{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T19:01:25Z","timestamp":1772910085129,"version":"3.50.1"},"reference-count":93,"publisher":"Springer Science and Business Media LLC","issue":"28","license":[{"start":{"date-parts":[[2022,5,13]],"date-time":"2022-05-13T00:00:00Z","timestamp":1652400000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,5,13]],"date-time":"2022-05-13T00:00:00Z","timestamp":1652400000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Department of Science and Technology, Government of India","award":["SR\/WOS-A\/ET-119\/2016"],"award-info":[{"award-number":["SR\/WOS-A\/ET-119\/2016"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2022,11]]},"DOI":"10.1007\/s11042-022-13182-7","type":"journal-article","created":{"date-parts":[[2022,5,13]],"date-time":"2022-05-13T10:03:59Z","timestamp":1652436239000},"page":"40793-40826","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Deep CNN based online image deduplication technique for cloud storage system"],"prefix":"10.1007","volume":"81","author":[{"given":"Ravneet","family":"Kaur","sequence":"first","affiliation":[]},{"given":"Jhilik","family":"Bhattacharya","sequence":"additional","affiliation":[]},{"given":"Inderveer","family":"Chana","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,5,13]]},"reference":[{"issue":"1","key":"13182_CR1","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/s00521-016-2663-3","volume":"30","author":"MH Alkawaz","year":"2018","unstructured":"Alkawaz MH, Sulong G, Saba T, Rehman A (2018) Detection of copy-move image forgery based on discrete cosine transform. Neural Comput & Applic 30(1):183\u2013192. https:\/\/doi.org\/10.1007\/s00521-016-2663-3","journal-title":"Neural Comput & Applic"},{"key":"13182_CR2","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1721654.1721672","volume":"53","author":"M Armbrust","year":"2010","unstructured":"Armbrust M, Fox A, Griffith R, Joseph AD, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I, Zaharia M (2010) A view of cloud computing. Commun ACM 53:50\u201358","journal-title":"Commun ACM"},{"key":"13182_CR3","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1016\/j.neucom.2013.02.014","volume":"117","author":"S Banerji","year":"2013","unstructured":"Banerji S, Sinha A, Liu C (2013) New image descriptors based on color, texture, shape, and wavelets for object and scene image classification. Neurocomputing 117:173\u2013185. https:\/\/doi.org\/10.1016\/j.neucom.2013.02.014","journal-title":"Neurocomputing"},{"issue":"3","key":"13182_CR4","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1016\/j.cviu.2007.09.014","volume":"110","author":"H Bay","year":"2008","unstructured":"Bay H, Ess A, Tuytelaars T, Van Gool L (2008) Speeded-up robust features (SURF). Comput Vis Image Underst 110(3):346\u2013359. https:\/\/doi.org\/10.1016\/j.cviu.2007.09.014","journal-title":"Comput Vis Image Underst"},{"key":"13182_CR5","doi-asserted-by":"publisher","unstructured":"Biadgie Y, Sohn KA (2014) Feature detector using adaptive accelerated segment test. In: 2014 international conference on information science and applications (ICISA) 2014, (pp. 1-4). IEEE. https:\/\/doi.org\/10.1109\/ICISA.2014.6847403","DOI":"10.1109\/ICISA.2014.6847403"},{"key":"13182_CR6","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1016\/j.jvcir.2015.02.014","volume":"30","author":"CC Chen","year":"2015","unstructured":"Chen CC, Hsieh SL (2015) Using binarization and hashing for efficient SIFT matching. J Vis Commun Image Represent 30:86\u201393. https:\/\/doi.org\/10.1016\/j.jvcir.2015.02.014","journal-title":"J Vis Commun Image Represent"},{"key":"13182_CR7","doi-asserted-by":"publisher","unstructured":"Chen M, Wang Y, Zou X, Wang S, Wu G (2012) A duplicate image deduplication approach via Haar wavelet technology. In: 2nd International Conference on Cloud Computing and Intelligence Systems, IEEE 2: 624\u2013628. https:\/\/doi.org\/10.1109\/CCIS.2012.6664249","DOI":"10.1109\/CCIS.2012.6664249"},{"issue":"11","key":"13182_CR8","doi-asserted-by":"publisher","first-page":"2768","DOI":"10.4304\/jcp.8.11.2768-2775","volume":"8","author":"M Chen","year":"2013","unstructured":"Chen M, Wang S, Tian L (2013) A high-precision duplicate image deduplication approach. J Comput 8(11):2768\u20132775. https:\/\/doi.org\/10.4304\/jcp.8.11.2768-2775","journal-title":"J Comput"},{"key":"13182_CR9","unstructured":"Dharshini T, Angelina JJR (2019) Review and analysis of image and video deduplication techniques. J Inf Comput Sci 9(12)"},{"issue":"11","key":"13182_CR10","doi-asserted-by":"publisher","first-page":"2049","DOI":"10.1109\/TMM.2015.2477042","volume":"17","author":"C Ding","year":"2015","unstructured":"Ding C, Tao D (2015) Robust face recognition via multimodal deep face representation. IEEE Trans Multimedia 17(11):2049\u20132058. https:\/\/doi.org\/10.1109\/TMM.2015.2477042","journal-title":"IEEE Trans Multimedia"},{"key":"13182_CR11","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/j.bspc.2018.01.010","volume":"42","author":"M Diwakar","year":"2018","unstructured":"Diwakar M, Kumar M (2018) A review on CT image noise and its denoising. Biomed Signal Process Control 42:73\u201388. https:\/\/doi.org\/10.1016\/j.bspc.2018.01.010","journal-title":"Biomed Signal Process Control"},{"issue":"5","key":"13182_CR12","doi-asserted-by":"publisher","first-page":"708","DOI":"10.1049\/iet-ipr.2017.0639","volume":"12","author":"M Diwakar","year":"2018","unstructured":"Diwakar M, Kumar M (2018) CT image denoising using NLM and correlation-based wavelet packet thresholding. IET Image Process 12(5):708\u2013715","journal-title":"IET Image Process"},{"key":"13182_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.bspc.2019.101754","volume":"57","author":"M Diwakar","year":"2010","unstructured":"Diwakar M, Singh P (2010) CT image denoising using multivariate model and its method noise thresholding in non-subsampled shearlet domain. Biomed Signal Process Control 57:101754. https:\/\/doi.org\/10.1016\/j.bspc.2019.101754","journal-title":"Biomed Signal Process Control"},{"key":"13182_CR14","doi-asserted-by":"publisher","unstructured":"Foo JJ, Sinha R, Zobel J (2007) SICO: a system for detection of near-duplicate images during search. Multimedia and Expo, IEEE International Conference on, 595\u2013598. https:\/\/doi.org\/10.1109\/ICME.2007.4284720","DOI":"10.1109\/ICME.2007.4284720"},{"key":"13182_CR15","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/978-3-319-24315-3_25","volume-title":"Information and Communication Technology ICT-EurAsia, Lecture Notes in Computer Science","author":"H Gang","year":"2015","unstructured":"Gang H, Yan H, Xu L (2015) Secure image deduplication in cloud storage. In: Khalil I, Neuhold E, Tjoa A, Xu L, You I (eds) Information and Communication Technology ICT-EurAsia, Lecture Notes in Computer Science, vol 9357. Springer, pp 243\u2013251. https:\/\/doi.org\/10.1007\/978-3-319-24315-3_25"},{"issue":"1","key":"13182_CR16","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1109\/TPAMI.2015.2437384","volume":"38","author":"R Girshick","year":"2016","unstructured":"Girshick R, Donahue J, Darrell T, Malik J (2016) Region-based convolutional networks for accurate object detection and segmentation. IEEE Trans Pattern Anal Mach Intell 38(1):142\u2013158. https:\/\/doi.org\/10.1109\/TPAMI.2015.2437384","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"13182_CR17","doi-asserted-by":"publisher","unstructured":"Grabner M, Grabner H, Bischof H (2006) Fast approximated SIFT. Lecture Notes in Computer Science, LNCS. In: Asian conference on computer vision, Springer, Berlin, 3851: 918\u2013927. https:\/\/doi.org\/10.1007\/11612032_92","DOI":"10.1007\/11612032_92"},{"key":"13182_CR18","doi-asserted-by":"publisher","unstructured":"Harris C, Stephens M (1988) A combined corner and edge detector. Procedings of the Alvey Vision Conference 1988, 23.1-23.6. https:\/\/doi.org\/10.5244\/C.2.23","DOI":"10.5244\/C.2.23"},{"key":"13182_CR19","doi-asserted-by":"publisher","unstructured":"Hua Y, He W, Liu X, Feng D (2015) SmartEye: real-time and efficient cloud image sharing for disaster environments. IEEE Conference on Computer Communications (INFOCOM) 1616-1624, https:\/\/doi.org\/10.1109\/INFOCOM.2015.7218541","DOI":"10.1109\/INFOCOM.2015.7218541"},{"key":"13182_CR20","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1504\/IJCSE.2019.098540","volume":"18","author":"F Huang","year":"2019","unstructured":"Huang F, Zhou Z, Yang CN, Liu X, Wang T (2019) Original image tracing with image relational graph for near-duplicate image elimination. Int J Comput Sci Eng 18:294\u2013304. https:\/\/doi.org\/10.1504\/IJCSE.2019.098540","journal-title":"Int J Comput Sci Eng"},{"key":"13182_CR21","doi-asserted-by":"publisher","unstructured":"Jia Y, Shelhamer E, Donahue J, Karayev S, Long J, Girshick R, Guadarrama S, Darrell T (2014) Caffe: convolutional architecture for fast feature embedding. In: Proceedings of the 22nd ACM international conference on Multimedia ACM, pp. 675-678. https:\/\/doi.org\/10.1145\/2647868.2654889","DOI":"10.1145\/2647868.2654889"},{"issue":"4","key":"13182_CR22","first-page":"143","volume":"3","author":"L Juan","year":"2009","unstructured":"Juan L, Gwun O (2009) A comparison of sift, pca-sift and surf. Int J Image Process (IJIP) 3(4):143\u2013152","journal-title":"Int J Image Process (IJIP)"},{"key":"13182_CR23","doi-asserted-by":"publisher","unstructured":"Jung HM, Park WV, Lee WY, Lee JG, Ko YW (2011) Data deduplication system for supporting multi-mode. In Asian Conference on Intelligent Information and Database Systems, Lecture Notes in Computer Science, Springer 6591:78-87. https:\/\/doi.org\/10.1007\/978-3-642-20039-7-8","DOI":"10.1007\/978-3-642-20039-7-8"},{"key":"13182_CR24","doi-asserted-by":"publisher","unstructured":"Jyoti RR (2019) A hybrid approach for effective image deduplication using PCA, SPIHT and compressive sensing. Women Institute of Technology Conference on Electrical and Computer Engineering (WITCON ECE) 129-134. https:\/\/doi.org\/10.1109\/WITCONECE48374.2019.9092894","DOI":"10.1109\/WITCONECE48374.2019.9092894"},{"key":"13182_CR25","doi-asserted-by":"publisher","unstructured":"Kalia R, Lee KD, Samir BVR, Je SK, Oh WG (2011) An analysis of the effect of different image preprocessing techniques on the performance of SURF: speeded up robust features. 17th Korea-Japan joint workshop on Frontiers of computer vision, FCV 2011. https:\/\/doi.org\/10.1109\/FCV.2011.5739756","DOI":"10.1109\/FCV.2011.5739756"},{"issue":"5","key":"13182_CR26","doi-asserted-by":"publisher","first-page":"2035","DOI":"10.1007\/s11227-017-2210-8","volume":"74","author":"R Kaur","year":"2018","unstructured":"Kaur R, Chana I, Bhattacharya J (2018) Data deduplication techniques for efficient cloud storage management: a systematic review. J Supercomput 74(5):2035\u20132085. https:\/\/doi.org\/10.1007\/s11227-017-2210-8","journal-title":"J Supercomput"},{"key":"13182_CR27","doi-asserted-by":"publisher","unstructured":"Ke Y, Sukthankar R (2004) PCA-SIFT: \u201ca more distinctive representation for local image descriptors, in proc. Conf. Computer vision and Pattern Recognition, pp. 511-517, 2004. https:\/\/doi.org\/10.1109\/CVPR.2004.1315206","DOI":"10.1109\/CVPR.2004.1315206"},{"key":"13182_CR28","doi-asserted-by":"crossref","unstructured":"Ke Y, Sukthankar R, Huston L (2004) Efficient near-duplicate detection and sub-image retrieval. In Proceedings of ACM International Conference on Multimedia (MM), 4(1).","DOI":"10.1145\/1027527.1027729"},{"key":"13182_CR29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26752-0_4","volume-title":"Video Verification in the Fake News Era","author":"G Kordopatis-Zilos","year":"2019","unstructured":"Kordopatis-Zilos G, Papadopoulos S, Patras I, Kompatsiaris I (2019) Finding near-duplicate videos in large-scale collections. In: Mezaris V, Nixon L, Papadopoulos S, Teyssou D (eds) Video Verification in the Fake News Era. Springer. https:\/\/doi.org\/10.1007\/978-3-030-26752-0_4"},{"issue":"4","key":"13182_CR30","first-page":"7","volume":"1","author":"A Krizhevsky","year":"2009","unstructured":"Krizhevsky A, Hinton G (2009) Learning multiple layers of features from tiny images. Computer science department, University of Toronto. Tech Rep 1(4):7","journal-title":"Tech Rep"},{"issue":"1","key":"13182_CR31","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.jksuci.2016.03.003","volume":"30","author":"M Kumar","year":"2018","unstructured":"Kumar M, Diwakar M (2018) CT image denoising using locally adaptive shrinkage rule in tetrolet domain. J King Saud Unive-Comput Info Sci 30(1):41\u201350. https:\/\/doi.org\/10.1016\/j.jksuci.2016.03.003","journal-title":"J King Saud Unive-Comput Info Sci"},{"issue":"1","key":"13182_CR32","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.jksuci.2016.12.002","volume":"31","author":"M Kumar","year":"2019","unstructured":"Kumar M, Diwakar M (2019) A new exponentially directional weighted function based CT image denoising using total variation. J King Saud Univ-Comput Inf Sci 31(1):113\u2013124. https:\/\/doi.org\/10.1016\/j.jksuci.2016.12.002","journal-title":"J King Saud Univ-Comput Inf Sci"},{"key":"13182_CR33","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1504\/IJGUC.2020.108450","volume":"11","author":"PM Kumar","year":"2020","unstructured":"Kumar PM, Devi GU, Basheer S, Parthasarathy P (2020) A study on data de-duplication schemes in cloud storage. Int J Grid Util Comput 11:509\u2013516. https:\/\/doi.org\/10.1504\/IJGUC.2020.108450","journal-title":"Int J Grid Util Comput"},{"key":"13182_CR34","doi-asserted-by":"publisher","first-page":"1332","DOI":"10.1126\/science.aab3050","volume":"350","author":"BM Lake","year":"2015","unstructured":"Lake BM, Salakhutdinov R, Tenenbaum JB (2015) Human-level concept learning through probabilistic program induction. Science 350:1332\u20131338. https:\/\/doi.org\/10.1126\/science.aab3050","journal-title":"Science"},{"key":"13182_CR35","doi-asserted-by":"publisher","unstructured":"Latif A, Rasheed A, Sajid U, Ahmed J, Ali N, Ratyal NI, Zafar B, Dar SH, Sajid M, Khalil T (2019) Content-based image retrieval and feature extraction: a comprehensive review. Math Probl Eng. https:\/\/doi.org\/10.1155\/2019\/9658350","DOI":"10.1155\/2019\/9658350"},{"key":"13182_CR36","doi-asserted-by":"publisher","unstructured":"Lee SH, Chan CS, Wilkin P, Remagnino P (2015) Deep-plant: plant identification with convolutional neural networks. Proceedings - International Conference on Image Processing, ICIP, pp.452\u2013456. https:\/\/doi.org\/10.1109\/ICIP.2015.7350839","DOI":"10.1109\/ICIP.2015.7350839"},{"issue":"4","key":"13182_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2602186","volume":"10","author":"Y Lei","year":"2014","unstructured":"Lei Y, Qiu G, Zheng L, Huang J (2014) Fast near-duplicate image detection using uniform randomized trees. ACM Trans Multimed Comput Commun Appl (TOMM) 10(4):1\u201315. https:\/\/doi.org\/10.1145\/2602186","journal-title":"ACM Trans Multimed Comput Commun Appl (TOMM)"},{"key":"13182_CR38","doi-asserted-by":"publisher","unstructured":"Leutenegger S, Chli M, Siegwart RY (2011) BRISK: binary robust invariant scalable keypoints. Proceedings of the IEEE International Conference on Computer Vision, 2548\u20132555. https:\/\/doi.org\/10.1109\/ICCV.2011.6126542","DOI":"10.1109\/ICCV.2011.6126542"},{"issue":"6","key":"13182_CR39","doi-asserted-by":"publisher","first-page":"829","DOI":"10.4304\/jmm.9.6.829-834","volume":"9","author":"L Li","year":"2014","unstructured":"Li L, Zic J (2014) Image matching algorithm based on feature-point and DAISY descriptor. J Multimed 9(6):829\u2013834. https:\/\/doi.org\/10.4304\/jmm.9.6.829-834","journal-title":"J Multimed"},{"issue":"2","key":"13182_CR40","doi-asserted-by":"publisher","first-page":"655","DOI":"10.1007\/s11042-014-2008-0","volume":"74","author":"J Li","year":"2015","unstructured":"Li J, Qian X, Li Q, Zhao Y, Wang L, Tang YY (2015) Mining near duplicate image groups. Multimed Tools Appl 74(2):655\u2013669. https:\/\/doi.org\/10.1007\/s11042-014-2008-0","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"13182_CR41","doi-asserted-by":"publisher","first-page":"1437","DOI":"10.1007\/s00500-015-1596-6","volume":"20","author":"X Li","year":"2016","unstructured":"Li X, Li J, Huang F (2016) A secure cloud storage system supporting privacy-preserving fuzzy deduplication. J Soft Comput 20(4):1437\u20131448. https:\/\/doi.org\/10.1007\/s00500-015-1596-6","journal-title":"J Soft Comput"},{"key":"13182_CR42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-37731-1_61","volume-title":"MultiMedia modeling. MMM lecture notes in computer science","author":"S Liang","year":"2020","unstructured":"Liang S, Wang P (2020) An efficient hierarchical near-duplicate video detection algorithm based on deep semantic features. In: Ro Y et al (eds) MultiMedia modeling. MMM lecture notes in computer science, vol 11961. Springer. https:\/\/doi.org\/10.1007\/978-3-030-37731-1_61"},{"issue":"6","key":"13182_CR43","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1087\/6\/062032","volume":"1087","author":"YH Liu","year":"2018","unstructured":"Liu YH (2018) Feature extraction and image recognition with convolutional neural networks. J Phys Conf Ser 1087(6):062032","journal-title":"J Phys Conf Ser"},{"issue":"4","key":"13182_CR44","doi-asserted-by":"publisher","first-page":"1282","DOI":"10.1109\/TIP.2015.2400229","volume":"24","author":"L Liu","year":"2015","unstructured":"Liu L, Lu Y, Suen CY (2015) Variable-length signature for near-duplicate image matching. IEEE Trans Image Process 24(4):1282\u20131296. https:\/\/doi.org\/10.1109\/TIP.2015.2400229","journal-title":"IEEE Trans Image Process"},{"key":"13182_CR45","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/s11554-019-00887-6","volume":"17","author":"D Liu","year":"2020","unstructured":"Liu D, Shen J, Wang A, Wang C (2020) Secure real-time image protection scheme with near-duplicate detection in cloud computing. J Real-Time Image Proc 17:175\u2013184. https:\/\/doi.org\/10.1007\/s11554-019-00887-6","journal-title":"J Real-Time Image Proc"},{"issue":"2","key":"13182_CR46","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1023\/B:VISI.0000029664.99615.94","volume":"60","author":"DG Lowe","year":"2004","unstructured":"Lowe DG (2004) Distinctive image features from scale-invariant keypoints. Int J Comput Vis 60(2):91\u2013110. https:\/\/doi.org\/10.1023\/B:VISI.0000029664.99615.94","journal-title":"Int J Comput Vis"},{"key":"13182_CR47","volume-title":"Fine-grained visual classification of aircraft","author":"S Maji","year":"2013","unstructured":"Maji S, Rahtu E, Kannala J, Blaschko M, Vedaldi A (2013) Fine-grained visual classification of aircraft. arXiv preprint arXiv:1306.5151"},{"issue":"2","key":"13182_CR48","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2512348","volume":"10","author":"B Mao","year":"2014","unstructured":"Mao B, Jiang H, Wu S, Fu Y, Tian L (2014) Read-performance optimization for deduplication-based storage Systems in the Cloud. ACM Trans Storage 10(2):1\u201322. https:\/\/doi.org\/10.1145\/2512348","journal-title":"ACM Trans Storage"},{"key":"13182_CR49","unstructured":"Miksik O, Mikolajczyk K (2012) Evaluation of local detectors and descriptors for fast feature matching. In: Proceedings of 21st international conference of pattern recognition (ICPR), 2012, pp. 2681-2684. IEEE"},{"key":"13182_CR50","doi-asserted-by":"publisher","unstructured":"Mohamed SMA, Wang Y (2020) A survey on novel classification of deduplication storage systems. Distrib Parallel Databases. https:\/\/doi.org\/10.1007\/s10619-020-07301-2","DOI":"10.1007\/s10619-020-07301-2"},{"key":"13182_CR51","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1007\/978-981-15-2449-3_34","volume":"1120","author":"S Mohapatra","year":"2020","unstructured":"Mohapatra S, Bajpai N, Swarnkar T, Mishra M (2020) Raw data redundancy elimination on cloud database. In: Das A, Nayak J, Naik B, Dutta S, Pelusi D(eds), Computational intelligence in pattern recognition. Adv Intel Sys Comput 1120:395\u2013405. https:\/\/doi.org\/10.1007\/978-981-15-2449-3_34","journal-title":"Adv Intel Sys Comput"},{"key":"13182_CR52","first-page":"12","volume":"5","author":"Y Nbt","year":"2016","unstructured":"Nbt Y, Ismail A, Majid NAA (2016) Deduplication image middleware detection comparison in standalone cloud database. Int J Adv Comput Sci Technol (IJACST) 5:12\u201318","journal-title":"Int J Adv Comput Sci Technol (IJACST)"},{"issue":"5","key":"13182_CR53","doi-asserted-by":"publisher","first-page":"2435","DOI":"10.1007\/s11042-015-2472-1","volume":"75","author":"F Nian","year":"2016","unstructured":"Nian F, Li T, Wu X, Gao Q, Li F (2016) Efficient near-duplicate image detection with a local-based binary representation. Multimed Tools Appl 75(5):2435\u20132452. https:\/\/doi.org\/10.1007\/s11042-015-2472-1","journal-title":"Multimed Tools Appl"},{"key":"13182_CR54","doi-asserted-by":"publisher","unstructured":"Nilsback ME, Zisserman A (2006) A visual vocabulary for flower classification. In: IEEE computer society conference on computer vision and Pattern Recognition (CVPR'06), 2:1447-1454. https:\/\/doi.org\/10.1109\/CVPR.2006.42","DOI":"10.1109\/CVPR.2006.42"},{"key":"13182_CR55","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1016\/j.neucom.2011.12.006","volume":"85","author":"Y Pang","year":"2012","unstructured":"Pang Y, Li W, Yuan Y, Pan J (2012) Fully affine invariant SURF for image matching. Neurocomputing 85:6\u201310. https:\/\/doi.org\/10.1016\/j.neucom.2011.12.006","journal-title":"Neurocomputing"},{"key":"13182_CR56","doi-asserted-by":"crossref","unstructured":"Paulin M, Douze M, Harchaoui Z, Mairal J, Perronin F, Schmid C (2015) Local convolutional features with unsupervised training for image retrieval. In: Proceedings of the IEEE international conference on computer vision, pp. 91-99","DOI":"10.1109\/ICCV.2015.19"},{"issue":"1","key":"13182_CR57","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2611778","volume":"47","author":"J Paulo","year":"2014","unstructured":"Paulo J, Pereira J (2014) A survey and classification of storage deduplication systems. ACM Comput Surv 47(1):1\u201330. https:\/\/doi.org\/10.1145\/2611778","journal-title":"ACM Comput Surv"},{"key":"13182_CR58","doi-asserted-by":"publisher","unstructured":"Peker KA (2011) Binary sift: fast image retrieval using binary quantized sift features. In: Content-based multimedia indexing (CBMI), in 9th international workshop on 2011, pp. 217-222, IEEE. https:\/\/doi.org\/10.1109\/CBMI.2011.5972548","DOI":"10.1109\/CBMI.2011.5972548"},{"key":"13182_CR59","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.comcom.2016.01.011","volume":"82","author":"RD Pietro","year":"2016","unstructured":"Pietro RD, Sorniotti A (2016) Proof of ownership for deduplication systems: a secure, scalable, and efficient solution. Comput Commun 82:71\u201382. https:\/\/doi.org\/10.1016\/j.comcom.2016.01.011","journal-title":"Comput Commun"},{"key":"13182_CR60","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.ins.2018.01.051","volume":"441","author":"U Raghavendra","year":"2018","unstructured":"Raghavendra U, Fujita H, Bhandary SV, Gudigar A, Hong TJ, Acharya UR (2018) Deep convolution neural network for accurate diagnosis of glaucoma using digital fundus images. Inf Sci 441:41\u201349. https:\/\/doi.org\/10.1016\/j.ins.2018.01.051","journal-title":"Inf Sci"},{"key":"13182_CR61","doi-asserted-by":"publisher","unstructured":"Ramaiah NP, Mohan CK (2011) De-duplication of photograph images using histogram refinement. IEEE Recent Advances in Intelligent Computational Systems 391\u2013395. https:\/\/doi.org\/10.1109\/RAICS.2011.6069341","DOI":"10.1109\/RAICS.2011.6069341"},{"issue":"4","key":"13182_CR62","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1016\/j.image.2003.12.001","volume":"19","author":"JS Seo","year":"2004","unstructured":"Seo JS, Haitsma J, Kalker T, Yoo CD (2004) A robust image fingerprinting system using the radon transform. Signal Process Image Commun 19(4):325\u2013339. https:\/\/doi.org\/10.1016\/j.image.2003.12.001","journal-title":"Signal Process Image Commun"},{"key":"13182_CR63","volume-title":"Very deep convolutional networks for large-scale image recognition","author":"K Simonyan","year":"2014","unstructured":"Simonyan K, Zisserman A (2014) Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556"},{"key":"13182_CR64","volume-title":"Binary generative adversarial networks for image retrieval","author":"J Song","year":"2017","unstructured":"Song J (2017) Binary generative adversarial networks for image retrieval. arXiv preprint arXiv:1708.04150"},{"key":"13182_CR65","doi-asserted-by":"publisher","first-page":"1997","DOI":"10.1109\/TMM.2013.2271746","volume":"15","author":"J Song","year":"2013","unstructured":"Song J, Yang Y, Huang Z, Shen HT, Luo J (2013) Effective multiple feature hashing for large-scale near-duplicate video retrieval. IEEE Trans Multimedia 15:1997\u20132008. https:\/\/doi.org\/10.1109\/TMM.2013.2271746","journal-title":"IEEE Trans Multimedia"},{"key":"13182_CR66","doi-asserted-by":"publisher","first-page":"3210","DOI":"10.1109\/TIP.2018.2814344","volume":"27","author":"J Song","year":"2018","unstructured":"Song J, Zhang H, Li X, Gao L, Wang M, Hong R (2018) Self-supervised video hashing with hierarchical binary auto-encoder. IEEE Trans Image Process 27:3210\u20133221. https:\/\/doi.org\/10.1109\/TIP.2018.2814344","journal-title":"IEEE Trans Image Process"},{"key":"13182_CR67","doi-asserted-by":"publisher","first-page":"2243","DOI":"10.1007\/s11263-020-01305-2","volume":"128","author":"J Song","year":"2020","unstructured":"Song J, He T, Gao L, Xu X, Hanjalic A, Shen HT (2020) Unified binary generative adversarial network for image retrieval and compression. Int J Comput Vis 128:2243\u20132264. https:\/\/doi.org\/10.1007\/s11263-020-01305-2","journal-title":"Int J Comput Vis"},{"key":"13182_CR68","doi-asserted-by":"publisher","unstructured":"Srinivas S, Sarvadevabhatla RK, Mopuri KR, Prabhu N, Kruthiventi SS, Babu RV (2016) A taxonomy of deep convolutional neural nets for computer vision. Front Robot AI https:\/\/doi.org\/10.3389\/frobt.2015.00036","DOI":"10.3389\/frobt.2015.00036"},{"key":"13182_CR69","doi-asserted-by":"publisher","unstructured":"Sujatha G, Raj JR (2020) A study on image hashing techniques for implementing deduplication. In: Hemanth D., Vadivu G., Sangeetha M., Balas V. (eds), In Artificial Intelligence Techniques for Advanced Computing Applications. Lecture Notes in Networks and Systems 130:529-534. https:\/\/doi.org\/10.1007\/978-981-15-5329-5_49","DOI":"10.1007\/978-981-15-5329-5_49"},{"key":"13182_CR70","doi-asserted-by":"publisher","unstructured":"Szegedy C, Liu W, Jia Y, Sermanet P, Reed S, Anguelov D, Erhan D, Vanhoucke V, Rabinovich A (2015) Going deeper with convolutions. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 1-9, https:\/\/doi.org\/10.1109\/CVPR.2015.7298594","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"13182_CR71","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN49398.2020.9209728","volume-title":"Secure single-server nearly-identical image deduplication","author":"J Takeshita","year":"2020","unstructured":"Takeshita J, Karl R, Jung T (2020) Secure single-server nearly-identical image deduplication. arXiv preprint arXiv:2005.02330"},{"issue":"1","key":"13182_CR72","doi-asserted-by":"publisher","first-page":"1943","DOI":"10.1016\/j.matpr.2017.11.297","volume":"5","author":"S Thaiyalnayaki","year":"2018","unstructured":"Thaiyalnayaki S, Sasikala J, Ponraj R (2018) Indexing near-duplicate images in web search using minhash algorithm. Mater Today: Proc 5(1):1943\u20131949. https:\/\/doi.org\/10.1016\/j.matpr.2017.11.297","journal-title":"Mater Today: Proc"},{"key":"13182_CR73","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1504\/IJAIP.2019.096963","volume":"12","author":"S Thaiyalnayaki","year":"2019","unstructured":"Thaiyalnayaki S, Sasikala J, Ponraj R (2019) Detecting near-duplicate images using segmented minhash algorithm. Int J Adv Intell Paradigms 12:192\u2013206. https:\/\/doi.org\/10.1504\/IJAIP.2019.096963","journal-title":"Int J Adv Intell Paradigms"},{"key":"13182_CR74","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11831-020-09400-w","volume":"6","author":"KK Thyagharajan","year":"2020","unstructured":"Thyagharajan KK, Kalaiarasi G (2020) A review on near-duplicate detection of images using computer vision techniques. Arch Comput Methods Eng 6:1\u201320. https:\/\/doi.org\/10.1007\/s11831-020-09400-w","journal-title":"Arch Comput Methods Eng"},{"key":"13182_CR75","doi-asserted-by":"publisher","unstructured":"Tian Y, Luo P, Wang X, Tang X (2015) Deep learning strong parts for pedestrian detection. Proceedings of the IEEE International Conference on Computer Vision, 2015 Inter, 1904\u20131912. https:\/\/doi.org\/10.1109\/ICCV.2015.221","DOI":"10.1109\/ICCV.2015.221"},{"key":"13182_CR76","doi-asserted-by":"publisher","unstructured":"Vedaldi A, Lenc K (2015) MatConvNet - Convolutional Neural Networks for MATLAB. In: Proceedings of the 23rd ACM international conference on Multimedia, 2015 pp. 689-692. https:\/\/doi.org\/10.1145\/2733373.2807412","DOI":"10.1145\/2733373.2807412"},{"key":"13182_CR77","unstructured":"Velmurugan K, Baboo LDSS (2011) Content-based image retrieval using SURF and colour moments. Global J Comput Sci Technol 11(10)"},{"key":"13182_CR78","doi-asserted-by":"publisher","unstructured":"Wan J, Han S, Zhang J, Zhu B, Zhou L (2013) An image management system implemented on open-source cloud platform. Proceedings - IEEE 27th International Parallel and Distributed Processing Symposium Workshops and PhD Forum, IPDPSW 2064\u20132070. https:\/\/doi.org\/10.1109\/IPDPSW.2013.176","DOI":"10.1109\/IPDPSW.2013.176"},{"issue":"3","key":"13182_CR79","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/s41019-016-0018-9","volume":"1","author":"J Wang","year":"2016","unstructured":"Wang J, Chen X (2016) Efficient and secure storage for outsourced data: a survey. Data Sci Eng 1(3):178\u2013188. https:\/\/doi.org\/10.1007\/s41019-016-0018-9","journal-title":"Data Sci Eng"},{"key":"13182_CR80","doi-asserted-by":"publisher","unstructured":"Wang JG, Li J, Lee CY, Yau WY (2010) Dense SIFT and Gabor descriptors-based face representation with applications to gender recognition. In: 11th International Conference on Control, Automation, Robotics and Vision, ICARCV 2010, 1860\u20131864. https:\/\/doi.org\/10.1109\/ICARCV.2010.5707370","DOI":"10.1109\/ICARCV.2010.5707370"},{"key":"13182_CR81","unstructured":"Wu Z, Song S, Khosla A, Yu F, Zhang L, Tang X, Xiao J (2015) 3D shapenets: a deep representation for volumetric shapes. In: Proceedings of the IEEE conference on computer vision and pattern recognition, 1912\u20131920"},{"key":"13182_CR82","doi-asserted-by":"publisher","first-page":"2017","DOI":"10.1109\/TPDS.2020.2984632","volume":"31","author":"W Xia","year":"2020","unstructured":"Xia W, Zou X, Jiang H, Zhou Y, Liu C, Feng D, Hua Y, Hu Y, Zhang Y (2020) The Design of Fast Content-Defined Chunking for data deduplication based storage systems. IEEE Trans Parallel Distrib Syst 31:2017\u20132031. https:\/\/doi.org\/10.1109\/TPDS.2020.2984632","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"13182_CR83","doi-asserted-by":"publisher","unstructured":"Yang S, Luo P, Loy CC, Tang X (2015) From facial parts responses to face detection: a deep learning approach. In: Proceedings of the IEEE International Conference on Computer Vision 2015, pp. 3676-3684. https:\/\/doi.org\/10.1109\/ICCV.2015.419","DOI":"10.1109\/ICCV.2015.419"},{"issue":"9","key":"13182_CR84","doi-asserted-by":"publisher","first-page":"1404","DOI":"10.1109\/LSP.2014.2377795","volume":"22","author":"J Yao","year":"2015","unstructured":"Yao J, Yang B, Zhu Q (2015) Near-duplicate image retrieval based on contextual descriptor. IEEE Signal Process Lett 22(9):1404\u20131408 https:\/\/digitalcommons.unomaha.edu\/compscifacpub\/25","journal-title":"IEEE Signal Process Lett"},{"key":"13182_CR85","doi-asserted-by":"publisher","unstructured":"Yu X, Huang T (2009) A SIFT-based image fingerprinting approach robust to geometric transformations. In: Circuits and systems, ISCAS 2009. IEEE international symposium on, pp. 1665-1668. IEEE. https:\/\/doi.org\/10.1109\/ISCAS.2009.5118093","DOI":"10.1109\/ISCAS.2009.5118093"},{"key":"13182_CR86","doi-asserted-by":"publisher","unstructured":"Zargar AJ, Singh N, Rathee G, Singh AK (2015) Image data-deduplication using the block truncation coding technique. IEEE International Conference on Futuristic Trends in Computational Analysis and Knowledge Management 154\u2013158. https:\/\/doi.org\/10.1109\/ABLAZE.2015.7154986","DOI":"10.1109\/ABLAZE.2015.7154986"},{"issue":"2","key":"13182_CR87","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1007\/s00521-016-2700-2","volume":"30","author":"X Zeng","year":"2018","unstructured":"Zeng X, Wen S, Zeng Z, Huang T (2018) Design of memristor-based image convolution calculation in convolutional neural network. Neural Comput & Applic 30(2):503\u2013508. https:\/\/doi.org\/10.1007\/s00521-016-2700-2","journal-title":"Neural Comput & Applic"},{"key":"13182_CR88","doi-asserted-by":"publisher","unstructured":"Zhang J, Feng Z, Su Y (2008) A new approach for detecting copy-move forgery in digital images. 11th IEEE Singapore International Conference on Communication Systems, ICCS 2008, 362\u2013366. https:\/\/doi.org\/10.1109\/ICCS.2008.4737205","DOI":"10.1109\/ICCS.2008.4737205"},{"key":"13182_CR89","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/978-981-15-3867-4_16","volume-title":"Advances in 3D image and graphics representation, analysis, computing and information technology. Smart innovation, systems and Technologies","author":"D Zhang","year":"2020","unstructured":"Zhang D, Sun Z, Jia K (2020) Near-duplicate video detection based on temporal and spatial key points. In: Kountchev R, Patnaik S, Shi J, Favorskaya M (eds) Advances in 3D image and graphics representation, analysis, computing and information technology. Smart innovation, systems and Technologies, vol 180. Springer, Singapore, pp 129\u2013137. https:\/\/doi.org\/10.1007\/978-981-15-3867-4_16"},{"issue":"5","key":"13182_CR90","doi-asserted-by":"publisher","first-page":"1037","DOI":"10.1109\/TMM.2007.898928","volume":"9","author":"WL Zhao","year":"2007","unstructured":"Zhao WL, Ngo CW, Tan HK, Wu X (2007) Near-duplicate keyframe identification with interest point matching and pattern learning. IEEE Trans Multimedia 9(5):1037\u20131048. https:\/\/doi.org\/10.1109\/TMM.2007.898928","journal-title":"IEEE Trans Multimedia"},{"key":"13182_CR91","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.isprsjprs.2018.01.004","volume":"145","author":"W Zhou","year":"2018","unstructured":"Zhou W, Newsam S, Li C, Shao Z (2018) PatternNet: a benchmark dataset for performance evaluation of remote sensing image retrieval. ISPRS J Photogramm Remote Sens 145:197\u2013209. https:\/\/doi.org\/10.1016\/j.isprsjprs.2018.01.004","journal-title":"ISPRS J Photogramm Remote Sens"},{"key":"13182_CR92","doi-asserted-by":"publisher","unstructured":"Zuo F, de With PH (2004) Fast facial feature extraction using a deformable shape model with haar-wavelet based local texture attributes. In: IEEE international conference on image processing, ICIP'04, 3:1425-1428. https:\/\/doi.org\/10.1109\/ICIP.2004.1421330","DOI":"10.1109\/ICIP.2004.1421330"},{"key":"13182_CR93","doi-asserted-by":"publisher","unstructured":"Zuo P, Hua Y, Liu X, Feng D, Xia W, Cao S, Wu J, Sun Y, Guo Y (2017) BEES: bandwidth- and energy- efficient image sharing for real-time situation awareness. Proceedings - International Conference on Distributed Computing Systems, 1510\u20131520. https:\/\/doi.org\/10.1109\/ICDCS.2017.36","DOI":"10.1109\/ICDCS.2017.36"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-13182-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-13182-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-13182-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,25]],"date-time":"2022-10-25T09:51:45Z","timestamp":1666691505000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-13182-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,13]]},"references-count":93,"journal-issue":{"issue":"28","published-print":{"date-parts":[[2022,11]]}},"alternative-id":["13182"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-13182-7","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,5,13]]},"assertion":[{"value":"13 March 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 January 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 April 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 May 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}