Deep Constrained Siamese Hash Coding Network and Load-Balanced Locality-Sensitive Hashing for Near Duplicate Image Detection

被引:22
作者
Hu, Weiming [1 ,2 ]
Fan, Yabo [1 ,2 ]
Xing, Junliang [1 ,2 ]
Sun, Liang [3 ]
Cai, Zhaoquan [4 ]
Maybank, Stephen [5 ]
机构
[1] Chinese Acad Sci, Natl Lab Pattern Recognit, CAS Ctr Excellence Brain Sci & Intelligence Techn, Inst Automat, Beijing 100190, Peoples R China
[2] Univ Chinese Acad Sci, Beijing 100049, Peoples R China
[3] Univ Sci & Technol China, Sch Informat Sci & Technol, Hefei 230026, Anhui, Peoples R China
[4] Huizhou Univ, Dept Informat Sci & Technol, Huizhou 516007, Peoples R China
[5] Univ London, Birkbeck Coll, Dept Comp Sci & Informat Syst, London WC1E 7HX, England
基金
北京市自然科学基金;
关键词
Near duplicate image detection; load-balanced locality-sensitive hashing; deep constrained siamese neural network; deep feature extraction;
D O I
10.1109/TIP.2018.2839886
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We construct a new efficient near duplicate image detection method using a hierarchical hash code learning neural network and load-balanced locality-sensitive hashing (LSH) indexing. We propose a deep constrained siamese hash coding neural network combined with deep feature learning. Our neural network is able to extract effective features for near duplicate image detection. The extracted features are used to construct a LSH-based index. We propose a load-balanced LSH method to produce load-balanced buckets in the hashing process. The load-balanced LSH significantly reduces the query time. Based on the proposed load-balanced LSH, we design an effective and feasible algorithm for near duplicate image detection. Extensive experiments on three benchmark data sets demonstrate the effectiveness of our deep siamese hash encoding network and load-balanced LSH.
引用
收藏
页码:4452 / 4464
页数:13
相关论文
共 44 条
  • [1] Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions
    Andoni, Alexandr
    Indyk, Piotr
    [J]. COMMUNICATIONS OF THE ACM, 2008, 51 (01) : 117 - 122
  • [2] [Anonymous], 2016, ARXIV PREPRINT ARXIV
  • [3] Arandjelovic R, 2012, PROC CVPR IEEE, P2911, DOI 10.1109/CVPR.2012.6248018
  • [4] Collaborative multiview hashing
    Chen, Zhixiang
    Zhou, Jie
    [J]. PATTERN RECOGNITION, 2018, 75 : 149 - 160
  • [5] Nonlinear Discrete Hashing
    Chen, Zhixiang
    Lu, Jiwen
    Feng, Jianjiang
    Zhou, Jie
    [J]. IEEE TRANSACTIONS ON MULTIMEDIA, 2017, 19 (01) : 123 - 135
  • [6] Chum O., 2008, P BRIT MACH VIS C
  • [7] Histograms of oriented gradients for human detection
    Dalal, N
    Triggs, B
    [J]. 2005 IEEE COMPUTER SOCIETY CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION, VOL 1, PROCEEDINGS, 2005, : 886 - 893
  • [8] Douze M., 2009, P ACM INT C IM VID R, P1
  • [9] Gionis A, 1999, PROCEEDINGS OF THE TWENTY-FIFTH INTERNATIONAL CONFERENCE ON VERY LARGE DATA BASES, P518
  • [10] Iterative Quantization: A Procrustean Approach to Learning Binary Codes for Large-Scale Image Retrieval
    Gong, Yunchao
    Lazebnik, Svetlana
    Gordo, Albert
    Perronnin, Florent
    [J]. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2013, 35 (12) : 2916 - 2929