SlideShare a Scribd company logo
A Segmentation based Sequential
Pattern Matching for
Efficient Video Copy Detection
• Introduction
• Motivation
• Problem Statement
• Aim and Objectives
• Literature Survey
• System architecture
• Proposed System
• Improvements
• References
 Rapid growth of the Internet , Easiness in digital media acquiring and
distributing.
 As digital videos can be copied and modified easily, protecting the
copyright of the digital media has become matter of concern.
 Criteria for selection of copy detection algorithm :-
 Accuracy, measured in terms of false positive and false negative rates
 Computational Requirements, processing time & storage
3
Definition-“Exclusive rights granted by the State for
inventions, new and original designs, trademarks,
new plant varieties and artistic and literary works”.
Goals For IPR Security:-
Detection and retrieval of authentic content.
Protection of content from fraudulent
alterations.
Common types of intellectual property rights
include copyright ,trademarks, patents, industrial
design rights.
4
A point in an image which has a well-defined position and can
be robustly detected.
Local features vs. Global Features
Types of local feature - Edges, Corner, Blobs.
Associated with a significant change of one or more image
properties (e.g.intensity,colors).
 Used to find corresponding points between images which is
very useful for numerous applications!
Courtesy:- Kristen Grauman
Motivation
• Main Concern-
• A considerable number of videos are illegal copies or manipulated versions of
existing media, making copyright management a complicated process.
• Call for Change:-
• Today’s widespread video copyright infringement calls for the development of
fast and accurate copy-detection algorithms.
• As video is the most complex type of digital media, it has so far received the
least attention regarding copyright management.
• Protect Data:-
• Content-based copy detection (CBCD) ,a promising technique for video
monitoring and copyright protection.
Problem statement
To design a copy-detection algorithm which is
sufficiently robust to detect severely deformed
copies with high accuracy to localize copy segment.
Aim and Objectives of the project
• The aim of the project is to provide security to
multimedia content and provide platform to safeguard
copyright of the digital media.
• Objective of video copy detection:-
• To decide whether a query video segment is a copy of a
video from the video data set.
• If a system finds a matching video segment, then to
retrieve the name of copy video in the video database
and the time stamp where the query was copied from.
Architecture for Video Copy Detection
• Main Components:-
1. Change-based Threshold for Video Segmentation
2. Feature extraction with SIFT from keyframes
3. Similarity-based matching between SIFT feature point sets
4. Graph-based Video Sequence Matching
5. Evaluation Criteria:
• Copy Location Accuracy
• Computational Time Cost
• Recall & Precision
Architecture for Video Copy Detection
2
1
1
2
3
4
1. Change-based Threshold for Video Segmentation
2. Feature extraction with Binary SIFT from keyframes
3. Similarity-based matching between SIFT feature point sets
4. Graph-based Video Sequence Matching
1.Change-basedThresholdforVideo Segmentation
Method cuts continuous video frames into video segments by eliminating
temporal redundancy of the visual information of continuous video frames.
• Threshold for detecting abrupt changes of visual information of frames , TH= µ
+α σ , µ and σ are mean and standard deviation of difference values between
consecutive frames , α suggested between 5 and 6.
• Threshold for detecting gradual changes of visual information of frames , TL =
b * Th , where b is selected from the range 0.1-0.5
2. FeatureExtractionwithSIFT fromKeyframes
SIFT Detection:-
1. Find Scale-Space Extrema
2. Keypoint Localization & Filtering
– Improve keypoints,throw out bad ones
SIFT Description:-
3. Orientation Assignment
– Remove effects of rotation and scale
4. Create descriptor
– Using histograms of orientations
3. Similarity-basedmatchingbetweenSIFT featuresets
• For Binary SIFT descriptor extracted compute its nearest
neighbor in the dictionary.
• Cluster the set of descriptors (using k-means for
example) to k clusters. The cluster centers act as
dictionary’s visual words.
• Given a test feature(Binary SIFT),Hierarchical k-NN
search is used to find out nearest visual word.
4. Graph-based Video Sequence Matching
Time direction consistency: For Mij and Mlm, if there exists (i – j)*(l-m)> 0, then Mij and Mlm
satisfy the time direction consistency.
Time jump degree: For Mij and Mlm ,the time jump degree between them is defined as,
If the following two conditions are satisfied, there exists an edge between two vertexes:
1. The two vertexes should satisfy time direction consistency.
2. The time jump degree ∆t < T( T is a preset threshold).
Evaluation Criteria:-
• Copy location accuracy:
• This measure aims to assess the accuracy of finding the exact extent of the
copy in the reference video.
• What percent of your predictions were correct?
 Precision :

true number of copied images detected
total number of copied images detected
 What percent of positive predictions were correct?
 Recall:

true number of copied images detected
total number of real copied images in database
 What percent of the positive cases did you catch?
Improvements In Existing System
• Segmentation based on Dual Threshold:
• Basic Problems:-
• Matching based on SIFT descriptor is computationally expensive for large number of points and its high
dimension.
• To reduce the computational complexity, use the dual-threshold method to segment the videos into segments with
homogeneous content and extract keyframes from each segment.
• Binary SIFT Descriptor for Feature Matching:
• Basic Problems:-
• Global or Local Descriptor?
• SIFT not only has good tolerance to scale changes, illumination variations, and image rotations, but also is robust to
change of viewpoints, and additive noise,logo insertion, shifting or cropping, complicated edit.
• Compared with methods based on global descriptor, methods based on local descriptor(SIFT) have a better
detection performance .
• Memory cost of binary SIFT is low, making it feasible to store the whole binary SIFT in the index list.
• Graph-based Video Sequence Matching:
• Basic Problems:-
• Hard threshold ?
• Exhaustive search ?
• To resolve these problems, Graph-based video sequence matching method has the advantages of high accuracy in
locating copies, reducing detection time costs, and being able to simultaneously locate more than one copy in two
comparing video sequences.
References
• “A Segmentation And Graph-based Video Sequence Matching Method For Video Copy
Detection”,hong Liu, Hong Lu, And Xiangyang Xue, IEEE Transactions On Knowledge And Data
Engineering, Vol. 25, No. 8, August 2013
• “Visual word expansion and BSIFT verification for large-scale image search”,Wengang Zhou •
Houqiang Li • Yijuan Lu •Meng Wang • Qi Tian,Springer,2013
• “Content-based Video Copy Detection Using Discrete Wavelet Transform”, Gitto George Thampi,
D. Abraham Chandyc., Proceedings Of IEEE Conference On Information And Communication
Technologies,2013
• “Fast And Accurate Content-based Video Copy Detection Using Bag-of-global Visual
Features”,yusuke Uchida, Koichi Takagi, Shigeyuki Sakazawa,IEEE,2012
• “Fast And Robust Short Video Clip Search For Copy Detection” Junsongyuan, Ling-yu Duan, Qi Tian,
Surendra Ranganath, And Changsheng Xu1,2005
• “Distinctive Image Features From Scale-invariant Keypoints,” Int’l J. Computer Vision,
D.G.Lowe,Vol. 60, No. 2, Pp. 91-110, 2004.

More Related Content

Similar to A Segmentation based Sequential Pattern Matching for Efficient Video Copy Detection

Video Content Identification using Video Signature: Survey
Video Content Identification using Video Signature: SurveyVideo Content Identification using Video Signature: Survey
Video Content Identification using Video Signature: Survey
IRJET Journal
 
A Segmentation Based Sequential Pattern Matching for Efficient Video Copy Det...
A Segmentation Based Sequential Pattern Matching for Efficient Video Copy Det...A Segmentation Based Sequential Pattern Matching for Efficient Video Copy Det...
A Segmentation Based Sequential Pattern Matching for Efficient Video Copy Det...Best Jobs
 
PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...
PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...
PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...
IJCSEIT Journal
 
Ac02417471753
Ac02417471753Ac02417471753
Ac02417471753IJMER
 
Inverted File Based Search Technique for Video Copy Retrieval
Inverted File Based Search Technique for Video Copy RetrievalInverted File Based Search Technique for Video Copy Retrieval
Inverted File Based Search Technique for Video Copy Retrieval
ijcsa
 
Similarity-based retrieval of multimedia content
Similarity-based retrieval of multimedia contentSimilarity-based retrieval of multimedia content
Similarity-based retrieval of multimedia content
Symeon Papadopoulos
 
Real-Time Video Copy Detection in Big Data
Real-Time Video Copy Detection in Big DataReal-Time Video Copy Detection in Big Data
Real-Time Video Copy Detection in Big Data
IRJET Journal
 
Techniques for effective and efficient fire detection from social media images
Techniques for effective and efficient fire detection from social media imagesTechniques for effective and efficient fire detection from social media images
Techniques for effective and efficient fire detection from social media images
Universidade de São Paulo
 
Mpeg4copy 120428133000-phpapp01
Mpeg4copy 120428133000-phpapp01Mpeg4copy 120428133000-phpapp01
Mpeg4copy 120428133000-phpapp01
netzwelt12345
 
Video copy detection using segmentation method and
Video copy detection using segmentation method andVideo copy detection using segmentation method and
Video copy detection using segmentation method and
eSAT Publishing House
 
Key frame extraction methodology for video annotation
Key frame extraction methodology for video annotationKey frame extraction methodology for video annotation
Key frame extraction methodology for video annotationIAEME Publication
 
An Stepped Forward Security System for Multimedia Content Material for Cloud ...
An Stepped Forward Security System for Multimedia Content Material for Cloud ...An Stepped Forward Security System for Multimedia Content Material for Cloud ...
An Stepped Forward Security System for Multimedia Content Material for Cloud ...
IRJET Journal
 
Built In Self Testing(BIST) Architecture for Motin Estimation and Computing A...
Built In Self Testing(BIST) Architecture for Motin Estimation and Computing A...Built In Self Testing(BIST) Architecture for Motin Estimation and Computing A...
Built In Self Testing(BIST) Architecture for Motin Estimation and Computing A...
Shashidhar Reddy
 
Recent advances in content based video copy detection (IEEE)
Recent advances in content based video copy detection (IEEE)Recent advances in content based video copy detection (IEEE)
Recent advances in content based video copy detection (IEEE)
PACE 2.0
 
F0953235
F0953235F0953235
F0953235
IOSR Journals
 
Video Indexing and Retrieval
Video Indexing and RetrievalVideo Indexing and Retrieval
Video Indexing and Retrieval
Rachmat Wahid Saleh Insani
 
mpeg4copy-120428133000-phpapp01.ppt
mpeg4copy-120428133000-phpapp01.pptmpeg4copy-120428133000-phpapp01.ppt
mpeg4copy-120428133000-phpapp01.ppt
PawachMetharattanara
 
IRJET - Applications of Image and Video Deduplication: A Survey
IRJET -  	  Applications of Image and Video Deduplication: A SurveyIRJET -  	  Applications of Image and Video Deduplication: A Survey
IRJET - Applications of Image and Video Deduplication: A Survey
IRJET Journal
 
Content Based Video Retrieval Using Integrated Feature Extraction and Persona...
Content Based Video Retrieval Using Integrated Feature Extraction and Persona...Content Based Video Retrieval Using Integrated Feature Extraction and Persona...
Content Based Video Retrieval Using Integrated Feature Extraction and Persona...
IJERD Editor
 

Similar to A Segmentation based Sequential Pattern Matching for Efficient Video Copy Detection (20)

Video Content Identification using Video Signature: Survey
Video Content Identification using Video Signature: SurveyVideo Content Identification using Video Signature: Survey
Video Content Identification using Video Signature: Survey
 
A Segmentation Based Sequential Pattern Matching for Efficient Video Copy Det...
A Segmentation Based Sequential Pattern Matching for Efficient Video Copy Det...A Segmentation Based Sequential Pattern Matching for Efficient Video Copy Det...
A Segmentation Based Sequential Pattern Matching for Efficient Video Copy Det...
 
PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...
PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...
PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...
 
Ac02417471753
Ac02417471753Ac02417471753
Ac02417471753
 
Inverted File Based Search Technique for Video Copy Retrieval
Inverted File Based Search Technique for Video Copy RetrievalInverted File Based Search Technique for Video Copy Retrieval
Inverted File Based Search Technique for Video Copy Retrieval
 
Similarity-based retrieval of multimedia content
Similarity-based retrieval of multimedia contentSimilarity-based retrieval of multimedia content
Similarity-based retrieval of multimedia content
 
Real-Time Video Copy Detection in Big Data
Real-Time Video Copy Detection in Big DataReal-Time Video Copy Detection in Big Data
Real-Time Video Copy Detection in Big Data
 
Techniques for effective and efficient fire detection from social media images
Techniques for effective and efficient fire detection from social media imagesTechniques for effective and efficient fire detection from social media images
Techniques for effective and efficient fire detection from social media images
 
Mpeg4copy 120428133000-phpapp01
Mpeg4copy 120428133000-phpapp01Mpeg4copy 120428133000-phpapp01
Mpeg4copy 120428133000-phpapp01
 
Video copy detection using segmentation method and
Video copy detection using segmentation method andVideo copy detection using segmentation method and
Video copy detection using segmentation method and
 
Key frame extraction methodology for video annotation
Key frame extraction methodology for video annotationKey frame extraction methodology for video annotation
Key frame extraction methodology for video annotation
 
An Stepped Forward Security System for Multimedia Content Material for Cloud ...
An Stepped Forward Security System for Multimedia Content Material for Cloud ...An Stepped Forward Security System for Multimedia Content Material for Cloud ...
An Stepped Forward Security System for Multimedia Content Material for Cloud ...
 
Built In Self Testing(BIST) Architecture for Motin Estimation and Computing A...
Built In Self Testing(BIST) Architecture for Motin Estimation and Computing A...Built In Self Testing(BIST) Architecture for Motin Estimation and Computing A...
Built In Self Testing(BIST) Architecture for Motin Estimation and Computing A...
 
Recent advances in content based video copy detection (IEEE)
Recent advances in content based video copy detection (IEEE)Recent advances in content based video copy detection (IEEE)
Recent advances in content based video copy detection (IEEE)
 
F0953235
F0953235F0953235
F0953235
 
Video Indexing and Retrieval
Video Indexing and RetrievalVideo Indexing and Retrieval
Video Indexing and Retrieval
 
MPEG4 vs H.264
MPEG4 vs H.264MPEG4 vs H.264
MPEG4 vs H.264
 
mpeg4copy-120428133000-phpapp01.ppt
mpeg4copy-120428133000-phpapp01.pptmpeg4copy-120428133000-phpapp01.ppt
mpeg4copy-120428133000-phpapp01.ppt
 
IRJET - Applications of Image and Video Deduplication: A Survey
IRJET -  	  Applications of Image and Video Deduplication: A SurveyIRJET -  	  Applications of Image and Video Deduplication: A Survey
IRJET - Applications of Image and Video Deduplication: A Survey
 
Content Based Video Retrieval Using Integrated Feature Extraction and Persona...
Content Based Video Retrieval Using Integrated Feature Extraction and Persona...Content Based Video Retrieval Using Integrated Feature Extraction and Persona...
Content Based Video Retrieval Using Integrated Feature Extraction and Persona...
 

More from SWAMI06

Secure Distibuted data discovery & dissemination IN WSN
Secure Distibuted data discovery & dissemination IN WSNSecure Distibuted data discovery & dissemination IN WSN
Secure Distibuted data discovery & dissemination IN WSN
SWAMI06
 
ns2-project-list
ns2-project-listns2-project-list
ns2-project-list
SWAMI06
 
Heart disease prediction system
Heart disease prediction systemHeart disease prediction system
Heart disease prediction system
SWAMI06
 
Detection of Spyware by Mining Executable Files
Detection of  Spyware by Mining Executable FilesDetection of  Spyware by Mining Executable Files
Detection of Spyware by Mining Executable Files
SWAMI06
 
Annotating Search Results from Web Databases
Annotating Search Results from Web DatabasesAnnotating Search Results from Web Databases
Annotating Search Results from Web Databases
SWAMI06
 
Multimedia Answer Generation for Community Question Answering
Multimedia Answer Generation for Community Question AnsweringMultimedia Answer Generation for Community Question Answering
Multimedia Answer Generation for Community Question Answering
SWAMI06
 
Keyword Query Routing
Keyword Query RoutingKeyword Query Routing
Keyword Query Routing
SWAMI06
 
A Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized Deduplication
SWAMI06
 
Efficient Instant-Fuzzy Search With Proximity Ranking
Efficient Instant-Fuzzy Search With Proximity RankingEfficient Instant-Fuzzy Search With Proximity Ranking
Efficient Instant-Fuzzy Search With Proximity Ranking
SWAMI06
 
Opinion Mining & Sentiment Analysis Based on Natural Language Processing
Opinion Mining & Sentiment Analysis Based on Natural Language ProcessingOpinion Mining & Sentiment Analysis Based on Natural Language Processing
Opinion Mining & Sentiment Analysis Based on Natural Language Processing
SWAMI06
 
Frequent itemset mining_on_hadoop
Frequent itemset mining_on_hadoopFrequent itemset mining_on_hadoop
Frequent itemset mining_on_hadoop
SWAMI06
 

More from SWAMI06 (11)

Secure Distibuted data discovery & dissemination IN WSN
Secure Distibuted data discovery & dissemination IN WSNSecure Distibuted data discovery & dissemination IN WSN
Secure Distibuted data discovery & dissemination IN WSN
 
ns2-project-list
ns2-project-listns2-project-list
ns2-project-list
 
Heart disease prediction system
Heart disease prediction systemHeart disease prediction system
Heart disease prediction system
 
Detection of Spyware by Mining Executable Files
Detection of  Spyware by Mining Executable FilesDetection of  Spyware by Mining Executable Files
Detection of Spyware by Mining Executable Files
 
Annotating Search Results from Web Databases
Annotating Search Results from Web DatabasesAnnotating Search Results from Web Databases
Annotating Search Results from Web Databases
 
Multimedia Answer Generation for Community Question Answering
Multimedia Answer Generation for Community Question AnsweringMultimedia Answer Generation for Community Question Answering
Multimedia Answer Generation for Community Question Answering
 
Keyword Query Routing
Keyword Query RoutingKeyword Query Routing
Keyword Query Routing
 
A Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized Deduplication
 
Efficient Instant-Fuzzy Search With Proximity Ranking
Efficient Instant-Fuzzy Search With Proximity RankingEfficient Instant-Fuzzy Search With Proximity Ranking
Efficient Instant-Fuzzy Search With Proximity Ranking
 
Opinion Mining & Sentiment Analysis Based on Natural Language Processing
Opinion Mining & Sentiment Analysis Based on Natural Language ProcessingOpinion Mining & Sentiment Analysis Based on Natural Language Processing
Opinion Mining & Sentiment Analysis Based on Natural Language Processing
 
Frequent itemset mining_on_hadoop
Frequent itemset mining_on_hadoopFrequent itemset mining_on_hadoop
Frequent itemset mining_on_hadoop
 

Recently uploaded

Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 

Recently uploaded (20)

Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 

A Segmentation based Sequential Pattern Matching for Efficient Video Copy Detection

  • 1. A Segmentation based Sequential Pattern Matching for Efficient Video Copy Detection
  • 2. • Introduction • Motivation • Problem Statement • Aim and Objectives • Literature Survey • System architecture • Proposed System • Improvements • References
  • 3.  Rapid growth of the Internet , Easiness in digital media acquiring and distributing.  As digital videos can be copied and modified easily, protecting the copyright of the digital media has become matter of concern.  Criteria for selection of copy detection algorithm :-  Accuracy, measured in terms of false positive and false negative rates  Computational Requirements, processing time & storage 3
  • 4. Definition-“Exclusive rights granted by the State for inventions, new and original designs, trademarks, new plant varieties and artistic and literary works”. Goals For IPR Security:- Detection and retrieval of authentic content. Protection of content from fraudulent alterations. Common types of intellectual property rights include copyright ,trademarks, patents, industrial design rights. 4
  • 5. A point in an image which has a well-defined position and can be robustly detected. Local features vs. Global Features Types of local feature - Edges, Corner, Blobs. Associated with a significant change of one or more image properties (e.g.intensity,colors).  Used to find corresponding points between images which is very useful for numerous applications!
  • 7.
  • 8. Motivation • Main Concern- • A considerable number of videos are illegal copies or manipulated versions of existing media, making copyright management a complicated process. • Call for Change:- • Today’s widespread video copyright infringement calls for the development of fast and accurate copy-detection algorithms. • As video is the most complex type of digital media, it has so far received the least attention regarding copyright management. • Protect Data:- • Content-based copy detection (CBCD) ,a promising technique for video monitoring and copyright protection.
  • 9. Problem statement To design a copy-detection algorithm which is sufficiently robust to detect severely deformed copies with high accuracy to localize copy segment.
  • 10. Aim and Objectives of the project • The aim of the project is to provide security to multimedia content and provide platform to safeguard copyright of the digital media. • Objective of video copy detection:- • To decide whether a query video segment is a copy of a video from the video data set. • If a system finds a matching video segment, then to retrieve the name of copy video in the video database and the time stamp where the query was copied from.
  • 11. Architecture for Video Copy Detection • Main Components:- 1. Change-based Threshold for Video Segmentation 2. Feature extraction with SIFT from keyframes 3. Similarity-based matching between SIFT feature point sets 4. Graph-based Video Sequence Matching 5. Evaluation Criteria: • Copy Location Accuracy • Computational Time Cost • Recall & Precision
  • 12. Architecture for Video Copy Detection 2 1 1 2 3 4 1. Change-based Threshold for Video Segmentation 2. Feature extraction with Binary SIFT from keyframes 3. Similarity-based matching between SIFT feature point sets 4. Graph-based Video Sequence Matching
  • 13. 1.Change-basedThresholdforVideo Segmentation Method cuts continuous video frames into video segments by eliminating temporal redundancy of the visual information of continuous video frames. • Threshold for detecting abrupt changes of visual information of frames , TH= µ +α σ , µ and σ are mean and standard deviation of difference values between consecutive frames , α suggested between 5 and 6. • Threshold for detecting gradual changes of visual information of frames , TL = b * Th , where b is selected from the range 0.1-0.5
  • 14. 2. FeatureExtractionwithSIFT fromKeyframes SIFT Detection:- 1. Find Scale-Space Extrema 2. Keypoint Localization & Filtering – Improve keypoints,throw out bad ones SIFT Description:- 3. Orientation Assignment – Remove effects of rotation and scale 4. Create descriptor – Using histograms of orientations
  • 15. 3. Similarity-basedmatchingbetweenSIFT featuresets • For Binary SIFT descriptor extracted compute its nearest neighbor in the dictionary. • Cluster the set of descriptors (using k-means for example) to k clusters. The cluster centers act as dictionary’s visual words. • Given a test feature(Binary SIFT),Hierarchical k-NN search is used to find out nearest visual word.
  • 16. 4. Graph-based Video Sequence Matching Time direction consistency: For Mij and Mlm, if there exists (i – j)*(l-m)> 0, then Mij and Mlm satisfy the time direction consistency. Time jump degree: For Mij and Mlm ,the time jump degree between them is defined as, If the following two conditions are satisfied, there exists an edge between two vertexes: 1. The two vertexes should satisfy time direction consistency. 2. The time jump degree ∆t < T( T is a preset threshold).
  • 17. Evaluation Criteria:- • Copy location accuracy: • This measure aims to assess the accuracy of finding the exact extent of the copy in the reference video. • What percent of your predictions were correct?  Precision :  true number of copied images detected total number of copied images detected  What percent of positive predictions were correct?  Recall:  true number of copied images detected total number of real copied images in database  What percent of the positive cases did you catch?
  • 18. Improvements In Existing System • Segmentation based on Dual Threshold: • Basic Problems:- • Matching based on SIFT descriptor is computationally expensive for large number of points and its high dimension. • To reduce the computational complexity, use the dual-threshold method to segment the videos into segments with homogeneous content and extract keyframes from each segment. • Binary SIFT Descriptor for Feature Matching: • Basic Problems:- • Global or Local Descriptor? • SIFT not only has good tolerance to scale changes, illumination variations, and image rotations, but also is robust to change of viewpoints, and additive noise,logo insertion, shifting or cropping, complicated edit. • Compared with methods based on global descriptor, methods based on local descriptor(SIFT) have a better detection performance . • Memory cost of binary SIFT is low, making it feasible to store the whole binary SIFT in the index list. • Graph-based Video Sequence Matching: • Basic Problems:- • Hard threshold ? • Exhaustive search ? • To resolve these problems, Graph-based video sequence matching method has the advantages of high accuracy in locating copies, reducing detection time costs, and being able to simultaneously locate more than one copy in two comparing video sequences.
  • 19. References • “A Segmentation And Graph-based Video Sequence Matching Method For Video Copy Detection”,hong Liu, Hong Lu, And Xiangyang Xue, IEEE Transactions On Knowledge And Data Engineering, Vol. 25, No. 8, August 2013 • “Visual word expansion and BSIFT verification for large-scale image search”,Wengang Zhou • Houqiang Li • Yijuan Lu •Meng Wang • Qi Tian,Springer,2013 • “Content-based Video Copy Detection Using Discrete Wavelet Transform”, Gitto George Thampi, D. Abraham Chandyc., Proceedings Of IEEE Conference On Information And Communication Technologies,2013 • “Fast And Accurate Content-based Video Copy Detection Using Bag-of-global Visual Features”,yusuke Uchida, Koichi Takagi, Shigeyuki Sakazawa,IEEE,2012 • “Fast And Robust Short Video Clip Search For Copy Detection” Junsongyuan, Ling-yu Duan, Qi Tian, Surendra Ranganath, And Changsheng Xu1,2005 • “Distinctive Image Features From Scale-invariant Keypoints,” Int’l J. Computer Vision, D.G.Lowe,Vol. 60, No. 2, Pp. 91-110, 2004.