skip to main content
10.1145/2536853.2536934acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmommConference Proceedingsconference-collections
research-article

Hash Bit Selection Using Markov Process for Approximate Nearest Neighbor Search

Authors Info & Claims
Published:02 December 2013Publication History

ABSTRACT

Hashing for nearest neighbor search has attracted great attentions in the past years. Many hashing methods have been successfully applied in real-world applications like the mobile product search. The performance of these applications usually highly relies on the quality of hash bits. However, it still lacks of a general method that can provide good hash bits for different scenarios. In this paper, we propose a novel method that can select compact, independent and informative hash bits using the Markov Process. Our method can serve as a unified framework compatible with different hashing methods. We design two algorithms, BS-CMP and BS-DMP, and formulate the selection problem as the subgraph discovery on a graph. Experiments are conducted for two important selection scenarios when applying hash techniques, i.e., hashing using different hashing algorithms and hashing with multiple features. The result indicates that our proposed bit selection approaches outperform naive selection methods significantly under aforementioned two scenarios.

References

  1. J. L. Doob. Stochastic processes, volume 101. New York Wiley, 1953.Google ScholarGoogle Scholar
  2. S. N. Ethier and T. G. Kurtz. Markov processes: characterization and convergence, volume 282. Wiley. com, 2009.Google ScholarGoogle Scholar
  3. J. He, J. Feng, X. Liu, T. Cheng, T.-H. Lin, H. Chung, and S.-F. Chang. Mobile product search with bag of hash bits and boundary reranking. In IEEE CVPR, pages 3005--3012. IEEE, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. J. He, R. Radhakrishnan, S.-F. Chang, and C. Bauer. Compact hashing with joint optimization of search accuracy and time. In IEEE CVPR, pages 753--760. IEEE, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. J.-P. Heo, Y. Lee, J. He, S.-F. Chang, and S.-E. Yoon. Spherical hashing. In IEEE CVPR, pages 2957--2964. IEEE, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. A. Joly and O. Buisson. Random maximum margin hashing. In IEEE CVPR, pages 873--880. IEEE, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. B. Kulis and K. Grauman. Kernelized locality-sensitive hashing for scalable image search. In IEEE ICCV in 2009, pages 2130--2137. IEEE, 2009.Google ScholarGoogle ScholarCross RefCross Ref
  8. X. Liu, J. He, and B. Lang. Reciprocal hash tables for nearest neighbor search. In AAAI, 2013.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. X. Liu, J. He, B. Lang, and S.-F. Chang. Hash bit selection: a unified solution for selection problems in hashing. In IEEE CVPR, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Y. Mu, X. Chen, X. Liu, T.-S. Chua, and S. Yan. Multimedia semantics-aware query-adaptive hashing with bits reconfigurability. IJMIR, 1(1):59--70, 2012.Google ScholarGoogle Scholar
  11. M. Pavan and M. Pelillo. Dominant sets and pairwise clustering. IEEE Trans. PAMI, 29(1):167--172, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Y. Weiss, A. Torralba, and R. Fergus. Spectral hashing. In NIPS, pages 1753--1760, 2008.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Hash Bit Selection Using Markov Process for Approximate Nearest Neighbor Search

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        MoMM '13: Proceedings of International Conference on Advances in Mobile Computing & Multimedia
        December 2013
        599 pages
        ISBN:9781450321068
        DOI:10.1145/2536853

        Copyright © 2013 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 2 December 2013

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader