary overflow;
generating a signature vector for the analyzed data andemploying the signature vector to determine one of uniqueness and similarity of the analyzed data to other data based on a similarity of the signature vector to signature vectors of the other data.
4 Assignments
0 Petitions
Accused Products
Abstract
Technologies are generally presented for employing enhanced expectation maximization (EEM) in image retrieval and authentication. Using uniform distribution as initial condition, the EEM may converge iteratively to a global optimality. If a realization of the uniform distribution is used as the initial condition, the process may also be repeatable. In some examples, a positive perturbation scheme may be used to avoid boundary overflow, often occurring with the conventional EM algorithms. To reduce computation time and resource consumption, a histogram of one dimensional Gaussian Mixture Model (GMM) with two components and wavelet decomposition of an image may be employed.
-
Citations
23 Claims
-
1. A method for employing an Enhanced Expectation Maximization (EEM) to determine data uniqueness and similarity, the method comprising:
-
receiving data to be analyzed; employing, a realization of uniform distribution in an initialization of the EEM on the received data to prevent a convergence to a local maximum and to allow another convergence to a global maximum; employing a positive perturbation scheme to avoid boundary overflow; generating a signature vector for the analyzed data and employing the signature vector to determine one of uniqueness and similarity of the analyzed data to other data based on a similarity of the signature vector to signature vectors of the other data. - View Dependent Claims (2, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
3. The method according to claim further comprising
employing a histogram of one dimensional Gaussian Mixture Model (GMM) for the image data.
-
14. A computing device for employing an Enhanced Expectation Maximization (EEM) to determine data uniqueness and similarity, the computing device comprising:
-
a memory configured to store instructions; and a processor coupled to the memory and configured to execute a data processing application in conjunction with the instructions stored in the memory, wherein the data processing application is configured to; receive data to be analyzed; employ a realization of uniform distribution in an initialization of the EEM on the received data to prevent convergence to a local maximum and to allow another convergence to a global maximum; employ a positive perturbation scheme to avoid boundary overflow; generate a signature vector fir the analyzed data; and employ the signature vector to determine one of uniqueness and similarity of the analyzed data to other data based on a similarity of the signature vector to signature vectors of the other data. - View Dependent Claims (15, 16, 17, 18)
-
-
19. A non-transitory computer-readable storage medium having instructions stored thereon for employing an Enhanced Expectation Maximization (EEM) to determine data uniqueness and similarity, the instructions comprising;
-
receiving, data to be analyzed; employing a realization of uniform distribution in an initialization of the EEM on the received data to prevent a convergence to a local maximum and to allow another convergence to a global maximum; employing, a positive perturbation scheme to avoid boundary overflow; generating a signature vector for the analyzed data; and employing the signature vector to determine one of uniqueness and similarity of the analyzed data to other data based on a similarity of the signature vector to signature vectors of the other data. - View Dependent Claims (20, 21, 22, 23)
-
Specification