-
2
-
-
84905268888
-
Beyond "project and sign" for cosine estimation with binary codes
-
May
-
R. Balu, T. Furon, and H. Jégou. Beyond "project and sign" for cosine estimation with binary codes. In Proc. of International Conference on Acoustics, Speech, and Signal Processing (ICASSP), pages 6884-6888, May 2014.
-
(2014)
Proc. of International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
, pp. 6884-6888
-
-
Balu, R.1
Furon, T.2
Jégou, H.3
-
4
-
-
4544259509
-
Locality-sensitive hashing scheme based on p-stable distributions
-
M. Datar, N. Immorlica, P. Indyk, and V. S. Mirrokni. Locality-sensitive hashing scheme based on p-stable distributions. In Proc. of 20th Symposium on Computational Geometry (SCG), pages 253-262, 2004.
-
(2004)
Proc. of 20th Symposium on Computational Geometry (SCG)
, pp. 253-262
-
-
Datar, M.1
Immorlica, N.2
Indyk, P.3
Mirrokni, V.S.4
-
8
-
-
78649317568
-
Product quantization for nearest neighbor search
-
H. Jégou, M. Douze, and C. Schmid. Product quantization for nearest neighbor search. IEEE Transactions on Pattern Analysis and Machine Intelligence, 33(1):117-128, 2011.
-
(2011)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.33
, Issue.1
, pp. 117-128
-
-
Jégou, H.1
Douze, M.2
Schmid, C.3
-
9
-
-
77949696748
-
Perceptual image hashing based on virtual watermark detection
-
April
-
F. Khelifi and J. Jiang. Perceptual image hashing based on virtual watermark detection. IEEE Transactions on Image Processing, 19(4):981-994, April 2010.
-
(2010)
IEEE Transactions on Image Processing
, vol.19
, Issue.4
, pp. 981-994
-
-
Khelifi, F.1
Jiang, J.2
-
11
-
-
84960919414
-
RASH: RAdon Soft Hash algorithm
-
Toulouse, France, Sep
-
F. Lefèbvre, B. Macq, and J.-D. Legat. RASH: RAdon Soft Hash algorithm. In Proc. of 11th European Signal Processing Conference, volume 1, pages 299-302, Toulouse, France, Sep. 2002.
-
(2002)
Proc. of 11th European Signal Processing Conference
, vol.1
, pp. 299-302
-
-
Lefèbvre, F.1
Macq, B.2
Legat, J.-D.3
-
12
-
-
84866726818
-
Supervised hashing with kernels
-
W. Liu, J. Wang, R. Ji, Y.-G. Jiang, and S.-F. Chang. Supervised hashing with kernels. In Proc. of IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pages 2074-2081, 2012.
-
(2012)
Proc. of IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
, pp. 2074-2081
-
-
Liu, W.1
Wang, J.2
Ji, R.3
Jiang, Y.-G.4
Chang, S.-F.5
-
13
-
-
3042535216
-
Distinctive image features from scale-invariant keypoints
-
Nov.
-
D. G. Lowe. Distinctive image features from scale-invariant keypoints. International Journal of Computer Vision, 60(2):91-110, Nov. 2004.
-
(2004)
International Journal of Computer Vision
, vol.60
, Issue.2
, pp. 91-110
-
-
Lowe, D.G.1
-
14
-
-
0035328421
-
Modeling the shape of the scene: A holistic representation of the spatial envelope
-
May
-
A. Oliva and A. Torralba. Modeling the shape of the scene: A holistic representation of the spatial envelope. International Journal of Computer Vision, 42(3):145-175, May 2001.
-
(2001)
International Journal of Computer Vision
, vol.42
, Issue.3
, pp. 145-175
-
-
Oliva, A.1
Torralba, A.2
-
17
-
-
85032771294
-
Locality-sensitive hashing for finding nearest neighbors [lecture notes]
-
M. Slaney and M. Casey. Locality-sensitive hashing for finding nearest neighbors [lecture notes]. Signal Processing Magazine, IEEE, 25(2):128-131, 2008.
-
(2008)
Signal Processing Magazine, IEEE
, vol.25
, Issue.2
, pp. 128-131
-
-
Slaney, M.1
Casey, M.2
-
19
-
-
81855191888
-
LDAHash: Improved matching with smaller descriptors
-
C. Strecha, A. M. Bronstein, M. M. Bronstein, and P. Fua. LDAHash: Improved matching with smaller descriptors. IEEE Transactions on Pattern Analysis and Machine Intelligence, 34(1):66-78, 2012.
-
(2012)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.34
, Issue.1
, pp. 66-78
-
-
Strecha, C.1
Bronstein, A.M.2
Bronstein, M.M.3
Fua, P.4
-
20
-
-
33744764278
-
Robust and secure image hashing
-
June
-
A. Swaminathan, Y. Mao, and M. Wu. Robust and secure image hashing. IEEE Transactions on Information Forensics and Security, 1(2):215-230, June 2006.
-
(2006)
IEEE Transactions on Information Forensics and Security
, vol.1
, Issue.2
, pp. 215-230
-
-
Swaminathan, A.1
Mao, Y.2
Wu, M.3
-
22
-
-
84919832056
-
A privacy-preserving framework for large-scale content-based information retrieval
-
Jan.
-
L. Weng, L. Amsaleg, A. Morton, and S. Marchand-Maillet. A privacy-preserving framework for large-scale content-based information retrieval. IEEE Transactions on Information Forensics and Security, 10(1):152-167, Jan. 2015.
-
(2015)
IEEE Transactions on Information Forensics and Security
, vol.10
, Issue.1
, pp. 152-167
-
-
Weng, L.1
Amsaleg, L.2
Morton, A.3
Marchand-Maillet, S.4
-
23
-
-
84868158524
-
Robust image content authentication with tamper location
-
L. Weng, G. Braeckman, A. Dooms, and B. Preneel. Robust image content authentication with tamper location. In Proc. of IEEE International Conference on Multimedia and Expo, pages 380-385, 2012.
-
(2012)
Proc. of IEEE International Conference on Multimedia and Expo
, pp. 380-385
-
-
Weng, L.1
Braeckman, G.2
Dooms, A.3
Preneel, B.4
-
24
-
-
84871436378
-
Robust image content authentication using perceptual hashing and watermarking
-
of LNCS
-
L. Weng, R. Darazi, B. Preneel, B. Macq, and A. Dooms. Robust image content authentication using perceptual hashing and watermarking. In Proc. of 13th Pacific-Rim Conference on Multimedia (PCM), volume 7674 of LNCS, pages 315-326, 2012.
-
(2012)
Proc. of 13th Pacific-rim Conference on Multimedia (PCM)
, vol.7674
, pp. 315-326
-
-
Weng, L.1
Darazi, R.2
Preneel, B.3
Macq, B.4
Dooms, A.5
|