Sequential and Correlated Image Hash Code Generation with Deep Reinforcement Learning
Abstract
Keywords
References
- [1] A. Swaminathan, Y. Mao and M. Wu, "Robust and secure image hashing," in IEEE Transactions on Information Forensics and Security, vol. 1, no. 2, pp. 215-230, June 2006, doi: 10.1109/TIFS.2006.873601.
- [2] J. Wang, T. Zhang, N. Sebe, H. T. Shen et al., “A survey on learning to hash,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 40, no. 4, pp. 769–790, 2018.
- [3] S. Zhang, J. Li, M. Jiang, and B. Zhang, “Scalable discrete supervised multimedia hash learning with clustering,” IEEE Transactions on Circuits and Systems for Video Technology (TCSVT), vol. PP, no. 99, pp. 1–1, 2017.
- [4] M. Kafai, K. Eshghi, and B. Bhanu, “Discrete cosine transform locality sensitive hashes for face retrieval,” IEEE Transactions on Multimedia (TMM), vol. 16, no. 4, pp. 1090–1103, 2014.
- [5] P. Li, M. Wang, J. Cheng, C. Xu, and H. Lu, “Spectral hashing with semantically consistent graph for image indexing,” IEEE Transactions on Multimedia (TMM), vol. 15, no. 1, pp. 141–152, 2013.
- [6] S. Zhang, J. Li, M. Jiang, and B. Zhang, “Scalable discrete supervised multimedia hash learning with clustering,” IEEE Transactions on Circuits and Systems for Video Technology (TCSVT), vol. PP, no. 99, pp. 1–1, 2017.
- [7] V. E. Liong, J. Lu, Y.-P. Tan, and J. Zhou, “Deep video hashing,” IEEE Transactions on Multimedia (TMM), 2016.
- [8] K. Ding, B. Fan, C. Huo, S. Xiang, and C. Pan, “Cross-modal hashing via rank-order preserving,” IEEE Transactions on Multimedia (TMM), vol. 19, no. 3, pp. 571–585, 2017.
Details
Primary Language
English
Subjects
Software Engineering (Other)
Journal Section
Research Article
Authors
Can Yüzkollar
*
0000-0001-5823-8773
Türkiye
Early Pub Date
August 31, 2023
Publication Date
August 31, 2023
Submission Date
August 7, 2023
Acceptance Date
August 31, 2023
Published in Issue
Year 2023 Volume: 6 Number: 2
