Skip to main content
Log in

Iterated local search optimized hashing for image copy detection

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Currently, researches on content based image copy detection mainly focus on robust feature extraction. However, due to the exponential growth of online images, it is necessary to consider searching among large number of images, which is very time-consuming and unscalable. Hence, we need to pay much attention to the efficiency of image detection. Although many hashing methods has been proposed, they did not show excellent performance in decreasing semantic loss during the process of hashing. In this paper, we propose a hashing based method for image copy detection, which not only generates compact fingerprint for image representation, but also prevents huge semantic loss during the process of hashing. To generate the fingerprint, an objective function of semantic loss is constructed and minimized, which combine the influence of both the neighborhood structure of feature data and mapping error. To minimize the objective function, we first calculate an approximate solution through trace optimization, and then optimize the solution through Iterated Local Search(ILS) to further decrease semantic loss. Experimental results show that our approach significantly outperforms state-of-art methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Notes

  1. http://wang.ist.psu.edu/docs/related.shtml

  2. http://www.irit.fr/RFIEC/CLIC/CLICkernel/CLICkernel.zip

  3. http://vision.caltech.edu/ImageDatasets/Caltech256/

References

  1. Lei Y, Wang Y, Huang J (2011) Robust image hash in Radon transform domain for authentication. Sig Process 26:280–288

    Google Scholar 

  2. Ahmed F, Siyal MY, Abbas VU (2010) A secure and robust hash based scheme for image authentication. Sig Process 90:1456–1470

    Article  MATH  Google Scholar 

  3. Lv X, Wang ZJ (2012) Perceptual image hashing based on shape contexts and local feature points. IEEE Trans Inf Forensics Secur 7:1081–1093

    Article  Google Scholar 

  4. Zhao Y, Tang Z, Wang S, Zhang X, Wei W (2011) Lexicographical framework for image hashing with implementation based on DCT and NMF. Multimedia Tools Applicat 52:325–345

    Article  Google Scholar 

  5. Tang Z, Wang S, Zhang X, Wei W, Su S (2008) Robust image hashing for tamper detection using non-negative matrix factorization. J Ubiquit Converg Technol 2:18–26

    Google Scholar 

  6. Shakhnarovich G, Viola P, Darrell T (2003) Fast pose estimation with parameter-sensitive hashing. In: Proceedings of the IEEE International Conference on Computer Vision

  7. Blei DM, Ng AY, Jordan MI (2003) Latent Dirichlet allocation. Mach Learn Res 3:993–1022

    MATH  Google Scholar 

  8. Weiss Y, Torralba A, Fergus R (2008) Spectral hashing. In: Proceedings of the 22nd Annual Conference on Neural Information Processing Systems

  9. Zhang D, Wang J, Cai D, Lu J (2010) Self-taught hashing for fast similarity search. In: Proceedings of the 33rd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval

  10. Zou F, Liu C, Ling H, Feng H, Yan L, Li D (2013) Least square regularized spectral hashing for similarity search. Sig Process 93:2265–2273

    Article  Google Scholar 

  11. Hoos HH, Stutzle T (2004) Combinatorial Fusion Analysis: Methods and Practice of Combining Multiple Scoring Systems, San Francisco

  12. Zhipeng L, Jinkao H (2009) A Critical Element-Guided Perturbation Strategy for Iterated Local Search. In: Proceedings of the 9th European Conference on Evolutionary Computation in Combinatorial Optimization

  13. Petitcolas F (2000) Watermarking schemes evaluation. Sig Process 17:58–64

    Article  Google Scholar 

  14. Meng Y, Chang E, Li B (2003) Enhancing dpf for near-replica image recognition. IEEE Comput Soc Conf Comput Vis Pattern Recognit:416–423

  15. Avidan S, Shamir A (2007) Seam carving for content-aware image resizing. ACM Trans Graph:26

  16. Datar M, Indyk P, Immorlica N, Mirrokni VS (2004) Locality-sensitive hashing scheme based on p-stable distributions. In: Proceedings of the Annual Symposium on Computational Geometry

  17. Heo J, Lee Y, He J, Chang SF, Yoon S (2012) Spherical Hashing. In: Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition

  18. Joachims T (2004) Training linear SVMs in linear time. In: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining

  19. Lv. Q, Josephson W, Wang Z, Charikar M, Li K (2007) Multi-probe LSH: efficient indexing for high-dimensional similarity search. In: Proceedings of the 33rd International Conference on Very large databases

  20. Berrani SA, Amsaleg L, Gros P (2003) Robust content-based image searches for copyright protection. In: Proceedings of the 1st ACM international workshop on Multimedia Databases

  21. Yang Y, Nie F, Xu D, Luo J, Zhuang Y, Pan Y (2012) A multimedia retrieval framework based on semi-supervised ranking and relevance feedback. IEEE Trans Pattern Anal Mach Intell 34:723–742

    Article  Google Scholar 

  22. Yang Y, Zhuang YT, Wu F, Pan YH (2008) Harmonizing hierarchical manifolds for multimedia document semantics understanding and cross-media retrieval. IEEE Trans Multimedia 10:437–446

    Article  Google Scholar 

  23. Song J, Yang Y, Huang Z, Shen HT, Hong R (2011) Multiple feature hashing for real-time large scale near-duplicate video retrieval. In: Proceedings of the 19th ACM International Conference on Multimedia

  24. Li P, Wang M, Cheng J, Xu C (2013) Spectral hashing with semantically consistent graph for image indexing. IEEE Trans Multimedia 15:141–152

    Article  Google Scholar 

  25. Kulis B, Grauman K (2009) Kernelized locality-sensitive hashing for scalable image search. In: Proceedings of the IEEE International Conference on Computer Vision

  26. Wang J, Kumar S, Chang S F (2010) Semi-supervised hashing for scalable image retrieval. In: Proceedings of the IEEE Computer Conference on Computer Vision and Pattern Recognition

  27. Liu W, Wang J, Ji R, Jiang Y, Chang SF (2012) Supervised Hashing with Kernel. In: Proceedings of the IEEE Computer Conference on Computer Vision and Pattern Recognition

  28. Gong Y, Lazebnik S (2011) Iterative Quantization: A Procrustean Approach to Learning Binary Codes. In: Proceedings of the IEEE Computer Conference on Computer Vision and Pattern Recognition

  29. Norouzi ME, Fleet DJ (2011) Minimal loss hashing for compact binary codes. Int Conf Mach Learn 2011:353–360

    Google Scholar 

  30. He K, Wen F, Sun J (2013) K-means Hashing: an Affinity-Preserving Quantization Method for Learning Binary Compact Codes. In: Proceedings of the IEEE Computer Conference on Computer Vision and Pattern Recognition

  31. Hawkins DM, Basak SC, Mills D (2003) Assessing Model Fit by Cross-Validation. J Chem Inf Comput Sci 43:579–586

    Article  Google Scholar 

  32. Peronnin et al (2012) Towards good practice in large-scale learning for image classification. IEEE Comput Vis Pattern Recognit:3482–3489

  33. Lin L, Wu T, Porway J, Xu Z (2009) A Stochastic Graph Grammar for Compositional Object Representation and Recognition. Pattern Recog 42(7):1297–1307

    Article  MATH  Google Scholar 

  34. Lai H, Pan Y et al (2013) Sparse Learning-to-Rank via an Efficient Primal-Dual Algorithm. IEEE Trans Comput (TC) 62(6):1221–1233

    Article  MathSciNet  Google Scholar 

  35. Lin L, Liu X, Zhu S-C (2010) Layered Graph Matching with Composite Cluster Sampling. IEEE Trans Pattern Anal Mach Intell (TPAMI) 32(8):1426–1442

    Article  Google Scholar 

  36. Lin L, Liu X, Zhu S-C (2010) Layered Graph Matching with Composite Cluster Sampling. IEEE Trans Pattern Anal Mach Intell (TPAMI) 32(8):1426–1442

    Article  Google Scholar 

Download references

Acknowledgment

This work is supported by the NSF of China under Grant No. 61272409, the Fundamental Research Funds for the Central Universities and Wuhan Youth Science and Technology Chenguang Program. The authors appreciate the valuable suggestions from the anonymous reviewers and the Editors.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Lingyu Yan or Hefei Ling.

Appendix

Appendix

Using the obtained results of (5) and (7), we get

$$\begin{array}{@{}rcl@{}} && {X^{T}}W+ \bold 1 b-H\\ && ={X^{T}}W+ \bold 1 {{\frac{1}{n}}({\bold 1^{T}}H-{\bold 1^{T}}{X^{T}}W)}-H\\ && =A{X^{T}}W-AH\\ && =A{X^{T}}({XA{X^{T}}+\gamma I}^{-1})XAH-AH\\ && =(A{X^{T}}({XA{X^{T}}+\gamma I}^{-1})XA-A)H \end{array} $$
(13)

Let B = (X A X T + γ I)−1, it is obvious that B = B T, so W = B X A H and X T W + 1 bH = (A X T B X AA)H,then we transform the last part of the objective function as follows by applying the theory of trace optimization [10]:

$$\begin{array}{@{}rcl@{}} &&{\left\| {X^{T}}W + {\bold 1}b-H \right\|_{F}^{2}}+\gamma \left\| W \right\|_{F}^{2}\\ && = tr{H^{T}}{(A{X^{T}}BXA-A)^{T}}(A{X^{T}}BXA-A)H+\\ && \quad \gamma tr({W^{T}}W)\\ && = tr{H^{T}}(A{X^{T}}BXAA{X^{T}}BXA-2A{X^{T}}BXA+A)H+\\ && \quad \gamma tr({H^{T}}A{X^{T}}BBXAH)\\ && = tr{H^{T}}(\gamma A{X^{T}}BBXA+A{X^{T}}BXA{X^{T}}BXA\\ && \quad \quad\quad\quad-2A{X^{T}}BXA+A)H\\ && = tr{H^{T}}(A{X^{T}}B(\gamma I+ XA{X^{T}})BXA\\ && \quad \quad\quad\quad-2A{X^{T}}BXA+A)H\\ && = tr{H^{T}}(A{X^{T}}B{B^{-1}}BXA-2A{X^{T}}BXA+A)H\\ && = tr{H^{T}}(A{X^{T}}BXA-2A{X^{T}}BXA+A)H\\ && = tr{H^{T}}(A-A{X^{T}}BXA)H\\ && = tr{H^{T}}CH \end{array} $$
(14)

Where C = AA X T B X A.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yan, L., Ling, H., Zou, F. et al. Iterated local search optimized hashing for image copy detection. Multimed Tools Appl 74, 9729–9746 (2015). https://doi.org/10.1007/s11042-014-2148-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-014-2148-2

Keywords

Navigation