A survey of computational methods for iconic image analysis

被引:4
|
作者
van Noord, Nanne [1 ]
机构
[1] Univ Amsterdam, Informat Inst, Amsterdam, Netherlands
基金
荷兰研究理事会;
关键词
COMPUTER VISION; PHOTOGRAPHS; ARCHIVES;
D O I
10.1093/llc/fqac003
中图分类号
C [社会科学总论];
学科分类号
03 ; 0303 ;
摘要
Digitization and digitalization efforts have led to an explosive growth of the number of images that are published, shared, and made available in collections. In turn, this has resulted in increased awareness of, and interest in, computational methods for automatic image analysis. Despite the tremendous progress made in the development of computational methods, there remains a gap between how a person interprets an image and what can be automatically extracted. By considering iconic images as those images for which this gap is most salient, as their meaning goes well beyond what is represented in the visual data, this article gives an overview of the potential and limitations of computational methods for iconic image analysis. I structure this overview by discussing methods that can be used to analyse the production, distribution, and reception of iconic images. Although the majority of computational methods focus on analysing production aspects, there are promising methods for image distribution aspects, whereas methods for studying image reception have received little attention. By considering the limitations of available methods I argue that computational methods can be of use for studying iconic images, but that comprehensive analysis will require methods that incorporate the plurality of meanings an image can have, and temporal nature thereof.
引用
收藏
页码:1316 / 1338
页数:23
相关论文
共 50 条
  • [21] A survey of methods for image annotation
    Hanbury, Allan
    JOURNAL OF VISUAL LANGUAGES AND COMPUTING, 2008, 19 (05): : 617 - 627
  • [22] Methods for image authentication: a survey
    Adil Haouzia
    Rita Noumeir
    Multimedia Tools and Applications, 2008, 39 : 1 - 46
  • [23] Image registration methods:: a survey
    Zitová, B
    Flusser, J
    IMAGE AND VISION COMPUTING, 2003, 21 (11) : 977 - 1000
  • [24] Methods for image authentication: a survey
    Haouzia, Adil
    Noumeir, Rita
    MULTIMEDIA TOOLS AND APPLICATIONS, 2008, 39 (01) : 1 - 46
  • [25] Image Scrambling Methods for Image Hiding: A Survey
    Rhine, Reema
    Bhuvan, Nikhila T.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (02): : 86 - 91
  • [26] Systematicity and Idiosyncrasy in Iconic Gesture Use: Empirical Analysis and Computational Modeling
    Bergmann, Kirsten
    Kopp, Stefan
    GESTURE IN EMBODIED COMMUNICATION AND HUMAN-COMPUTER INTERACTION, 2010, 5934 : 182 - 194
  • [27] IMAGE-ANALYSIS USING ICONIC FUZZY-SETS
    MENHARDT, W
    PROCEEDINGS OF THE ANNUAL INTERNATIONAL CONFERENCE OF THE IEEE ENGINEERING IN MEDICINE AND BIOLOGY SOCIETY, PTS 1-4, 1988, : 351 - 353
  • [28] Image Fusion Using Computational Intelligence: A Survey
    Irshad, Humayun
    Kamran, Muhammad
    Siddiqui, Abdul Basit
    Hussain, Ayyaz
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON ENVIRONMENTAL AND COMPUTER SCIENCE, 2009, : 128 - 132
  • [29] A short survey of computational analysis methods in analysing ChIP-seq data
    Kim H.
    Kim J.
    Selby H.
    Gao D.
    Tong T.
    Phang T.L.
    Tan A.C.
    Human Genomics, 5 (2) : 117 - 123
  • [30] Analysis and coding technique based on the computational intelligence methods and image understanding architecture
    Kuvychko, I
    VISUAL COMMUNICATIONS AND IMAGE PROCESSING 2000, PTS 1-3, 2000, 4067 : 556 - 567