Skip to main content

Localization and Detection of Vector Logo Image Plagiarism

  • Conference paper
Digital Forensics and Cyber Crime (ICDF2C 2009)

Abstract

One of the main research issues in forensic computing is to protect intellectual properties. Logo images, one type of intellectual properties, are posted in the Internet and widely available. Logo image plagiarism and theft are not unusual. Detection and localization of logo image plagiarism are crucial to protect logo intellectual property. In recent years, logo images that are written in Scalable Vector Graphics format are able to be rendered efficiently in the web browser and accessed easily. In this paper, after introducing logo images edited and rendered from scalable vector graphics, we classify all possible types of logo image plagiarism, localize a possible set of logo images being infringed using distance functions, and detect and verify logo plagiarism using reversible transformation. We believe our work is valuable to businesses involving logo creation and development.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Alt, H., Behrends, B., Blomer, J.: Approximate matching of polygonal shapes. Annals of Mathematics and Artificial Intelligence, 251–265 (1995)

    Google Scholar 

  2. http://www.articlechecker.com/ (accessed on August 10, 2009)

  3. Alt, H., Fuchs, U., Rote, G., Weber, G.: Matching convex shapes with respect to the symmetric difference. In: Díaz, J. (ed.) ESA 1996. LNCS, vol. 1136, pp. 320–333. Springer, Heidelberg (1996)

    Chapter  Google Scholar 

  4. Chang, H., Mockus, A.: Evaluation of Source Code Copy Detection Methods on FreeBSD. In: Proc. of the 2008 Int’l Working Conf. on Mining Software Repositories, pp. 61–65 (2008)

    Google Scholar 

  5. http://www.checkforplagiarism.net/ (accessed on August 10, 2009)

  6. Efrat, A., Itai, A.: Improvements on bottleneck matching and related problems using geometry. In: Proceedings of the 12th Symposium on Computational Geometry, pp. 301–310 (1996)

    Google Scholar 

  7. Fry, D.: Shape Recognition using metrics on the space of shapes. PhD thesis, Harvard University, Department of Mathematics (1993)

    Google Scholar 

  8. Godau, M.: A natural metric for curves – computing the distance for polygonal chains and approximation algorithms. In: Jantzen, M., Choffrut, C. (eds.) STACS 1991. LNCS, vol. 480, pp. 127–136. Springer, Heidelberg (1991)

    Chapter  Google Scholar 

  9. http://images.google.com/ (accessed on August 10, 2009)

  10. Liu, C., Chen, C., Han, J., Yu, P.: GPLAG: Detection of Software Plagiarism by Program Dependence Graph Analysis. In: Proc. of ACM Conf. on Knowledge Discovery and Data Mining, pp. 872–881 (2006)

    Google Scholar 

  11. http://www.logoblog.org (accessed on August 10, 2009)

  12. Lowe, D.G.: Object recognition from local scale-invariant features. In: Proceedings of the International Conference on Computer Vision, vol. 2, pp. 1150–1157 (1999), doi:10.1109/ICCV.1999.790410

    Google Scholar 

  13. Lu, Z.-M., Zheng, W.-M., Pan, J.-S., Sun, Z.: Multipurpose Image Watermarking Method Based on Mean-removed Vector Quantization. Journal of Information Assurance and Security, 33–42 (2006)

    Google Scholar 

  14. Mohanty, S.P., Bhargava, B.K.: Invisible Wateramrking based on Creation and Robust Insertion-Extraction of Image Adaptive Watermarks. ACM Transactions on Multimedia Computing, Communications, and Applications 5, 12:1–12:22 (2008)

    Google Scholar 

  15. Navarro, G.: A Guided Tour to Approximate String Matching. ACM Computing Surveys 33, 31–88 (2001)

    Article  Google Scholar 

  16. http://www.plagiarismchecker.net/ (accessed on August 10, 2009)

  17. http://www.plagiarismtoday.com/2009/04/24/google-similar-images-poor-copy-detection/

  18. Petrakis, E., Voutsakis, E., Milios, E.: Searching for Logo and Trademark Images on the Web. In: Proc. of the 6th ACM Int’l Conf. Image and Video Retrieval (2007)

    Google Scholar 

  19. Roy, S., Chang, E.: A Unified Framework for Resolving Ambiguity in Copy Detection. In: Proc. of ACM Conf. on Multimedia, pp. 648–655 (2005)

    Google Scholar 

  20. http://rainbow.arch.scriptmania.com/scripts/no_right_click.html (accessed on August 10, 2009)

  21. http://www.w3.org/Graphics/SVG/ (accessed on August 10, 2009)

  22. Sulehria, H.K., Zhang, Y.: Vehicle Logo Recognition Using Mathematical Morphology. In: Proc. of the 6th WSEAS Int’l Conf. on Telecommunications and Informatics (2007)

    Google Scholar 

  23. Alt, H., Behrends, B., Blomer, J.: Approximate matching of polygonal shapes. Annals of Mathematics and Artificial Intelligence, 251–265 (1995)

    Google Scholar 

  24. Thomee, B., Huiskes, M., Bakker, E., Lew, M.: Large scale image copy detection evaluation. In: Proceedings of ACM International Conference on Multimedia Information Retrieval, pp. 59–66 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Yoon, J.P., Chen, Z. (2010). Localization and Detection of Vector Logo Image Plagiarism. In: Goel, S. (eds) Digital Forensics and Cyber Crime. ICDF2C 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 31. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-11534-9_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-11534-9_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-11533-2

  • Online ISBN: 978-3-642-11534-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics