skip to main content
10.1145/3269206.3271780acmconferencesArticle/Chapter ViewAbstractPublication PagescikmConference Proceedingsconference-collections
research-article

Parallel Hashing Using Representative Points in Hyperoctants

Published: 17 October 2018 Publication History

Abstract

The goal of hashing is to learn a low-dimensional binary representation of high-dimensional information, leading to a tremendous reduction of computational cost. Previous studies usually achieved this goal by applying projection or quantization methods. However, the projection method fails to capture the intrinsic data structures, and the quantization method cannot make full use of complete information by its strategy of partitioning original space. To combine their advantages and avoid their drawbacks, we propose a novel algorithm, termed as representative points quantization (RPQ), by using the representative points defined as the barycenters of points in the hyperoctants. To settle the problem of exponential time complexity with the growth of the coding length, for long hashing codes, we further propose a parallel RPQ (PRPQ) algorithm, by separating a long code into several short codes, re-coding the short codes in different low dimensional subspaces, and then concatenating them to a long code. Experiments on image retrieval tasks demonstrate that RPQ and PRPQ can well capture the main topology structure of data, showing that our algorithm achieves better performance than state-of-the-art methods.

References

[1]
L. V. Ahn, R. Liu, and M. Blum. 2006. Peekaboom: A game for locating objects in images. In Sigchi Conference on Human Factors in Computing Systems. 55--64.
[2]
A. P. Dempster, N. M. Laird, and D. B. Rubin. 1977. Maximum likelihood from incomplete data via the EM algorithm. Journal of the Royal Statistical Society, Vol. 39, 1 (1977), 1--38.
[3]
R. Deriche and G. Giraudon. 1993. A Computational approach for corner and vertex detection. International Journal of Computer Vision, Vol. 10, 2 (1993), 101--124.
[4]
T. Ge, K. He, Q. Ke, and J. Sun. 2013. Optimized product quantization for approximate nearest neighbor search. In IEEE Conference on Computer Vision and Pattern Recognition. 2946--2953.
[5]
Allen Gersho and Robert M. Gray. 1991. Vector Quantization and Signal Compression .Kluwer Academic Publishers, Norwell, MA, USA.
[6]
K. He, F. Wen, and J. Sun. 2013. K-Means hashing: An affinity-preserving quantization method for learning binary compact codes. In Computer Vision and Pattern Recognition . 2938--2945.
[7]
J. Herve, D. Matthijs, and S. Cordelia. 2010. Product quantization for nearest neighbor search. IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 33, 1 (2010), 117--128.
[8]
Z. Jin, Y. Lin C. Li, and D. Cai. 2014. Density sensitive hashing. IEEE Transactions on Cybernetics, Vol. 44, 8 (2014), 1362--1371.
[9]
B. Kulis and K. Grauman. 2009. Kernelized locality-sensitive hashing for scalable image search. In IEEE International Conference on Computer Vision. 2130--2137.
[10]
S. Lazebnik. 2011. Iterative quantization: A procrustean approach to learning binary codes. In Conference on Computer Vision and Pattern Recognition. 817--824.
[11]
D. T. Lee and C. K. Wong. 1977. Worst-case analysis for region and partial region searches in multidimensional binary search trees and balanced quad trees. Acta Informatica, Vol. 9, 1 (1977), 23--29.
[12]
W. Liu, J. Wang, S. Kumar, and S. Chang. 2011. Hashing with graphs. In Proc. International Conference on Machine Learning. 1--8.
[13]
X. Liu, Z. Li, C. Deng, and D. Tao. 2017. Distributed adaptive binary quantization for fast nearest neighbor search. IEEE Transactions on Image Processing, Vol. 26, 11 (2017), 5324--5336.
[14]
D. G. Lowe. 2004. Distinctive image features from scale-invariant keypoints. International Journal of Computer Vision, Vol. 60, 2 (2004), 91--110.
[15]
R. Motwani, A. Naor, and R. Panigrahi. 2006. Lower bounds on locality sensitive hashing. In Proceedings of the Twenty-Second Annual Symposium on Computational Geometry. 154--157.
[16]
A. Oliva and A. Torralba. 2001. Modeling the shape of the scene: A holistic representation of the spatial envelope. International Journal of Computer Vision, Vol. 42, 3 (2001), 145--175.
[17]
M. Raginsky. 2009. Locality-sensitive binary codes from shift-invariant kernels. In Advances in Neural Information Processing Systems. 1509--1517.
[18]
R. Rugina and M. C. Rinard. 2000. Recursion unrolling for divide and conquer programs. In Proceedings of Languages and Compilers for Parallel Computing. 34--48.
[19]
G. Shakhnarovich, P. Viola, and T. Darrel. 2003. Fast pose estimation with parameter-sensitive hashing. In IEEE International Conference on Computer Vision. 750--759.
[20]
A. Shrivastava and P. Li. 2014. Densifying one permutation hashing via rotation for fast near neighbor search. In International Conference on Machine Learning. 557--565.
[21]
A. Torralba, B. C. Russell, and J. Yuen. 2010. LabelMe: Online image annotation and applications. Proc. IEEE, Vol. 98, 8 (2010), 1467--1484.
[22]
J. Wang, T. Zhang, J. Song, N. Sebe, and H. Shen. 2018. A Survey on learning to hash. IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 40, 4 (2018), 769--790.
[23]
Y. Weiss, A. Torralba, and R. Fergus. 2008. Spectral hashing. In Advances in Neural Information Processing Systems. 1753--1760.
[24]
N. Zhang, K. L. Man, T. Yu, and C. Lei. 2011. Text and content based image retrieval via locality sensitive hashing. Engineering Letters, Vol. 19, 3 (2011), 228--234.
[25]
H. Zhao, Z. Wang, and P. Liu. 2015. The ordinal relation preserving binary codes. Pattern Recognition, Vol. 48, 10 (2015), 3169--3179.

Index Terms

  1. Parallel Hashing Using Representative Points in Hyperoctants

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CIKM '18: Proceedings of the 27th ACM International Conference on Information and Knowledge Management
    October 2018
    2362 pages
    ISBN:9781450360142
    DOI:10.1145/3269206
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 17 October 2018

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. approximate nearest neighbor search
    2. binary code
    3. dimensionality reduction
    4. hashing
    5. information retrieval

    Qualifiers

    • Research-article

    Funding Sources

    • NSFC

    Conference

    CIKM '18
    Sponsor:

    Acceptance Rates

    CIKM '18 Paper Acceptance Rate 147 of 826 submissions, 18%;
    Overall Acceptance Rate 1,861 of 8,427 submissions, 22%

    Upcoming Conference

    CIKM '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 128
      Total Downloads
    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 01 Mar 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media