Asymmetric Deep Supervised Hashing

07/26/2017
by   Qing-Yuan Jiang, et al.
0

Hashing has been widely used for large-scale approximate nearest neighbor search because of its storage and search efficiency. Recent work has found that deep supervised hashing can significantly outperform non-deep supervised hashing in many applications. However, most existing deep supervised hashing methods adopt a symmetric strategy to learn one deep hash function for both query points and database (retrieval) points. The training of these symmetric deep supervised hashing methods is typically time-consuming, which makes them hard to effectively utilize the supervised information for cases with large-scale database. In this paper, we propose a novel deep supervised hashing method, called asymmetric deep supervised hashing (ADSH), for large-scale nearest neighbor search. ADSH treats the query points and database points in an asymmetric way. More specifically, ADSH learns a deep hash function only for query points, while the hash codes for database points are directly learned. The training of ADSH is much more efficient than that of traditional symmetric deep supervised hashing methods. Experiments show that ADSH can achieve state-of-the-art performance in real applications.

READ FULL TEXT
research
01/15/2022

Asymmetric Hash Code Learning for Remote Sensing Image Retrieval

Remote sensing image retrieval (RSIR), aiming at searching for a set of ...
research
04/18/2019

Query-Adaptive Hash Code Ranking for Large-Scale Multi-View Visual Search

Hash based nearest neighbor search has become attractive in many applica...
research
12/03/2022

Fast Online Hashing with Multi-Label Projection

Hashing has been widely researched to solve the large-scale approximate ...
research
11/10/2015

Online Supervised Hashing for Ever-Growing Datasets

Supervised hashing methods are widely-used for nearest neighbor search i...
research
09/11/2016

Sharing Hash Codes for Multiple Purposes

Locality sensitive hashing (LSH) is a powerful tool for sublinear-time a...
research
05/27/2019

Deep Multi-Index Hashing for Person Re-Identification

Traditional person re-identification (ReID) methods typically represent ...
research
07/10/2019

Polytopes, lattices, and spherical codes for the nearest neighbor problem

We study locality-sensitive hash methods for the nearest neighbor proble...

Please sign up or login with your details

Forgot password? Click here to reset