计算机科学 ›› 2019, Vol. 46 ›› Issue (10): 49-54.doi: 10.11896/jsjkx.190100139
所属专题: 数据库技术
陈凤, 蒙祖强
CHEN Feng, MENG Zu-qiang
摘要: 随着大数据时代的发展,网络上的文本、图像、视频、音频等异构多模态数据呈指数级增长。在海量数据中进行异构多模态数据的检索,成为了热门的研究方向。但是,异构多模态数据检索面临两大挑战:1)数据存在“语义鸿沟”,即如何表达异构多模态数据之间的相似性;2)在海量数据中,如何进行准确高效的检索。针对哈希检索算法忽略了异构多模态数据之间语义一致性的问题,文中提出了一种基于CCA(典型相关性分析)语义一致性的哈希检索算法(CCA-SCH)。该算法为了保持模态内的语义一致性,分别生成文本和图像数据的语义模型;为了保持模态间的语义一致性,通过CCA算法融合文本和图像语义,生成最大相关矩阵;同时引入ℓ2,ρ范式来减少原始数据集的噪声和冗余信息,使哈希函数具有更好的鲁棒性。实验结果表明,CCA-SCH算法在实验数据集上的均值平均准确率(Map)相较于基准算法提升了10%以上,体现了该算法更好的检索性能。
中图分类号:
[1]MA Q,GU Y,ZHANG T C,et al.A Heterogeneous Multi-Source Multi-Mode Sensory Data Acquisition Method Based on Data Quality[J].Chinese Journal of Computers,2013,36(10):2120-2131. [2]MAO X J,YANG Y B.Semantic Hashing with Image Subspace Learning[J].Journal of Software,2014,25(8):1781-1793. [3]CAO Y D,LIU Y Y,SUN F M,et al.LSH with low space com-plexity for image retrieval[J].Computer Engineering & Science,2015,37(2):379-383. [4]ZHANG L.Research on Locality Sensitive Hashing Based Approximate Nearest Neighbor(s) Searching Algrothm[D].Nanjing:Nanjing University of Posts and Telecommunications,2015. [5]LIU H,WANG R,SHAN S,et al.Deep Supervised Hashing for Fast Image Retrieval[C]//IEEE Conference on Computer Vision and Pattern Recognition.IEEE Computer Society,2016:2064-2072. [6]WEN Q F,WANG J M,ZHU H,et al.Distributed Learning to Hash for Approximate Nearest Neighbor Search[J].Chinese Journal of Computers,2017,40(1):192-206. [7]TANG J,WANG K,SHAO L.Supervised Matrix Factorization Hashing for Cross-Modal Retrieval[J].IEEE Transactions on Image Processing,2016,25(7):3157-3166. [8]ZHANG L,ZHAO Y,ZHU Z F.Advances in Semantically Shared Subspace Learning for Cross-Media Data[J].Chinese Journal of Computers,2017,40(6):168-195. [9]WANG K,TANG J,WANG N,et al.Semantic Boosting Cross-Modal Hashing for efficient multimedia retrieval[J].Information Sciences,2016,330(C):199-210. [10]WANG D,GAO X,WANG X,et al.Multimodal Discriminative Binary Embedding for Large-Scale Cross-Modal Retrieval[J].IEEE Transactions on Image Processing A Publication of the IEEE Signal Processing Society,2016,25(10):4540-4554. [11]LI X,GAO L,XU X,et al.Kernel based Latent Semantic Sparse Hashing for Large-scale Retrieval from Heterogeneous Data Sources[J].Neurocomputing,2017,253:89-96. [12]DATAR M,IMMORLICA N,INDYK P,et al.Locality-sensitive hashing scheme based on p-stable distributions[C]//Twentieth Symposium on Computational Geometry.ACM,2004:253. [13]DING G,GUO Y,ZHOU J.Collective Matrix Factorization Hashing for Multimodal Data[C]//Computer Vision and Pattern Recognition.IEEE,2014:2083-2090. [14]ZHU Y Y.Research on Semantic Consistency and Matrix Factorization based Cross-modal Hashing Retrieval[D].Hefei:Anhui University,2017. [15]HOTELLING H.Relations Between Two Sets of Variates[J].Biometrika,1936,28(3/4):321-377. [16]ZHANG D,LI W J.Large-scale supervised multimodal hashing with semantic correlation maximization[C]//Twenty-Eighth AAAI Conference on Artificial Intelligence.AAAI Press,2014:2177-2183. [17]LIN Z,DING G,HU M,et al.Semantics-preserving hashing for cross-view retrieval[C]//2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).IEEE,2015:3864-3872. |
[1] | 甘勇, 王凯, 贺蕾. 一种全新的RFID标签所有权转移协议 New Ownership Transfer Protocol of RFID Tag 计算机科学, 2018, 45(11A): 369-372. |
[2] | 朱淑芹,李俊青,葛广英. 基于一个新的四维离散混沌映射的图像加密新算法 New Image Encryption Algorithm Based on New Four-dimensional Discrete-time Chaotic Map 计算机科学, 2017, 44(1): 188-193. https://doi.org/10.11896/j.issn.1002-137X.2017.01.036 |
[3] | 唐成华,王丽娜,强保华,汤申生,张 鑫. 基于语义相似度的静态安全策略一致性检测 Static Security Policy Consistency Detection Based on Semantic Similarity 计算机科学, 2015, 42(8): 166-169. |
[4] | 赵佳佳,任平安. 基于抗窃听和拜占庭攻击的随机网络编码 Random Network Coding Based on Anti-eavesdropping and Byzantine Adversaries 计算机科学, 2014, 41(9): 174-177. https://doi.org/10.11896/j.issn.1002-137X.2014.09.033 |
[5] | 高树静,王洪君. UHF RFID标签的伪随机数发生器研究 Research on PRNG Suitable for UHF RFID Tag 计算机科学, 2013, 40(7): 102-106. |
[6] | 邹又姣,马文平,冉占军,陈和风. 改进的多变量哈希函数 Improved Multivariate Hash Function 计算机科学, 2013, 40(6): 45-48. |
[7] | 谢 璇,喻建平,王 廷,张 鹏. 基于格的变色龙签名方案 Chameleon Signature Scheme Based on Lattice 计算机科学, 2013, 40(2): 117-119. |
[8] | 邓淑华,赵泽茂. 一种安全可靠的集中式组播密钥管理方案 Secure and Reliable Centralized Multicast Key Management Scheme 计算机科学, 2011, 38(Z10): 50-52. |
[9] | 刘外喜,余顺争,蔡君. 安全的网络编码所面临的挑战和对策 Secure Network Coding: Challenges and Solution 计算机科学, 2011, 38(6): 20-27. |
[10] | 郭方方 杨永田. 分布式IP分片处理问题的研究 计算机科学, 2006, 33(11): 34-37. |
|