Similarity and Ranking Preserving Deep Hashing for image Retrieval

被引:0
作者
Li, Xiaoyun [1 ]
Li, Tongliang [1 ]
Zhao, Huanyu [1 ]
Zhang, Hao Lan [2 ]
Fan, Ruiqin [3 ]
Pang, Chaoyi [2 ]
机构
[1] Hebei Acad Sci, Authenticat Technol Engn Res Ctr, Inst Appl Math, Shijiazhuang, Hebei, Peoples R China
[2] Zhejiang Univ, Ctr SCDM, NIT, Ningbo, Peoples R China
[3] Shijiazhuang Tiedao Univ, Dept Math & Phys, Shijiazhuang, Hebei, Peoples R China
来源
2020 IEEE/WIC/ACM INTERNATIONAL JOINT CONFERENCE ON WEB INTELLIGENCE AND INTELLIGENT AGENT TECHNOLOGY (WI-IAT 2020) | 2020年
关键词
insage retrieva4 sestsade labe4 derp hashing; cons s scarps; ALGORITHMS;
D O I
10.1109/WIIAT50758.2020.00122
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Hasit codes based on deep learning can effectively learn image features. For supervised deep learning methods, the label information of the image OM be used to farther learn the semantic Information of the image. However, the current supervised deep learning methods often use I and 0 (or -1) to represent the sindlariry of two images In fact, these two extreme values do not fully reflect the similarity between bnages. Thus, we proposed a novel dinibuity and ranking preserving deep hashing method (SRPDH). In order to enrich and more comprehensively reflect the semantic information between Merges, we refine the single-label information into mold -label Information, and use Jaceard coefficient model to calculate the sbnflarity between label information. In the loss hmction model, we use the cress entropy model and consider the loss caused by the bbuiry quantization of the network output- The experimental results show that our method can farther *improve the mean average precision (MAP) of image retrieval compared with the existing methods,
引用
收藏
页码:791 / 796
页数:6
相关论文
共 36 条
  • [1] Andoni A, 2006, ANN IEEE SYMP FOUND, P459
  • [2] [Anonymous], 2014, Hashing for similarity search: A survey
  • [3] Data-Dependent Hashing Based on p-Stable Distribution
    Bai, Xiao
    Yang, Haichuan
    Zhou, Jun
    Ren, Peng
    Cheng, Jian
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2014, 23 (12) : 5033 - 5046
  • [4] SPACE/TIME TRADE/OFFS IN HASH CODING WITH ALLOWABLE ERRORS
    BLOOM, BH
    [J]. COMMUNICATIONS OF THE ACM, 1970, 13 (07) : 422 - &
  • [5] Efficient large-scale sequence comparison by locality-sensitive hashing
    Buhler, J
    [J]. BIOINFORMATICS, 2001, 17 (05) : 419 - 428
  • [6] The devil is in the details: an evaluation of recent feature encoding methods
    Chatfield, Ken
    Lempitsky, Victor
    Vedaldi, Andrea
    Zisserman, Andrew
    [J]. PROCEEDINGS OF THE BRITISH MACHINE VISION CONFERENCE 2011, 2011,
  • [7] Chua T.-S., 2009, P ACM INT C IM VID R, P48
  • [8] Histograms of oriented gradients for human detection
    Dalal, N
    Triggs, B
    [J]. 2005 IEEE COMPUTER SOCIETY CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION, VOL 1, PROCEEDINGS, 2005, : 886 - 893
  • [9] Dasgupta A., 2011, P 17 ACM SIGKDD INT, P1073
  • [10] Triplet-Based Deep Hashing Network for Cross-Modal Retrieval
    Deng, Cheng
    Chen, Zhaojia
    Liu, Xianglong
    Gao, Xinbo
    Tao, Dacheng
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2018, 27 (08) : 3893 - 3903