Cie1 commited on
Commit
4e307de
·
verified ·
1 Parent(s): 1d00bd8

Update MMSearch-Plus dataset with encrypted data files

Browse files
README.md CHANGED
@@ -71,7 +71,7 @@ Official repository for the paper "[MMSearch-Plus: Benchmarking Provenance-Aware
71
 
72
  **⚠️ Important: This dataset is encrypted to prevent data contamination. However, decryption is handled transparently by the dataset loader.**
73
 
74
- ### Simple Usage (Recommended)
75
 
76
  Load the dataset with automatic decryption using your canary string:
77
 
@@ -80,7 +80,7 @@ import os
80
  from datasets import load_dataset
81
 
82
  # Set the canary string (hint: it's the name of this repo)
83
- os.environ['MMSEARCH_CANARY'] = 'your_canary_string'
84
 
85
  # Load dataset with transparent decryption
86
  dataset = load_dataset("Cie1/MMSearch-Plus", trust_remote_code=True)
@@ -129,14 +129,14 @@ Evaluation of closed- and open-source MLLMs shows:
129
  - Models struggle with multi-step visual reasoning and cross-modal information integration
130
 
131
  <p align="center">
132
- <img src="https://raw.githubusercontent.com/mmsearch-plus/mmsearch-plus.github.io/main/static/images/teaser.png" width="75%"> <br>
133
  The overview of three paradigms for multimodal browsing tasks that demand fine-grained visual reasoning.
134
  </p>
135
 
136
 
137
 
138
  <p align="center">
139
- <img src="https://raw.githubusercontent.com/mmsearch-plus/mmsearch-plus.github.io/main/static/images/real-teaser.jpg" width="60%"> <br>
140
  The overview of an example trajectory for a task in <b>MMSearch-Plus</b>.
141
  </p>
142
 
 
71
 
72
  **⚠️ Important: This dataset is encrypted to prevent data contamination. However, decryption is handled transparently by the dataset loader.**
73
 
74
+ ### Dataset Usage
75
 
76
  Load the dataset with automatic decryption using your canary string:
77
 
 
80
  from datasets import load_dataset
81
 
82
  # Set the canary string (hint: it's the name of this repo)
83
+ os.environ['MMSEARCH_PLUS'] = 'your_canary_string'
84
 
85
  # Load dataset with transparent decryption
86
  dataset = load_dataset("Cie1/MMSearch-Plus", trust_remote_code=True)
 
129
  - Models struggle with multi-step visual reasoning and cross-modal information integration
130
 
131
  <p align="center">
132
+ <img src="https://raw.githubusercontent.com/mmsearch-plus/mmsearch-plus.github.io/main/static/images/teaser.png" width="80%"> <br>
133
  The overview of three paradigms for multimodal browsing tasks that demand fine-grained visual reasoning.
134
  </p>
135
 
136
 
137
 
138
  <p align="center">
139
+ <img src="https://raw.githubusercontent.com/mmsearch-plus/mmsearch-plus.github.io/main/static/images/real-teaser.jpg" width="80%"> <br>
140
  The overview of an example trajectory for a task in <b>MMSearch-Plus</b>.
141
  </p>
142
 
data-00000-of-00003.arrow CHANGED
@@ -1,3 +1,3 @@
1
  version https://git-lfs.github.com/spec/v1
2
- oid sha256:d303f1ca1a9cd9470d401a538f55e1d4d70f9ca07aed8b2ab8d23f635e59831a
3
- size 419738728
 
1
  version https://git-lfs.github.com/spec/v1
2
+ oid sha256:5d37bfccc2c49668422470eddaccb1aa3abe8d022b6c36f8f5d3b5eb4a23c9b9
3
+ size 419741304
data-00001-of-00003.arrow CHANGED
@@ -1,3 +1,3 @@
1
  version https://git-lfs.github.com/spec/v1
2
- oid sha256:f070af1555340c0202102f292ef2f7920fccce0434b65c6fd384de407db9b9da
3
- size 466499832
 
1
  version https://git-lfs.github.com/spec/v1
2
+ oid sha256:731843bf222a4ab7e8facf9a468b5d84fb7b8af98d37dfb9b09bc877d278542a
3
+ size 466502312
data-00002-of-00003.arrow CHANGED
@@ -1,3 +1,3 @@
1
  version https://git-lfs.github.com/spec/v1
2
- oid sha256:7d59c12bdf310ad6399d4f94fc9cda5cabcd3a059e528accb8653a253e466adc
3
- size 345386360
 
1
  version https://git-lfs.github.com/spec/v1
2
+ oid sha256:25e89cb48e883d9884e9dd2acc0498c89556987385fcb2c0badb8933a15a9f6b
3
+ size 345388808
dataset_info.json CHANGED
@@ -2,10 +2,6 @@
2
  "citation": "",
3
  "description": "",
4
  "features": {
5
- "question": {
6
- "dtype": "string",
7
- "_type": "Value"
8
- },
9
  "answer": {
10
  "feature": {
11
  "dtype": "string",
@@ -13,15 +9,19 @@
13
  },
14
  "_type": "Sequence"
15
  },
16
- "num_images": {
17
- "dtype": "int64",
 
 
 
 
18
  "_type": "Value"
19
  },
20
  "arxiv_id": {
21
  "dtype": "string",
22
  "_type": "Value"
23
  },
24
- "video_url": {
25
  "dtype": "string",
26
  "_type": "Value"
27
  },
@@ -29,33 +29,49 @@
29
  "dtype": "string",
30
  "_type": "Value"
31
  },
32
- "difficulty": {
33
  "dtype": "string",
34
  "_type": "Value"
35
  },
36
- "subtask": {
37
  "dtype": "string",
38
  "_type": "Value"
39
  },
40
- "img_1": {
41
  "dtype": "string",
42
  "_type": "Value"
43
  },
44
- "img_5": {
45
  "dtype": "string",
46
  "_type": "Value"
47
  },
48
- "img_4": {
49
  "dtype": "string",
50
  "_type": "Value"
51
  },
52
- "img_2": {
53
  "dtype": "string",
54
  "_type": "Value"
55
  },
56
  "img_3": {
57
  "dtype": "string",
58
  "_type": "Value"
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
59
  }
60
  },
61
  "homepage": "",
 
2
  "citation": "",
3
  "description": "",
4
  "features": {
 
 
 
 
5
  "answer": {
6
  "feature": {
7
  "dtype": "string",
 
9
  },
10
  "_type": "Sequence"
11
  },
12
+ "encrypted_img_1": {
13
+ "dtype": "string",
14
+ "_type": "Value"
15
+ },
16
+ "encrypted_img_4": {
17
+ "dtype": "string",
18
  "_type": "Value"
19
  },
20
  "arxiv_id": {
21
  "dtype": "string",
22
  "_type": "Value"
23
  },
24
+ "question": {
25
  "dtype": "string",
26
  "_type": "Value"
27
  },
 
29
  "dtype": "string",
30
  "_type": "Value"
31
  },
32
+ "img_5": {
33
  "dtype": "string",
34
  "_type": "Value"
35
  },
36
+ "encrypted_img_5": {
37
  "dtype": "string",
38
  "_type": "Value"
39
  },
40
+ "difficulty": {
41
  "dtype": "string",
42
  "_type": "Value"
43
  },
44
+ "img_4": {
45
  "dtype": "string",
46
  "_type": "Value"
47
  },
48
+ "encrypted_img_2": {
49
  "dtype": "string",
50
  "_type": "Value"
51
  },
52
+ "subtask": {
53
  "dtype": "string",
54
  "_type": "Value"
55
  },
56
  "img_3": {
57
  "dtype": "string",
58
  "_type": "Value"
59
+ },
60
+ "video_url": {
61
+ "dtype": "string",
62
+ "_type": "Value"
63
+ },
64
+ "num_images": {
65
+ "dtype": "int64",
66
+ "_type": "Value"
67
+ },
68
+ "encrypted_img_3": {
69
+ "dtype": "string",
70
+ "_type": "Value"
71
+ },
72
+ "img_2": {
73
+ "dtype": "string",
74
+ "_type": "Value"
75
  }
76
  },
77
  "homepage": "",
mmsearch_plus.py CHANGED
@@ -104,7 +104,7 @@ class MmsearchPlus(datasets.GeneratorBasedBuilder):
104
 
105
  def _split_generators(self, dl_manager):
106
  # Get canary from environment variable or kwargs
107
- canary = os.environ.get("MMSEARCH_CANARY")
108
 
109
  # Check if passed in the builder's initialization
110
  if hasattr(self, 'canary'):
@@ -112,10 +112,10 @@ class MmsearchPlus(datasets.GeneratorBasedBuilder):
112
 
113
  if not canary:
114
  raise ValueError(
115
- "Canary string is required for decryption. Either set the MMSEARCH_CANARY "
116
  "environment variable or pass it via the dataset loading kwargs. "
117
  "Example: load_dataset('path/to/dataset', trust_remote_code=True) after setting "
118
- "os.environ['MMSEARCH_CANARY'] = 'your_canary_string'"
119
  )
120
 
121
  # Download files
@@ -156,11 +156,28 @@ class MmsearchPlus(datasets.GeneratorBasedBuilder):
156
  decrypted_answers.append(answer)
157
  example["answer"] = decrypted_answers
158
 
159
- # Decrypt image fields
160
- image_fields = ["img_1", "img_2", "img_3", "img_4", "img_5"]
161
- for field in image_fields:
162
- if example.get(field):
163
- example[field] = decrypt_image(example[field], canary)
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
164
 
165
  yield key, example
166
  key += 1
 
104
 
105
  def _split_generators(self, dl_manager):
106
  # Get canary from environment variable or kwargs
107
+ canary = os.environ.get("MMSEARCH_PLUS")
108
 
109
  # Check if passed in the builder's initialization
110
  if hasattr(self, 'canary'):
 
112
 
113
  if not canary:
114
  raise ValueError(
115
+ "Canary string is required for decryption. Either set the MMSEARCH_PLUS "
116
  "environment variable or pass it via the dataset loading kwargs. "
117
  "Example: load_dataset('path/to/dataset', trust_remote_code=True) after setting "
118
+ "os.environ['MMSEARCH_PLUS'] = 'your_canary_string'"
119
  )
120
 
121
  # Download files
 
156
  decrypted_answers.append(answer)
157
  example["answer"] = decrypted_answers
158
 
159
+ # Decrypt image fields - handle both original and renamed encrypted fields
160
+ image_field_mapping = {
161
+ "encrypted_img_1": "img_1",
162
+ "encrypted_img_2": "img_2",
163
+ "encrypted_img_3": "img_3",
164
+ "encrypted_img_4": "img_4",
165
+ "encrypted_img_5": "img_5",
166
+ # Also handle original field names for backward compatibility
167
+ "img_1": "img_1",
168
+ "img_2": "img_2",
169
+ "img_3": "img_3",
170
+ "img_4": "img_4",
171
+ "img_5": "img_5"
172
+ }
173
+
174
+ for encrypted_field, decrypted_field in image_field_mapping.items():
175
+ if example.get(encrypted_field):
176
+ decrypted_image = decrypt_image(example[encrypted_field], canary)
177
+ example[decrypted_field] = decrypted_image
178
+ # Remove the encrypted field if it's not the same as decrypted field
179
+ if encrypted_field != decrypted_field and encrypted_field in example:
180
+ del example[encrypted_field]
181
 
182
  yield key, example
183
  key += 1
state.json CHANGED
@@ -10,7 +10,7 @@
10
  "filename": "data-00002-of-00003.arrow"
11
  }
12
  ],
13
- "_fingerprint": "f322dd0e15bea130",
14
  "_format_columns": null,
15
  "_format_kwargs": {},
16
  "_format_type": null,
 
10
  "filename": "data-00002-of-00003.arrow"
11
  }
12
  ],
13
+ "_fingerprint": "c8f35004d8a5d590",
14
  "_format_columns": null,
15
  "_format_kwargs": {},
16
  "_format_type": null,