SlideShare a Scribd company logo
1 of 3
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 182
IMPLEMENTATION OF VIDEO TAGGING: IDENTIFYING
CHARACTERS IN VIDEO
Akshay Bhardwaj1
, Ramani S2
, Mayank Goyal3
1
Student, School of Computing Science and Engineering, Vellore Institute of Technology, Vellore, India
2
Assistant Professor, School of Computing Science and Engineering, Vellore Institute of Technology, Vellore, India
3
Student, School of Computing Science and Engineering, Vellore Institute of Technology, Vellore, India
Abstract
Automatic face detection in movies has been an interesting area of research. Due to the various appearances of the characters in the
moving film it is not easy to identify the true faces. There has been a significant growth in the field of image processing to detect still
human faces with high accuracy and results. This idea can be further used to implement video tagging. We see biometric security
check points that compare still images to verify a person in the database and the same can be done if a person is in the motion. This
paper proposes a method to identify characters appearing in the moving film.
Keywords—Video Tagging, Image processing, Eigen objects, Security, Template matching
----------------------------------------------------------------------***----------------------------------------------------------------------
1. INTRODUCTION
The growing video and TV content on the internet comes with
huge amount of digital video data just like still images. This
resulted in studying and developing efficient techniques for
understanding the video content. The concept of automatic video
analysis is one of the technologies which is studied and
implemented here.
Video tagging is a concept similar to image tagging with a
difference being that the faces are in the motion in the former.
The key concept is to store the image from a running video and
storing it after training under constraint like size of image, gray
scale and bytes. Photo tagging has been implemented in various
social media such as Facebook and Instagram where you can tag
a person once and the next time you upload a photo of the same
character his name will appear automatically.
The objective is to identify the human faces present in the
running film and label them with their corresponding identity for
example the name of character. Figure1 explains the underlying
idea by pointing the name of faces detected.
Fig.1
2. RELATED WORK
Template matching is a common technique where an object is
captured as an image called template.
The match will fail if the object appears scaled, rotated, or
skewed on the image. Instead, this can be done using Emgu CV
image processing library.It is written entirely in C#. The benefit
is that it can be compiled in mono and therefore is able to run on
any platform Mono supports, including Linux, Mac OS X, win.
It comprises of 2 layers, Layer 1 contains functions,
enumeration, structures and Layer 2 has classes. The figure
below is the architecture overview of the Emgu CV library.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 183
3. WORK DONE
The idea in this paper uses the above mentioned Emgu, an image
processing library to achieve the video tagging concept. The
process consists of mainly three following steps:
When the video is played or streamed the faces appearing on the
screen will be detected. Faces will have different orientation, size
and color. Only after the face of a person is detected, the
information of its identity will be entered that can be Name, ID,
Gender etc. of the person. This information will be stored in the
database as a tag which will be called in the future reference. So
when a video is played and the same person whose information is
already stored appears in that video, the system will recognize
him [8] and displays his related information.
4. IMPLEMENTATION OF VIDEO TAGGING
4.1 Detecting the Face
It uses simple rectangular features also called Haarfeature[2],
where each feature is a single valueobtained bysubtracting sum
of pixels under white rectangle from sumof pixels under black
rectangle. If the difference is above threshold, corresponding
feature like eyes, nose etc. are present. Then a special
representation of the sample called the integral image is used
which makes feature extraction faster. A series of AdaBoost[2]
classifiers works as a filter chain. Image sub regions that make it
through the entire cascade are classified as face. All others are
classified as non-face. The classifiers are used efficiently by
assigning heavily weighted filters first on the window, if a
window fails the first stage, discard it and we don’t consider
remaining features on it. If it passes we apply the remaining
featuresand continue the process. Finally once the face is
detected using above filters, we draw a focus around the region
to highlight the face.
4.2 Recognizing the face:
Once the faces are detected they are saved into database as
image templates. All the trained faces are histogram normalized
to convert them into 0-255 gray scale [3] and correspondingly
object recognizer is created for the given faces. Calculation of
Eigen image and correspondingly Eigen values are done after
that.And when the new face is detected, calculation of Eigen
distance value [4] of the projected face with the trained faces
isperformed.If the value of Eigen distance is greater than
threshold for a particular image, and we display the label of the
correspondingtrained face to the projected face.
Fig 2 Video tagging illustrations
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 184
5. CONCLUSIONS
Video tagging is done on a video with the concept explained in
the paper. Figure 2 shows the process steps taking place, a face
is recognized successfully after matching with the image
template of the person stored for the first time. Now if the same
person appears in that video or any other video, the face will be
automatically recognized by the system with a tag to tell who the
person is. Implemented concept of video tagging in this paper
can have various utilities.
FUTURE WORK
The basic concept will remain the same which is to identify a
character present in the video [5] or live streaming. The
following work can be done in future based on the work done-
Tagging a Video on the Facebook
Photo tagging is a major reason that makes photos special on
Facebook. So video tagging can be introduced too. You can tag a
video to show who’s in the video or tell who you are with. The
tag will be the user name of the person. When a friend is tagged
in the video, he will be notified through an alert. The user needs
to be tagged just once in a video and every time that person
appears in any video uploaded later; he will be recognized
automatically like auto photo tagging.
Biometric Security Checks for Secure Areas
In normal face recognition biometric test a person stands in front
of the detector and matches the traits with the once stored in the
system. In that a person should be still to match the features. So
using this idea there is no need to stop and unlock. The person
can be recognized while in motion and the camera will detect
and recognize if the person appearing on stream is valid in
database or not and permission will be granted if match is found.
REFERENCES
[1]. Jitao Sand and ChangshengXu, “Robust Face-Name Graph
Matching for Movie Character Identification”,
IEEETransactionson multimedia Vol. 14, no3, June 2012
[2]. P. Viola and M Jones, “Rapid Object Detection using
boosted cascade of simple features”. Computer Vision and
Pattern Recognition, IEEE CVPR.2001.990517 Vol1.
[3]. Dalal N and Triggs B, “Histograms of oriented gradients for
human detection”.Computer Vision and Pattern Recognition,
IEEE CVPR.2005.177 Vol1.
[4]. A. Sanfeliu and K. Fu, “A distance measure between
attributed relationalgraphs for pattern recognition,” IEEE Trans.
Syst. Man Cybern.vol.13, no. 3, 1983.
[5]. J. Stallkamp, H. K. Ekenel, and R. Stiefelhagen, “Video-
based face recognition on real-world data,” in Proc. Int. Conf.
Comput. Vis. 2007, pp. 1-8
[6]. channel9.msdn.com/Face-Detection-with-Emgu-CV-in-C-
and-WPF.
[7]. M. DharmatejaPurna, N. Praveen “A Novel Method for
Movie Character Identification and its Facial Expression
Recognition”, IJMER Vol.3, Issue.3 2013
[8]. W. Zhao, R. Chelappa, P. J. Phillips, and A. Rosenfeld,
“Face recognition: A literature survey,” ACM Compu. Survey.,
vol. 35, no. 4, pp. 399–458, 2003

More Related Content

What's hot

IRJET- Navigation and Camera Reading System for Visually Impaired
IRJET- Navigation and Camera Reading System for Visually ImpairedIRJET- Navigation and Camera Reading System for Visually Impaired
IRJET- Navigation and Camera Reading System for Visually ImpairedIRJET Journal
 
A survey paper on various biometric security system methods
A survey paper on various biometric security system methodsA survey paper on various biometric security system methods
A survey paper on various biometric security system methodsIRJET Journal
 
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...ijceronline
 
Eye(I) Still Know! – An App for the Blind Built using Web and AI
Eye(I) Still Know! – An App for the Blind Built using Web and AIEye(I) Still Know! – An App for the Blind Built using Web and AI
Eye(I) Still Know! – An App for the Blind Built using Web and AIDr. Amarjeet Singh
 
Authentication Using Graphical Password
Authentication Using Graphical PasswordAuthentication Using Graphical Password
Authentication Using Graphical Passwordijceronline
 
An overview of face liveness detection
An overview of face liveness detectionAn overview of face liveness detection
An overview of face liveness detectionijitjournal
 
IRJET- Applications of Object Detection System
IRJET-  	  Applications of Object Detection SystemIRJET-  	  Applications of Object Detection System
IRJET- Applications of Object Detection SystemIRJET Journal
 
IRJET - NETRA: Android Application for Visually Challenged People to Dete...
IRJET -  	  NETRA: Android Application for Visually Challenged People to Dete...IRJET -  	  NETRA: Android Application for Visually Challenged People to Dete...
IRJET - NETRA: Android Application for Visually Challenged People to Dete...IRJET Journal
 
Automatic Attendance Using Face Recognition
Automatic Attendance Using Face RecognitionAutomatic Attendance Using Face Recognition
Automatic Attendance Using Face Recognitionrahulmonikasharma
 
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...Bimodal Biometric System using Multiple Transformation Features of Fingerprin...
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...IDES Editor
 
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...IJTET Journal
 
A comparative review of various approaches for feature extraction in Face rec...
A comparative review of various approaches for feature extraction in Face rec...A comparative review of various approaches for feature extraction in Face rec...
A comparative review of various approaches for feature extraction in Face rec...Vishnupriya T H
 
The influence of eyes and brain
The influence of eyes and brainThe influence of eyes and brain
The influence of eyes and brainijma
 
Face Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image ProcessingFace Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image Processingpaperpublications3
 
Saksham seminar report
Saksham seminar reportSaksham seminar report
Saksham seminar reportSakshamTurki
 
Saksham presentation
Saksham presentationSaksham presentation
Saksham presentationSakshamTurki
 
IRJET- A Smart Personal AI Assistant for Visually Impaired People: A Survey
IRJET-  	  A Smart Personal AI Assistant for Visually Impaired People: A SurveyIRJET-  	  A Smart Personal AI Assistant for Visually Impaired People: A Survey
IRJET- A Smart Personal AI Assistant for Visually Impaired People: A SurveyIRJET Journal
 

What's hot (20)

IRJET- Navigation and Camera Reading System for Visually Impaired
IRJET- Navigation and Camera Reading System for Visually ImpairedIRJET- Navigation and Camera Reading System for Visually Impaired
IRJET- Navigation and Camera Reading System for Visually Impaired
 
A survey paper on various biometric security system methods
A survey paper on various biometric security system methodsA survey paper on various biometric security system methods
A survey paper on various biometric security system methods
 
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
 
Eye(I) Still Know! – An App for the Blind Built using Web and AI
Eye(I) Still Know! – An App for the Blind Built using Web and AIEye(I) Still Know! – An App for the Blind Built using Web and AI
Eye(I) Still Know! – An App for the Blind Built using Web and AI
 
Authentication Using Graphical Password
Authentication Using Graphical PasswordAuthentication Using Graphical Password
Authentication Using Graphical Password
 
Mini Project- Face Recognition
Mini Project- Face RecognitionMini Project- Face Recognition
Mini Project- Face Recognition
 
An overview of face liveness detection
An overview of face liveness detectionAn overview of face liveness detection
An overview of face liveness detection
 
IRJET- Applications of Object Detection System
IRJET-  	  Applications of Object Detection SystemIRJET-  	  Applications of Object Detection System
IRJET- Applications of Object Detection System
 
An optimal face recoginition tool
An optimal face recoginition toolAn optimal face recoginition tool
An optimal face recoginition tool
 
IRJET - NETRA: Android Application for Visually Challenged People to Dete...
IRJET -  	  NETRA: Android Application for Visually Challenged People to Dete...IRJET -  	  NETRA: Android Application for Visually Challenged People to Dete...
IRJET - NETRA: Android Application for Visually Challenged People to Dete...
 
Dq4301702706
Dq4301702706Dq4301702706
Dq4301702706
 
Automatic Attendance Using Face Recognition
Automatic Attendance Using Face RecognitionAutomatic Attendance Using Face Recognition
Automatic Attendance Using Face Recognition
 
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...Bimodal Biometric System using Multiple Transformation Features of Fingerprin...
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...
 
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
 
A comparative review of various approaches for feature extraction in Face rec...
A comparative review of various approaches for feature extraction in Face rec...A comparative review of various approaches for feature extraction in Face rec...
A comparative review of various approaches for feature extraction in Face rec...
 
The influence of eyes and brain
The influence of eyes and brainThe influence of eyes and brain
The influence of eyes and brain
 
Face Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image ProcessingFace Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image Processing
 
Saksham seminar report
Saksham seminar reportSaksham seminar report
Saksham seminar report
 
Saksham presentation
Saksham presentationSaksham presentation
Saksham presentation
 
IRJET- A Smart Personal AI Assistant for Visually Impaired People: A Survey
IRJET-  	  A Smart Personal AI Assistant for Visually Impaired People: A SurveyIRJET-  	  A Smart Personal AI Assistant for Visually Impaired People: A Survey
IRJET- A Smart Personal AI Assistant for Visually Impaired People: A Survey
 

Viewers also liked

International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Biosorption of hg (ii) from aqueous solutions
Biosorption of hg (ii) from aqueous solutionsBiosorption of hg (ii) from aqueous solutions
Biosorption of hg (ii) from aqueous solutionseSAT Publishing House
 
Identification of dynamic rigidity for high speed
Identification of dynamic rigidity for high speedIdentification of dynamic rigidity for high speed
Identification of dynamic rigidity for high speedeSAT Publishing House
 
An assessment of cloud computing evolution
An assessment of cloud computing evolutionAn assessment of cloud computing evolution
An assessment of cloud computing evolutioneSAT Publishing House
 
A review on managed aquifer recharge by check dams a case study near chennai,...
A review on managed aquifer recharge by check dams a case study near chennai,...A review on managed aquifer recharge by check dams a case study near chennai,...
A review on managed aquifer recharge by check dams a case study near chennai,...eSAT Publishing House
 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficeSAT Publishing House
 
A novel hybrid communication technique involving power line communication and...
A novel hybrid communication technique involving power line communication and...A novel hybrid communication technique involving power line communication and...
A novel hybrid communication technique involving power line communication and...eSAT Publishing House
 
Redesign and thermal analysis of transfer mold tool
Redesign and thermal analysis of transfer mold toolRedesign and thermal analysis of transfer mold tool
Redesign and thermal analysis of transfer mold tooleSAT Publishing House
 
Monitoring wind turbine using wi fi network for reliable communication
Monitoring wind turbine using wi fi network for reliable communicationMonitoring wind turbine using wi fi network for reliable communication
Monitoring wind turbine using wi fi network for reliable communicationeSAT Publishing House
 
Performance comparison of row per slave and rows set
Performance comparison of row per slave and rows setPerformance comparison of row per slave and rows set
Performance comparison of row per slave and rows seteSAT Publishing House
 
Testing and ergonomically evaluation of tractor mounted and self mounted coco...
Testing and ergonomically evaluation of tractor mounted and self mounted coco...Testing and ergonomically evaluation of tractor mounted and self mounted coco...
Testing and ergonomically evaluation of tractor mounted and self mounted coco...eSAT Publishing House
 
Fusion method used to tolerate the faults occurred in disrtibuted system
Fusion method used to tolerate the faults occurred in disrtibuted systemFusion method used to tolerate the faults occurred in disrtibuted system
Fusion method used to tolerate the faults occurred in disrtibuted systemeSAT Publishing House
 
Production and characterization of nano copper powder using electric explosio...
Production and characterization of nano copper powder using electric explosio...Production and characterization of nano copper powder using electric explosio...
Production and characterization of nano copper powder using electric explosio...eSAT Publishing House
 
An overview of plastic card frauds and solutions for
An overview of plastic card frauds and solutions forAn overview of plastic card frauds and solutions for
An overview of plastic card frauds and solutions foreSAT Publishing House
 
Analysis of dual bell rocket nozzle using
Analysis of dual bell rocket nozzle usingAnalysis of dual bell rocket nozzle using
Analysis of dual bell rocket nozzle usingeSAT Publishing House
 
Growth and physical properties of pure and manganese doped strontium tartrate...
Growth and physical properties of pure and manganese doped strontium tartrate...Growth and physical properties of pure and manganese doped strontium tartrate...
Growth and physical properties of pure and manganese doped strontium tartrate...eSAT Publishing House
 
Mathematical model study on solvent extraction of
Mathematical model study on solvent extraction ofMathematical model study on solvent extraction of
Mathematical model study on solvent extraction ofeSAT Publishing House
 
A heuristic approach for optimizing travel planning using genetics algorithm
A heuristic approach for optimizing travel planning using genetics algorithmA heuristic approach for optimizing travel planning using genetics algorithm
A heuristic approach for optimizing travel planning using genetics algorithmeSAT Publishing House
 
Channel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communicationsChannel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communicationseSAT Publishing House
 

Viewers also liked (20)

International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Biosorption of hg (ii) from aqueous solutions
Biosorption of hg (ii) from aqueous solutionsBiosorption of hg (ii) from aqueous solutions
Biosorption of hg (ii) from aqueous solutions
 
Identification of dynamic rigidity for high speed
Identification of dynamic rigidity for high speedIdentification of dynamic rigidity for high speed
Identification of dynamic rigidity for high speed
 
An assessment of cloud computing evolution
An assessment of cloud computing evolutionAn assessment of cloud computing evolution
An assessment of cloud computing evolution
 
A review on managed aquifer recharge by check dams a case study near chennai,...
A review on managed aquifer recharge by check dams a case study near chennai,...A review on managed aquifer recharge by check dams a case study near chennai,...
A review on managed aquifer recharge by check dams a case study near chennai,...
 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network traffic
 
A novel hybrid communication technique involving power line communication and...
A novel hybrid communication technique involving power line communication and...A novel hybrid communication technique involving power line communication and...
A novel hybrid communication technique involving power line communication and...
 
Green vehicle
Green vehicleGreen vehicle
Green vehicle
 
Redesign and thermal analysis of transfer mold tool
Redesign and thermal analysis of transfer mold toolRedesign and thermal analysis of transfer mold tool
Redesign and thermal analysis of transfer mold tool
 
Monitoring wind turbine using wi fi network for reliable communication
Monitoring wind turbine using wi fi network for reliable communicationMonitoring wind turbine using wi fi network for reliable communication
Monitoring wind turbine using wi fi network for reliable communication
 
Performance comparison of row per slave and rows set
Performance comparison of row per slave and rows setPerformance comparison of row per slave and rows set
Performance comparison of row per slave and rows set
 
Testing and ergonomically evaluation of tractor mounted and self mounted coco...
Testing and ergonomically evaluation of tractor mounted and self mounted coco...Testing and ergonomically evaluation of tractor mounted and self mounted coco...
Testing and ergonomically evaluation of tractor mounted and self mounted coco...
 
Fusion method used to tolerate the faults occurred in disrtibuted system
Fusion method used to tolerate the faults occurred in disrtibuted systemFusion method used to tolerate the faults occurred in disrtibuted system
Fusion method used to tolerate the faults occurred in disrtibuted system
 
Production and characterization of nano copper powder using electric explosio...
Production and characterization of nano copper powder using electric explosio...Production and characterization of nano copper powder using electric explosio...
Production and characterization of nano copper powder using electric explosio...
 
An overview of plastic card frauds and solutions for
An overview of plastic card frauds and solutions forAn overview of plastic card frauds and solutions for
An overview of plastic card frauds and solutions for
 
Analysis of dual bell rocket nozzle using
Analysis of dual bell rocket nozzle usingAnalysis of dual bell rocket nozzle using
Analysis of dual bell rocket nozzle using
 
Growth and physical properties of pure and manganese doped strontium tartrate...
Growth and physical properties of pure and manganese doped strontium tartrate...Growth and physical properties of pure and manganese doped strontium tartrate...
Growth and physical properties of pure and manganese doped strontium tartrate...
 
Mathematical model study on solvent extraction of
Mathematical model study on solvent extraction ofMathematical model study on solvent extraction of
Mathematical model study on solvent extraction of
 
A heuristic approach for optimizing travel planning using genetics algorithm
A heuristic approach for optimizing travel planning using genetics algorithmA heuristic approach for optimizing travel planning using genetics algorithm
A heuristic approach for optimizing travel planning using genetics algorithm
 
Channel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communicationsChannel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communications
 

Similar to Implementation of video tagging identifying characters in video

Human Face Identification
Human Face IdentificationHuman Face Identification
Human Face Identificationbhupesh lahare
 
IRJET - Applications of Image and Video Deduplication: A Survey
IRJET -  	  Applications of Image and Video Deduplication: A SurveyIRJET -  	  Applications of Image and Video Deduplication: A Survey
IRJET - Applications of Image and Video Deduplication: A SurveyIRJET Journal
 
IRJET- Real-Time Object Detection System using Caffe Model
IRJET- Real-Time Object Detection System using Caffe ModelIRJET- Real-Time Object Detection System using Caffe Model
IRJET- Real-Time Object Detection System using Caffe ModelIRJET Journal
 
IRJET - Facial Recognition based Attendance Management System
IRJET - Facial Recognition based Attendance Management SystemIRJET - Facial Recognition based Attendance Management System
IRJET - Facial Recognition based Attendance Management SystemIRJET Journal
 
SMART MEDIA PLAYER USING AI
SMART MEDIA PLAYER USING AISMART MEDIA PLAYER USING AI
SMART MEDIA PLAYER USING AIIRJET Journal
 
Criminal Face Identification
Criminal Face IdentificationCriminal Face Identification
Criminal Face IdentificationIRJET Journal
 
IRJET - Direct Me-Nevigation for Blind People
IRJET -  	  Direct Me-Nevigation for Blind PeopleIRJET -  	  Direct Me-Nevigation for Blind People
IRJET - Direct Me-Nevigation for Blind PeopleIRJET Journal
 
IRJET - Blind Guidance using Smart Cap
IRJET - Blind Guidance using Smart CapIRJET - Blind Guidance using Smart Cap
IRJET - Blind Guidance using Smart CapIRJET Journal
 
Face Annotation using Co-Relation based Matching for Improving Image Mining ...
Face Annotation using Co-Relation based Matching  for Improving Image Mining ...Face Annotation using Co-Relation based Matching  for Improving Image Mining ...
Face Annotation using Co-Relation based Matching for Improving Image Mining ...IRJET Journal
 
YOLOv4: A Face Mask Detection System
YOLOv4: A Face Mask Detection SystemYOLOv4: A Face Mask Detection System
YOLOv4: A Face Mask Detection SystemIRJET Journal
 
Face Recognition System using OpenCV
Face Recognition System using OpenCVFace Recognition System using OpenCV
Face Recognition System using OpenCVIRJET Journal
 
IRJET - Face Detection and Recognition System
IRJET -  	  Face Detection and Recognition SystemIRJET -  	  Face Detection and Recognition System
IRJET - Face Detection and Recognition SystemIRJET Journal
 
Covid Mask Detection and Social Distancing Using Raspberry pi
Covid Mask Detection and Social Distancing Using Raspberry piCovid Mask Detection and Social Distancing Using Raspberry pi
Covid Mask Detection and Social Distancing Using Raspberry piIRJET Journal
 
Human Segmentation Using Haar-Classifier
Human Segmentation Using Haar-ClassifierHuman Segmentation Using Haar-Classifier
Human Segmentation Using Haar-ClassifierIJERA Editor
 
IRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric LearningIRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric LearningIRJET Journal
 
IRJET- Object Detection and Recognition for Blind Assistance
IRJET- Object Detection and Recognition for Blind AssistanceIRJET- Object Detection and Recognition for Blind Assistance
IRJET- Object Detection and Recognition for Blind AssistanceIRJET Journal
 
Text Recognition, Object Detection and Language Translation App
Text Recognition, Object Detection and Language Translation AppText Recognition, Object Detection and Language Translation App
Text Recognition, Object Detection and Language Translation AppIRJET Journal
 
Progression in Large Age-Gap Face Verification
Progression in Large Age-Gap Face VerificationProgression in Large Age-Gap Face Verification
Progression in Large Age-Gap Face VerificationIRJET Journal
 
Face Recognition and Increased Reality System for Mobile Devices
Face Recognition and Increased Reality System for Mobile DevicesFace Recognition and Increased Reality System for Mobile Devices
Face Recognition and Increased Reality System for Mobile Devicesijtsrd
 

Similar to Implementation of video tagging identifying characters in video (20)

Human Face Identification
Human Face IdentificationHuman Face Identification
Human Face Identification
 
IRJET - Applications of Image and Video Deduplication: A Survey
IRJET -  	  Applications of Image and Video Deduplication: A SurveyIRJET -  	  Applications of Image and Video Deduplication: A Survey
IRJET - Applications of Image and Video Deduplication: A Survey
 
IRJET- Real-Time Object Detection System using Caffe Model
IRJET- Real-Time Object Detection System using Caffe ModelIRJET- Real-Time Object Detection System using Caffe Model
IRJET- Real-Time Object Detection System using Caffe Model
 
IRJET - Facial Recognition based Attendance Management System
IRJET - Facial Recognition based Attendance Management SystemIRJET - Facial Recognition based Attendance Management System
IRJET - Facial Recognition based Attendance Management System
 
SMART MEDIA PLAYER USING AI
SMART MEDIA PLAYER USING AISMART MEDIA PLAYER USING AI
SMART MEDIA PLAYER USING AI
 
Criminal Face Identification
Criminal Face IdentificationCriminal Face Identification
Criminal Face Identification
 
IRJET - Direct Me-Nevigation for Blind People
IRJET -  	  Direct Me-Nevigation for Blind PeopleIRJET -  	  Direct Me-Nevigation for Blind People
IRJET - Direct Me-Nevigation for Blind People
 
IRJET - Blind Guidance using Smart Cap
IRJET - Blind Guidance using Smart CapIRJET - Blind Guidance using Smart Cap
IRJET - Blind Guidance using Smart Cap
 
Face Annotation using Co-Relation based Matching for Improving Image Mining ...
Face Annotation using Co-Relation based Matching  for Improving Image Mining ...Face Annotation using Co-Relation based Matching  for Improving Image Mining ...
Face Annotation using Co-Relation based Matching for Improving Image Mining ...
 
YOLOv4: A Face Mask Detection System
YOLOv4: A Face Mask Detection SystemYOLOv4: A Face Mask Detection System
YOLOv4: A Face Mask Detection System
 
Face Recognition System using OpenCV
Face Recognition System using OpenCVFace Recognition System using OpenCV
Face Recognition System using OpenCV
 
IRJET - Face Detection and Recognition System
IRJET -  	  Face Detection and Recognition SystemIRJET -  	  Face Detection and Recognition System
IRJET - Face Detection and Recognition System
 
Covid Mask Detection and Social Distancing Using Raspberry pi
Covid Mask Detection and Social Distancing Using Raspberry piCovid Mask Detection and Social Distancing Using Raspberry pi
Covid Mask Detection and Social Distancing Using Raspberry pi
 
Human Segmentation Using Haar-Classifier
Human Segmentation Using Haar-ClassifierHuman Segmentation Using Haar-Classifier
Human Segmentation Using Haar-Classifier
 
”YOGA WITH AI”
”YOGA WITH AI””YOGA WITH AI”
”YOGA WITH AI”
 
IRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric LearningIRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric Learning
 
IRJET- Object Detection and Recognition for Blind Assistance
IRJET- Object Detection and Recognition for Blind AssistanceIRJET- Object Detection and Recognition for Blind Assistance
IRJET- Object Detection and Recognition for Blind Assistance
 
Text Recognition, Object Detection and Language Translation App
Text Recognition, Object Detection and Language Translation AppText Recognition, Object Detection and Language Translation App
Text Recognition, Object Detection and Language Translation App
 
Progression in Large Age-Gap Face Verification
Progression in Large Age-Gap Face VerificationProgression in Large Age-Gap Face Verification
Progression in Large Age-Gap Face Verification
 
Face Recognition and Increased Reality System for Mobile Devices
Face Recognition and Increased Reality System for Mobile DevicesFace Recognition and Increased Reality System for Mobile Devices
Face Recognition and Increased Reality System for Mobile Devices
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 

Recently uploaded (20)

Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 

Implementation of video tagging identifying characters in video

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 182 IMPLEMENTATION OF VIDEO TAGGING: IDENTIFYING CHARACTERS IN VIDEO Akshay Bhardwaj1 , Ramani S2 , Mayank Goyal3 1 Student, School of Computing Science and Engineering, Vellore Institute of Technology, Vellore, India 2 Assistant Professor, School of Computing Science and Engineering, Vellore Institute of Technology, Vellore, India 3 Student, School of Computing Science and Engineering, Vellore Institute of Technology, Vellore, India Abstract Automatic face detection in movies has been an interesting area of research. Due to the various appearances of the characters in the moving film it is not easy to identify the true faces. There has been a significant growth in the field of image processing to detect still human faces with high accuracy and results. This idea can be further used to implement video tagging. We see biometric security check points that compare still images to verify a person in the database and the same can be done if a person is in the motion. This paper proposes a method to identify characters appearing in the moving film. Keywords—Video Tagging, Image processing, Eigen objects, Security, Template matching ----------------------------------------------------------------------***---------------------------------------------------------------------- 1. INTRODUCTION The growing video and TV content on the internet comes with huge amount of digital video data just like still images. This resulted in studying and developing efficient techniques for understanding the video content. The concept of automatic video analysis is one of the technologies which is studied and implemented here. Video tagging is a concept similar to image tagging with a difference being that the faces are in the motion in the former. The key concept is to store the image from a running video and storing it after training under constraint like size of image, gray scale and bytes. Photo tagging has been implemented in various social media such as Facebook and Instagram where you can tag a person once and the next time you upload a photo of the same character his name will appear automatically. The objective is to identify the human faces present in the running film and label them with their corresponding identity for example the name of character. Figure1 explains the underlying idea by pointing the name of faces detected. Fig.1 2. RELATED WORK Template matching is a common technique where an object is captured as an image called template. The match will fail if the object appears scaled, rotated, or skewed on the image. Instead, this can be done using Emgu CV image processing library.It is written entirely in C#. The benefit is that it can be compiled in mono and therefore is able to run on any platform Mono supports, including Linux, Mac OS X, win. It comprises of 2 layers, Layer 1 contains functions, enumeration, structures and Layer 2 has classes. The figure below is the architecture overview of the Emgu CV library.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 183 3. WORK DONE The idea in this paper uses the above mentioned Emgu, an image processing library to achieve the video tagging concept. The process consists of mainly three following steps: When the video is played or streamed the faces appearing on the screen will be detected. Faces will have different orientation, size and color. Only after the face of a person is detected, the information of its identity will be entered that can be Name, ID, Gender etc. of the person. This information will be stored in the database as a tag which will be called in the future reference. So when a video is played and the same person whose information is already stored appears in that video, the system will recognize him [8] and displays his related information. 4. IMPLEMENTATION OF VIDEO TAGGING 4.1 Detecting the Face It uses simple rectangular features also called Haarfeature[2], where each feature is a single valueobtained bysubtracting sum of pixels under white rectangle from sumof pixels under black rectangle. If the difference is above threshold, corresponding feature like eyes, nose etc. are present. Then a special representation of the sample called the integral image is used which makes feature extraction faster. A series of AdaBoost[2] classifiers works as a filter chain. Image sub regions that make it through the entire cascade are classified as face. All others are classified as non-face. The classifiers are used efficiently by assigning heavily weighted filters first on the window, if a window fails the first stage, discard it and we don’t consider remaining features on it. If it passes we apply the remaining featuresand continue the process. Finally once the face is detected using above filters, we draw a focus around the region to highlight the face. 4.2 Recognizing the face: Once the faces are detected they are saved into database as image templates. All the trained faces are histogram normalized to convert them into 0-255 gray scale [3] and correspondingly object recognizer is created for the given faces. Calculation of Eigen image and correspondingly Eigen values are done after that.And when the new face is detected, calculation of Eigen distance value [4] of the projected face with the trained faces isperformed.If the value of Eigen distance is greater than threshold for a particular image, and we display the label of the correspondingtrained face to the projected face. Fig 2 Video tagging illustrations
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 184 5. CONCLUSIONS Video tagging is done on a video with the concept explained in the paper. Figure 2 shows the process steps taking place, a face is recognized successfully after matching with the image template of the person stored for the first time. Now if the same person appears in that video or any other video, the face will be automatically recognized by the system with a tag to tell who the person is. Implemented concept of video tagging in this paper can have various utilities. FUTURE WORK The basic concept will remain the same which is to identify a character present in the video [5] or live streaming. The following work can be done in future based on the work done- Tagging a Video on the Facebook Photo tagging is a major reason that makes photos special on Facebook. So video tagging can be introduced too. You can tag a video to show who’s in the video or tell who you are with. The tag will be the user name of the person. When a friend is tagged in the video, he will be notified through an alert. The user needs to be tagged just once in a video and every time that person appears in any video uploaded later; he will be recognized automatically like auto photo tagging. Biometric Security Checks for Secure Areas In normal face recognition biometric test a person stands in front of the detector and matches the traits with the once stored in the system. In that a person should be still to match the features. So using this idea there is no need to stop and unlock. The person can be recognized while in motion and the camera will detect and recognize if the person appearing on stream is valid in database or not and permission will be granted if match is found. REFERENCES [1]. Jitao Sand and ChangshengXu, “Robust Face-Name Graph Matching for Movie Character Identification”, IEEETransactionson multimedia Vol. 14, no3, June 2012 [2]. P. Viola and M Jones, “Rapid Object Detection using boosted cascade of simple features”. Computer Vision and Pattern Recognition, IEEE CVPR.2001.990517 Vol1. [3]. Dalal N and Triggs B, “Histograms of oriented gradients for human detection”.Computer Vision and Pattern Recognition, IEEE CVPR.2005.177 Vol1. [4]. A. Sanfeliu and K. Fu, “A distance measure between attributed relationalgraphs for pattern recognition,” IEEE Trans. Syst. Man Cybern.vol.13, no. 3, 1983. [5]. J. Stallkamp, H. K. Ekenel, and R. Stiefelhagen, “Video- based face recognition on real-world data,” in Proc. Int. Conf. Comput. Vis. 2007, pp. 1-8 [6]. channel9.msdn.com/Face-Detection-with-Emgu-CV-in-C- and-WPF. [7]. M. DharmatejaPurna, N. Praveen “A Novel Method for Movie Character Identification and its Facial Expression Recognition”, IJMER Vol.3, Issue.3 2013 [8]. W. Zhao, R. Chelappa, P. J. Phillips, and A. Rosenfeld, “Face recognition: A literature survey,” ACM Compu. Survey., vol. 35, no. 4, pp. 399–458, 2003