Using binarization and hashing for efficient SIFT matching

被引:26
作者
Chen, Chun-Che [1 ,2 ]
Hsieh, Shang-Lin [1 ]
机构
[1] Tatung Univ, Dept Comp Sci & Engn, 40,Sec 3,Zhongshan N Rd, Taipei 10452, Taiwan
[2] Taipei Coll Maritime Technol, New Taipei City 25172, Taiwan
关键词
Image retrieval; Image hashing; SIFT feature; Feature extraction; Feature binarization; Binary descriptor; Feature matching; Hashing; IMAGE; FEATURES; BINARY;
D O I
10.1016/j.jvcir.2015.02.014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The well-known SIFT is capable of extracting distinctive features for image retrieval. However, its matching is time consuming and slows down the entire process. In the SIFT matching, the Euclidean distance is used to measure the similarity of two features, which is expensive because it involves taking square root. Moreover, the scale of the image database is usually too large to adopt linear search for image retrieval. To improve the SIFT matching, this paper proposes a fast image retrieval scheme transforms the SIFT features to binary representations. The complexity of the distance calculation is reduced to bit-wise operation and the retrieval time is greatly decreased. Moreover, the proposed scheme utilizes hashing for retrieving similar images according to the binarized features and further speeds up the retrieval process. The experiment results show the proposed scheme can retrieve images efficiently with only a little sacrifice of accuracy as compared to SIFT. (C) 2015 Elsevier Inc. All rights reserved.
引用
收藏
页码:86 / 93
页数:8
相关论文
共 26 条
  • [1] Alitappeh R. J., 2012, 2012 11th International Conference on Information Sciences, Signal Processing and their Applications (ISSPA), P906, DOI 10.1109/ISSPA.2012.6310683
  • [2] [Anonymous], 2009, International Journal of Image Processing
  • [3] Chen WH, 2013, CHIN CONT DECIS CONF, P3755
  • [4] From Bits to Images: Inversion of Local Binary Descriptors
    d'Angelo, Emmanuel
    Jacques, Laurent
    Alahi, Alexandre
    Vandergheynst, Pierre
    [J]. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2014, 36 (05) : 874 - 887
  • [5] Jiang XD, 2009, 2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 1, P1, DOI 10.1109/ICCSIT.2009.5235014
  • [6] Jianhui Li, 2013, Web-Age Information Management. WAIM 2013 International Workshops: HardBD, MDSP, BigEM, TMSN, LQPM, BDMS. Proceedings. LNCS 7901, P187, DOI 10.1007/978-3-642-39527-7_20
  • [7] Jie Zhao, 2010, 2010 International Conference on Machine Learning and Cybernetics (ICMLC 2010), P258, DOI 10.1109/ICMLC.2010.5581057
  • [8] Karimi V, 2012, 2012 20TH TELECOMMUNICATIONS FORUM (TELFOR), P1725, DOI 10.1109/TELFOR.2012.6419560
  • [9] Ke Y, 2004, PROC CVPR IEEE, P506
  • [10] Exposing Digital Image Forgeries from Near Duplicate Images
    Khamankar, Snehal M.
    Madankar, M. S.
    [J]. 2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2014, : 924 - 928