Triple-Bit Quantization with Asymmetric Distance for Image Content Security

被引:3
|
作者
Xu, Degang [1 ]
Xie, Hongtao [2 ]
Yan, Chenggang [3 ]
机构
[1] Henan Univ Technol, Sch Informat Sci & Engn, Zhengzhou, Henan, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, Natl Engn Lab Informat Secur Technol, Beijing, Peoples R China
[3] Hangzhou Dianzi Univ, Inst Informat & Control, Hangzhou, Zhejiang, Peoples R China
关键词
Image security; Triple-bit quantization; Asymmetric distance; Binary embedding; Nearest neighbor search; ITERATIVE QUANTIZATION; PROCRUSTEAN APPROACH; FACE; REPRESENTATION; ASSOCIATION; SEARCH; SPACE; NAME;
D O I
10.1007/s00138-017-0853-3
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the rapid growth of the number of images on the Internet, it has become more necessary to ensure the content security of images. The key problem is retrieving relevant images from the large database. Binary embedding is an effective way to improve the efficiency of calculating similarities for image content security as binary code is storage efficient and fast to compute. It tries to convert real-valued signatures into binary codes while preserving similarity of the original data, and most binary embedding methods quantize each projected dimension to one bit (presented as 0/1). As a consequence, it greatly decreases the discriminability of original signatures. In this paper, we first propose a novel triple-bit quantization strategy to solve the problem by assigning 3-bit to each dimension. Then, asymmetric distance algorithm is applied to re-rank candidates obtained from Hamming space for the final nearest neighbors. For simplicity, we call the framework triple-bit quantization with asymmetric distance (TBAD). The inherence of TBAD is combining the best of binary codes and real-valued signatures to get nearest neighbors quickly and concisely. Moreover, TBAD is applicable to a wide variety of embedding techniques. Experimental comparisons on BIGANN set show that the proposed method can achieve remarkable improvement in query accuracy compared to original binary embedding methods.
引用
收藏
页码:771 / 779
页数:9
相关论文
共 50 条
  • [41] Improving security of quantization-index-modulation steganography in low bit-rate speech streams
    Tian, Hui
    Liu, Jin
    Li, Songbin
    MULTIMEDIA SYSTEMS, 2014, 20 (02) : 143 - 154
  • [42] Improving security of quantization-index-modulation steganography in low bit-rate speech streams
    Hui Tian
    Jin Liu
    Songbin Li
    Multimedia Systems, 2014, 20 : 143 - 154
  • [43] PQTable: Fast Exact Asymmetric Distance Neighbor Search for Product Quantization using Hash Tables
    Matsui, Yusuke
    Yamasaki, Toshihiko
    Aizawa, Kiyoharu
    2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV), 2015, : 1940 - 1948
  • [44] 16-Bit to 8-Bit Conversion in Remote Sensing Images by Using Image Content
    Baseski, Emre
    2019 9TH INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN SPACE TECHNOLOGIES (RAST), 2019, : 413 - 417
  • [45] COMPARISON BETWEEN ADAPTIVE SEARCH AND BIT ALLOCATION ALGORITHMS FOR IMAGE COMPRESSION USING VECTOR QUANTIZATION
    LIANG, KM
    HUANG, CM
    HARRIS, RW
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 1995, 4 (07) : 1020 - 1023
  • [46] MedQ: Lossless ultra-low-bit neural network quantization for medical image segmentation
    Zhang, Rongzhao
    Chung, Albert C. S.
    MEDICAL IMAGE ANALYSIS, 2021, 73 (73)
  • [47] Comparison between adaptive search and bit allocation algorithms for image compression using vector quantization
    Utah State Univ, Logan, United States
    IEEE Trans Image Process, 7 (1020-1023):
  • [48] An approach of detecting least significant bit matching based on image content
    Xiong, Gang
    Ping, Xi-Jian
    Zhang, Tao
    Sun, Bing
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2012, 34 (06): : 1380 - 1387
  • [49] Triple-Layer Image Security Using a Zigzag Embedding Pattern
    Farrag, Sara
    Alexan, Wassim
    Hussein, Hisham H.
    2019 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGIES AND NETWORKING (COMMNET), 2019, : 120 - 127
  • [50] Improving security in Image Steganography using MSB Bit differencing and Cryptographic algorithm
    Shrilekha
    Reddy, N. V. Subba
    PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON COMPUTATIONAL TECHNIQUES, ELECTRONICS AND MECHANICAL SYSTEMS (CTEMS), 2018, : 228 - 230