SlideShare a Scribd company logo
1 of 5
International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 7, Issue 4 (May 2013), PP. 19-23
19
Video Fingerprint Extraction Using TIRI – DCT
Vaishali V. Sarbhukan1
, Prof. V. B. Gaikwad2
1Terna Engineering College,PG Student, Nerul,Navi Mumbai
2Terna Engineering College, Associate Professor, Nerul,Navi Mumbai
Abstract:- Nowadays copyright infringement and data piracy are major serious concerns. Thousands
of videos are being uploaded to the internet and are shared every day. Out of these videos, considerable
numbers of videos are illegal copies or some videos are manipulated versions of existing media. Due to
these reasons copyright management on the internet becomes a complicated process. To detect such
kind of infringements, there are two approaches. First is based on watermarking and other is based on
content-based copy detection (CBCD). Video copy detection system relies on a fingerprint extraction
algorithm. The fingerprint extraction algorithm extracts compact content- based signatures from
special images constructed from the video. Each such image represents a short segment of the video
and contains temporal as well as spatial information about the video segment. These images are
denoted by temporally informative representative images. Existing video fingerprint extraction
algorithms have certain limitations. Therefore temporally informative representative images - discrete
cosine transform (TIRI-DCT) is developed. TIRI-DCT is based on temporally informative
representative images which contains spatial and temporal information of a short segment of a video
sequence.
Keywords:- Fingerprinting System ,Video Copy Retrieval, Fingerprint Extraction Methods, TIRI-
DCT, Content based Copy Detection
I. INTRODUCTION
Digital videos can be found on TV Channels, Web-TV, Video Blogs and the public Video Web servers.
The massive capacity of these sources makes the tracing of video content into a very hard problem for video
professionals. Recently for increasing online video repositories copyright infringements and data piracy have
become serious concerns. Copyright infringement occurs when someone other than the copyright holder copies
the “expression” of a work. Today’s widespread video copyright infringement calls for the development of fast
and accurate copy-detection algorithms. To detect infringements, there are two approaches. First is based on
watermarking and other is based on content-based copy detection (CBCD).The watermarking is a widely used
technique in the photography field. It allows the owner to detect whether the image has been copied or not. The
limitations [1] of watermarks are that if the original image is not watermarked, then it is not possible to know if
other images are copied or not. The primary aim of content-based copy detection (CBCD) is “the media itself is
the watermark”.
II. STRUCTURE OF FINGERPRINTING SYSTEM
Figure 1 shows the overall structure of this fingerprinting system [8].Content-based copy detection
finds the duplicate by comparing the fingerprint of the query video with the fingerprints of the copyrighted
videos. To find a copy of a query video in a video database, one can search for a close match of its fingerprint in
the corresponding fingerprint database (extracted from the videos in the database). Closeness of two fingerprints
represents a similarity between the corresponding videos; two perceptually different videos should have
different fingerprints. Ideally, video fingerprint should be robust, discriminant, easy to compute, compact,
secure, low complex.
Video Fingerprint Extraction Using TIRI – DCT
20
Fig. 1 Overall Structure of Fingerprinting System.
III. TRADITIONAL VIDEO FINGERPRINT EXTRACTION ALGORITHMS
Existing video fingerprint extraction algorithms are color-space based fingerprints, temporal
fingerprints, spatial fingerprints, and spatio-temporal fingerprints.
3.1 Color-space-based fingerprints
They are mostly derived from the histograms of the colors in specific regions in time and/or space
within the video. According to Lienhart [2] the color coherence vector (CCV) differentiates between pixels of
the same color depending on the size of the color region they belong to. Lienhart et al. and Sanchez et al. have
been tested for the domain of TV commercials and are susceptible to color variations. Naphade el al. proposed a
technique that was also experimented by Hampapur el al. Naphade[3][4] proposed to use YUV histograms as
the signature of each frame in the sequence and the use of histogram intersection as a distance measure between
two signatures (frames). Disadvantages of color-space-based fingerprint are that color features change with
different video formats and color features are not applicable to black and white videos.
3.2Temporal fingerprints
Temporal fingerprint algorithms can be applied to the luminance (the gray level) value of the frames.
According to Indyk and Shivkumar[5], first, a video sequence is segmented into shots. Then, the duration of
each shot is taken as a temporal signature, and the sequence of concatenated shot durations form the fingerprint
of the video. Temporal signatures are computed on adjacent frames in a video. Temporal fingerprints are
extracted from the characteristics of a video sequence over time. These features usually work well with long
video sequences, but do not perform well for short video clips since they do not contain sufficient discriminant
temporal information.
3.3 Spatial fingerprints
Spatial fingerprints are features derived from each frame or from a key frame. They are widely used for
both video and image fingerprinting. Spatial fingerprints can be further subdivided into global and local
fingerprints. One shortcoming of spatial fingerprints is their inability to capture the video’s temporal
information, which is an important discriminating factor. Therefore spatio-temporal fingerprints [9][10] are
developed.
3.4 Spatio-temporal fingerprints
Spatio-temporal fingerprints that contain both spatial and temporal information about the video are thus
expected to perform better than fingerprints that use only spatial or temporal fingerprints. Some spatio-temporal
algorithms consider a video as a three-dimensional (3-D) matrix and extract 3-D transform-based features [6][7].
IV. PROPOSED TIRI- DCT ALGORITHM
Figure 3 shows the block diagram of our proposed approach which is based on temporally informative
representative images (TIRIs). TIRI-DCT Algorithm includes following steps
Video Fingerprint Extraction Using TIRI – DCT
21
Step 1: Generate TIRIs from each segment of J frames after preprocessing of input video .TIRIs are generated
using .
Step 2: Segment each TIRI into overlapping blocks of size , using
Where and
When indexes are outside of boundary then TIRI image is padded with 0’s.
Step 3: Extract DCT coefficient from each TIRI block. These are first horizontal and first vertical DCT
coefficient. First vertical frequency can be found for as
Where
Step 4: Concatenate all coefficients to form feature vector f.
Step 5: Find median m, using all elements of f.
Step 6: Generate binary hash h, using f
And 1 is column vector of all ones. Similarly first horizontal frequency can be found for as
Fig. 2 Schematic of the TIRI-DCT algorithm
Due to increasing online video repositories, copyright infringements and data piracy have become
serious concerns .Many videos uploaded on internet are illegal copies or manipulated versions of existing media.
So today’s widespread video copyright infringement calls for the development of fast and accurate copy-
detection algorithms. Temporally Informative Representative Images (TIRI) - Discrete Cosine Transform (DCT)
extracts compact content-based signatures from special images constructed from the video. Each image in TIRI
represents a short segment of the video and contains temporal as well as spatial information about the video
segment. The disadvantages of existing fingerprint extraction systems are overcome in Proposed TIRI-DCT.
TIRI-DCT is based on temporally informative representative Images. As a Temporally informative
representative Images (TIRI) contains spatial and temporal information of a short segment of a video sequence,
the spatial feature extracted from a TIRI would also contain temporal information.TIRI-DCT is faster than 3D-
DCT while maintaining a very good performance over the range of the considered attacks. Another important
property of TIRI-DCT is that it is computationally less demanding than 3D-DCT.
V. EXPERIMENTAL RESULTS
50
constant
linear exponential
Fig. 3 Frame 50 of the sequence akiyo_qcif.yuv and the resulting TIRIs with different weighting functions for
constant, linear, exponential
Video Fingerprint Extraction Using TIRI – DCT
22
We have examined different weight factors (constant, linear, and exponential). Figure 3 shows the
corresponding TIRIs using three different weighting functions as constant, linear, and exponential. It observed
that exponential weighting factor generates images that best capture the motion. So we have chosen the
exponential weighting function for generating TIRIs.
Fig. 4 Overlapping Block Image
10 20 30 40 50 60 70 80 90
0.999
0.999
0.9991
0.9991
0.9992
0.9992
0.9993
0.9993
0.9994
0.9994
noise var
F-0.5
-0.8 -0.6 -0.4 -0.2 0 0.2 0.4 0.6 0.8
0.996
0.9965
0.997
0.9975
0.998
0.9985
0.999
0.9995
1
1.0005
b
F-0.5
-5 -4 -3 -2 -1 0 1 2 3 4 5
0.9975
0.998
0.9985
0.999
0.9995
1
r
F-0.5
-4 -3 -2 -1 0 1 2 3 4
0.9997
0.9997
0.9997
0.9997
0.9998
0.9998
0.9998
0.9998
0.9998
0.9999
space shift
F-0.5
Fig. 5 F-score of TIRI -DCT for different attack parameters like Noise, Brightness, Rotation and Space Shift
respectively
Overlapping block image for sequence akiyo_qcif.yuv is as shown in figure 4. We evaluate the
performance of the proposed TIRI-DCT algorithm .We evaluate F-score of TIRI-DCT for different attack
parameters like noise, brightness,rotation space shift etc. as shown in figure 5. Figure 6 shows the receiver
operating characteristic (ROC) curve for different values of when
0 0.05 0.1 0.15 0.2 0.25 0.3 0.35
0.8
1
1.2
1.4
1.6
1.8
2
2.2
2.4
2.6
2.8
FPR
TPR
Fig.6 ROC for akiyo_qcif.yuv
overlap block image
Video Fingerprint Extraction Using TIRI – DCT
23
1 2 3 4 5 6 7
-2
-1.5
-1
-0.5
0
0.5
1
1.5
2
method
amountofchange
1-Noise2-Brightness3-Contrast4-Rotation5-Timeshift6-Spatialshift7-frame drop
TPR
FPR
F
Fig. 7 Amount of change in the average TPR, FPR and F score
Fig 7 shows amount of change in average TPR, FPR and F score for akiyo_qcif.yuv.
REFERENCES
[1] Sunil Lee and Chang D. Yoo, “Robust Video Fingerprinting for Content-Based Video Identification”,
IEEE Transactions Circuits And Systems For Video Technology, Vol. 18, NO. 7, July 2008
[2] J. Law-To, L. Chen, A. Joly, I. Laptev, O. Buisson, V. Gouet-Brunet, N. Boujemaa, and F. Stentiford,
“Video copy detection: A comparative study”, in Proc. Conf. Image Video Retrieval (CIVR), 2007
[3] C. K. R. Lienhart and W. Effelsberg, “On the detection and recognition of television commercials”, in
Proc. of the IEEE Conf. on Multimedia Computing and Systems, 1997.
[4] J. V. J. M. Sanchez, X. Binefa and P. Radeva., “Local color analysis for scene break detection applied
to TV commercials recognition” ,in Proceedings of Visual 99, June 1999.
[5] P. Indyk, G. Iyengar, and N. Shivakumar “Finding pirated video sequences on the internet”, Technical
report, Stanford University, 1999.
[6] A. Hampapur and R. Bolle. “Comparison of sequence matching techniques for video copy detection”,
In Conference on Storage and Retrieval for Media Databases, 2002
[7] Chen, L. and Stentiford, F. W. M., “Video sequence matching based on temporal ordinal measurement”,
Pattern Recognition Letters, vol. 29, no. 13, Oct. 2008.
[8] Mani Malek Esmaeili, Mehrdad Fatourechi, and Rabab Kreidieh Ward, “A Robust
And Fast Video Copy Detection System Using Content-Based Fingerprinting”, IEEE Trans. On
Information Forensics and Security”, Vol. 6, No. 1, March 2011
[9] B. Coskun, B. Sankur, and N. Memon, “Spatiotemporal transform based video hashing”, IEEE Trans.
Multimedia, vol. 8, no. 6, Dec. 2006.
[10] G.Willems, T. Tuytelaars, and L. Van Gool, “Spatio-temporal features for robust content-based video
copy detection”, in Proc. ACMInt. Conf. Multimedia Information Retrieval, New York, NY, 2008,
ACM.

More Related Content

What's hot

International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
IRJET - Information Hiding in H.264/AVC using Digital Watermarking
IRJET -  	  Information Hiding in H.264/AVC using Digital WatermarkingIRJET -  	  Information Hiding in H.264/AVC using Digital Watermarking
IRJET - Information Hiding in H.264/AVC using Digital WatermarkingIRJET Journal
 
Video copy detection using segmentation method and
Video copy detection using segmentation method andVideo copy detection using segmentation method and
Video copy detection using segmentation method andeSAT Publishing House
 
Video Compression Using Block By Block Basis Salience Detection
Video Compression Using Block By Block Basis Salience DetectionVideo Compression Using Block By Block Basis Salience Detection
Video Compression Using Block By Block Basis Salience DetectionIRJET Journal
 
IRJET-Feature Extraction from Video Data for Indexing and Retrieval
IRJET-Feature Extraction from Video Data for Indexing and Retrieval IRJET-Feature Extraction from Video Data for Indexing and Retrieval
IRJET-Feature Extraction from Video Data for Indexing and Retrieval IRJET Journal
 
IRJET- Human Fall Detection using Co-Saliency-Enhanced Deep Recurrent Convolu...
IRJET- Human Fall Detection using Co-Saliency-Enhanced Deep Recurrent Convolu...IRJET- Human Fall Detection using Co-Saliency-Enhanced Deep Recurrent Convolu...
IRJET- Human Fall Detection using Co-Saliency-Enhanced Deep Recurrent Convolu...IRJET Journal
 
Chris Varekamp (Philips Group Innovation, Research): Depth estimation, Proces...
Chris Varekamp (Philips Group Innovation, Research): Depth estimation, Proces...Chris Varekamp (Philips Group Innovation, Research): Depth estimation, Proces...
Chris Varekamp (Philips Group Innovation, Research): Depth estimation, Proces...AugmentedWorldExpo
 
IJSRED-V2I3P80
IJSRED-V2I3P80IJSRED-V2I3P80
IJSRED-V2I3P80IJSRED
 
Flexible Transport of 3D Videos over Networks
Flexible Transport of 3D Videos over NetworksFlexible Transport of 3D Videos over Networks
Flexible Transport of 3D Videos over NetworksAhmed Hamza
 
Secured Video Watermarking Based On DWT
Secured Video Watermarking Based On DWTSecured Video Watermarking Based On DWT
Secured Video Watermarking Based On DWTEditor IJMTER
 
Jiri ece-01-03 adaptive temporal averaging and frame prediction based surveil...
Jiri ece-01-03 adaptive temporal averaging and frame prediction based surveil...Jiri ece-01-03 adaptive temporal averaging and frame prediction based surveil...
Jiri ece-01-03 adaptive temporal averaging and frame prediction based surveil...Ijripublishers Ijri
 
3-D Video Formats and Coding- A review
3-D Video Formats and Coding- A review3-D Video Formats and Coding- A review
3-D Video Formats and Coding- A reviewinventionjournals
 
Performance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A SurveyPerformance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A SurveyEditor IJCATR
 
Action event retrieval from cricket video using audio energy feature for even...
Action event retrieval from cricket video using audio energy feature for even...Action event retrieval from cricket video using audio energy feature for even...
Action event retrieval from cricket video using audio energy feature for even...IAEME Publication
 

What's hot (20)

International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
IRJET - Information Hiding in H.264/AVC using Digital Watermarking
IRJET -  	  Information Hiding in H.264/AVC using Digital WatermarkingIRJET -  	  Information Hiding in H.264/AVC using Digital Watermarking
IRJET - Information Hiding in H.264/AVC using Digital Watermarking
 
Video copy detection using segmentation method and
Video copy detection using segmentation method andVideo copy detection using segmentation method and
Video copy detection using segmentation method and
 
Video Compression Using Block By Block Basis Salience Detection
Video Compression Using Block By Block Basis Salience DetectionVideo Compression Using Block By Block Basis Salience Detection
Video Compression Using Block By Block Basis Salience Detection
 
IRJET-Feature Extraction from Video Data for Indexing and Retrieval
IRJET-Feature Extraction from Video Data for Indexing and Retrieval IRJET-Feature Extraction from Video Data for Indexing and Retrieval
IRJET-Feature Extraction from Video Data for Indexing and Retrieval
 
IRJET- Human Fall Detection using Co-Saliency-Enhanced Deep Recurrent Convolu...
IRJET- Human Fall Detection using Co-Saliency-Enhanced Deep Recurrent Convolu...IRJET- Human Fall Detection using Co-Saliency-Enhanced Deep Recurrent Convolu...
IRJET- Human Fall Detection using Co-Saliency-Enhanced Deep Recurrent Convolu...
 
F0953235
F0953235F0953235
F0953235
 
Chris Varekamp (Philips Group Innovation, Research): Depth estimation, Proces...
Chris Varekamp (Philips Group Innovation, Research): Depth estimation, Proces...Chris Varekamp (Philips Group Innovation, Research): Depth estimation, Proces...
Chris Varekamp (Philips Group Innovation, Research): Depth estimation, Proces...
 
IJSRED-V2I3P80
IJSRED-V2I3P80IJSRED-V2I3P80
IJSRED-V2I3P80
 
Flexible Transport of 3D Videos over Networks
Flexible Transport of 3D Videos over NetworksFlexible Transport of 3D Videos over Networks
Flexible Transport of 3D Videos over Networks
 
Secured Video Watermarking Based On DWT
Secured Video Watermarking Based On DWTSecured Video Watermarking Based On DWT
Secured Video Watermarking Based On DWT
 
A04840107
A04840107A04840107
A04840107
 
F010413438
F010413438F010413438
F010413438
 
Jiri ece-01-03 adaptive temporal averaging and frame prediction based surveil...
Jiri ece-01-03 adaptive temporal averaging and frame prediction based surveil...Jiri ece-01-03 adaptive temporal averaging and frame prediction based surveil...
Jiri ece-01-03 adaptive temporal averaging and frame prediction based surveil...
 
3D Video: From Stereo to Multi-View
3D Video: From Stereo to Multi-View3D Video: From Stereo to Multi-View
3D Video: From Stereo to Multi-View
 
3-D Video Formats and Coding- A review
3-D Video Formats and Coding- A review3-D Video Formats and Coding- A review
3-D Video Formats and Coding- A review
 
Performance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A SurveyPerformance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A Survey
 
[IJET-V1I6P5] Authors: Tawde Priyanka, Londhe Archana, Nazirkar Sandhya, Khat...
[IJET-V1I6P5] Authors: Tawde Priyanka, Londhe Archana, Nazirkar Sandhya, Khat...[IJET-V1I6P5] Authors: Tawde Priyanka, Londhe Archana, Nazirkar Sandhya, Khat...
[IJET-V1I6P5] Authors: Tawde Priyanka, Londhe Archana, Nazirkar Sandhya, Khat...
 
C1 mala1 akila
C1 mala1 akilaC1 mala1 akila
C1 mala1 akila
 
Action event retrieval from cricket video using audio energy feature for even...
Action event retrieval from cricket video using audio energy feature for even...Action event retrieval from cricket video using audio energy feature for even...
Action event retrieval from cricket video using audio energy feature for even...
 

Viewers also liked

International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Offshore Outsourcing Alternative Solution
Offshore Outsourcing Alternative SolutionOffshore Outsourcing Alternative Solution
Offshore Outsourcing Alternative SolutionSynergroup
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Mi comunidad en trazos. Una propuesta disruptiva ...
Mi comunidad en trazos. Una propuesta disruptiva ...Mi comunidad en trazos. Una propuesta disruptiva ...
Mi comunidad en trazos. Una propuesta disruptiva ...Carlos Luis Gomez Valderrama
 

Viewers also liked (7)

International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Offshore Outsourcing Alternative Solution
Offshore Outsourcing Alternative SolutionOffshore Outsourcing Alternative Solution
Offshore Outsourcing Alternative Solution
 
L0704065070
L0704065070L0704065070
L0704065070
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Mal radical-banal
Mal radical-banalMal radical-banal
Mal radical-banal
 
Mi comunidad en trazos. Una propuesta disruptiva ...
Mi comunidad en trazos. Una propuesta disruptiva ...Mi comunidad en trazos. Una propuesta disruptiva ...
Mi comunidad en trazos. Una propuesta disruptiva ...
 

Similar to E0704019023

Recent advances in content based video copy detection (IEEE)
Recent advances in content based video copy detection (IEEE)Recent advances in content based video copy detection (IEEE)
Recent advances in content based video copy detection (IEEE)PACE 2.0
 
Inverted File Based Search Technique for Video Copy Retrieval
Inverted File Based Search Technique for Video Copy RetrievalInverted File Based Search Technique for Video Copy Retrieval
Inverted File Based Search Technique for Video Copy Retrievalijcsa
 
An Exploration based on Multifarious Video Copy Detection Strategies
An Exploration based on Multifarious Video Copy Detection StrategiesAn Exploration based on Multifarious Video Copy Detection Strategies
An Exploration based on Multifarious Video Copy Detection Strategiesidescitation
 
PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...
PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...
PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...IJCSEIT Journal
 
Video Content Identification using Video Signature: Survey
Video Content Identification using Video Signature: SurveyVideo Content Identification using Video Signature: Survey
Video Content Identification using Video Signature: SurveyIRJET Journal
 
Video Liveness Verification
Video Liveness VerificationVideo Liveness Verification
Video Liveness Verificationijtsrd
 
VIDEO SUMMARIZATION: CORRELATION FOR SUMMARIZATION AND SUBTRACTION FOR RARE E...
VIDEO SUMMARIZATION: CORRELATION FOR SUMMARIZATION AND SUBTRACTION FOR RARE E...VIDEO SUMMARIZATION: CORRELATION FOR SUMMARIZATION AND SUBTRACTION FOR RARE E...
VIDEO SUMMARIZATION: CORRELATION FOR SUMMARIZATION AND SUBTRACTION FOR RARE E...Journal For Research
 
A survey on passive digital video forgery detection techniques
A survey on passive digital video forgery detection techniquesA survey on passive digital video forgery detection techniques
A survey on passive digital video forgery detection techniquesIJECEIAES
 
Parking Surveillance Footage Summarization
Parking Surveillance Footage SummarizationParking Surveillance Footage Summarization
Parking Surveillance Footage SummarizationIRJET Journal
 
Effective Compression of Digital Video
Effective Compression of Digital VideoEffective Compression of Digital Video
Effective Compression of Digital VideoIRJET Journal
 
A Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking TechniquesA Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking Techniquestheijes
 
Mobile Recorded Videos
Mobile Recorded Videos Mobile Recorded Videos
Mobile Recorded Videos IJECEIAES
 
18 17 jan17 13470 rakesh ahuja revised-version(edit)
18 17 jan17 13470 rakesh ahuja revised-version(edit)18 17 jan17 13470 rakesh ahuja revised-version(edit)
18 17 jan17 13470 rakesh ahuja revised-version(edit)IAESIJEECS
 
IRJET - Applications of Image and Video Deduplication: A Survey
IRJET -  	  Applications of Image and Video Deduplication: A SurveyIRJET -  	  Applications of Image and Video Deduplication: A Survey
IRJET - Applications of Image and Video Deduplication: A SurveyIRJET Journal
 
Key frame extraction methodology for video annotation
Key frame extraction methodology for video annotationKey frame extraction methodology for video annotation
Key frame extraction methodology for video annotationIAEME Publication
 
Surveillance using Video Analytics
Surveillance using Video AnalyticsSurveillance using Video Analytics
Surveillance using Video Analyticsidescitation
 
Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...
Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...
Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...Editor IJMTER
 
Paper id 312201518
Paper id 312201518Paper id 312201518
Paper id 312201518IJRAT
 
"Using Deep Learning for Video Event Detection on a Compute Budget," a Presen...
"Using Deep Learning for Video Event Detection on a Compute Budget," a Presen..."Using Deep Learning for Video Event Detection on a Compute Budget," a Presen...
"Using Deep Learning for Video Event Detection on a Compute Budget," a Presen...Edge AI and Vision Alliance
 

Similar to E0704019023 (20)

Recent advances in content based video copy detection (IEEE)
Recent advances in content based video copy detection (IEEE)Recent advances in content based video copy detection (IEEE)
Recent advances in content based video copy detection (IEEE)
 
Inverted File Based Search Technique for Video Copy Retrieval
Inverted File Based Search Technique for Video Copy RetrievalInverted File Based Search Technique for Video Copy Retrieval
Inverted File Based Search Technique for Video Copy Retrieval
 
An Exploration based on Multifarious Video Copy Detection Strategies
An Exploration based on Multifarious Video Copy Detection StrategiesAn Exploration based on Multifarious Video Copy Detection Strategies
An Exploration based on Multifarious Video Copy Detection Strategies
 
PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...
PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...
PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...
 
Video Content Identification using Video Signature: Survey
Video Content Identification using Video Signature: SurveyVideo Content Identification using Video Signature: Survey
Video Content Identification using Video Signature: Survey
 
Video Liveness Verification
Video Liveness VerificationVideo Liveness Verification
Video Liveness Verification
 
VIDEO SUMMARIZATION: CORRELATION FOR SUMMARIZATION AND SUBTRACTION FOR RARE E...
VIDEO SUMMARIZATION: CORRELATION FOR SUMMARIZATION AND SUBTRACTION FOR RARE E...VIDEO SUMMARIZATION: CORRELATION FOR SUMMARIZATION AND SUBTRACTION FOR RARE E...
VIDEO SUMMARIZATION: CORRELATION FOR SUMMARIZATION AND SUBTRACTION FOR RARE E...
 
A survey on passive digital video forgery detection techniques
A survey on passive digital video forgery detection techniquesA survey on passive digital video forgery detection techniques
A survey on passive digital video forgery detection techniques
 
Parking Surveillance Footage Summarization
Parking Surveillance Footage SummarizationParking Surveillance Footage Summarization
Parking Surveillance Footage Summarization
 
Effective Compression of Digital Video
Effective Compression of Digital VideoEffective Compression of Digital Video
Effective Compression of Digital Video
 
A Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking TechniquesA Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking Techniques
 
Mobile Recorded Videos
Mobile Recorded Videos Mobile Recorded Videos
Mobile Recorded Videos
 
18 17 jan17 13470 rakesh ahuja revised-version(edit)
18 17 jan17 13470 rakesh ahuja revised-version(edit)18 17 jan17 13470 rakesh ahuja revised-version(edit)
18 17 jan17 13470 rakesh ahuja revised-version(edit)
 
IRJET - Applications of Image and Video Deduplication: A Survey
IRJET -  	  Applications of Image and Video Deduplication: A SurveyIRJET -  	  Applications of Image and Video Deduplication: A Survey
IRJET - Applications of Image and Video Deduplication: A Survey
 
Key frame extraction methodology for video annotation
Key frame extraction methodology for video annotationKey frame extraction methodology for video annotation
Key frame extraction methodology for video annotation
 
Surveillance using Video Analytics
Surveillance using Video AnalyticsSurveillance using Video Analytics
Surveillance using Video Analytics
 
Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...
Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...
Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...
 
AcademicProject
AcademicProjectAcademicProject
AcademicProject
 
Paper id 312201518
Paper id 312201518Paper id 312201518
Paper id 312201518
 
"Using Deep Learning for Video Event Detection on a Compute Budget," a Presen...
"Using Deep Learning for Video Event Detection on a Compute Budget," a Presen..."Using Deep Learning for Video Event Detection on a Compute Budget," a Presen...
"Using Deep Learning for Video Event Detection on a Compute Budget," a Presen...
 

More from IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEIJERD Editor
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignIJERD Editor
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationIJERD Editor
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string valueIJERD Editor
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingIJERD Editor
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart GridIJERD Editor
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
 

More from IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 

Recently uploaded

Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 

Recently uploaded (20)

Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 

E0704019023

  • 1. International Journal of Engineering Research and Development e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com Volume 7, Issue 4 (May 2013), PP. 19-23 19 Video Fingerprint Extraction Using TIRI – DCT Vaishali V. Sarbhukan1 , Prof. V. B. Gaikwad2 1Terna Engineering College,PG Student, Nerul,Navi Mumbai 2Terna Engineering College, Associate Professor, Nerul,Navi Mumbai Abstract:- Nowadays copyright infringement and data piracy are major serious concerns. Thousands of videos are being uploaded to the internet and are shared every day. Out of these videos, considerable numbers of videos are illegal copies or some videos are manipulated versions of existing media. Due to these reasons copyright management on the internet becomes a complicated process. To detect such kind of infringements, there are two approaches. First is based on watermarking and other is based on content-based copy detection (CBCD). Video copy detection system relies on a fingerprint extraction algorithm. The fingerprint extraction algorithm extracts compact content- based signatures from special images constructed from the video. Each such image represents a short segment of the video and contains temporal as well as spatial information about the video segment. These images are denoted by temporally informative representative images. Existing video fingerprint extraction algorithms have certain limitations. Therefore temporally informative representative images - discrete cosine transform (TIRI-DCT) is developed. TIRI-DCT is based on temporally informative representative images which contains spatial and temporal information of a short segment of a video sequence. Keywords:- Fingerprinting System ,Video Copy Retrieval, Fingerprint Extraction Methods, TIRI- DCT, Content based Copy Detection I. INTRODUCTION Digital videos can be found on TV Channels, Web-TV, Video Blogs and the public Video Web servers. The massive capacity of these sources makes the tracing of video content into a very hard problem for video professionals. Recently for increasing online video repositories copyright infringements and data piracy have become serious concerns. Copyright infringement occurs when someone other than the copyright holder copies the “expression” of a work. Today’s widespread video copyright infringement calls for the development of fast and accurate copy-detection algorithms. To detect infringements, there are two approaches. First is based on watermarking and other is based on content-based copy detection (CBCD).The watermarking is a widely used technique in the photography field. It allows the owner to detect whether the image has been copied or not. The limitations [1] of watermarks are that if the original image is not watermarked, then it is not possible to know if other images are copied or not. The primary aim of content-based copy detection (CBCD) is “the media itself is the watermark”. II. STRUCTURE OF FINGERPRINTING SYSTEM Figure 1 shows the overall structure of this fingerprinting system [8].Content-based copy detection finds the duplicate by comparing the fingerprint of the query video with the fingerprints of the copyrighted videos. To find a copy of a query video in a video database, one can search for a close match of its fingerprint in the corresponding fingerprint database (extracted from the videos in the database). Closeness of two fingerprints represents a similarity between the corresponding videos; two perceptually different videos should have different fingerprints. Ideally, video fingerprint should be robust, discriminant, easy to compute, compact, secure, low complex.
  • 2. Video Fingerprint Extraction Using TIRI – DCT 20 Fig. 1 Overall Structure of Fingerprinting System. III. TRADITIONAL VIDEO FINGERPRINT EXTRACTION ALGORITHMS Existing video fingerprint extraction algorithms are color-space based fingerprints, temporal fingerprints, spatial fingerprints, and spatio-temporal fingerprints. 3.1 Color-space-based fingerprints They are mostly derived from the histograms of the colors in specific regions in time and/or space within the video. According to Lienhart [2] the color coherence vector (CCV) differentiates between pixels of the same color depending on the size of the color region they belong to. Lienhart et al. and Sanchez et al. have been tested for the domain of TV commercials and are susceptible to color variations. Naphade el al. proposed a technique that was also experimented by Hampapur el al. Naphade[3][4] proposed to use YUV histograms as the signature of each frame in the sequence and the use of histogram intersection as a distance measure between two signatures (frames). Disadvantages of color-space-based fingerprint are that color features change with different video formats and color features are not applicable to black and white videos. 3.2Temporal fingerprints Temporal fingerprint algorithms can be applied to the luminance (the gray level) value of the frames. According to Indyk and Shivkumar[5], first, a video sequence is segmented into shots. Then, the duration of each shot is taken as a temporal signature, and the sequence of concatenated shot durations form the fingerprint of the video. Temporal signatures are computed on adjacent frames in a video. Temporal fingerprints are extracted from the characteristics of a video sequence over time. These features usually work well with long video sequences, but do not perform well for short video clips since they do not contain sufficient discriminant temporal information. 3.3 Spatial fingerprints Spatial fingerprints are features derived from each frame or from a key frame. They are widely used for both video and image fingerprinting. Spatial fingerprints can be further subdivided into global and local fingerprints. One shortcoming of spatial fingerprints is their inability to capture the video’s temporal information, which is an important discriminating factor. Therefore spatio-temporal fingerprints [9][10] are developed. 3.4 Spatio-temporal fingerprints Spatio-temporal fingerprints that contain both spatial and temporal information about the video are thus expected to perform better than fingerprints that use only spatial or temporal fingerprints. Some spatio-temporal algorithms consider a video as a three-dimensional (3-D) matrix and extract 3-D transform-based features [6][7]. IV. PROPOSED TIRI- DCT ALGORITHM Figure 3 shows the block diagram of our proposed approach which is based on temporally informative representative images (TIRIs). TIRI-DCT Algorithm includes following steps
  • 3. Video Fingerprint Extraction Using TIRI – DCT 21 Step 1: Generate TIRIs from each segment of J frames after preprocessing of input video .TIRIs are generated using . Step 2: Segment each TIRI into overlapping blocks of size , using Where and When indexes are outside of boundary then TIRI image is padded with 0’s. Step 3: Extract DCT coefficient from each TIRI block. These are first horizontal and first vertical DCT coefficient. First vertical frequency can be found for as Where Step 4: Concatenate all coefficients to form feature vector f. Step 5: Find median m, using all elements of f. Step 6: Generate binary hash h, using f And 1 is column vector of all ones. Similarly first horizontal frequency can be found for as Fig. 2 Schematic of the TIRI-DCT algorithm Due to increasing online video repositories, copyright infringements and data piracy have become serious concerns .Many videos uploaded on internet are illegal copies or manipulated versions of existing media. So today’s widespread video copyright infringement calls for the development of fast and accurate copy- detection algorithms. Temporally Informative Representative Images (TIRI) - Discrete Cosine Transform (DCT) extracts compact content-based signatures from special images constructed from the video. Each image in TIRI represents a short segment of the video and contains temporal as well as spatial information about the video segment. The disadvantages of existing fingerprint extraction systems are overcome in Proposed TIRI-DCT. TIRI-DCT is based on temporally informative representative Images. As a Temporally informative representative Images (TIRI) contains spatial and temporal information of a short segment of a video sequence, the spatial feature extracted from a TIRI would also contain temporal information.TIRI-DCT is faster than 3D- DCT while maintaining a very good performance over the range of the considered attacks. Another important property of TIRI-DCT is that it is computationally less demanding than 3D-DCT. V. EXPERIMENTAL RESULTS 50 constant linear exponential Fig. 3 Frame 50 of the sequence akiyo_qcif.yuv and the resulting TIRIs with different weighting functions for constant, linear, exponential
  • 4. Video Fingerprint Extraction Using TIRI – DCT 22 We have examined different weight factors (constant, linear, and exponential). Figure 3 shows the corresponding TIRIs using three different weighting functions as constant, linear, and exponential. It observed that exponential weighting factor generates images that best capture the motion. So we have chosen the exponential weighting function for generating TIRIs. Fig. 4 Overlapping Block Image 10 20 30 40 50 60 70 80 90 0.999 0.999 0.9991 0.9991 0.9992 0.9992 0.9993 0.9993 0.9994 0.9994 noise var F-0.5 -0.8 -0.6 -0.4 -0.2 0 0.2 0.4 0.6 0.8 0.996 0.9965 0.997 0.9975 0.998 0.9985 0.999 0.9995 1 1.0005 b F-0.5 -5 -4 -3 -2 -1 0 1 2 3 4 5 0.9975 0.998 0.9985 0.999 0.9995 1 r F-0.5 -4 -3 -2 -1 0 1 2 3 4 0.9997 0.9997 0.9997 0.9997 0.9998 0.9998 0.9998 0.9998 0.9998 0.9999 space shift F-0.5 Fig. 5 F-score of TIRI -DCT for different attack parameters like Noise, Brightness, Rotation and Space Shift respectively Overlapping block image for sequence akiyo_qcif.yuv is as shown in figure 4. We evaluate the performance of the proposed TIRI-DCT algorithm .We evaluate F-score of TIRI-DCT for different attack parameters like noise, brightness,rotation space shift etc. as shown in figure 5. Figure 6 shows the receiver operating characteristic (ROC) curve for different values of when 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.8 1 1.2 1.4 1.6 1.8 2 2.2 2.4 2.6 2.8 FPR TPR Fig.6 ROC for akiyo_qcif.yuv overlap block image
  • 5. Video Fingerprint Extraction Using TIRI – DCT 23 1 2 3 4 5 6 7 -2 -1.5 -1 -0.5 0 0.5 1 1.5 2 method amountofchange 1-Noise2-Brightness3-Contrast4-Rotation5-Timeshift6-Spatialshift7-frame drop TPR FPR F Fig. 7 Amount of change in the average TPR, FPR and F score Fig 7 shows amount of change in average TPR, FPR and F score for akiyo_qcif.yuv. REFERENCES [1] Sunil Lee and Chang D. Yoo, “Robust Video Fingerprinting for Content-Based Video Identification”, IEEE Transactions Circuits And Systems For Video Technology, Vol. 18, NO. 7, July 2008 [2] J. Law-To, L. Chen, A. Joly, I. Laptev, O. Buisson, V. Gouet-Brunet, N. Boujemaa, and F. Stentiford, “Video copy detection: A comparative study”, in Proc. Conf. Image Video Retrieval (CIVR), 2007 [3] C. K. R. Lienhart and W. Effelsberg, “On the detection and recognition of television commercials”, in Proc. of the IEEE Conf. on Multimedia Computing and Systems, 1997. [4] J. V. J. M. Sanchez, X. Binefa and P. Radeva., “Local color analysis for scene break detection applied to TV commercials recognition” ,in Proceedings of Visual 99, June 1999. [5] P. Indyk, G. Iyengar, and N. Shivakumar “Finding pirated video sequences on the internet”, Technical report, Stanford University, 1999. [6] A. Hampapur and R. Bolle. “Comparison of sequence matching techniques for video copy detection”, In Conference on Storage and Retrieval for Media Databases, 2002 [7] Chen, L. and Stentiford, F. W. M., “Video sequence matching based on temporal ordinal measurement”, Pattern Recognition Letters, vol. 29, no. 13, Oct. 2008. [8] Mani Malek Esmaeili, Mehrdad Fatourechi, and Rabab Kreidieh Ward, “A Robust And Fast Video Copy Detection System Using Content-Based Fingerprinting”, IEEE Trans. On Information Forensics and Security”, Vol. 6, No. 1, March 2011 [9] B. Coskun, B. Sankur, and N. Memon, “Spatiotemporal transform based video hashing”, IEEE Trans. Multimedia, vol. 8, no. 6, Dec. 2006. [10] G.Willems, T. Tuytelaars, and L. Van Gool, “Spatio-temporal features for robust content-based video copy detection”, in Proc. ACMInt. Conf. Multimedia Information Retrieval, New York, NY, 2008, ACM.