期刊文献+
共找到9篇文章
< 1 >
每页显示 20 50 100
Secure Medical Image Retrieval Based on Multi-Attention Mechanism and Triplet Deep Hashing
1
作者 Shaozheng Zhang Qiuyu Zhang +1 位作者 Jiahui Tang Ruihua Xu 《Computers, Materials & Continua》 2025年第2期2137-2158,共22页
Medical institutions frequently utilize cloud servers for storing digital medical imaging data, aiming to lower both storage expenses and computational expenses. Nevertheless, the reliability of cloud servers as third... Medical institutions frequently utilize cloud servers for storing digital medical imaging data, aiming to lower both storage expenses and computational expenses. Nevertheless, the reliability of cloud servers as third-party providers is not always guaranteed. To safeguard against the exposure and misuse of personal privacy information, and achieve secure and efficient retrieval, a secure medical image retrieval based on a multi-attention mechanism and triplet deep hashing is proposed in this paper (abbreviated as MATDH). Specifically, this method first utilizes the contrast-limited adaptive histogram equalization method applicable to color images to enhance chest X-ray images. Next, a designed multi-attention mechanism focuses on important local features during the feature extraction stage. Moreover, a triplet loss function is utilized to learn discriminative hash codes to construct a compact and efficient triplet deep hashing. Finally, upsampling is used to restore the original resolution of the images during retrieval, thereby enabling more accurate matching. To ensure the security of medical image data, a lightweight image encryption method based on frequency domain encryption is designed to encrypt the chest X-ray images. The findings of the experiment indicate that, in comparison to various advanced image retrieval techniques, the suggested approach improves the precision of feature extraction and retrieval using the COVIDx dataset. Additionally, it offers enhanced protection for the confidentiality of medical images stored in cloud settings and demonstrates strong practicality. 展开更多
关键词 Secure medical image retrieval multi-attention mechanism triplet deep hashing image enhancement lightweight image encryption
在线阅读 下载PDF
Secure Content Based Image Retrieval Scheme Based on Deep Hashing and Searchable Encryption
2
作者 Zhen Wang Qiu-yu Zhang +1 位作者 Ling-tao Meng Yi-lin Liu 《Computers, Materials & Continua》 SCIE EI 2023年第6期6161-6184,共24页
To solve the problem that the existing ciphertext domain image retrieval system is challenging to balance security,retrieval efficiency,and retrieval accuracy.This research suggests a searchable encryption and deep ha... To solve the problem that the existing ciphertext domain image retrieval system is challenging to balance security,retrieval efficiency,and retrieval accuracy.This research suggests a searchable encryption and deep hashing-based secure image retrieval technique that extracts more expressive image features and constructs a secure,searchable encryption scheme.First,a deep learning framework based on residual network and transfer learn-ing model is designed to extract more representative image deep features.Secondly,the central similarity is used to quantify and construct the deep hash sequence of features.The Paillier homomorphic encryption encrypts the deep hash sequence to build a high-security and low-complexity searchable index.Finally,according to the additive homomorphic property of Paillier homomorphic encryption,a similarity measurement method suitable for com-puting in the retrieval system’s security is ensured by the encrypted domain.The experimental results,which were obtained on Web Image Database from the National University of Singapore(NUS-WIDE),Microsoft Common Objects in Context(MS COCO),and ImageNet data sets,demonstrate the system’s robust security and precise retrieval,the proposed scheme can achieve efficient image retrieval without revealing user privacy.The retrieval accuracy is improved by at least 37%compared to traditional hashing schemes.At the same time,the retrieval time is saved by at least 9.7%compared to the latest deep hashing schemes. 展开更多
关键词 Content-based image retrieval deep supervised hashing central similarity quantification searchable encryption Paillier homomorphic encryption
在线阅读 下载PDF
Hierarchical deep hashing for image retrieval 被引量:3
3
作者 Ge SONG Xiaoyang TAN 《Frontiers of Computer Science》 SCIE EI CSCD 2017年第2期253-265,共13页
We present a new method to generate efficient multi-level hashing codes for image retrieval based on the deep siamese conv01utional neural network (DSCNN). Con- ventional deep hashing methods trade off the capabilit... We present a new method to generate efficient multi-level hashing codes for image retrieval based on the deep siamese conv01utional neural network (DSCNN). Con- ventional deep hashing methods trade off the capability of capturing highly complex and nonlinear semantic informa- tion of images against very compact hash codes, usually lead- ing to high retrieval efficiency but with deteriorated accuracy. We alleviate the restrictive compactness requirement of hash codes by extending them to a two-level hierarchical coding scheme, in which the first level aims to capture the high-level semantic information extracted by the deep network using a rich encoding strategy, while the subsequent level squeezes them to more global and compact codes. At running time, we adopt an attention-based mechanism to select some of its most essential bits specific to each query image for retrieval instead of using the full hash codes of the first level. The attention-based mechanism is based on the guides of hash codes generated by the second level, taking advantage of both local and global properties of deep features. Experimental re- suits on various popular datasets demonstrate the advantages of the proposed method compared to several state-of-the-art methods. 展开更多
关键词 image retrieval deep hashing hierarchical deep hashing
原文传递
Asymmetric Deep Hashing for Person Re-Identifications 被引量:2
4
作者 Yali Zhao Yali Li Shengjin Wang 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2022年第2期396-411,共16页
The person re-identification(re-ID)community has witnessed an explosion in the scale of data that it has to handle.On one hand,it is important for large-scale re-ID to provide constant or sublinear search time and dra... The person re-identification(re-ID)community has witnessed an explosion in the scale of data that it has to handle.On one hand,it is important for large-scale re-ID to provide constant or sublinear search time and dramatically reduce the storage cost for data points from the viewpoint of efficiency.On the other hand,the semantic affinity existing in the original space should be preserved because it greatly boosts the accuracy of re-ID.To this end,we use the deep hashing method,which utilizes the pairwise similarity and classification label to learn deep hash mapping functions,in order to provide discriminative representations.More importantly,considering the great advantage of asymmetric hashing over the existing symmetric one,we finally propose an asymmetric deep hashing(ADH)method for large-scale re-ID.Specifically,a two-stream asymmetric convolutional neural network is constructed to learn the similarity between image pairs.Another asymmetric pairwise loss is formulated to capture the similarity between the binary hashing codes and real-value representations derived from the deep hash mapping functions,so as to constrain the binary hash codes in the Hamming space to preserve the semantic structure existing in the original space.Then,the image labels are further explored to have a direct impact on the hash function learning through a classification loss.Furthermore,an efficient alternating algorithm is elaborately designed to jointly optimize the asymmetric deep hash functions and high-quality binary codes,by optimizing one parameter with the other parameters fixed.Experiments on the four benchmarks,i.e.,DukeMTMC-reID,Market-1501,Market-1501+500 k,and CUHK03 substantiate the competitive accuracy and superior efficiency of the proposed ADH over the compared state-of-the-art methods for large-scale re-ID. 展开更多
关键词 person re-identification deep hashing asymmetric hashing large-scale
原文传递
Cross-Modal Hashing Retrieval Based on Deep Residual Network
5
作者 Zhiyi Li Xiaomian Xu +1 位作者 Du Zhang Peng Zhang 《Computer Systems Science & Engineering》 SCIE EI 2021年第2期383-405,共23页
In the era of big data rich inWe Media,the single mode retrieval system has been unable to meet people’s demand for information retrieval.This paper proposes a new solution to the problem of feature extraction and un... In the era of big data rich inWe Media,the single mode retrieval system has been unable to meet people’s demand for information retrieval.This paper proposes a new solution to the problem of feature extraction and unified mapping of different modes:A Cross-Modal Hashing retrieval algorithm based on Deep Residual Network(CMHR-DRN).The model construction is divided into two stages:The first stage is the feature extraction of different modal data,including the use of Deep Residual Network(DRN)to extract the image features,using the method of combining TF-IDF with the full connection network to extract the text features,and the obtained image and text features used as the input of the second stage.In the second stage,the image and text features are mapped into Hash functions by supervised learning,and the image and text features are mapped to the common binary Hamming space.In the process of mapping,the distance measurement of the original distance measurement and the common feature space are kept unchanged as far as possible to improve the accuracy of Cross-Modal Retrieval.In training the model,adaptive moment estimation(Adam)is used to calculate the adaptive learning rate of each parameter,and the stochastic gradient descent(SGD)is calculated to obtain the minimum loss function.The whole training process is completed on Caffe deep learning framework.Experiments show that the proposed algorithm CMHR-DRN based on Deep Residual Network has better retrieval performance and stronger advantages than other Cross-Modal algorithms CMFH,CMDN and CMSSH. 展开更多
关键词 deep residual network cross-modal retrieval hashing cross-modal hashing retrieval based on deep residual network
在线阅读 下载PDF
Enhanced Disease Identification Model for Tea Plant Using Deep Learning 被引量:1
6
作者 Santhana Krishnan Jayapal Sivakumar Poruran 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期1261-1275,共15页
Tea plant cultivation plays a significant role in the Indian economy.The Tea board of India supports tea farmers to increase tea production by preventing various diseases in Tea Plant.Various climatic factors and othe... Tea plant cultivation plays a significant role in the Indian economy.The Tea board of India supports tea farmers to increase tea production by preventing various diseases in Tea Plant.Various climatic factors and other parameters cause these diseases.In this paper,the image retrieval model is developed to identify whether the given input tea leaf image has a disease or is healthy.Automation in image retrieval is a hot topic in the industry as it doesn’t require any form of metadata related to the images for storing or retrieval.Deep Hashing with Integrated Autoencoders is our proposed method for image retrieval in Tea Leaf images.It is an efficient andflexible way of retrieving Tea Leaf images.It has an integrated autoencoder which makes it better than the state-of-the-art methods giving better results for the MAP(mean average precision)scores,which is used as a parameter to judge the efficiency of the model.The autoencoders used with skip connections increase the weightage of the prominent features present in the previous tensor.This constitutes a hybrid model for hashing and retrieving images from a tea leaf data set.The proposed model will examine the input tea leaf image and identify the type of tea leaf disease.The relevant image will be retrieved based on the resulting type of disease.This model is only trained on scarce data as a real-life scenario,making it practical for many applications. 展开更多
关键词 Image retrieval autoencoders deep hashing plant disease tea leaf blister blight
在线阅读 下载PDF
An Efficient Encrypted Speech Retrieval Based on Unsupervised Hashing and B+ Tree Dynamic Index
7
作者 Qiu-yu Zhang Yu-gui Jia +1 位作者 Fang-Peng Li Le-Tian Fan 《Computers, Materials & Continua》 SCIE EI 2023年第7期107-128,共22页
Existing speech retrieval systems are frequently confronted with expanding volumes of speech data.The dynamic updating strategy applied to construct the index can timely process to add or remove unnecessary speech dat... Existing speech retrieval systems are frequently confronted with expanding volumes of speech data.The dynamic updating strategy applied to construct the index can timely process to add or remove unnecessary speech data to meet users’real-time retrieval requirements.This study proposes an efficient method for retrieving encryption speech,using unsupervised deep hashing and B+ tree dynamic index,which avoid privacy leak-age of speech data and enhance the accuracy and efficiency of retrieval.The cloud’s encryption speech library is constructed by using the multi-threaded Dijk-Gentry-Halevi-Vaikuntanathan(DGHV)Fully Homomorphic Encryption(FHE)technique,which encrypts the original speech.In addition,this research employs Residual Neural Network18-Gated Recurrent Unit(ResNet18-GRU),which is used to learn the compact binary hash codes,store binary hash codes in the designed B+tree index table,and create a mapping relation of one to one between the binary hash codes and the corresponding encrypted speech.External B+tree index technology is applied to achieve dynamic index updating of the B+tree index table,thereby satisfying users’needs for real-time retrieval.The experimental results on THCHS-30 and TIMIT showed that the retrieval accuracy of the proposed method is more than 95.84%compared to the existing unsupervised hashing methods.The retrieval efficiency is greatly improved.Compared to the method of using hash index tables,and the speech data’s security is effectively guaranteed. 展开更多
关键词 Encrypted speech retrieval unsupervised deep hashing learning to hash B+tree dynamic index DGHV fully homomorphic encryption
在线阅读 下载PDF
Central similarity consistency hashing for asymmetric image retrieval
8
作者 Zhaofeng Xuan Dayan Wu +3 位作者 Wanqian Zhang Qinghang Su Bo Li Weiping Wang 《Computational Visual Media》 SCIE EI CSCD 2024年第4期725-740,共16页
Asymmetric image retrieval methods have drawn much attention due to their effectiveness in resource-constrained scenarios.They try to learn two models in an asymmetric paradigm,i.e.,a small model for the query side an... Asymmetric image retrieval methods have drawn much attention due to their effectiveness in resource-constrained scenarios.They try to learn two models in an asymmetric paradigm,i.e.,a small model for the query side and a large model for the gallery.However,we empirically find that the mutual training scheme(learning with each other)will inevitably degrade the performance of the large gallery model,due to the negative effects exerted by the small query one.In this paper,we propose Central Similarity Consistency Hashing(CSCH),which simultaneously learns a small query model and a large gallery model in a mutually promoted manner,ensuring both high retrieval accuracy and efficiency on the query side.To achieve this,we first introduce heuristically generated hash centers as the common learning target for both two models.Instead of randomly assigning each hash center to its corresponding category,we introduce the Hungarian algorithm to optimally match each of them by aligning the Hamming similarity of hash centers to the semantic similarity of their classes.Furthermore,we introduce the instance-level consistency loss,which enables the explicit knowledge transfer from the gallery model to the query one,without the sacrifice of gallery performance.Guided by the unified learning of hash centers and the distilled knowledge from gallery model,the query model can be gradually aligned to the Hamming space of the gallery model in a decoupled manner.Extensive experiments demonstrate the superiority of our CSCH method compared with current state-of-the-art deep hashing methods.The open-source code is available at https://github.com/dubanx/CSCH. 展开更多
关键词 asymmetric image retrieval deep hashing Hungarian algorithm decoupled manner
原文传递
Supervised Deep Second-Order Covariance Hashing for Image Retrieval
9
作者 Qian Wang YueWu +3 位作者 Jianxin Zhang Hengbo Zhang Chao Che Lin Shan 《国际计算机前沿大会会议论文集》 2020年第1期476-487,共12页
Recently,deep hashing methods play a pivotal role in image retrieval tasks by combining advanced convolutional neural networks(CNNs)with efficient hashing.Meanwhile,second-order representations of deep convolutional a... Recently,deep hashing methods play a pivotal role in image retrieval tasks by combining advanced convolutional neural networks(CNNs)with efficient hashing.Meanwhile,second-order representations of deep convolutional activations have been established to effectively improve network performance in various computer vision applications.In this work,to obtain more compact hash codes,we propose a supervised deep second-order covariance hashing(SDSoCH)method by combining deep hashing with second-order statistic model.SDSoCH utilizes a powerful covariance pooling to model the second-order statistics of convolutional features,which is naturally integrated into the existing point-wise hashing network in an end-to-end manner.The embedded covariance pooling operation well captures the interaction of convolutional features and produces global feature representations with more discriminant capability,leading to the more informative hash codes.Extensive experiments conducted on two benchmarks demonstrate that the proposed SDSoCH outperforms its first-order counterparts and achieves superior retrieval performance. 展开更多
关键词 deep hashing Point-wise manner Covariance pooling Image retrieval
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部