Proceedings of the 1st ACM International Conference on Multimedia Retrieval 2011
DOI: 10.1145/1991996.1992027
|View full text |Cite
|
Sign up to set email alerts
|

A comparison of extended fingerprint hashing and locality sensitive hashing for binary audio fingerprints

Abstract: Hash tables have been proposed for the indexing of highdimensional binary vectors, specifically for the identification of media by fingerprints. In this paper we develop a new model to predict the performance of a hash-based method (Fingerprint Hashing) under varying levels of noise. We show that by the adjustment of two parameters, robustness to a higher level of noise is achieved. We extend Fingerprint Hashing to a multi-table range search (Extended Fingerprint Hashing) and show this approach also increases … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 15 publications
0
3
0
Order By: Relevance
“…Substantial work has been conducted on database scalability issues, and various mechanisms are proposed. Among them, distributed key‐value stores exhibit great efficiency to store and retrieve large‐volume of data, and have been widely used in various applications such as content‐based image processing , bio‐info data mining , spatial data processing . There are several open‐source implementations available, including HBase , Cassandra and Voldemort .…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Substantial work has been conducted on database scalability issues, and various mechanisms are proposed. Among them, distributed key‐value stores exhibit great efficiency to store and retrieve large‐volume of data, and have been widely used in various applications such as content‐based image processing , bio‐info data mining , spatial data processing . There are several open‐source implementations available, including HBase , Cassandra and Voldemort .…”
Section: Introductionmentioning
confidence: 99%
“…We design a strict order‐preserving hash function to map the nearby objects in high‐dimensional spaces onto adjacent keys in key‐value stores using locality sensitive hashing (LSH) . LSH has been proven to be very efficient for many applications, where a transformation from a higher‐dimensional space to a lower‐dimensional space is needed.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation