SlideShare ist ein Scribd-Unternehmen logo
1 von 9
OUR OFFICES @CHENNAI/ TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE / BANGALORE / HYDRABAD
CELL: +91 9894917187 | 875487 1111 / 2111 / 3111 / 4111 / 5111 / 6111
ECWAY TECHNOLOGIES
IEEE SOFTWARE | EMBEDDED | MECHANICAL | ROBOTICS PROJECTS DEVELOPMENT
Visit: www.ecwaytechnologies.com | www.ecwayprojects.com Mail to: ecwaytechnologies@gmail.com
ASYMMETRIC CYCLICAL HASHING FOR LARGE SCALE IMAGE RETRIEVAL
By
A
PROJECT REPORT
Submitted to the Department of electronics &communication Engineering in the
FACULTY OF ENGINEERING & TECHNOLOGY
In partial fulfillment of the requirements for the award of the degree
Of
MASTER OF TECHNOLOGY
IN
ELECTRONICS &COMMUNICATION ENGINEERING
APRIL 2016
OUR OFFICES @CHENNAI/ TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE / BANGALORE / HYDRABAD
CELL: +91 9894917187 | 875487 1111 / 2111 / 3111 / 4111 / 5111 / 6111
ECWAY TECHNOLOGIES
IEEE SOFTWARE | EMBEDDED | MECHANICAL | ROBOTICS PROJECTS DEVELOPMENT
Visit: www.ecwaytechnologies.com | www.ecwayprojects.com Mail to: ecwaytechnologies@gmail.com
CERTIFICATE
Certified that this project report titled “Asymmetric Cyclical Hashing for Large Scale Image
Retrieval” is the bonafide work of Mr. _____________Who carried out the research under my
supervision Certified further, that to the best of my knowledge the work reported herein does not
form part of any other project report or dissertation on the basis of which a degree or award was
conferred on an earlier occasion on this or any other candidate.
Signature of the Guide Signature of the H.O.D
Name Name
OUR OFFICES @CHENNAI/ TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE / BANGALORE / HYDRABAD
CELL: +91 9894917187 | 875487 1111 / 2111 / 3111 / 4111 / 5111 / 6111
ECWAY TECHNOLOGIES
IEEE SOFTWARE | EMBEDDED | MECHANICAL | ROBOTICS PROJECTS DEVELOPMENT
Visit: www.ecwaytechnologies.com | www.ecwayprojects.com Mail to: ecwaytechnologies@gmail.com
DECLARATION
I hereby declare that the project work entitled “Asymmetric Cyclical Hashing for Large Scale
Image Retrieval” Submitted to BHARATHIDASAN UNIVERSITY in partial fulfillment of the
requirement for the award of the Degree of MASTER OF APPLIED ELECTRONICS is a record
of original work done by me the guidance of Prof.A.Vinayagam M.Sc., M.Phil., M.E., to the
best of my knowledge, the work reported here is not a part of any other thesis or work on the basis
of which a degree or award was conferred on an earlier occasion to me or any other candidate.
(Student Name)
(Reg.No)
Place:
Date:
OUR OFFICES @CHENNAI/ TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE / BANGALORE / HYDRABAD
CELL: +91 9894917187 | 875487 1111 / 2111 / 3111 / 4111 / 5111 / 6111
ECWAY TECHNOLOGIES
IEEE SOFTWARE | EMBEDDED | MECHANICAL | ROBOTICS PROJECTS DEVELOPMENT
Visit: www.ecwaytechnologies.com | www.ecwayprojects.com Mail to: ecwaytechnologies@gmail.com
ACKNOWLEDGEMENT
I am extremely glad to present my project “Asymmetric Cyclical Hashing for Large Scale
Image Retrieval” which is a part of my curriculum of third semester Master of Science in
Computer science. I take this opportunity to express my sincere gratitude to those who helped me
in bringing out this project work.
I would like to express my Director,Dr. K. ANANDAN, M.A.(Eco.), M.Ed., M.Phil.,(Edn.),
PGDCA., CGT., M.A.(Psy.)of who had given me an opportunity to undertake this project.
I am highly indebted to Co-OrdinatorProf. Muniappan Department of Physics and thank from
my deep heart for her valuable comments I received through my project.
I wish to express my deep sense of gratitude to my guide
Prof. A.Vinayagam M.Sc., M.Phil., M.E., for her immense help and encouragement for
successful completion of this project.
I also express my sincere thanks to the all the staff members of Computer science for their kind
advice.
And last, but not the least, I express my deep gratitude to my parents and friends for their
encouragement and support throughout the project.
OUR OFFICES @CHENNAI/ TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE / BANGALORE / HYDRABAD
CELL: +91 9894917187 | 875487 1111 / 2111 / 3111 / 4111 / 5111 / 6111
ECWAY TECHNOLOGIES
IEEE SOFTWARE | EMBEDDED | MECHANICAL | ROBOTICS PROJECTS DEVELOPMENT
Visit: www.ecwaytechnologies.com | www.ecwayprojects.com Mail to: ecwaytechnologies@gmail.com
ABSTRACT:
This paper addresses a problem in the hashing technique for large scale image retrieval:
learn a compact hash code to reduce the storage cost with performance comparable to that of the
long hash code. A longer hash code yields a better precision rate of retrieved images. However it
also requires a larger storage, which limits the number of stored images. Current hashing methods
employ the same code length for both queries and stored images. We propose a new hashing
scheme using two hash codes with different lengths for queries and stored images, i.e., the
Asymmetric Cyclical Hashing. A compact hash code is used to reduce the storage requirement,
while a long hash code is used for the query image. The image retrieval is performed by computing
the Hamming distance of the long hash code of the query and the cyclically concatenated compact
hash code of the stored image to yield a high precision and recall rate. Experiments on
benchmarking databases consisting up to one million images show the effectiveness of the
proposed method.
OUR OFFICES @CHENNAI/ TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE / BANGALORE / HYDRABAD
CELL: +91 9894917187 | 875487 1111 / 2111 / 3111 / 4111 / 5111 / 6111
ECWAY TECHNOLOGIES
IEEE SOFTWARE | EMBEDDED | MECHANICAL | ROBOTICS PROJECTS DEVELOPMENT
Visit: www.ecwaytechnologies.com | www.ecwayprojects.com Mail to: ecwaytechnologies@gmail.com
INTRODUCTION:
With the explosive growth of both the number of images available on the Internet and the
dimensionality of image descriptors, two problems must be addressed: retrieval speed and storage
cost. On the issue of speed, hashing methods have a sublinear time complexity for solving large
scale content based image retrieval problems. The computation of Hamming distances between
hash codes of the query and the stored images is very fast and can be accomplished with a simple
data structure and efficient bit operations. Even the exhaustive computation of millions of
Hamming distances could take only a second using a single CPU.
Many hashing methods have been proposed in recent years for better retrieval performance.
They can be divided into two major categories: random projection based and data-dependent based
methods. The Locality Sensitive Hashing (LSH) is a very first and popular random projection
based hashing method with a strong theoretical foundation.The major drawback of the LSH and
its variants (e.g. the SKLSH) is the requirement of a long hash code to achieve a high precision for
the similarity estimation. It leads to a large storage cost and even slow hard disk access for large
scale databases. To deal with this problem, datadependent based methods are proposed to find
compact hash codes by finding the mapping from the high dimensional real-valued vectors
describing images to the low dimensional hash codes. These data-dependent methods achieve
satisfactory performances with short hash codes, but they fail to improve performances when the
number of bits increases as the LSH and its variants do. Recently, many sophisticated data-
dependent hashing methods , have shown better performances by using longer hash codes.
However, the storage cost of a long hash code for a large scale database is very large and
it limits the number of images being stored in memory. When the memory cannot accommodate
hash codes for all images, frequent access to hard disks or a distributed system will be needed
which is much slower than direct memory access . As a result, queries may collapse because of a
long response time which severely limits the application of hashing methods with long codes for
large scale databases. For an image retrieval system processing millions of query in a second on
the Internet, a slow access of image hash codes costs much more time in comparison to the fast
Hamming distance computation. To address this problem created by using the same code length
for both the query and stored images, we propose the Asymmetric Cyclical Hashing (ACH). The
major contribution of the ACH is to use a short hash code with k bits storage for each stored image
OUR OFFICES @CHENNAI/ TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE / BANGALORE / HYDRABAD
CELL: +91 9894917187 | 875487 1111 / 2111 / 3111 / 4111 / 5111 / 6111
ECWAY TECHNOLOGIES
IEEE SOFTWARE | EMBEDDED | MECHANICAL | ROBOTICS PROJECTS DEVELOPMENT
Visit: www.ecwaytechnologies.com | www.ecwayprojects.com Mail to: ecwaytechnologies@gmail.com
and mk bits for the query to provide a good retrieval performance by using a long hash code for
the similarity computation, where k and m are non-negative integers. In contrast, the asymmetric
hashing presented in , uses two different hash codes with the same length and thus still suffers
from the aforementioned limitation. We select mk bits for the query for ease of Hamming distance
computation. In other words, the ACH computes the Hamming distances between the mk-bit hash
code of the query and the m-times repetitive concatenation of the k-bit hash code of the stored
images.
Let x be the descriptor vector of an image and n = mk. Figure 1 provides a visual illustration of
the ACH. The ACH uses F (x) = [f1 (x), f2 (x), · · · , fn (x)]T : Rd → {−1, +1} n to generate the
n-bit hash codes for the query image as all hashing methods do. In contrast, for each image in the
database, the ACH uses G (x) = [g1 (x), g2 (x), · · · , gk (x)]T : Rd → {−1, +1} k to generate a k-
bit hash code B. During the query execution, B is repeated m times and the resulting mkbit codes
are concatenated to form an n-bit hash code for computing the Hamming distances between the
query and the stored images. Therefore, the storage requirement for each image is the short k-bit
code, while long mk-bit codes are used for the similarity computation during the query execution.
This paper is organized as follows. Section 2 briefly introduces related works while the ACH is
proposed in Section 3. Experimental results are presented and discussed in Section 4. Section 5
concludes this work.
OUR OFFICES @CHENNAI/ TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE / BANGALORE / HYDRABAD
CELL: +91 9894917187 | 875487 1111 / 2111 / 3111 / 4111 / 5111 / 6111
ECWAY TECHNOLOGIES
IEEE SOFTWARE | EMBEDDED | MECHANICAL | ROBOTICS PROJECTS DEVELOPMENT
Visit: www.ecwaytechnologies.com | www.ecwayprojects.com Mail to: ecwaytechnologies@gmail.com
CONCLUSION:
In this work, the Asymmetric Cyclical Hashing (ACH) is proposed to yield both high
similarity preservation among images and better storage efficiency. The ACH stores only k-bit
hash codes for the stored images, while it uses mk-bit hash codes to compute the similarity between
the stored images and the query. Experimental results show that the ACH yields higher precision
and recall rates in comparison to current hashing methods using the same storage cost. The ACH
is an unsupervised hashing method. Although it yields a certain degree of semantic preserving
capability as shown in our experiments, it heavily depends on the semantic similarity preservation
of the features being used.
A semi-supervised ACH is expected to yield a better retrieval results for semantic image
retrieval problems. On the other hand, the weighted Hamming distance has been shown to yield a
better precision in comparison to the traditional binary Hamming distance at the cost of more
computation. One of our future works is to extend the ACH to a real-valued weighted Hamming
distance based asymmetric hashing scheme to provide a higher similarity precision. One may
consider reducing both the storage and the computational costs of the real-valued weighed
Hamming distance based hashing. Another improvement of the ACH is to relax the restriction on
the multiple relationships between lengths of the short (k) and the long (mk) hash codes. However,
this also requires a more complicated optimization to find the long code based on the short code.
Bit selection and weighting may be required in the optimization
OUR OFFICES @CHENNAI/ TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE / BANGALORE / HYDRABAD
CELL: +91 9894917187 | 875487 1111 / 2111 / 3111 / 4111 / 5111 / 6111
ECWAY TECHNOLOGIES
IEEE SOFTWARE | EMBEDDED | MECHANICAL | ROBOTICS PROJECTS DEVELOPMENT
Visit: www.ecwaytechnologies.com | www.ecwayprojects.com Mail to: ecwaytechnologies@gmail.com
REFERENCES:
[1] A. Gordo, F. Perronnin, Y. Gong, and S. Lazebnik, “Asymmetric distances for binary
embeddings,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 36, no. 1, pp.
33–47, 2014.
[2] J. Wang, S. Kumar, and S.-F. Chang, “Semi-supervised hashing for large-scale search,” IEEE
Transactions on Pattern Analysis and Machine Intelligence, vol. 34, no. 12, pp. 2393–2406, 2012.
[3] B. Neyshabur, N. Srebro, R. Salakhutdinov, Y. Makarychev, and P. Yadollahpour, “The power
of asymmetry in binary hashing,” in NIPS, 2013, pp. 2823–2831.
[4] Y. Gong, S. Lazebnik, A. Gordo, and F. Perronnin, “Iterative quantization: A procrustean
approach to learning binary codes for large-scale image retrieval,” IEEE Transactions on Pattern
Analysis and Machine Intelligence, vol. 35, no. 12, pp. 2916–2929, 2013.
[5] M. Norouzi, A. Punjani, and D. J. Fleet, “Fast search in hamming space with multi-index
hashing,” in IEEE Conference on Computer Vision and Pattern Recognition. IEEE, 2012, pp.
3108–3115.
[6] M. Raginsky and S. Lazebnik, “Locality-sensitive binary codes from shift-invariant kernels.”
in NIPS, vol. 22, 2009, pp. 1509–1517.
[7] B. Kulis and K. Grauman, “Kernelized locality-sensitive hashing for scalable image search,”
in IEEE Conference on Computer Vision and Pattern Recognition. IEEE, 2009, pp. 2130–2137.

Weitere ähnliche Inhalte

Kürzlich hochgeladen

Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoordharasingh5698
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 

Kürzlich hochgeladen (20)

Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 

Empfohlen

How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...DevGAMM Conference
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationErica Santiago
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellSaba Software
 
Introduction to C Programming Language
Introduction to C Programming LanguageIntroduction to C Programming Language
Introduction to C Programming LanguageSimplilearn
 

Empfohlen (20)

How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
 
Introduction to C Programming Language
Introduction to C Programming LanguageIntroduction to C Programming Language
Introduction to C Programming Language
 

Asymmetric cyclical hashing for large scale image retrieval

  • 1. OUR OFFICES @CHENNAI/ TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE / BANGALORE / HYDRABAD CELL: +91 9894917187 | 875487 1111 / 2111 / 3111 / 4111 / 5111 / 6111 ECWAY TECHNOLOGIES IEEE SOFTWARE | EMBEDDED | MECHANICAL | ROBOTICS PROJECTS DEVELOPMENT Visit: www.ecwaytechnologies.com | www.ecwayprojects.com Mail to: ecwaytechnologies@gmail.com ASYMMETRIC CYCLICAL HASHING FOR LARGE SCALE IMAGE RETRIEVAL By A PROJECT REPORT Submitted to the Department of electronics &communication Engineering in the FACULTY OF ENGINEERING & TECHNOLOGY In partial fulfillment of the requirements for the award of the degree Of MASTER OF TECHNOLOGY IN ELECTRONICS &COMMUNICATION ENGINEERING APRIL 2016
  • 2. OUR OFFICES @CHENNAI/ TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE / BANGALORE / HYDRABAD CELL: +91 9894917187 | 875487 1111 / 2111 / 3111 / 4111 / 5111 / 6111 ECWAY TECHNOLOGIES IEEE SOFTWARE | EMBEDDED | MECHANICAL | ROBOTICS PROJECTS DEVELOPMENT Visit: www.ecwaytechnologies.com | www.ecwayprojects.com Mail to: ecwaytechnologies@gmail.com CERTIFICATE Certified that this project report titled “Asymmetric Cyclical Hashing for Large Scale Image Retrieval” is the bonafide work of Mr. _____________Who carried out the research under my supervision Certified further, that to the best of my knowledge the work reported herein does not form part of any other project report or dissertation on the basis of which a degree or award was conferred on an earlier occasion on this or any other candidate. Signature of the Guide Signature of the H.O.D Name Name
  • 3. OUR OFFICES @CHENNAI/ TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE / BANGALORE / HYDRABAD CELL: +91 9894917187 | 875487 1111 / 2111 / 3111 / 4111 / 5111 / 6111 ECWAY TECHNOLOGIES IEEE SOFTWARE | EMBEDDED | MECHANICAL | ROBOTICS PROJECTS DEVELOPMENT Visit: www.ecwaytechnologies.com | www.ecwayprojects.com Mail to: ecwaytechnologies@gmail.com DECLARATION I hereby declare that the project work entitled “Asymmetric Cyclical Hashing for Large Scale Image Retrieval” Submitted to BHARATHIDASAN UNIVERSITY in partial fulfillment of the requirement for the award of the Degree of MASTER OF APPLIED ELECTRONICS is a record of original work done by me the guidance of Prof.A.Vinayagam M.Sc., M.Phil., M.E., to the best of my knowledge, the work reported here is not a part of any other thesis or work on the basis of which a degree or award was conferred on an earlier occasion to me or any other candidate. (Student Name) (Reg.No) Place: Date:
  • 4. OUR OFFICES @CHENNAI/ TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE / BANGALORE / HYDRABAD CELL: +91 9894917187 | 875487 1111 / 2111 / 3111 / 4111 / 5111 / 6111 ECWAY TECHNOLOGIES IEEE SOFTWARE | EMBEDDED | MECHANICAL | ROBOTICS PROJECTS DEVELOPMENT Visit: www.ecwaytechnologies.com | www.ecwayprojects.com Mail to: ecwaytechnologies@gmail.com ACKNOWLEDGEMENT I am extremely glad to present my project “Asymmetric Cyclical Hashing for Large Scale Image Retrieval” which is a part of my curriculum of third semester Master of Science in Computer science. I take this opportunity to express my sincere gratitude to those who helped me in bringing out this project work. I would like to express my Director,Dr. K. ANANDAN, M.A.(Eco.), M.Ed., M.Phil.,(Edn.), PGDCA., CGT., M.A.(Psy.)of who had given me an opportunity to undertake this project. I am highly indebted to Co-OrdinatorProf. Muniappan Department of Physics and thank from my deep heart for her valuable comments I received through my project. I wish to express my deep sense of gratitude to my guide Prof. A.Vinayagam M.Sc., M.Phil., M.E., for her immense help and encouragement for successful completion of this project. I also express my sincere thanks to the all the staff members of Computer science for their kind advice. And last, but not the least, I express my deep gratitude to my parents and friends for their encouragement and support throughout the project.
  • 5. OUR OFFICES @CHENNAI/ TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE / BANGALORE / HYDRABAD CELL: +91 9894917187 | 875487 1111 / 2111 / 3111 / 4111 / 5111 / 6111 ECWAY TECHNOLOGIES IEEE SOFTWARE | EMBEDDED | MECHANICAL | ROBOTICS PROJECTS DEVELOPMENT Visit: www.ecwaytechnologies.com | www.ecwayprojects.com Mail to: ecwaytechnologies@gmail.com ABSTRACT: This paper addresses a problem in the hashing technique for large scale image retrieval: learn a compact hash code to reduce the storage cost with performance comparable to that of the long hash code. A longer hash code yields a better precision rate of retrieved images. However it also requires a larger storage, which limits the number of stored images. Current hashing methods employ the same code length for both queries and stored images. We propose a new hashing scheme using two hash codes with different lengths for queries and stored images, i.e., the Asymmetric Cyclical Hashing. A compact hash code is used to reduce the storage requirement, while a long hash code is used for the query image. The image retrieval is performed by computing the Hamming distance of the long hash code of the query and the cyclically concatenated compact hash code of the stored image to yield a high precision and recall rate. Experiments on benchmarking databases consisting up to one million images show the effectiveness of the proposed method.
  • 6. OUR OFFICES @CHENNAI/ TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE / BANGALORE / HYDRABAD CELL: +91 9894917187 | 875487 1111 / 2111 / 3111 / 4111 / 5111 / 6111 ECWAY TECHNOLOGIES IEEE SOFTWARE | EMBEDDED | MECHANICAL | ROBOTICS PROJECTS DEVELOPMENT Visit: www.ecwaytechnologies.com | www.ecwayprojects.com Mail to: ecwaytechnologies@gmail.com INTRODUCTION: With the explosive growth of both the number of images available on the Internet and the dimensionality of image descriptors, two problems must be addressed: retrieval speed and storage cost. On the issue of speed, hashing methods have a sublinear time complexity for solving large scale content based image retrieval problems. The computation of Hamming distances between hash codes of the query and the stored images is very fast and can be accomplished with a simple data structure and efficient bit operations. Even the exhaustive computation of millions of Hamming distances could take only a second using a single CPU. Many hashing methods have been proposed in recent years for better retrieval performance. They can be divided into two major categories: random projection based and data-dependent based methods. The Locality Sensitive Hashing (LSH) is a very first and popular random projection based hashing method with a strong theoretical foundation.The major drawback of the LSH and its variants (e.g. the SKLSH) is the requirement of a long hash code to achieve a high precision for the similarity estimation. It leads to a large storage cost and even slow hard disk access for large scale databases. To deal with this problem, datadependent based methods are proposed to find compact hash codes by finding the mapping from the high dimensional real-valued vectors describing images to the low dimensional hash codes. These data-dependent methods achieve satisfactory performances with short hash codes, but they fail to improve performances when the number of bits increases as the LSH and its variants do. Recently, many sophisticated data- dependent hashing methods , have shown better performances by using longer hash codes. However, the storage cost of a long hash code for a large scale database is very large and it limits the number of images being stored in memory. When the memory cannot accommodate hash codes for all images, frequent access to hard disks or a distributed system will be needed which is much slower than direct memory access . As a result, queries may collapse because of a long response time which severely limits the application of hashing methods with long codes for large scale databases. For an image retrieval system processing millions of query in a second on the Internet, a slow access of image hash codes costs much more time in comparison to the fast Hamming distance computation. To address this problem created by using the same code length for both the query and stored images, we propose the Asymmetric Cyclical Hashing (ACH). The major contribution of the ACH is to use a short hash code with k bits storage for each stored image
  • 7. OUR OFFICES @CHENNAI/ TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE / BANGALORE / HYDRABAD CELL: +91 9894917187 | 875487 1111 / 2111 / 3111 / 4111 / 5111 / 6111 ECWAY TECHNOLOGIES IEEE SOFTWARE | EMBEDDED | MECHANICAL | ROBOTICS PROJECTS DEVELOPMENT Visit: www.ecwaytechnologies.com | www.ecwayprojects.com Mail to: ecwaytechnologies@gmail.com and mk bits for the query to provide a good retrieval performance by using a long hash code for the similarity computation, where k and m are non-negative integers. In contrast, the asymmetric hashing presented in , uses two different hash codes with the same length and thus still suffers from the aforementioned limitation. We select mk bits for the query for ease of Hamming distance computation. In other words, the ACH computes the Hamming distances between the mk-bit hash code of the query and the m-times repetitive concatenation of the k-bit hash code of the stored images. Let x be the descriptor vector of an image and n = mk. Figure 1 provides a visual illustration of the ACH. The ACH uses F (x) = [f1 (x), f2 (x), · · · , fn (x)]T : Rd → {−1, +1} n to generate the n-bit hash codes for the query image as all hashing methods do. In contrast, for each image in the database, the ACH uses G (x) = [g1 (x), g2 (x), · · · , gk (x)]T : Rd → {−1, +1} k to generate a k- bit hash code B. During the query execution, B is repeated m times and the resulting mkbit codes are concatenated to form an n-bit hash code for computing the Hamming distances between the query and the stored images. Therefore, the storage requirement for each image is the short k-bit code, while long mk-bit codes are used for the similarity computation during the query execution. This paper is organized as follows. Section 2 briefly introduces related works while the ACH is proposed in Section 3. Experimental results are presented and discussed in Section 4. Section 5 concludes this work.
  • 8. OUR OFFICES @CHENNAI/ TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE / BANGALORE / HYDRABAD CELL: +91 9894917187 | 875487 1111 / 2111 / 3111 / 4111 / 5111 / 6111 ECWAY TECHNOLOGIES IEEE SOFTWARE | EMBEDDED | MECHANICAL | ROBOTICS PROJECTS DEVELOPMENT Visit: www.ecwaytechnologies.com | www.ecwayprojects.com Mail to: ecwaytechnologies@gmail.com CONCLUSION: In this work, the Asymmetric Cyclical Hashing (ACH) is proposed to yield both high similarity preservation among images and better storage efficiency. The ACH stores only k-bit hash codes for the stored images, while it uses mk-bit hash codes to compute the similarity between the stored images and the query. Experimental results show that the ACH yields higher precision and recall rates in comparison to current hashing methods using the same storage cost. The ACH is an unsupervised hashing method. Although it yields a certain degree of semantic preserving capability as shown in our experiments, it heavily depends on the semantic similarity preservation of the features being used. A semi-supervised ACH is expected to yield a better retrieval results for semantic image retrieval problems. On the other hand, the weighted Hamming distance has been shown to yield a better precision in comparison to the traditional binary Hamming distance at the cost of more computation. One of our future works is to extend the ACH to a real-valued weighted Hamming distance based asymmetric hashing scheme to provide a higher similarity precision. One may consider reducing both the storage and the computational costs of the real-valued weighed Hamming distance based hashing. Another improvement of the ACH is to relax the restriction on the multiple relationships between lengths of the short (k) and the long (mk) hash codes. However, this also requires a more complicated optimization to find the long code based on the short code. Bit selection and weighting may be required in the optimization
  • 9. OUR OFFICES @CHENNAI/ TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE / BANGALORE / HYDRABAD CELL: +91 9894917187 | 875487 1111 / 2111 / 3111 / 4111 / 5111 / 6111 ECWAY TECHNOLOGIES IEEE SOFTWARE | EMBEDDED | MECHANICAL | ROBOTICS PROJECTS DEVELOPMENT Visit: www.ecwaytechnologies.com | www.ecwayprojects.com Mail to: ecwaytechnologies@gmail.com REFERENCES: [1] A. Gordo, F. Perronnin, Y. Gong, and S. Lazebnik, “Asymmetric distances for binary embeddings,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 36, no. 1, pp. 33–47, 2014. [2] J. Wang, S. Kumar, and S.-F. Chang, “Semi-supervised hashing for large-scale search,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 34, no. 12, pp. 2393–2406, 2012. [3] B. Neyshabur, N. Srebro, R. Salakhutdinov, Y. Makarychev, and P. Yadollahpour, “The power of asymmetry in binary hashing,” in NIPS, 2013, pp. 2823–2831. [4] Y. Gong, S. Lazebnik, A. Gordo, and F. Perronnin, “Iterative quantization: A procrustean approach to learning binary codes for large-scale image retrieval,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 35, no. 12, pp. 2916–2929, 2013. [5] M. Norouzi, A. Punjani, and D. J. Fleet, “Fast search in hamming space with multi-index hashing,” in IEEE Conference on Computer Vision and Pattern Recognition. IEEE, 2012, pp. 3108–3115. [6] M. Raginsky and S. Lazebnik, “Locality-sensitive binary codes from shift-invariant kernels.” in NIPS, vol. 22, 2009, pp. 1509–1517. [7] B. Kulis and K. Grauman, “Kernelized locality-sensitive hashing for scalable image search,” in IEEE Conference on Computer Vision and Pattern Recognition. IEEE, 2009, pp. 2130–2137.