Abstract
Currently, researches on content based image copy detection mainly focus on robust feature extraction. However, due to the exponential growth of online images, it is necessary to consider searching among large number of images, which is very time-consuming and unscalable. Hence, we need to pay much attention to the efficiency of image detection. Although many hashing methods has been proposed, they did not show excellent performance in decreasing semantic loss during the process of hashing. In this paper, we propose a hashing based method for image copy detection, which not only generates compact fingerprint for image representation, but also prevents huge semantic loss during the process of hashing. To generate the fingerprint, an objective function of semantic loss is constructed and minimized, which combine the influence of both the neighborhood structure of feature data and mapping error. To minimize the objective function, we first calculate an approximate solution through trace optimization, and then optimize the solution through Iterated Local Search(ILS) to further decrease semantic loss. Experimental results show that our approach significantly outperforms state-of-art methods.







References
Lei Y, Wang Y, Huang J (2011) Robust image hash in Radon transform domain for authentication. Sig Process 26:280–288
Ahmed F, Siyal MY, Abbas VU (2010) A secure and robust hash based scheme for image authentication. Sig Process 90:1456–1470
Lv X, Wang ZJ (2012) Perceptual image hashing based on shape contexts and local feature points. IEEE Trans Inf Forensics Secur 7:1081–1093
Zhao Y, Tang Z, Wang S, Zhang X, Wei W (2011) Lexicographical framework for image hashing with implementation based on DCT and NMF. Multimedia Tools Applicat 52:325–345
Tang Z, Wang S, Zhang X, Wei W, Su S (2008) Robust image hashing for tamper detection using non-negative matrix factorization. J Ubiquit Converg Technol 2:18–26
Shakhnarovich G, Viola P, Darrell T (2003) Fast pose estimation with parameter-sensitive hashing. In: Proceedings of the IEEE International Conference on Computer Vision
Blei DM, Ng AY, Jordan MI (2003) Latent Dirichlet allocation. Mach Learn Res 3:993–1022
Weiss Y, Torralba A, Fergus R (2008) Spectral hashing. In: Proceedings of the 22nd Annual Conference on Neural Information Processing Systems
Zhang D, Wang J, Cai D, Lu J (2010) Self-taught hashing for fast similarity search. In: Proceedings of the 33rd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval
Zou F, Liu C, Ling H, Feng H, Yan L, Li D (2013) Least square regularized spectral hashing for similarity search. Sig Process 93:2265–2273
Hoos HH, Stutzle T (2004) Combinatorial Fusion Analysis: Methods and Practice of Combining Multiple Scoring Systems, San Francisco
Zhipeng L, Jinkao H (2009) A Critical Element-Guided Perturbation Strategy for Iterated Local Search. In: Proceedings of the 9th European Conference on Evolutionary Computation in Combinatorial Optimization
Petitcolas F (2000) Watermarking schemes evaluation. Sig Process 17:58–64
Meng Y, Chang E, Li B (2003) Enhancing dpf for near-replica image recognition. IEEE Comput Soc Conf Comput Vis Pattern Recognit:416–423
Avidan S, Shamir A (2007) Seam carving for content-aware image resizing. ACM Trans Graph:26
Datar M, Indyk P, Immorlica N, Mirrokni VS (2004) Locality-sensitive hashing scheme based on p-stable distributions. In: Proceedings of the Annual Symposium on Computational Geometry
Heo J, Lee Y, He J, Chang SF, Yoon S (2012) Spherical Hashing. In: Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition
Joachims T (2004) Training linear SVMs in linear time. In: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
Lv. Q, Josephson W, Wang Z, Charikar M, Li K (2007) Multi-probe LSH: efficient indexing for high-dimensional similarity search. In: Proceedings of the 33rd International Conference on Very large databases
Berrani SA, Amsaleg L, Gros P (2003) Robust content-based image searches for copyright protection. In: Proceedings of the 1st ACM international workshop on Multimedia Databases
Yang Y, Nie F, Xu D, Luo J, Zhuang Y, Pan Y (2012) A multimedia retrieval framework based on semi-supervised ranking and relevance feedback. IEEE Trans Pattern Anal Mach Intell 34:723–742
Yang Y, Zhuang YT, Wu F, Pan YH (2008) Harmonizing hierarchical manifolds for multimedia document semantics understanding and cross-media retrieval. IEEE Trans Multimedia 10:437–446
Song J, Yang Y, Huang Z, Shen HT, Hong R (2011) Multiple feature hashing for real-time large scale near-duplicate video retrieval. In: Proceedings of the 19th ACM International Conference on Multimedia
Li P, Wang M, Cheng J, Xu C (2013) Spectral hashing with semantically consistent graph for image indexing. IEEE Trans Multimedia 15:141–152
Kulis B, Grauman K (2009) Kernelized locality-sensitive hashing for scalable image search. In: Proceedings of the IEEE International Conference on Computer Vision
Wang J, Kumar S, Chang S F (2010) Semi-supervised hashing for scalable image retrieval. In: Proceedings of the IEEE Computer Conference on Computer Vision and Pattern Recognition
Liu W, Wang J, Ji R, Jiang Y, Chang SF (2012) Supervised Hashing with Kernel. In: Proceedings of the IEEE Computer Conference on Computer Vision and Pattern Recognition
Gong Y, Lazebnik S (2011) Iterative Quantization: A Procrustean Approach to Learning Binary Codes. In: Proceedings of the IEEE Computer Conference on Computer Vision and Pattern Recognition
Norouzi ME, Fleet DJ (2011) Minimal loss hashing for compact binary codes. Int Conf Mach Learn 2011:353–360
He K, Wen F, Sun J (2013) K-means Hashing: an Affinity-Preserving Quantization Method for Learning Binary Compact Codes. In: Proceedings of the IEEE Computer Conference on Computer Vision and Pattern Recognition
Hawkins DM, Basak SC, Mills D (2003) Assessing Model Fit by Cross-Validation. J Chem Inf Comput Sci 43:579–586
Peronnin et al (2012) Towards good practice in large-scale learning for image classification. IEEE Comput Vis Pattern Recognit:3482–3489
Lin L, Wu T, Porway J, Xu Z (2009) A Stochastic Graph Grammar for Compositional Object Representation and Recognition. Pattern Recog 42(7):1297–1307
Lai H, Pan Y et al (2013) Sparse Learning-to-Rank via an Efficient Primal-Dual Algorithm. IEEE Trans Comput (TC) 62(6):1221–1233
Lin L, Liu X, Zhu S-C (2010) Layered Graph Matching with Composite Cluster Sampling. IEEE Trans Pattern Anal Mach Intell (TPAMI) 32(8):1426–1442
Lin L, Liu X, Zhu S-C (2010) Layered Graph Matching with Composite Cluster Sampling. IEEE Trans Pattern Anal Mach Intell (TPAMI) 32(8):1426–1442
Acknowledgment
This work is supported by the NSF of China under Grant No. 61272409, the Fundamental Research Funds for the Central Universities and Wuhan Youth Science and Technology Chenguang Program. The authors appreciate the valuable suggestions from the anonymous reviewers and the Editors.
Author information
Authors and Affiliations
Corresponding authors
Appendix
Appendix
Using the obtained results of (5) and (7), we get
Let B = (X A X T + γ I)−1, it is obvious that B = B T, so W = B X A H and X T W + 1 b − H = (A X T B X A − A)H,then we transform the last part of the objective function as follows by applying the theory of trace optimization [10]:
Where C = A − A X T B X A.
Rights and permissions
About this article
Cite this article
Yan, L., Ling, H., Zou, F. et al. Iterated local search optimized hashing for image copy detection. Multimed Tools Appl 74, 9729–9746 (2015). https://doi.org/10.1007/s11042-014-2148-2
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-014-2148-2