Research Article

Deep Learning Hash for Wireless Multimedia Image Content Security

Figure 2

Deep learning-hash retrieval flowchart. IDLH mainly includes three processes (supervised pretraining, rough image retrieval, and accurate image retrieval).