Skip to main content
Log in

Deep linear discriminant analysis hashing for image retrieval

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Currently, due to the exponential growth of online images, it is necessary to consider image retrieval among large number of images, which is very time-consuming and unscalable. Although many hashing methods has been proposed, they did not show excellent performance in decreasing semantic loss during the process of hashing. In this paper, we propose a novel Deep Linear Discriminant Analysis Hashing(DLDAH) algorithm, which consists of Hash label generation stage and Deep hash model construction stage. In hash label generation stage, using extract image features, we construct an objective function based on Linear Discriminant Analysis(LDA), and minimize it to map image features into hash labels. In deep hash model construction stage, we use the generated hash labels to train a simple deep learning network for image hashing and get discriminative hash codes corresponding to training images. Then the deep hash model is used to map a new image feature into hash code for fast image retrieval. The scheme obtain a deep hash model which obtains deep semantic information without using network with a lot of layers, simplifying the process of mapping new images into hash codes. Experimental results show that our approach significantly outperforms state-of-art methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Cai D, He X, Han J (2008) SRDA: an efficient algorithm for large-scale discriminant analysis. IEEE Trans Knowl Data Eng 20(1):1–12

    Article  Google Scholar 

  2. Do T, Doan A, Cheung N (2016) Learning to hash with binary deep neural network. In: ECCV, pp 219–234

  3. Gionis A, Indyk P, Motwani R (1999) Similarity search in high dimensions via hashing. In: In VLDB, pp 518–529

  4. Gong Y, Lazebnik S (2011) Iterative quantization: a procrustean approach to learning binary codes. In: CVPR, pp 817–824

  5. Gu Y, Ma C, Yang J (2016) Supervised recurrent hashing for large scale video retrieval. In: ACM MM, pp 272–276

  6. Ioffe S, Szegedy C (2015) Batch normalization: accelerating deep network training by reducing internal covariate shift. In: 32nd international conference on machine learning, pp 448–456

  7. J<äegou H, Douze M, Schmid C (2011) Product quantization for nearest neighbor search. IEEE Trans Pattern Anal Mach Intell 33(1):117–128

    Article  Google Scholar 

  8. Kokiopoulou E, Chen J, Saad Y (2011) Trace optimization and eigenproblems in dimension reduction methods. Numer Linear Algebra Appl 18(3):565–602

    Article  MathSciNet  MATH  Google Scholar 

  9. Krizhevsky A, Sutskever I, Hinton GE (2012) Imagenet classification with deep convolutional neural networks. In: Advances in neural information processing systems, pp 1097–1105

  10. Kulis B, Darrell T (2009) Learning to hash with binary reconstructive embeddings. In: NIPS, pp 1042–1050

  11. Kulis B, Grauman K (2012) Kernelized locality-sensitive hashing. IEEE Trans Pattern Anal Mach Intell 34(6):1092–1104

    Article  Google Scholar 

  12. Lai H, Pan Y, Liu Y, Shuicheng Y (2015) Simultaneous feature learning and hash coding with deep neural networks. In: CVPR, pp 3270–3278

  13. Lai H, Pan Y, Liu Y, Yan S (2015) Simultaneous feature learning and hash coding with deep neural networks. In: CVPR, pp 3270–3278

  14. Leng L, Teoh A, Li M, Khan M (2014) Analysis of correlation of 2DPalmHash code and orientation range suitable for transposition. Neurocomputing 131:377–387

    Article  Google Scholar 

  15. Leng L, Teoh A (2015) Alignment-free row-co-occurrence cancelable palmprint fuzzy vault. Pattern Recogn 48(7):2290–2303

    Article  Google Scholar 

  16. Leng L, Teoh A, Li M (2017) Simplified 2DPalmHash code for secure palmprint verification. Multimed Tools Appl 76(6):8373–8398

    Article  Google Scholar 

  17. Leng L, Teoh A, Li M, Khan M (2015) Orientation range of transposition for vertical correlation suppression of 2DPalmphasor code. Multimed Tools Appl 74 (24):11683–11701

    Article  Google Scholar 

  18. Li P, Wang M, Cheng J, Xu C (2013) Spectral hashing with semantically consistent graph for image indexing. IEEE Trans Multimed 15:141–152

    Article  Google Scholar 

  19. Lin K, Yang H, Hsiao J, Chen C (2015) Deep learning of binary hash codes for fast image retrieval. In: CVPR, pp 27–35

  20. Liu W, Wang J, Ji R, Jiang Y-G, Chang S-F (2012) Supervised hashing with kernels. In: Computer vision and pattern recognition (CVPR), pp 2074–2081

  21. Liu Y, Nie L, Han L, Zhang L, Rosenblum DS (2015) Action2activity: recognizing complex activities from sensor data. In: Proceedings of the 24th international joint conference on artificial intelligence, pp 1617–1623

  22. Liu H, Wang R, Shan S, Chen X (2016) Deep supervised hashing for fast image retrieval. In: CVPR, pp 2064–2072

  23. Liu L, Cheng L, Liu Y, Jia Y, Rosenblum DS (2016) Recognizing complex activities by a probabilistic interval-based model. In: 30th AAAI conference on artificial intelligence, pp 1266–1272

  24. Liu Y, Nie L, Liu L, Rosenblum DS (2016) From action to activity: sensor-based activity recognition. Neurocomputing 181:108–115

    Article  Google Scholar 

  25. Long J, Shelhamer E, Darrell T (2015) Fully convolutional networks for semantic segmentation. In: Computer vision and pattern recognition (CVPR), pp 3431–3440

  26. Norouzi M, Fleet DJ (2011) Minimal loss hashing for compact binary codes. In: ICML, pp 353–360

  27. Song J, Gao L, Liu L, Zhu X, Sebe N (2018) Quantization-based hashing: a general framework for scalable image and video retrieval. Pattern Recogn 75:175–187

    Article  Google Scholar 

  28. Sun Y, Chen Y, Wang X, Tang X (2014) Deep learning face representation by joint identification-verification. In: Advances in neural information processing systems, pp 1988–1996

  29. Szegedy C, Toshev A, Erhan D (2013) Deep neural networks for object detection. In: Advances in neural information processing systems, pp 2553–2561

  30. Szegedy C, Liu W, Jia Y, Sermanet P, Reed S, Anguelov D, Erhan D, Vanhoucke V, Rabinovich A (2015) Going deeper with convolutions. In: Computer Vision and Pattern Recognition (CVPR), pp 1–9

  31. Tang Z, Wang S, Zhang X, Wei W, Su S (2008) Robust image hashing for tamper detection using non-negative matrix factorization. J Ubiquitous Convergence Technol 2:18–26

    Google Scholar 

  32. Wang J, Kumar S, Chang S-F (2012) Semi-supervised hashing for large-scale search. IEEE Trans Pattern Anal Mach Intell 34(12):2393–2406

    Article  Google Scholar 

  33. Xia R, Pan Y, Lai H, Liu C, Yan S (2014) Supervised hashing for image retrieval via image representation learning. In: AAAI, pp 2156–2162

  34. Yang H, Lin K, Chen C (2018) Supervised learning of semantics-preserving hash via deep convolutional neural networks. IEEE Trans Pattern Anal Mach Intell 40:437–451

    Article  Google Scholar 

  35. Zhang D, Wang J, Cai D, Lu J (2010) Self-taught hashing for fast similarity search. In: Proceedings of the 33rd annual international ACM SIGIR conference on research and development in information retrieval, pp 18–25

  36. Zheng L, Wang S, Tian L, He F, Liu Z, Tian Q (2015) Query-adaptive late fusion for image search and person re-identification. In: CVPR, pp 1741–1750

Download references

Acknowledgements

Thanks for the funding supported by the National Natural Science Foundation of China (No. 61502155, No. 61772180, No. U1536203, No. 61602161), National key research and development program of China (2016QY01W0200), Natural Science Foundation of Hubei University of Technology (No. BSQD15029, No. BSQD15028).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lingyu Yan.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yan, L., Lu, H., Wang, C. et al. Deep linear discriminant analysis hashing for image retrieval. Multimed Tools Appl 78, 15101–15119 (2019). https://doi.org/10.1007/s11042-018-6855-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-6855-y

Keywords

Navigation