We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 101-120 of 10,000 results
  1. A Central Similarity Hashing Method via Weighted Partial-Softmax Loss

    Image hashing techniques that map images into a set of hash codes are widely used in many image-related tasks. A recent trend is the deep supervised...
    Mengling Li, Yunpeng Fu, ... Zhaolin Wan in Algorithms and Architectures for Parallel Processing
    Conference paper 2024
  2. A novel deep translated attention hashing for cross-modal retrieval

    In recent years, driven by the increasing number of cross-modal data such as images and texts, cross-modal retrieval has received intensive...

    Haibo Yu, Ran Ma, ... Kai Li in Multimedia Tools and Applications
    Article 28 March 2022
  3. Context-Aware Hashing

    With the development of social media and mobile computing technology, the past decade has witnessed tremendous growth in social images. Consequently,...
    Lei Zhu, **g**g Li, Weili Guan in Multi-modal Hash Learning
    Chapter 2024
  4. A triple fusion model for cross-modal deep hashing retrieval

    In the field of resource retrieval, deep cross-modal retrieval is attracting increasing attention. It has a lower storage capacity and faster...

    Hufei Wang, Kaiqiang Zhao, Dexin Zhao in Multimedia Systems
    Article 23 September 2022
  5. An Image Perceptual Hashing Algorithm Based on Convolutional Neural Networks

    The conventional perceptual hashing algorithms are constrained to a singular global feature extraction algorithm and lack efficient scalability...
    Meihong Yang, Baolin Qi, ... Jian Li in Digital Forensics and Watermarking
    Conference paper 2024
  6. Bit-wise attention deep complementary supervised hashing for image retrieval

    Deep hashing is effective and efficient for large-scale image retrieval. Most of existing deep hashing methods train a single hash table by utilizing...

    Wing W. Y. Ng, Jiayong Li, ... Hui Wang in Multimedia Tools and Applications
    Article 18 September 2021
  7. Locality Sensitive Hashing

    In the preceding chapter, we delved into algorithms that inferred the geometrical shape of a collection of vectors and condensed it into a navigable...
    Sebastian Bruch in Foundations of Vector Retrieval
    Chapter 2024
  8. FuSIW: fusion-based secure RGB image watermarking using hashing

    With the proliferation of the use of the Internet and social media, the digital media industry has grown enormously in recent years. However, this...

    Dhiran Kumar Mahto, Om Prakash Singh, Amit Kumar Singh in Multimedia Tools and Applications
    Article 22 July 2022
  9. A cover selection-based reversible data hiding method by learning cross-modal hashing

    With the rapid development of the Internet, various ways of transmitting data have emerged, such as cloud and social applications. However, these...

    Liming Zou, Jiande Sun, ... Q. M. Jonathan Wu in Multimedia Tools and Applications
    Article 21 April 2022
  10. LWT-DCT based image hashing for image authentication via blind geometric correction

    Image authentication based on robust image hashing has been paid large attention by researchers. However, most of the existing methods are unable to...

    Article 13 June 2022
  11. Supervised Discriminative Discrete Hashing for Cross-Modal Retrieval

    With the growing interest in cross-modal retrieval technology, cross-modal hashing has become a mainstream trend for comparing and searching between...
    **ngyu Lu, Chi-Man Pun in Advanced Data Mining and Applications
    Conference paper 2023
  12. Rate-1 Fully Local Somewhere Extractable Hashing from DDH

    Somewhere statistically binding (SSB) hashing allows us to sample a special hashing key such that the digest statistically binds the input at m...
    Pedro Branco, Nico Döttling, ... Riccardo Zanotto in Public-Key Cryptography – PKC 2024
    Conference paper 2024
  13. Hashing-based semantic relevance attributed knowledge graph embedding enhancement for deep probabilistic recommendation

    Knowledge graph embedding (KGE) is effectively exploited in providing precise and accurate recommendations from many perspectives in different...

    Nasrullah Khan, Zongmin Ma, ... Aman Ullah in Applied Intelligence
    Article 06 May 2022
  14. Cuckoo Hashing in Cryptography: Optimal Parameters, Robustness and Applications

    Cuckoo hashing is a powerful primitive that enables storing items using small space with efficient querying. At a high level, cuckoo hashing maps n...
    Conference paper 2023
  15. Unified Energy-Based Generative Network for Supervised Image Hashing

    Hashing methods often face critical efficiency challenges, such as generalization with limited labeled data, and robustness issues (such as changes...
    Khoa D. Doan, Sarkhan Badirli, Chandan K. Reddy in Computer Vision – ACCV 2022
    Conference paper 2023
  16. Generative Adversarial Network Based Asymmetric Deep Cross-Modal Unsupervised Hashing

    With the explosive growth of internet information, cross-modal retrieval has become an important and valuable frontier hotspot. Due to its low...
    Yuan Cao, Yaru Gao, ... Sheng Chen in Algorithms and Architectures for Parallel Processing
    Conference paper 2024
  17. Diving Deep into the Preimage Security of AES-Like Hashing

    Since the seminal works by Sasaki and Aoki, Meet-in-the-Middle (MITM) attacks are recognized as an effective technique for preimage and collision...
    Shiyao Chen, Jian Guo, ... Tianyu Zhang in Advances in Cryptology – EUROCRYPT 2024
    Conference paper 2024
  18. Graph Attention Hashing via Contrastive Learning for Unsupervised Cross-Modal Retrieval

    Hashing-based cross-modal retrieval maps multi-modal features into binary codes into a common Hamming space. Due to its small storage consumption and...
    Chen Yang, Shuyan Ding, ... Jianhui Guo in Neural Information Processing
    Conference paper 2024
  19. Adaptive Graph Attention Hashing for Unsupervised Cross-Modal Retrieval via Multimodal Transformers

    Unsupervised cross-modal hashing retrieval has been extensively studied due to its advantages in storage, retrieval efficiency, and label...
    Yewen Li, Mingyuan Ge, ... Mingyong Li in Web and Big Data
    Conference paper 2024
Did you find what you were looking for? Share feedback.