2018
DOI: 10.1109/tip.2018.2864894
|View full text |Cite
|
Sign up to set email alerts
|

Deep Discrete Supervised Hashing

Abstract: Hashing has been widely used for large-scale search due to its low storage cost and fast query speed. By using supervised information, supervised hashing can significantly outperform unsupervised hashing. Recently, discrete supervised hashing and feature learning based deep hashing are two representative progresses in supervised hashing. On one hand, hashing is essentially a discrete optimization problem. Hence, utilizing supervised information to directly guide discrete (binary) coding procedure can avoid sub… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
72
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 107 publications
(72 citation statements)
references
References 33 publications
0
72
0
Order By: Relevance
“…In most schemes, the index encryption module uses the LSH algorithm. Some hashing algorithms [20][21][22][23] based on supervision and quantization are proposed to evaluate the quality of hash code learning. These hash algorithms are optimized primarily from the perspective of network structure and the loss function.…”
Section: Index Encryptionmentioning
confidence: 99%
See 1 more Smart Citation
“…In most schemes, the index encryption module uses the LSH algorithm. Some hashing algorithms [20][21][22][23] based on supervision and quantization are proposed to evaluate the quality of hash code learning. These hash algorithms are optimized primarily from the perspective of network structure and the loss function.…”
Section: Index Encryptionmentioning
confidence: 99%
“…In the traditional hash algorithm, SDH [19] was proposed to learn binary hash codes directly. Some hashing algorithms (DPSH [20], DSDH [21], DSEH [22], DDSH [23]) based on supervision and quantization were proposed to evaluate the quality of hash code learning. At the same time, these algorithms were also the baseline of this paper.…”
Section: Resnet18mentioning
confidence: 99%
“…To address the inefficiency problem in real-value based retrieval, many hashing methods have been proposed [9,10,11,12]. There have appeared two speaker hashing methods [1,3] for speaker identification and retrieval.…”
Section: Speaker Hashingmentioning
confidence: 99%
“…In recent years, deep learning is applied to perceptual hash [21,[24][25][26][27][28][29], which has solved many problems in traditional perceptual hash. Subject-sensitive perceptual hash [29], also known as subject-sensitive hashing, is proposed in this background to realize subject-biased integrity authentication of HRRS image.…”
Section: Introductionmentioning
confidence: 99%