期刊文献+
共找到5,006篇文章
< 1 2 250 >
每页显示 20 50 100
Improved locality-sensitive hashing method for the approximate nearest neighbor problem
1
作者 陆颖华 马廷淮 +3 位作者 钟水明 曹杰 王新 Abdullah Al-Dhelaane 《Chinese Physics B》 SCIE EI CAS CSCD 2014年第8期217-225,共9页
In recent years, the nearest neighbor search (NNS) problem has been widely used in various interesting applications. Locality-sensitive hashing (LSH), a popular algorithm for the approximate nearest neighbor probl... In recent years, the nearest neighbor search (NNS) problem has been widely used in various interesting applications. Locality-sensitive hashing (LSH), a popular algorithm for the approximate nearest neighbor problem, is proved to be an efficient method to solve the NNS problem in the high-dimensional and large-scale databases. Based on the scheme of p-stable LSH, this paper introduces a novel improvement algorithm called randomness-based locality-sensitive hashing (RLSH) based on p-stable LSH. Our proposed algorithm modifies the query strategy that it randomly selects a certain hash table to project the query point instead of mapping the query point into all hash tables in the period of the nearest neighbor query and reconstructs the candidate points for finding the nearest neighbors. This improvement strategy ensures that RLSH spends less time searching for the nearest neighbors than the p-stable LSH algorithm to keep a high recall. Besides, this strategy is proved to promote the diversity of the candidate points even with fewer hash tables. Experiments are executed on the synthetic dataset and open dataset. The results show that our method can cost less time consumption and less space requirements than the p-stable LSH while balancing the same recall. 展开更多
关键词 approximate nearest neighbor problem locality-sensitive hashing
原文传递
Trust-Aware Hybrid Collaborative Recommendation with Locality-Sensitive Hashing
2
作者 Dejuan Li James A.Esquivel 《Tsinghua Science and Technology》 2025年第4期1421-1434,共14页
This paper introduces a novel trust-aware hybrid recommendation framework that combines Locality-Sensitive Hashing(LSH)with the trust information in social networks,aiming to provide efficient and effective recommenda... This paper introduces a novel trust-aware hybrid recommendation framework that combines Locality-Sensitive Hashing(LSH)with the trust information in social networks,aiming to provide efficient and effective recommendations.Unlike traditional recommender systems which often overlook the critical influence of user trust,our proposed approach infuses trust metrics to better approximate user preferences.The LSH,with its intrinsic advantage in handling high-dimensional data and computational efficiency,is applied to expedite the process of finding similar items or users.We innovatively adapt LSH to form trust-aware buckets,encapsulating both trust and similarity information.These enhancements mitigate the sparsity and scalability issues usually found in existing recommender systems.Experimental results on a real-world dataset confirm the superiority of our approach in terms of recommendation quality and computational performance.The paper further discusses potential applications and future directions of the trust-aware hybrid recommendation with LSH. 展开更多
关键词 recommender system locality-sensitive hashing(LSH) user trust hybrid recommendation useritem similarity
原文传递
Secure Medical Image Retrieval Based on Multi-Attention Mechanism and Triplet Deep Hashing
3
作者 Shaozheng Zhang Qiuyu Zhang +1 位作者 Jiahui Tang Ruihua Xu 《Computers, Materials & Continua》 2025年第2期2137-2158,共22页
Medical institutions frequently utilize cloud servers for storing digital medical imaging data, aiming to lower both storage expenses and computational expenses. Nevertheless, the reliability of cloud servers as third... Medical institutions frequently utilize cloud servers for storing digital medical imaging data, aiming to lower both storage expenses and computational expenses. Nevertheless, the reliability of cloud servers as third-party providers is not always guaranteed. To safeguard against the exposure and misuse of personal privacy information, and achieve secure and efficient retrieval, a secure medical image retrieval based on a multi-attention mechanism and triplet deep hashing is proposed in this paper (abbreviated as MATDH). Specifically, this method first utilizes the contrast-limited adaptive histogram equalization method applicable to color images to enhance chest X-ray images. Next, a designed multi-attention mechanism focuses on important local features during the feature extraction stage. Moreover, a triplet loss function is utilized to learn discriminative hash codes to construct a compact and efficient triplet deep hashing. Finally, upsampling is used to restore the original resolution of the images during retrieval, thereby enabling more accurate matching. To ensure the security of medical image data, a lightweight image encryption method based on frequency domain encryption is designed to encrypt the chest X-ray images. The findings of the experiment indicate that, in comparison to various advanced image retrieval techniques, the suggested approach improves the precision of feature extraction and retrieval using the COVIDx dataset. Additionally, it offers enhanced protection for the confidentiality of medical images stored in cloud settings and demonstrates strong practicality. 展开更多
关键词 Secure medical image retrieval multi-attention mechanism triplet deep hashing image enhancement lightweight image encryption
在线阅读 下载PDF
Short-term local prediction of wind speed and wind power based on singular spectrum analysis and locality-sensitive hashing 被引量:11
4
作者 Ling LIU Tianyao JI +2 位作者 Mengshi LI Ziming CHEN Qinghua WU 《Journal of Modern Power Systems and Clean Energy》 SCIE EI 2018年第2期317-329,共13页
With the growing penetration of wind power in power systems, more accurate prediction of wind speed and wind power is required for real-time scheduling and operation. In this paper, a novel forecast model for shortter... With the growing penetration of wind power in power systems, more accurate prediction of wind speed and wind power is required for real-time scheduling and operation. In this paper, a novel forecast model for shortterm prediction of wind speed and wind power is proposed,which is based on singular spectrum analysis(SSA) and locality-sensitive hashing(LSH). To deal with the impact of high volatility of the original time series, SSA is applied to decompose it into two components: the mean trend,which represents the mean tendency of the original time series, and the fluctuation component, which reveals the stochastic characteristics. Both components are reconstructed in a phase space to obtain mean trend segments and fluctuation component segments. After that, LSH is utilized to select similar segments of the mean trend segments, which are then employed in local forecasting, so that the accuracy and efficiency of prediction can be enhanced. Finally, support vector regression is adopted forprediction, where the training input is the synthesis of the similar mean trend segments and the corresponding fluctuation component segments. Simulation studies are conducted on wind speed and wind power time series from four databases, and the final results demonstrate that the proposed model is more accurate and stable in comparison with other models. 展开更多
关键词 WIND power WIND speed locality-sensitive hashing(LSH) SINGULAR spectrum analysis(SSA) LOCAL forecast Support vector regression(SVR)
原文传递
Hash折叠寻址模型的研究
5
作者 庞志赟 萧琳 《现代信息科技》 2025年第5期184-186,192,共4页
在大数据背景下,研究大数据存储及寻址对大数据管理具有重要的数据经济意义。文章从数据存储物理结构和逻辑结构分析了数据存储的架构化现状,以准实时或实时为数据查询需求,在传统的主键索引查询技术基础上,对数据存储结构进行重组,关... 在大数据背景下,研究大数据存储及寻址对大数据管理具有重要的数据经济意义。文章从数据存储物理结构和逻辑结构分析了数据存储的架构化现状,以准实时或实时为数据查询需求,在传统的主键索引查询技术基础上,对数据存储结构进行重组,关心数据模型原型、数据存储规律与调用、数据Hash检索计算策略、结果存储和分发、折叠寻址结构模型,以及提升数据处理速度和数据查询处理能力等。应用Hash折叠检索策略和折叠函数原型构建折叠寻址思想模型,并将该思想应用于折叠寻址用例,对数据快速查询的Hash折叠寻址模型的研究具有重要意义。 展开更多
关键词 hash 折叠寻址 存储结构 折叠检索策略 寻址模型
在线阅读 下载PDF
基于Python语言和Hash算法的双关键字查找算法应用研究
6
作者 卢志刚 陈平 《安徽水利水电职业技术学院学报》 2025年第1期43-48,共6页
大数据量环境下,在2个二维表之间进行双关键字等值查找是一项挑战。传统的顺序查找算法在这种情况下效率较低。二分查找算法虽然更高效,但在处理大规模及非排序数据时仍有局限性。针对这一问题,文章提出了一种基于Hash算法的查找方法,... 大数据量环境下,在2个二维表之间进行双关键字等值查找是一项挑战。传统的顺序查找算法在这种情况下效率较低。二分查找算法虽然更高效,但在处理大规模及非排序数据时仍有局限性。针对这一问题,文章提出了一种基于Hash算法的查找方法,并使用Python语言开发了使用该算法的软件。对比分析结果表明,该方法在处理大规模数据时,相比传统顺序查找和二分查找,不仅简化了实现过程,而且显著提高了查找效率。 展开更多
关键词 二维表 hash table 查找算法
在线阅读 下载PDF
A Review of Image Steganography Based on Multiple Hashing Algorithm 被引量:1
7
作者 Abdullah Alenizi Mohammad Sajid Mohammadi +1 位作者 Ahmad A.Al-Hajji Arshiya Sajid Ansari 《Computers, Materials & Continua》 SCIE EI 2024年第8期2463-2494,共32页
Steganography is a technique for hiding secret messages while sending and receiving communications through a cover item.From ancient times to the present,the security of secret or vital information has always been a s... Steganography is a technique for hiding secret messages while sending and receiving communications through a cover item.From ancient times to the present,the security of secret or vital information has always been a significant problem.The development of secure communication methods that keep recipient-only data transmissions secret has always been an area of interest.Therefore,several approaches,including steganography,have been developed by researchers over time to enable safe data transit.In this review,we have discussed image steganography based on Discrete Cosine Transform(DCT)algorithm,etc.We have also discussed image steganography based on multiple hashing algorithms like the Rivest–Shamir–Adleman(RSA)method,the Blowfish technique,and the hash-least significant bit(LSB)approach.In this review,a novel method of hiding information in images has been developed with minimal variance in image bits,making our method secure and effective.A cryptography mechanism was also used in this strategy.Before encoding the data and embedding it into a carry image,this review verifies that it has been encrypted.Usually,embedded text in photos conveys crucial signals about the content.This review employs hash table encryption on the message before hiding it within the picture to provide a more secure method of data transport.If the message is ever intercepted by a third party,there are several ways to stop this operation.A second level of security process implementation involves encrypting and decrypting steganography images using different hashing algorithms. 展开更多
关键词 Image steganography multiple hashing algorithms hash-LSB approach RSA algorithm discrete cosine transform(DCT)algorithm blowfish algorithm
在线阅读 下载PDF
基于线性同态hash和秘密分享的高效可验证聚合方案
8
作者 高琦 孙奕 +1 位作者 王友贺 李宇杰 《计算机应用研究》 北大核心 2025年第2期599-605,共7页
针对目前联邦学习可验证聚合方案存在用户通信开销过大、无法容忍用户退出以及用户退出导致验证效率降低的问题,提出了一种基于线性同态hash和秘密分享的高效可验证聚合方案(LHSSEVA)。首先,采用线性同态hash和同态承诺实现聚合结果的... 针对目前联邦学习可验证聚合方案存在用户通信开销过大、无法容忍用户退出以及用户退出导致验证效率降低的问题,提出了一种基于线性同态hash和秘密分享的高效可验证聚合方案(LHSSEVA)。首先,采用线性同态hash和同态承诺实现聚合结果的可验证性,保证验证信息通信开销与模型维度无关,同时防止服务器通过伪造聚合hash欺骗用户接受错误聚合结果;然后基于椭圆曲线离散对数问题及其同态性保护输入的隐私,同时保证验证的正确性;接着通过融入秘密分享使验证过程可以容忍用户随时退出,并确保用户退出不会导致验证效率降低;最后理论分析证明了方案的正确性、可靠性和隐私性。仿真实验结果表明了方案的可行性和高效性,与VeriFL方案相比,具有更低的计算和通信开销,特别是存在用户退出时,显著提高了验证效率,具有更强的退出容忍性。 展开更多
关键词 联邦学习 隐私保护 可验证 线性同态hash 秘密分享 容忍退出
在线阅读 下载PDF
Quantum-Resistant Cryptographic Primitives Using Modular Hash Learning Algorithms for Enhanced SCADA System Security
9
作者 Sunil K.Singh Sudhakar Kumar +5 位作者 Manraj Singh Savita Gupta Razaz Waheeb Attar Varsha Arya Ahmed Alhomoud Brij B.Gupta 《Computers, Materials & Continua》 2025年第8期3927-3941,共15页
As quantum computing continues to advance,traditional cryptographic methods are increasingly challenged,particularly when it comes to securing critical systems like Supervisory Control andData Acquisition(SCADA)system... As quantum computing continues to advance,traditional cryptographic methods are increasingly challenged,particularly when it comes to securing critical systems like Supervisory Control andData Acquisition(SCADA)systems.These systems are essential for monitoring and controlling industrial operations,making their security paramount.A key threat arises from Shor’s algorithm,a powerful quantum computing tool that can compromise current hash functions,leading to significant concerns about data integrity and confidentiality.To tackle these issues,this article introduces a novel Quantum-Resistant Hash Algorithm(QRHA)known as the Modular Hash Learning Algorithm(MHLA).This algorithm is meticulously crafted to withstand potential quantum attacks by incorporating advanced mathematical and algorithmic techniques,enhancing its overall security framework.Our research delves into the effectiveness ofMHLA in defending against both traditional and quantum-based threats,with a particular emphasis on its resilience to Shor’s algorithm.The findings from our study demonstrate that MHLA significantly enhances the security of SCADA systems in the context of quantum technology.By ensuring that sensitive data remains protected and confidential,MHLA not only fortifies individual systems but also contributes to the broader efforts of safeguarding industrial and infrastructure control systems against future quantumthreats.Our evaluation demonstrates that MHLA improves security by 38%against quantumattack simulations compared to traditional hash functionswhilemaintaining a computational efficiency ofO(m⋅n⋅k+v+n).The algorithm achieved a 98%success rate in detecting data tampering during integrity testing.These findings underline MHLA’s effectiveness in enhancing SCADA system security amidst evolving quantum technologies.This research represents a crucial step toward developing more secure cryptographic systems that can adapt to the rapidly changing technological landscape,ultimately ensuring the reliability and integrity of critical infrastructure in an era where quantum computing poses a growing risk. 展开更多
关键词 hash functions post-quantum cryptography quantum-resistant hash functions network security supervisory control and data acquisition(SCADA)
在线阅读 下载PDF
Dynamically redactable blockchain based on decentralized Chameleon hash
10
作者 Xinzhe Huang Yujue Wang +3 位作者 Yong Ding Qianhong Wu Changsong Yang Hai Liang 《Digital Communications and Networks》 2025年第3期757-767,共11页
The immutability is a crucial property for blockchain applications,however,it also leads to problems such as the inability to revise illegal data on the blockchain and delete private data.Although redactable blockchai... The immutability is a crucial property for blockchain applications,however,it also leads to problems such as the inability to revise illegal data on the blockchain and delete private data.Although redactable blockchains enable on-chain modification,they suffer from inefficiency and excessive centralization,the majority of redactable blockchain schemes ignore the difficult problems of traceability and consistency check.In this paper,we present a Dynamically Redactable Blockchain based on decentralized Chameleon hash(DRBC).Specifically,we propose an Identity-Based Decentralized Chameleon Hash(IDCH)and a Version-Based Transaction structure(VT)to realize the traceability of transaction modifications in a decentralized environment.Then,we propose an efficient block consistency check protocol based on the Bloom filter tree,which can realize the consistency check of transactions with extremely low time and space cost.Security analysis and experiment results demonstrate the reliability of DRBC and its significant advantages in a decentralized environment. 展开更多
关键词 Privacy protection Redactable blockchain Chameleon hash Consistency check SCALABILITY
在线阅读 下载PDF
Hash-based FDI attack-resilient distributed self-triggered secondary frequency control for islanded microgrids
11
作者 Xing Huang Yulin Chen +4 位作者 Donglian Qi Yunfeng Yan Shaohua Yang Ying Weng Xianbo Wang 《Global Energy Interconnection》 2025年第1期1-12,共12页
Given the rapid development of advanced information systems,microgrids(MGs)suffer from more potential attacks that affect their operational performance.Conventional distributed secondary control with a small,fixed sam... Given the rapid development of advanced information systems,microgrids(MGs)suffer from more potential attacks that affect their operational performance.Conventional distributed secondary control with a small,fixed sampling time period inevitably causes the wasteful use of communication resources.This paper proposes a self-triggered secondary control scheme under perturbations from false data injection(FDI)attacks.We designed a linear clock for each DG to trigger its controller at aperiodic and intermittent instants.Sub-sequently,a hash-based defense mechanism(HDM)is designed for detecting and eliminating malicious data infiltrated in the MGs.With the aid of HDM,a self-triggered control scheme achieves the secondary control objectives even in the presence of FDI attacks.Rigorous theoretical analyses and simulation results indicate that the introduced secondary control scheme significantly reduces communication costs and enhances the resilience of MGs under FDI attacks. 展开更多
关键词 MICROGRIDS Distributed secondary control Self-triggered control hash algorithms False data injection attack
在线阅读 下载PDF
基于word-hashing的DGA僵尸网络深度检测模型 被引量:9
12
作者 赵科军 葛连升 +1 位作者 秦丰林 洪晓光 《东南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2017年第A01期30-33,共4页
针对使用域名生成算法(DGA)僵尸网络隐蔽性强,传统检测算法特征提取复杂的问题,提出一种无需提取具体特征的深度学习模型DGA域名检测方法.首先基于word-hashing将所有域名转用二元语法字符串表示,利用词袋模型把域名映射到高维向量空间... 针对使用域名生成算法(DGA)僵尸网络隐蔽性强,传统检测算法特征提取复杂的问题,提出一种无需提取具体特征的深度学习模型DGA域名检测方法.首先基于word-hashing将所有域名转用二元语法字符串表示,利用词袋模型把域名映射到高维向量空间.然后利用5层深度神经网络对转换为高维向量的域名进行训练分类检测.通过深度模型,能够从训练数据中发现不同层次抽象的隐藏模式和特征,而这些模式和特征使用传统的统计方法大多是无法发现的.实验中使用了10万条DGA域名和10万条合法域名作为样本,与基于自然语言特征分类算法进行对比实验.实验结果表明该深度模型对DGA域名检测准确率达到97.23%,比基于自然语言特征分类算法得到的检测准确率高3.7%. 展开更多
关键词 DGA 僵尸网络 wordhashing 深度学习
在线阅读 下载PDF
基于直方图量化和混沌系统的感知图像Hashing算法 被引量:1
13
作者 邓绍江 王方晓 +1 位作者 张岱固 王瑜 《计算机应用》 CSCD 北大核心 2008年第11期2804-2807,共4页
研究了基于图像灰度级压缩的直方图差值量化(DQH)技术,并结合混沌系统,提出了一种新的感知图像Hash ing算法。算法首先利用混沌系统把压缩后的图像中各个灰度级的出现概率调制成一个固定长度的中间Hash序列;然后将中间Hash序列经过差值... 研究了基于图像灰度级压缩的直方图差值量化(DQH)技术,并结合混沌系统,提出了一种新的感知图像Hash ing算法。算法首先利用混沌系统把压缩后的图像中各个灰度级的出现概率调制成一个固定长度的中间Hash序列;然后将中间Hash序列经过差值量化和二值量化得到最终的图像Hash序列。仿真结果表明,该算法对JPEG压缩、低通滤波、图像缩放和旋转等操作有良好的鲁棒性,而且混沌系统的引入使算法具有较强的安全性。 展开更多
关键词 图像hash 差值量化 混沌系统 直方图
在线阅读 下载PDF
Trie Hashing结构平均路径长度分析
14
作者 王宏 熊西文 朱振文 《大连理工大学学报》 EI CAS CSCD 北大核心 1991年第5期507-514,共8页
针对 W.Litwin提出的 Trie Hashing结构的路径长度分析问题,研究并揭示 了该结构所具有的某些新的性质;建立了必要的分析前提.从而给出了 Trie Hashing 结构平均路径长度的分析方法。所得估计式仅与... 针对 W.Litwin提出的 Trie Hashing结构的路径长度分析问题,研究并揭示 了该结构所具有的某些新的性质;建立了必要的分析前提.从而给出了 Trie Hashing 结构平均路径长度的分析方法。所得估计式仅与外部结点数目有关,理论分析与模拟 实验的结果表明,对于 Trie Hashing 结构,文中的分析方法明显优于 Klein 和 wood的类似结果。 展开更多
关键词 T-H结构 算法分析
在线阅读 下载PDF
动态HASHING算法及其改进
15
作者 王艳军 安小宇 《光盘技术》 2009年第6期51-,53,共2页
对两种动态散列算法可扩展散列和线形散列进行了研究,提出了改进的动态散列算法。改进算法避免了不必要的溢出桶,散列桶的数量线性增长,避免了因查找键分布异常而出现频繁的桶分裂及桶地址表更新的现象。
关键词 动态散列 可扩展散列 线性散列
在线阅读 下载PDF
Recent development of perceptual image hashing 被引量:7
16
作者 王朔中 张新鹏 《Journal of Shanghai University(English Edition)》 CAS 2007年第4期323-331,共9页
The easy generation, storage, transmission and reproduction of digital images have caused serious abuse and security problems. Assurance of the rightful ownership, integrity, and authenticity is a major concern to the... The easy generation, storage, transmission and reproduction of digital images have caused serious abuse and security problems. Assurance of the rightful ownership, integrity, and authenticity is a major concern to the academia as well as the industry. On the other hand, efficient search of the huge amount of images has become a great challenge. Image hashing is a technique suitable for use in image authentication and content based image retrieval (CBIR). In this article, we review some representative image hashing techniques proposed in the recent years, with emphases on how to meet the conflicting requirements of perceptual robustness and security. Following a brief introduction to some earlier methods, we focus on a typical two-stage structure and some geometric-distortion resilient techniques. We then introduce two image hashing approaches developed in our own research, and reveal security problems in some existing methods due to the absence of secret keys in certain stage of the image feature extraction, or availability of a large quantity of images, keys, or the hash function to the adversary. More research efforts are needed in developing truly robust and secure image hashing techniques. 展开更多
关键词 image hashing perceptual robustness SECURITY image authentication.
在线阅读 下载PDF
机群系统上基于Hashing的多目标串匹配并行算法
17
作者 范曾 钟诚 +1 位作者 莫倩芸 刘萍 《微电子学与计算机》 CSCD 北大核心 2007年第9期165-168,共4页
基于孙子定理构造均匀的Hash函数并继承Karp-Rabin模式匹配思想,利用"筛选"方法,给出一种机群系统上的多目标串匹配并行算法。通过预处理将字符串映射成惟一的一对整数值,采用比较一对整数值来取代逐个字符比较字符串的方法... 基于孙子定理构造均匀的Hash函数并继承Karp-Rabin模式匹配思想,利用"筛选"方法,给出一种机群系统上的多目标串匹配并行算法。通过预处理将字符串映射成惟一的一对整数值,采用比较一对整数值来取代逐个字符比较字符串的方法使得匹配过程快速且比较结果是确定的;"筛选"节省了比较时间。算法分析和实验结果表明该并行算法简明、高效和可扩展。 展开更多
关键词 多目标串匹配:词典匹配:并行算法:hashing:机群系统
在线阅读 下载PDF
基于双向Hash链的无线传感网络通信节点自愈算法
18
作者 李晓薇 李翔宇 《传感技术学报》 CSCD 北大核心 2024年第12期2119-2124,共6页
无线传感网络中节点数量突增,增大了出现失效节点的概率,会影响数据传输效率,导致次级节点出现失效现象,为此提出基于双向hash链的无线传感网络通信节点自愈算法。分析无线传感网络节点流量过载现象,构建节点失效裁决模型,找出网络中失... 无线传感网络中节点数量突增,增大了出现失效节点的概率,会影响数据传输效率,导致次级节点出现失效现象,为此提出基于双向hash链的无线传感网络通信节点自愈算法。分析无线传感网络节点流量过载现象,构建节点失效裁决模型,找出网络中失效节点;利用质心算法确定失效节点具体位置,将双向hash链和节点失效裁决模型结合起来,实现对失效节点的自愈修复。构建WSN拓扑结构,对所提方法展开仿真测试,对比结果表明所提方法的节点拓扑移动距离平均值为63.5 m,网络流量出口带宽值平均值为583 Mbyte/s,节点自愈耗时平均值为14.2 s,证明该方法具有较高的自愈效率,保证了失效节点自愈效果最优、自愈能力最强。 展开更多
关键词 网络通信 通信节点自愈 双向hsh链 节点失效 质心算法 流量过载
在线阅读 下载PDF
Fast Near-duplicate Image Detection in Riemannian Space by A Novel Hashing Scheme 被引量:2
19
作者 Ligang Zheng Chao Song 《Computers, Materials & Continua》 SCIE EI 2018年第9期529-539,共11页
There is a steep increase in data encoded as symmetric positive definite(SPD)matrix in the past decade.The set of SPD matrices forms a Riemannian manifold that constitutes a half convex cone in the vector space of mat... There is a steep increase in data encoded as symmetric positive definite(SPD)matrix in the past decade.The set of SPD matrices forms a Riemannian manifold that constitutes a half convex cone in the vector space of matrices,which we sometimes call SPD manifold.One of the fundamental problems in the application of SPD manifold is to find the nearest neighbor of a queried SPD matrix.Hashing is a popular method that can be used for the nearest neighbor search.However,hashing cannot be directly applied to SPD manifold due to its non-Euclidean intrinsic geometry.Inspired by the idea of kernel trick,a new hashing scheme for SPD manifold by random projection and quantization in expanded data space is proposed in this paper.Experimental results in large scale nearduplicate image detection show the effectiveness and efficiency of the proposed method. 展开更多
关键词 RIEMANNIAN MANIFOLD CONGRUENT transformation hashing KERNEL TRICK
在线阅读 下载PDF
Robust Image Hashing via Random Gabor Filtering and DWT 被引量:4
20
作者 Zhenjun Tang Man Ling +4 位作者 Heng Yao Zhenxing Qian Xianquan Zhang Jilian Zhang Shijie Xu 《Computers, Materials & Continua》 SCIE EI 2018年第5期331-344,共14页
Image hashing is a useful multimedia technology for many applications,such as image authentication,image retrieval,image copy detection and image forensics.In this paper,we propose a robust image hashing based on rand... Image hashing is a useful multimedia technology for many applications,such as image authentication,image retrieval,image copy detection and image forensics.In this paper,we propose a robust image hashing based on random Gabor filtering and discrete wavelet transform(DWT).Specifically,robust and secure image features are first extracted from the normalized image by Gabor filtering and a chaotic map called Skew tent map,and then are compressed via a single-level 2-D DWT.Image hash is finally obtained by concatenating DWT coefficients in the LL sub-band.Many experiments with open image datasets are carried out and the results illustrate that our hashing is robust,discriminative and secure.Receiver operating characteristic(ROC)curve comparisons show that our hashing is better than some popular image hashing algorithms in classification performance between robustness and discrimination. 展开更多
关键词 Image hashing Gabor filtering chaotic map skew tent map discrete wavelet transform.
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部