{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:28:11Z","timestamp":1740148091825,"version":"3.37.3"},"reference-count":11,"publisher":"Wiley","license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/"}],"funder":[{"name":"STD of Zhejiang","award":["2012C21002","61272261","2014BA D10B02"],"award-info":[{"award-number":["2012C21002","61272261","2014BA D10B02"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2012C21002","61272261","2014BA D10B02"],"award-info":[{"award-number":["2012C21002","61272261","2014BA D10B02"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Support Program","award":["2012C21002","61272261","2014BA D10B02"],"award-info":[{"award-number":["2012C21002","61272261","2014BA D10B02"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computational Intelligence and Neuroscience"],"published-print":{"date-parts":[[2015]]},"abstract":"<jats:p>Matching of keypoints across image patches forms the basis of computer vision applications, such as object detection, recognition, and tracking in real-world images. Most of keypoint methods are mainly used to match the high-resolution images, which always utilize an image pyramid for multiscale keypoint detection. In this paper, we propose a novel keypoint method to improve the matching performance of image patches with the low-resolution and small size. The location, scale, and orientation of keypoints are directly estimated from an original image patch using a Log-Spiral sampling pattern for keypoint detection without consideration of image pyramid. A Log-Spiral sampling pattern for keypoint description and two bit-generated functions are designed for generating a binary descriptor. Extensive experiments show that the proposed method is more effective and robust than existing binary-based methods for image patch matching.<\/jats:p>","DOI":"10.1155\/2015\/457495","type":"journal-article","created":{"date-parts":[[2015,5,5]],"date-time":"2015-05-05T17:04:08Z","timestamp":1430845448000},"page":"1-12","source":"Crossref","is-referenced-by-count":1,"title":["Log-Spiral Keypoint: A Robust Approach toward Image Patch Matching"],"prefix":"10.1155","volume":"2015","author":[{"given":"Kangho","family":"Paek","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Zhejiang University, Hangzhou, Zhejiang 310027, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2966-6928","authenticated-orcid":true,"given":"Min","family":"Yao","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Zhejiang University, Hangzhou, Zhejiang 310027, China"}]},{"given":"Zhongwei","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Zhejiang University, Hangzhou, Zhejiang 310027, China"}]},{"given":"Hun","family":"Kim","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Zhejiang University, Hangzhou, Zhejiang 310027, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2004.09.004"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2009.07.014"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2003.07.003"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2014.01.004"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000029664.99615.94"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2008.07.003"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/11744023_32"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/11744023_34"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/tpami.2008.275"},{"key":"10","first-page":"1115","volume":"2","year":"2005","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-005-3848-x"}],"container-title":["Computational Intelligence and Neuroscience"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/cin\/2015\/457495.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/cin\/2015\/457495.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/cin\/2015\/457495.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,7,27]],"date-time":"2016-07-27T06:38:22Z","timestamp":1469601502000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.hindawi.com\/journals\/cin\/2015\/457495\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"references-count":11,"alternative-id":["457495","457495"],"URL":"https:\/\/doi.org\/10.1155\/2015\/457495","relation":{},"ISSN":["1687-5265","1687-5273"],"issn-type":[{"type":"print","value":"1687-5265"},{"type":"electronic","value":"1687-5273"}],"subject":[],"published":{"date-parts":[[2015]]}}}