Browse Definitions :
Definition

image content search

Image content search is the capacity for software to recognize objects in digital images and return a search engine results page (SERP) based on a user query. Should the user request a particular breed of dog, for example, the software would analyze indexed images to identify any examples of that breed. In contrast, traditional image search looks for keywords in content associated with images through text or meta-tags.

Image content search opens up many new possibilities for smart photo libraries, research, targeted advertising, interactivity of media and accessibility for the visually impaired.

Although humans recognize objects with little effort, computers have difficulty with the task. Software for image content search requires deep learning computers with neural net processors and a lot of processing power for the compute-intensive task. Image content search engines are often trained on millions of tagged images in guided computer learning.

One early application of image content search is Facebook's Lumos computer vision platform. Lumos was originally designed to identify what is in a picture and what is happening in it and describe the image for visually-impaired users.

Google, Microsoft, Apple and Pinterest are among the other companies currently investing heavily in image content search development.

Image content search is also known as content based image retrieval (CIBR) or query by image content (QBIC).

This was last updated in February 2017

Continue Reading About image content search

SearchCompliance
  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

SearchSecurity
  • session key

    A session key is an encryption and decryption key that is randomly generated to ensure the security of a communications session ...

  • computer forensics (cyber forensics)

    Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular ...

  • multifactor authentication (MFA)

    Multifactor authentication (MFA) is a security technology that requires more than one method of authentication from independent ...

SearchHealthIT
SearchDisasterRecovery
  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage
  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close