This document summarizes a research paper that proposes a method to enhance security in a video copy detection system using content-based fingerprinting. The paper discusses how existing video fingerprinting systems are not robust against content-changing attacks like changing the background of a video. To address this, the paper proposes using an interest point matching algorithm to extract fingerprints. The interest point matching algorithm detects interest points in video frames using the Harris corner detection method. It then constructs correspondences between interest points to form fingerprints. The fingerprints extracted with this method are claimed to be more robust against content-changing attacks compared to existing fingerprinting methods. The proposed algorithm is tested on videos with distortions and is found to have high detection rates and low false positive rates.
Inverted File Based Search Technique for Video Copy Retrievalijcsa
A video copy detection system is a content-based search engine focusing on Spatio-temporal features. It
aims to find whether a query video segment is a copy of video from the video database or not based on the
signature of the video. It is hard to find whether a video is a copied video or a similar video since the
features of the content are very similar from one video to the other. The main focus is to detect that the
query video is present in the video database with robustness depending on the content of video and also by
fast search of fingerprints. The Fingerprint Extraction Algorithm and Fast Search Algorithm are adopted
to achieve robust, fast, efficient and accurate video copy detection. As a first step, the Fingerprint
Extraction algorithm is employed which extracts a fingerprint through the features from the image content
of video. The images are represented as Temporally Informative Representative Images (TIRI). Then the
next step is to find the presence of copy of a query video in a video database, in which a close match of its
fingerprint in the corresponding fingerprint database is searched using inverted-file-based method.
PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...IJCSEIT Journal
A video fingerprint is a recognizer that is derived from a piece of video content. The video fingerprinting
methods obtain unique features of a video that differentiates one video clip from another. It aims to identify
whether a query video segment is a copy of video from the video database or not based on the signature of
the video. It is difficult to find whether a video is a copied video or a similar video, since the features of the
content are very similar from one video to the other. The main focus of this paper is to detect that the query
video is present in the video database with robustness depending on the content of video and also by fast
search of fingerprints. The Fingerprint Extraction Algorithm and Fast Search Algorithms are adopted in
this paper to achieve robust, fast, efficient and accurate video copy detection. As a first step, the
Fingerprint Extraction algorithm is employed which extracts a fingerprint through the features from the
image content of video. The images are represented as Temporally Informative Representative Images
(TIRI). Then, the second step is to find the presence of copy of a query video in a video database, in which
a close match of its fingerprint in the corresponding fingerprint database is searched using inverted-filebased
method. The proposed system is tested against various attacks like noise, brightness, contrast,
rotation and frame drop. Thus the performance of the proposed system on an average shows high true
positive rate of 98% and low false positive rate of 1.3% for different attacks.
Performance Comparison of Digital Image Watermarking Techniques: A SurveyEditor IJCATR
Digital watermarking is the processing of combined information into a digital signal. A watermark is a secondary image,
which is overlaid on the host image, and provides a means of protecting the image. In order to provide high quality watermarked
image, the watermarked image should be imperceptible. This paper presents different techniques of digital image watermarking based
on spatial & frequency domain, which shows that spatial domain technique provides security & successful recovery of watermark
image and higher PSNR value compared to frequency domain.
Multilayer bit allocation for video encodingIJMIT JOURNAL
Video compression approach removes spatial and temporal redundancy based on the signal statistical correlation. Bit allocation technique adopts a visual distortion model for a better rate visual distortion video coding. Visual distortion model uses both motion and the texture structures in the video sequences. The existing video coding mechanisms reduces the bit rate for video coding. However to get better video compression ratio there is a need for multilayer compression technique. In this paper we proposed a multilayer bit allocation video coding mechanism. The proposed model reduces the bit allocation for video coding by retaining the same video quality. The experimental results using the proposed model reduced the bit rate by 3% to 4%. The result are promising. Finally we conclude with conclusion and future work.
Inverted File Based Search Technique for Video Copy Retrievalijcsa
A video copy detection system is a content-based search engine focusing on Spatio-temporal features. It
aims to find whether a query video segment is a copy of video from the video database or not based on the
signature of the video. It is hard to find whether a video is a copied video or a similar video since the
features of the content are very similar from one video to the other. The main focus is to detect that the
query video is present in the video database with robustness depending on the content of video and also by
fast search of fingerprints. The Fingerprint Extraction Algorithm and Fast Search Algorithm are adopted
to achieve robust, fast, efficient and accurate video copy detection. As a first step, the Fingerprint
Extraction algorithm is employed which extracts a fingerprint through the features from the image content
of video. The images are represented as Temporally Informative Representative Images (TIRI). Then the
next step is to find the presence of copy of a query video in a video database, in which a close match of its
fingerprint in the corresponding fingerprint database is searched using inverted-file-based method.
PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...IJCSEIT Journal
A video fingerprint is a recognizer that is derived from a piece of video content. The video fingerprinting
methods obtain unique features of a video that differentiates one video clip from another. It aims to identify
whether a query video segment is a copy of video from the video database or not based on the signature of
the video. It is difficult to find whether a video is a copied video or a similar video, since the features of the
content are very similar from one video to the other. The main focus of this paper is to detect that the query
video is present in the video database with robustness depending on the content of video and also by fast
search of fingerprints. The Fingerprint Extraction Algorithm and Fast Search Algorithms are adopted in
this paper to achieve robust, fast, efficient and accurate video copy detection. As a first step, the
Fingerprint Extraction algorithm is employed which extracts a fingerprint through the features from the
image content of video. The images are represented as Temporally Informative Representative Images
(TIRI). Then, the second step is to find the presence of copy of a query video in a video database, in which
a close match of its fingerprint in the corresponding fingerprint database is searched using inverted-filebased
method. The proposed system is tested against various attacks like noise, brightness, contrast,
rotation and frame drop. Thus the performance of the proposed system on an average shows high true
positive rate of 98% and low false positive rate of 1.3% for different attacks.
Performance Comparison of Digital Image Watermarking Techniques: A SurveyEditor IJCATR
Digital watermarking is the processing of combined information into a digital signal. A watermark is a secondary image,
which is overlaid on the host image, and provides a means of protecting the image. In order to provide high quality watermarked
image, the watermarked image should be imperceptible. This paper presents different techniques of digital image watermarking based
on spatial & frequency domain, which shows that spatial domain technique provides security & successful recovery of watermark
image and higher PSNR value compared to frequency domain.
Multilayer bit allocation for video encodingIJMIT JOURNAL
Video compression approach removes spatial and temporal redundancy based on the signal statistical correlation. Bit allocation technique adopts a visual distortion model for a better rate visual distortion video coding. Visual distortion model uses both motion and the texture structures in the video sequences. The existing video coding mechanisms reduces the bit rate for video coding. However to get better video compression ratio there is a need for multilayer compression technique. In this paper we proposed a multilayer bit allocation video coding mechanism. The proposed model reduces the bit allocation for video coding by retaining the same video quality. The experimental results using the proposed model reduced the bit rate by 3% to 4%. The result are promising. Finally we conclude with conclusion and future work.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Jiri ece-01-03 adaptive temporal averaging and frame prediction based surveil...Ijripublishers Ijri
Global interconnect planning becomes a challenge as semiconductor technology continuously scales. Because of the increasing wire resistance and higher capacitive coupling in smaller features, the delay of global interconnects becomes large compared with the delay of a logic gate, introducing a huge performance gap that needs to be resolved A novel equalized global link architecture and driver– receiver co design flow are proposed for high-speed and low-energy on-chip communication by utilizing a continuous-time linear equalizer (CTLE). The proposed global link is analyzed using a linear system method, and the formula of CTLE eye opening is derived to provide high-level design guidelines and insights.
Compared with the separate driver–receiver design flow, over 50% energy reduction is observed.
Image Authentication Using Digital Watermarkingijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Digital watermarking is used for data authentication and copyright protection of digital media files.
Original host files required to recover the watermark operation in non-blind watermark system, which increases
system resources overhead. It also doubles memory capacity and communication band-width. This system uses a
robust video multiple watermarking technique which is based on image interlacing. In this system, a watermark
embedding/extracting is done by using three-level discrete wavelet transform (DWT), Arnold transform is used as
a watermark encryption/ decryption method, and gray image, color image, and video are used as watermarks.
Geometric, noising, format compression, and image processing attacks are used to test this system.
Keywords — Digital watermarking, Image interlacing, Arnold transform, Three level DWT, Authentication,
Security.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A Survey on Multimedia Content Protection Mechanisms IJECEIAES
Cloud computing has emerged to influence multimedia content providers like Disney to render their multimedia services. When content providers use the public cloud, there are chances to have pirated copies further leading to a loss in revenues. At the same time, technological advancements regarding content recording and hosting made it easy to duplicate genuine multimedia objects. This problem has increased with increased usage of a cloud platform for rendering multimedia content to users across the globe. Therefore it is essential to have mechanisms to detect video copy, discover copyright infringement of multimedia content and protect the interests of genuine content providers. It is a challenging and computationally expensive problem to be addressed considering the exponential growth of multimedia content over the internet. In this paper, we surveyed multimedia-content protection mechanisms which throw light on different kinds of multimedia, multimedia content modification methods, and techniques to protect intellectual property from abuse and copyright infringement. It also focuses on challenges involved in protecting multimedia content and the research gaps in the area of cloud-based multimedia content protection.
A Review of BSS Based Digital Image Watermarking and Extraction MethodsIOSR Journals
The field of Signal Processing has witnessed the strong emergence of a new technique, the Blind
Signal Processing (BSP) which is based on sound theoretical foundation. An offshoot of the BSP is known as
Blind Source Separation (BSS). This digital signal processing techniques have a wide and varied potential
applications. The term blind is indicative of the fact that both the source signal and the mixing procedures are
unknown. One of the more interesting applications of BSS is in field of image data security/authentication where
digital watermarking is proposed. Watermarking is a promising technique to help protect data security and
intellectual property rights. The plethora digital image watermarking methods are surveyed and discussed here
with their features and limitations. Thus literature survey is presented in two major categories-Digital image
watermarking methods and BSS based techniques in digital image watermarking and extraction
Key Frame Extraction in Video Stream using Two Stage Method with Colour and S...ijtsrd
Key Frame Extraction is the summarization of videos for different applications like video object recognition and classification, video retrieval and archival and surveillance is an active research area in computer vision. In this paper describe a new criterion for well presentative key frames and correspondingly, create a key frame selection algorithm based Two stage Method. A two stage method is used to extract accurate key frames to cover the content for the whole video sequence. Firstly, an alternative sequence is got based on color characteristic difference between adjacent frames from original sequence. Secondly, by analyzing structural characteristic difference between adjacent frames from the alternative sequence, the final key frame sequence is obtained. And then, an optimization step is added based on the number of final key frames in order to ensure the effectiveness of key frame extraction. Khaing Thazin Min | Wit Yee Swe | Yi Yi Aung | Khin Chan Myae Zin "Key Frame Extraction in Video Stream using Two-Stage Method with Colour and Structure" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd27971.pdfPaper URL: https://www.ijtsrd.com/computer-science/data-processing/27971/key-frame-extraction-in-video-stream-using-two-stage-method-with-colour-and-structure/khaing-thazin-min
ADAPTIVE WATERMARKING TECHNIQUE FOR SPEECH SIGNAL AUTHENTICATION ijcsit
Biometrics data recently has become a major role in determining the identity of the person. With such
importance for the use of biometrics data, there are many attacks that threaten the security and integrity of
biometrics data itself. Therefore, it becomes necessary to protect the originality of biometrics data against
manipulation and fraud. This paper presents an authentication technique to achieve the authenticity of
speech signals based on adaptive watermarking technique. The basic idea is depends on extracting the
speech features from the speech signal initially and then using these features as a watermark. The
watermark information embeds into the same speech signal. The short time energy technique is used to
identifying the suitable positions for embedding the watermark in order to avoid the regions that used in
the speech recognition system. After exclusion the important areas that used in speech recognition the
Genetic Algorithm (GA) is used to generate random locations to hide the watermark information in an
intelligent manner. The experimental results have achieved high efficiency in establishing the authenticity
of speech signal and the process of embedding
Survey on Different Methods of Digital Audio WatermarkingIJERA Editor
The significant progress of the technology gives the full access to the digital data for retransmitting and reproduction with comfort. Since the benefits of such progress is easily available, they equally immune to some illegal manipulation of data. So there is necessity arises for the protection of digital data from unauthorized users. The digital audio watermarking technique is new technology among different watermarking techniques which provides successful solutions to problems occurred from some digital attacks. Basically watermarking is the scheme in which binary information is embedded into the original signal. The major concern of the audio watermarking scheme is to provide the proof of ownership to the owner and to provide protection for embedded data. This paper provides concise analysis of different existing audio water.
Efficient video indexing for fast motion videoijcga
Due to advances in recent multimedia technologies, various digital video contents become available from different multimedia sources. Efficient management, storage, coding, and indexing of video are required because video contains lots of visual information and requires a large amount of memory. This paper proposes an efficient video indexing method for video with rapid motion or fast illumination change, in which motion information and feature points of specific objects are used. For accurate shot boundary detection, we make use of two steps: block matching algorithm to obtain accurate motion information and modified displaced frame difference to compensate for the error in existing methods. We also propose an object matching algorithm based on the scale invariant feature transform, which uses feature points to group shots semantically. Computer simulation with five fast-motion video shows the effectiveness of the proposed video indexing method.
To make a biogas energy from different sources & creating awareness between h...IJMER
Biogas from biomass appears as an alternative source of energy, which is potentially enriched in biomass resources. This article gives an overview of present and future use of biomass as an industrial feedstock for production of fuels, chemicals and other materials. However, to be truly competitive in an open market situation, higher value products are required. Results suggest that biogas technology must be encouraged, promoted, invested, implemented, and demonstrated, but especially in remote rural areas. Different types of wastes are used for production of biogas .these wastes are found very easy and an every palace. This article helps to make biogas form different wastes. From this study, it can be concluded that this method not only contributed to renewable biogas production but also improved the effluent quality
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Jiri ece-01-03 adaptive temporal averaging and frame prediction based surveil...Ijripublishers Ijri
Global interconnect planning becomes a challenge as semiconductor technology continuously scales. Because of the increasing wire resistance and higher capacitive coupling in smaller features, the delay of global interconnects becomes large compared with the delay of a logic gate, introducing a huge performance gap that needs to be resolved A novel equalized global link architecture and driver– receiver co design flow are proposed for high-speed and low-energy on-chip communication by utilizing a continuous-time linear equalizer (CTLE). The proposed global link is analyzed using a linear system method, and the formula of CTLE eye opening is derived to provide high-level design guidelines and insights.
Compared with the separate driver–receiver design flow, over 50% energy reduction is observed.
Image Authentication Using Digital Watermarkingijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Digital watermarking is used for data authentication and copyright protection of digital media files.
Original host files required to recover the watermark operation in non-blind watermark system, which increases
system resources overhead. It also doubles memory capacity and communication band-width. This system uses a
robust video multiple watermarking technique which is based on image interlacing. In this system, a watermark
embedding/extracting is done by using three-level discrete wavelet transform (DWT), Arnold transform is used as
a watermark encryption/ decryption method, and gray image, color image, and video are used as watermarks.
Geometric, noising, format compression, and image processing attacks are used to test this system.
Keywords — Digital watermarking, Image interlacing, Arnold transform, Three level DWT, Authentication,
Security.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A Survey on Multimedia Content Protection Mechanisms IJECEIAES
Cloud computing has emerged to influence multimedia content providers like Disney to render their multimedia services. When content providers use the public cloud, there are chances to have pirated copies further leading to a loss in revenues. At the same time, technological advancements regarding content recording and hosting made it easy to duplicate genuine multimedia objects. This problem has increased with increased usage of a cloud platform for rendering multimedia content to users across the globe. Therefore it is essential to have mechanisms to detect video copy, discover copyright infringement of multimedia content and protect the interests of genuine content providers. It is a challenging and computationally expensive problem to be addressed considering the exponential growth of multimedia content over the internet. In this paper, we surveyed multimedia-content protection mechanisms which throw light on different kinds of multimedia, multimedia content modification methods, and techniques to protect intellectual property from abuse and copyright infringement. It also focuses on challenges involved in protecting multimedia content and the research gaps in the area of cloud-based multimedia content protection.
A Review of BSS Based Digital Image Watermarking and Extraction MethodsIOSR Journals
The field of Signal Processing has witnessed the strong emergence of a new technique, the Blind
Signal Processing (BSP) which is based on sound theoretical foundation. An offshoot of the BSP is known as
Blind Source Separation (BSS). This digital signal processing techniques have a wide and varied potential
applications. The term blind is indicative of the fact that both the source signal and the mixing procedures are
unknown. One of the more interesting applications of BSS is in field of image data security/authentication where
digital watermarking is proposed. Watermarking is a promising technique to help protect data security and
intellectual property rights. The plethora digital image watermarking methods are surveyed and discussed here
with their features and limitations. Thus literature survey is presented in two major categories-Digital image
watermarking methods and BSS based techniques in digital image watermarking and extraction
Key Frame Extraction in Video Stream using Two Stage Method with Colour and S...ijtsrd
Key Frame Extraction is the summarization of videos for different applications like video object recognition and classification, video retrieval and archival and surveillance is an active research area in computer vision. In this paper describe a new criterion for well presentative key frames and correspondingly, create a key frame selection algorithm based Two stage Method. A two stage method is used to extract accurate key frames to cover the content for the whole video sequence. Firstly, an alternative sequence is got based on color characteristic difference between adjacent frames from original sequence. Secondly, by analyzing structural characteristic difference between adjacent frames from the alternative sequence, the final key frame sequence is obtained. And then, an optimization step is added based on the number of final key frames in order to ensure the effectiveness of key frame extraction. Khaing Thazin Min | Wit Yee Swe | Yi Yi Aung | Khin Chan Myae Zin "Key Frame Extraction in Video Stream using Two-Stage Method with Colour and Structure" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd27971.pdfPaper URL: https://www.ijtsrd.com/computer-science/data-processing/27971/key-frame-extraction-in-video-stream-using-two-stage-method-with-colour-and-structure/khaing-thazin-min
ADAPTIVE WATERMARKING TECHNIQUE FOR SPEECH SIGNAL AUTHENTICATION ijcsit
Biometrics data recently has become a major role in determining the identity of the person. With such
importance for the use of biometrics data, there are many attacks that threaten the security and integrity of
biometrics data itself. Therefore, it becomes necessary to protect the originality of biometrics data against
manipulation and fraud. This paper presents an authentication technique to achieve the authenticity of
speech signals based on adaptive watermarking technique. The basic idea is depends on extracting the
speech features from the speech signal initially and then using these features as a watermark. The
watermark information embeds into the same speech signal. The short time energy technique is used to
identifying the suitable positions for embedding the watermark in order to avoid the regions that used in
the speech recognition system. After exclusion the important areas that used in speech recognition the
Genetic Algorithm (GA) is used to generate random locations to hide the watermark information in an
intelligent manner. The experimental results have achieved high efficiency in establishing the authenticity
of speech signal and the process of embedding
Survey on Different Methods of Digital Audio WatermarkingIJERA Editor
The significant progress of the technology gives the full access to the digital data for retransmitting and reproduction with comfort. Since the benefits of such progress is easily available, they equally immune to some illegal manipulation of data. So there is necessity arises for the protection of digital data from unauthorized users. The digital audio watermarking technique is new technology among different watermarking techniques which provides successful solutions to problems occurred from some digital attacks. Basically watermarking is the scheme in which binary information is embedded into the original signal. The major concern of the audio watermarking scheme is to provide the proof of ownership to the owner and to provide protection for embedded data. This paper provides concise analysis of different existing audio water.
Efficient video indexing for fast motion videoijcga
Due to advances in recent multimedia technologies, various digital video contents become available from different multimedia sources. Efficient management, storage, coding, and indexing of video are required because video contains lots of visual information and requires a large amount of memory. This paper proposes an efficient video indexing method for video with rapid motion or fast illumination change, in which motion information and feature points of specific objects are used. For accurate shot boundary detection, we make use of two steps: block matching algorithm to obtain accurate motion information and modified displaced frame difference to compensate for the error in existing methods. We also propose an object matching algorithm based on the scale invariant feature transform, which uses feature points to group shots semantically. Computer simulation with five fast-motion video shows the effectiveness of the proposed video indexing method.
To make a biogas energy from different sources & creating awareness between h...IJMER
Biogas from biomass appears as an alternative source of energy, which is potentially enriched in biomass resources. This article gives an overview of present and future use of biomass as an industrial feedstock for production of fuels, chemicals and other materials. However, to be truly competitive in an open market situation, higher value products are required. Results suggest that biogas technology must be encouraged, promoted, invested, implemented, and demonstrated, but especially in remote rural areas. Different types of wastes are used for production of biogas .these wastes are found very easy and an every palace. This article helps to make biogas form different wastes. From this study, it can be concluded that this method not only contributed to renewable biogas production but also improved the effluent quality
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
A Novel Information Accountability Framework for Cloud ComputingIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
Analyzing the indicators walkability of cities, in order to improving urban v...IJMER
Urban design is a technique and knowledge seeking to organize and improve urban qualities
and increase the quality of citizenship life. Based on the perspectives and objectives of urban design, the
dominant intention in all urbanism activities is to reach high humanistic and social dimensions. In fact,
what give meaning to a city are the social aspects raised in recent urban activities, in addition to the
physical and visual body of it. Over the past decade the quality of the walking environment has become
a significant factor in transportation planning and design in developed countries. It is argued that the
pedestrians’ environment has been ignored in favors of automobile. The purpose of this study was to
examine the effects of walkability on property values and investment returns. Research method is
descriptive. The method of collected data is field. Also, were used questionnaire tools in order to
collecting data. On the other hand, was referred to municipality 9 region due to, studied area was
located in this urban region.
In continue, was used SWOT technique in order to analyzing questionnaire. At finally, proposed
strategies in order to improving urban space qualify.
Speech Recognition for Agriculture based Interactive Voice Response SystemIJMER
Speech is the most desirable medium of communication between humans. The goal of speech processing is to provide natural interfaces to human –computer interaction through speech input and speech output capabilities in Regional languages. Speech being a natural mode of communication among human beings has the potential of being primary as well as convenient mode of interaction with computers. It is desirable to have a human computer dialogue in audio mode to take place in local language. Marathi is one of most widely used language in Maharashtra. The Interactive Voice response system is well known application of speech processing. This paper explores a new approach of IVRS system for agricultural assistance to farmers in Marathi.
User Navigation Pattern Prediction from Web Log Data: A SurveyIJMER
This paper proposes a survey of Web Page Prediction Techniques. Prefetching of Web page
has been widely used to reduce the access latency problem of the Web users. However, if Prefetching of
Web page is not accurate and Prefetched web pages are not visited by the users in their accesses, the
limited bandwidth of network and services of server will not be used efficiently and may face the problem
of access delay. Therefore, it is critical that we need an effective prediction method during prefetching.
The Markov models have been widely used to predict and analyze users navigational behavior. All the
activities of web users have been saved in web log files. The stored users session is used to extract
popular web navigation paths and predict current users next web page visit
Implementation of High Throughput Radix-16 FFT ProcessorIJMER
The extension of radix-4 algorithm to radix-16 to achieve the high throughput of 2.59 giga-samples/s for WPAN’s.We are also reformulating radix-16 algorithm to achieve low-complexity and
low area cost and high performance. Radix-16 FFT is obtained by cascaded the radix -4 butterfly
units. It facilitates low-complexity realization of radix-16 butterfly operation and high operation speed
due to its optimized pipelined structure. Besides, a new three-stage multiplier for twiddle factor
multiplication is also proposed, which has lower area and power consumption than conventional
complex multipliers
Effect of Co doping on the structural and physical properties of SrC4H4O6.3H2...IJMER
Single crystals of strontium tartrate and cobalt doped strontium tartrate crystals were
grown by the single diffusion gel growth technique. The growth conditions were optimized by varying
the parameters such as pH, concentration of the gel, gel setting time and concentration of the reactants.
Silica gel was used as the growth medium with test tubes as crystallization vessels. Crystals having
different morphologies were obtained (transparent and few opaque). The grown crystals were
characterized by carrying out PXRD, SXRD, FTIR spectral, UV-Vis-NIR spectral, SHG, PL spectral,
AAS, microhardness and TG/DTA measurements. The tri hydrate crystals belong to the monoclinic
crystal system and the tetra hydrate crystals belong to orthorhombic crystal system and are optically
transparent, NLO active, mechanically soft and thermally stable up to 100 °C. AAS measurement
revealed the presence of Co atoms in the doped crystals. Results indicate that Co-doping significantly
increases SHG efficiency. Details are presented
Review and Comparisons between Multiple Ant Based Routing Algorithms in Mobi...IJMER
Along with an increase in the use and development of various types of mobile ad hoc and
wireless sensor networks the necessity for presenting optimum routing in these networks is a topic yet to
be discussed and new algorithms are presented. Using ant colony optimization algorithm or ACO as a
routing method because of its structural similarities to these networks’ model, has had acceptable results
regarding different parameters especially quality of service (QoS). Considering the fact that many
articles have suggested and presented various models for ant based routing, the need for studying and comparing them can be felt. There are about 17 applied ant based routings, this article studies and compares the most important ant based algorithms so as to indicate the quality and importance of each of them under different conditions
Estimation of Manufacturing Costs in the Early Stages of Product Development ...IJMER
ABSTRACT : One of the crucial factors in increase of productivity of supply chains is the management of production
costs. Since the number of methods and tools used to estimate the production costs in product development phase is limited,
the designers often estimate the costs based on their experience. The designers can mainly affect the direct costs of a
product, including material, labor and purchased parts. Direct costs vary greatly depending on the number of produced
units. Indirect costs include for example the work in process, storage and internal transportations. The developed software
prototype is based on the Lucas method. It will take a simple and ideal part, whose costs are known and then use factors to
produce the final costs. The application calculates sophisticated estimates about how much it would cost to produce a single
part. The developed software seems to work surprisingly well. It may not tell the final truth about the component costs but
can be used to open the eyes of the designer when the costs of the component under design are growing too high. It can also
be used to find the most suitable manufacturing method and when considering the make or buy decisions.
Keywords: Cost estimation, Manufacturing costs, Product Development
An Exploration based on Multifarious Video Copy Detection Strategiesidescitation
We co-exist in an era, where tonnes and tonnes of
videos are uploaded every day. Video copy detection has become
the need for the hour as most of them are user generated
Internet videos through popular sites such as YouTube. It acts
as a medium to restrain piracy and prove whether the contents
are legitimate. The usual procedure adopted in video copy
detection techniques include discovering whether a query
video is copied from a database of videos or not. This paper
acquaints different Video copy detection techniques that have
been adopted to ensure robust and secure videos along some
applications of video fingerprinting.
VISUAL ATTENTION BASED KEYFRAMES EXTRACTION AND VIDEO SUMMARIZATIONcscpconf
Recent developments in digital video and drastic increase of internet use have increased the
amount of people searching and watching videos online. In order to make the search of the
videos easy, Summary of the video may be provided along with each video. The video summary
provided thus should be effective so that the user would come to know the content of the video
without having to watch it fully. The summary produced should consists of the key frames that
effectively express the content and context of the video. This work suggests a method to extract
key frames which express most of the information in the video. This is achieved by quantifying
Visual attention each frame commands. Visual attention of each frame is quantified using a
descriptor called Attention quantifier. This quantification of visual attention is based on the
human attention mechanism that indicates color conspicuousness and the motion involved seek
more attention. So based on the color conspicuousness and the motion involved each frame is
given a Attention parameter. Based on the attention quantifier value the key frames are extracted and are summarized adaptively. This framework suggests a method to produces meaningful video summary.
How to prepare a perfect video abstract for your research paper – Pubrica.pdfPubrica
A video abstract is a series of moving pictures taken from a lengthier movie that is significantly shorter than the original yet retains the original's essential meaning.
Learn More : https://bit.ly/3JVyrCW
Reference: https://pubrica.com/services/publication-support/Video-Abstract/
Why Pubrica:
When you order our services, we promise you the following – Plagiarism free | always on Time | 24*7 customer support | Written to international Standard | Unlimited Revisions support | Medical writing Expert | Publication Support | Bio statistical experts | High-quality Subject Matter Experts.
Contact us:
Web: https://pubrica.com/
Blog: https://pubrica.com/academy/
Email: sales@pubrica.com
WhatsApp : +91 9884350006
United Kingdom: +44-1618186353
LOCALIZATION OF OVERLAID TEXT BASED ON NOISE INCONSISTENCIESaciijournal
In this paper, we present a novel technique for localization of caption text in video frames based on noise inconsistencies. Text is artificially added to the video after it has been captured and as such does not form part of the original video graphics. Typically, the amount of noise level is uniform across the entire captured video frame, thus, artificially embedding or overlaying text on the video introduces yet another segment of noise level. Therefore detection of various noise levels in the video frame may signify availability of overlaid text. Hence we exploited this property by detecting regions with various noise levels to localize overlaid text in video frames. Experimental results obtained shows a great improvement in line with overlaid text localization, where we have performed metric measure based on Recall, Precision and f-measure.
The proposed scheme embedded the watermark during the differential pulse code modulation process and extracted through decoding the entropy details. This technique utilize the moving picture expert groups standard (MPEG-2) in which discrete cosine transform coefficients are adjusted from selected instantaneous decoder refresh frames for watermarking purpose. The subsets of frames as candidate I-frames are chosen to achieve better perceptibility and robustness. A secret key based cryptographic technique is used to select the candidate frames. Three more keys are required to extract the watermark whereas one of the key is used to stop the extraction process and the remaining two are used to display the scrambled watermark. The toughness is evaluated by testing spatial and temporal synchronization attacks. High sturdiness is achieved against video specific attacks frequently occurs in the real world. Even a single frame can accommodate thousand of watermark bits which reflect that high watermark capacity can be obtained.
Multi-View Video Coding Algorithms/Techniques: A Comprehensive StudyIJERA Editor
For scientific exploration and visualization, Multi-view display enables a viewer to experience a 3-D
environment via a flat 2-D screen. Visualization is the most effective and informative form for delivering any
information. In this paper the recent developments in the multi-view video coding are reviewed such as Motion
and Disparity Compensated coding, Wavelet based multi-view video coding, Spatial scalability coding etc.
How to prepare a perfect video abstract for your research paper – Pubrica.pptxPubrica
A video abstract is a series of moving pictures taken from a lengthier movie that is significantly shorter than the original yet retains the original's essential meaning.
Learn More : https://bit.ly/3JVyrCW
Reference: https://pubrica.com/services/publication-support/Video-Abstract/
Why Pubrica:
When you order our services, we promise you the following – Plagiarism free | always on Time | 24*7 customer support | Written to international Standard | Unlimited Revisions support | Medical writing Expert | Publication Support | Bio statistical experts | High-quality Subject Matter Experts.
Contact us:
Web: https://pubrica.com/
Blog: https://pubrica.com/academy/
Email: sales@pubrica.com
WhatsApp : +91 9884350006
United Kingdom: +44-1618186353
Efficient and Robust Detection of Duplicate Videos in a Databaserahulmonikasharma
In this paper, the duplicate detection method is to retrieve the best matching model video for a given query video using fingerprint. We have used the Color Layout Descriptor method and Opponent Color Space to extract feature from frame and perform k-means based clustering to generate fingerprints which are further encoded by Vector Quantization. The model-to-query video distance is computed using a new distance measure to find the similarity. To perform efficient search coarse-to-fine matching scheme is used to retrieve best match. We perform experiments on query videos and real time video with an average duration of 60 sec; the duplicate video is detected with high similarity.
A Study on Translucent Concrete Product and Its Properties by Using Optical F...IJMER
- Translucent concrete is a concrete based material with light-transferring properties,
obtained due to embedded light optical elements like Optical fibers used in concrete. Light is conducted
through the concrete from one end to the other. This results into a certain light pattern on the other
surface, depending on the fiber structure. Optical fibers transmit light so effectively that there is
virtually no loss of light conducted through the fibers. This paper deals with the modeling of such
translucent or transparent concrete blocks and panel and their usage and also the advantages it brings
in the field. The main purpose is to use sunlight as a light source to reduce the power consumption of
illumination and to use the optical fiber to sense the stress of structures and also use this concrete as an
architectural purpose of the building
Developing Cost Effective Automation for Cotton Seed DelintingIJMER
A low cost automation system for removal of lint from cottonseed is to be designed and
developed. The setup consists of stainless steel drum with stirrer in which cottonseeds having lint is mixed
with concentrated sulphuric acid. So lint will get burn. This lint free cottonseed treated with lime water to
neutralize acidic nature. After water washing this cottonseeds are used for agriculter purpose
Study & Testing Of Bio-Composite Material Based On Munja FibreIJMER
The incorporation of natural fibres such as munja fiber composites has gained
increasing applications both in many areas of Engineering and Technology. The aim of this study is to
evaluate mechanical properties such as flexural and tensile properties of reinforced epoxy composites.
This is mainly due to their applicable benefits as they are light weight and offer low cost compared to
synthetic fibre composites. Munja fibres recently have been a substitute material in many weight-critical
applications in areas such as aerospace, automotive and other high demanding industrial sectors. In
this study, natural munja fibre composites and munja/fibreglass hybrid composites were fabricated by a
combination of hand lay-up and cold-press methods. A new variety in munja fibre is the present work
the main aim of the work is to extract the neat fibre and is characterized for its flexural characteristics.
The composites are fabricated by reinforcing untreated and treated fibre and are tested for their
mechanical, properties strictly as per ASTM procedures.
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)IJMER
Hybrid engine is a combination of Stirling engine, IC engine and Electric motor. All these 3 are
connected together to a single shaft. The power source of the Stirling engine will be a Solar Panel. The aim of
this is to run the automobile using a Hybrid engine
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...IJMER
The present day technology demands eco-friendly developments. In this era the
composite material are playing a vital roal in different field of Engineering .The composite materials
are using as a principle materials. Nowaday the composite materials are utilizing as a important
component of engineering field .Where as the importance of the applications of composites is well
known, but thrust on the use of natural fibres in it for reinforcement has been given priority for some
times. But changing from synthetic fibres to natural fibres provides only half green-composites. A
partial green composite will be achieved if the matrix component is also eco-friendly. Keeping this in
view, a detailed literature surveyed has been carried out through various issues of the Journals
related to this field. The material systems used are sunnhemp fibres. Some epoxy and hardener has
been also added for stability and drying of the bio-composites. Various graphs and bar-charts are
super-imposed on each other for comparison among themselves and Graphs is plotted on MAT LAB
and ORIGIN 6.0 software. To determining tensile strengths, Various properties for different biocomposites
have been compared among themselves. Comparison of the behaviour of bio-composites of
this work has been also compare with other works. The bio-composites developed in this work are
likely to get applications in fall ceilings, partitions, bio-degradable packagings, automotive interiors,
sports things (e.g. rackets, nets, etc.), toys etc.
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...IJMER
The Greenstone belts of Karnataka are enriched in BIFs in Dharwar craton, where Iron
formations are confined to the basin shelf, clearly separated from the deeper-water iron formation that
accumulated at the basin margin and flanking the marine basin. Geochemical data procured in terms of
major, trace and REE are plotted in various diagrams to interpret the genesis of BIFs. Al2O3, Fe2O3 (T),
TiO2, CaO, and SiO2 abundances and ratios show a wide variation. Ni, Co, Zr, Sc, V, Rb, Sr, U, Th,
ΣREE, La, Ce and Eu anomalies and their binary relationships indicate that wherever the terrigenous
component has increased, the concentration of elements of felsic such as Zr and Hf has gone up. Elevated
concentrations of Ni, Co and Sc are contributed by chlorite and other components characteristic of basic
volcanic debris. The data suggest that these formations were generated by chemical and clastic
sedimentary processes on a shallow shelf. During transgression, chemical precipitation took place at the
sediment-water interface, whereas at the time of regression. Iron ore formed with sedimentary structures
and textures in Kammatturu area, in a setting where the water column was oxygenated.
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...IJMER
In this paper, the mechanical characteristics of C45 medium carbon steel are investigated
under various working conditions. The main characteristic to be studied on this paper is impact toughness
of the material with different configurations and the experiment were carried out on charpy impact testing
equipment. This study reveals the ability of the material to absorb energy up to failure for various
specimen configurations under different heat treated conditions and the corresponding results were
compared with the analysis outcome
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...IJMER
Robot guns are being increasingly employed in automotive manufacturing to replace
risky jobs and also to increase productivity. Using a single robot for a single operation proves to be
expensive. Hence for cost optimization, multiple guns are mounted on a single robot and multiple
operations are performed. Robot Gun structure is an efficient way in which multiple welds can be done
simultaneously. However mounting several weld guns on a single structure induces a variety of
dynamic loads, especially during movement of the robot arm as it maneuvers to reach the weld
locations. The primary idea employed in this paper, is to model those dynamic loads as equivalent G
force loads in FEA. This approach will be on the conservative side, and will be saving time and
subsequently cost efficient. The approach of the paper is towards creating a standard operating
procedure when it comes to analysis of such structures, with emphasis on deploying various technical
aspects of FEA such as Non Linear Geometry, Multipoint Constraint Contact Algorithm, Multizone
meshing .
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationIJMER
This paper aims to do modelling, simulation and performing the static analysis of a go
kart chassis consisting of Circular beams. Modelling, simulations and analysis are performed using 3-D
modelling software i.e. Solid Works and ANSYS according to the rulebook provided by Indian Society of
New Era Engineers (ISNEE) for National Go Kart Championship (NGKC-14).The maximum deflection is
determined by performing static analysis. Computed results are then compared to analytical calculation,
where it is found that the location of maximum deflection agrees well with theoretical approximation but
varies on magnitude aspect.
In récent year various vehicle introduced in market but due to limitation in
carbon émission and BS Séries limitd speed availability vehicle in the market and causing of
environnent pollution over few year There is need to decrease dependancy on fuel vehicle.
bicycle is to be modified for optional in the future To implement new technique using change in
pedal assembly and variable speed gearbox such as planetary gear optimise speed of vehicle
with variable speed ratio.To increase the efficiency of bicycle for confortable drive and to
reduce torque appli éd on bicycle. we introduced epicyclic gear box in which transmission done
throgh Chain Drive (i.e. Sprocket )to rear wheel with help of Epicyclical gear Box to give
number of différent Speed during driving.To reduce torque requirent in the cycle with change in
the pedal mechanism
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIJMER
The proposal of this paper is to present Spring Framework which is widely used in
developing enterprise applications. Considering the current state where applications are developed using
the EJB model, Spring Framework assert that ordinary java beans(POJO) can be utilize with minimal
modifications. This modular framework can be used to develop the application faster and can reduce
complexity. This paper will highlight the design overview of Spring Framework along with its features that
have made the framework useful. The integration of multiple frameworks for an E-commerce system has
also been addressed in this paper. This paper also proposes structure for a website based on integration of
Spring, Hibernate and Struts Framework.
Microcontroller Based Automatic Sprinkler Irrigation SystemIJMER
Microcontroller based Automatic Sprinkler System is a new concept of using
intelligence power of embedded technology in the sprinkler irrigation work. Designed system replaces
the conventional manual work involved in sprinkler irrigation to automatic process. Using this system a
farmer is protected against adverse inhuman weather conditions, tedious work of changing over of
sprinkler water pipe lines & risk of accident due to high pressure in the water pipe line. Overall
sprinkler irrigation work is transformed in to a comfortableautomatic work. This system provides
flexibility & accuracy in respect of time set for the operation of a sprinkler water pipe lines. In present
work the author has designed and developed an automatic sprinkler irrigation system which is
controlled and monitored by a microcontroller interfaced with solenoid valves.
On some locally closed sets and spaces in Ideal Topological SpacesIJMER
In this paper we introduce and characterize some new generalized locally closed sets
known as
δ
ˆ
s-locally closed sets and spaces are known as
δ
ˆ
s-normal space and
δ
ˆ
s-connected space and
discussed some of their properties
Intrusion Detection and Forensics based on decision tree and Association rule...IJMER
This paper present an approach based on the combination of, two techniques using
decision tree and Association rule mining for Probe attack detection. This approach proves to be
better than the traditional approach of generating rules for fuzzy expert system by clustering methods.
Association rule mining for selecting the best attributes together and decision tree for identifying the
best parameters together to create the rules for fuzzy expert system. After that rules for fuzzy expert
system are generated using association rule mining and decision trees. Decision trees is generated for
dataset and to find the basic parameters for creating the membership functions of fuzzy inference
system. Membership functions are generated for the probe attack. Based on these rules we have
created the fuzzy inference system that is used as an input to neuro-fuzzy system. Fuzzy inference
system is loaded to neuro-fuzzy toolbox as an input and the final ANFIS structure is generated for
outcome of neuro-fuzzy approach. The experiments and evaluations of the proposed method were
done with NSL-KDD intrusion detection dataset. As the experimental results, the proposed approach
based on the combination of, two techniques using decision tree and Association rule mining
efficiently detected probe attacks. Experimental results shows better results for detecting intrusions as
compared to others existing methods
Natural Language Ambiguity and its Effect on Machine LearningIJMER
"Natural language processing" here refers to the use and ability of systems to process
sentences in a natural language such as English, rather than in a specialized artificial computer
language such as C++. The systems of real interest here are digital computers of the type we think of as
personal computers and mainframes. Of course humans can process natural languages, but for us the
question is whether digital computers can or ever will process natural languages. We have tried to
explore in depth and break down the types of ambiguities persistent throughout the natural languages
and provide an answer to the question “How it affects the machine translation process and thereby
machine learning as whole?” .
Today in era of software industry there is no perfect software framework available for
analysis and software development. Currently there are enormous number of software development
process exists which can be implemented to stabilize the process of developing a software system. But no
perfect system is recognized till yet which can help software developers for opting of best software
development process. This paper present the framework of skillful system combined with Likert scale. With
the help of Likert scale we define a rule based model and delegate some mass score to every process and
develop one tool name as MuxSet which will help the software developers to select an appropriate
development process that may enhance the probability of system success.
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersIJMER
The present study investigates the creep in a thick-walled composite cylinders made
up of aluminum/aluminum alloy matrix and reinforced with silicon carbide particles. The distribution
of SiCp is assumed to be either uniform or decreasing linearly from the inner to the outer radius of
the cylinder. The creep behavior of the cylinder has been described by threshold stress based creep
law with a stress exponent of 5. The composite cylinders are subjected to internal pressure which is
applied gradually and steady state condition of stress is assumed. The creep parameters required to
be used in creep law, are extracted by conducting regression analysis on the available experimental
results. The mathematical models have been developed to describe steady state creep in the composite
cylinder by using von-Mises criterion. Regression analysis is used to obtain the creep parameters
required in the study. The basic equilibrium equation of the cylinder and other constitutive equations
have been solved to obtain creep stresses in the cylinder. The effect of varying particle size, particle
content and temperature on the stresses in the composite cylinder has been analyzed. The study
revealed that the stress distributions in the cylinder do not vary significantly for various combinations
of particle size, particle content and operating temperature except for slight variation observed for
varying particle content. Functionally Graded Materials (FGMs) emerged and led to the development
of superior heat resistant materials.
Energy Audit is the systematic process for finding out the energy conservation
opportunities in industrial processes. The project carried out studies on various energy conservation
measures application in areas like lighting, motors, compressors, transformer, ventilation system etc.
In this investigation, studied the technical aspects of the various measures along with its cost benefit
analysis.
Investigation found that major areas of energy conservation are-
1. Energy efficient lighting schemes.
2. Use of electronic ballast instead of copper ballast.
3. Use of wind ventilators for ventilation.
4. Use of VFD for compressor.
5. Transparent roofing sheets to reduce energy consumption.
So Energy Audit is the only perfect & analyzed way of meeting the Industrial Energy Conservation.
An Implementation of I2C Slave Interface using Verilog HDLIJMER
The focus of this paper is on implementation of Inter Integrated Circuit (I2C) protocol
following slave module for no data loss. In this paper, the principle and the operation of I2C bus protocol
will be introduced. It follows the I2C specification to provide device addressing, read/write operation and
an acknowledgement. The programmable nature of device provide users with the flexibility of configuring
the I2C slave device to any legal slave address to avoid the slave address collision on an I2C bus with
multiple slave devices. This paper demonstrates how I2C Master controller transmits and receives data to
and from the Slave with proper synchronization.
The module is designed in Verilog and simulated in ModelSim. The design is also synthesized in Xilinx
XST 14.1. This module acts as a slave for the microprocessor which can be customized for no data loss.
Discrete Model of Two Predators competing for One PreyIJMER
This paper investigates the dynamical behavior of a discrete model of one prey two
predator systems. The equilibrium points and their stability are analyzed. Time series plots are obtained
for different sets of parameter values. Also bifurcation diagrams are plotted to show dynamical behavior
of the system in selected range of growth parameter
Discrete Model of Two Predators competing for One Prey
Ac02417471753
1. International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.2, Issue.4, July-Aug. 2012 pp-1747-1753 ISSN: 2249-6645
Enhancing Security in a Video Copy Detection System
Using Content Based Fingerprinting
E. Meenachi¹, G. Selva Vinayagam², C. Vinothini³
1. PG Student, Dept of IT, SNS College Technology, Coimbatore
2. Assistant Professor, Dept of IT, SNS College of Technology, Coimbatore
3. PG Student, Dept of IT, SNS College Technology, Coimbatore
Abstract: Information Security means protecting information and information systems from unauthorized access, use,
disclosure, disruption, modification, inspection, recording or destruction. The "Video Copy Detection" system is based on
detecting video copies from a video sample to avoid copyright violations. To identify video sequences, Content Based
Copy Detection (CBCD) presents an alternative to the watermarking approach. Content based Video fingerprinting
methods extract several unique features of a digital video that can be stored as a fingerprint of the video content. Video
copy detection system aims at deciding whether a query video segment is a copy of a video from the indexed dataset or not.
The evaluation and identification of video content is then performed by comparing the extracted video fingerprints. The
search algorithm searches the fingerprints that are stored in the database to find closest match with the fingerprints of the
query video. The Interest point Matching algorithm is implemented to make the fingerprint robust against content
changing attacks such as changing the background of the video. The proposed algorithm is tested on videos which are
affected by the distortions like noise, changes in brightness/contrast, rotation, time shift and changes in background. The
results gives the high average true positive rate and low average false positive rate. The results demonstrate that the
fingerprint extracted using this algorithm is robust. Video fingerprinting system is important for the applications like
Digital Rights Management (DRM) area, particularly regarding the distribution of unauthorized content on the internet.
Index Terms: Content-Based Fingerprinting, Video Copy Detection, Video Copy Retrieval, Interest points
I. INTRODUCTION
The widespread availability of video content and services and the rapid diffusion of broadband platforms have
brought new challenges to content owners, publishers and distributors. Video copy detection is a recent research domain
which has emerged largely in response to this technological trend. The goal of video copy detection is to develop automated
video analysis procedure to identify the original and modified copies of a video among the large amount of video data for
the purposes of copyright control, monitoring and structuring large video databases.
A. Content Based Video Copy Detection
Content-Based Copy Detection (CBCD) schemes are an alternative to the watermarking approach for persistent
identification of images and video clips. The primary concept of content-based copy detection (CBCD) is “the media itself
is the watermark,” i.e., the media (video, audio, image) contains enough unique information that can be used for detecting
copies. Content-based copy detection schemes extract signatures from the original media and store it in a database. The
same signatures are extracted from the test media stream and compared to the original media signature which is already
extracted and stored in a database to determine if the test stream contains a copy of the original media. The signatures that
are extracted from the media are termed as „fingerprints‟.
B. Fingerprint
Fingerprints are compact content-based signature that summarizes a video signal or another media signal. These
signatures are feature vectors that uniquely characterize specific signal. Video fingerprinting is a proven and commercially
available technique that can be used for content based copy detection. The task of a video-fingerprinting system is to detect
whether a particular segment of video is (partly) based on the same original video as video footage in a database of
reference videos.
The fingerprint of a video should be robust to the content-preserving distortions i.e., the changes made to the
videos unintentionally or intentionally by the users of video sharing websites. It determines the tolerance of the system to
different encoding processing that give rise to several distortions. Fingerprint should also be discriminant to make sure that
different videos has distinguishable fingerprints. It should also be secure so that it is difficult for an adversary to generate
similar fingerprints for different videos and manipulate the video copy detection systems.
C. Type of Fingerprints
Existing video fingerprints can be classified into four groups: spatial, temporal, colour and spatio-temporal
fingerprints. A spatial fingerprint characterizes spatial features of a video frame and is computed independent of other
www.ijmer.com 1747 | Page
2. International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.2, Issue.4, July-Aug. 2012 pp-1747-1753 ISSN: 2249-6645
frames.These approaches are based on intensity statistics such as mean, variance, centroid, and other higher order moments
of the spatial content of the different frames of the video. The frames are divided into subsections and for each section, the
features are calculated. This approach allows uniform spatial processing over the entire frame. However it is less robust to
geometrical operations like rotation and scaling. Examples of spatial features include luminance patterns, differential
luminance or gradient patterns, and edges.
The temporal fingerprint describes temporal features of a video and is computed between two frames in the
temporal direction. This involves comparing each frame against the previous frame. Differences between the two are
flagged as motion. This is done by comparing macro-blocks of a pre-determined size. Motion is detected as a change in the
color between frames within a macro-block, while the magnitude of the motion is deduced from the difference in color. A
measure of the amount of motion of each frame relative to the preceding frame is calculated by summing the differences in
color between these frames for all macro blocks. This results in a series of features, each indicative of a measure of motion
between two adjacent frames over time. Consequently, the size of the motion fingerprints is dependent on the amount of
motion that has been detected. Examples of temporal features include frame difference measures, motion vector patterns,
and shot durations.
A color fingerprint captures color characteristics of a video frame and is computed in a color space such as RGB
or YUV. Color-space-based fingerprints are among the first feature extraction methods used for video fingerprinting. They
are mostly derived from the histograms of the colors in specific regions in time and/or space within the video. Since color
features changes with different video formats these features have not been popular.Another drawback of the color features
is that they are not applicable to black and white videos.
A spatio-temporal fingerprints contains both spatial and temporal informations about the video. They perform
better than the fingerprints that use only spatial or temporal fingerprints. To capture relevant information from both
temporal and spatial domain they apply temporal and spatial differentiation in the feature space. They take the differences
of corresponding features extracted from subsequent blocks from one frame, and from subsequent frames in the temporal
direction. This feature extraction is robust to global changes in luminance, also robust to luminance and contrast variations
because only the sings of the difference are retrained. Their experimental results show that the method is also robust
against MPEG compression and median filtering. Different types of fingerprints are combined to form a video fingerprint.
II. LITERATURE REVIEW
Hye-Jeong Cho et al.[6] proposed the hierarchical video copy detection method which estimates similarity using
statistical characteristics between original video and its spatial variations. The target video is transformed by various spatial
variations such as blurring, constrast change, zoom in, and zoom out. Zheng Cao et al.[15] computed a video signature
based on ordinal measurement of video spatio-temporal distribution feature. The video similarity is measured by the
computation of the distance of video signature. The duplicate videos are generated by spatio and temporal changes. Juan
Chen[7] extracted key frames from the video sequences to save the computing time and storage space. Candidate
descriptors are then determined in the local context by applying Harris point detection. The descriptors are invariant to
spatial deformations like shifting, cropping and change of ratio.
Coskun et al. proposed a hash function [3] to extract a fingerprint based on signal processing operations. Two
robust hash algorithms for video were implemented in this paper. Discrete Cosine Transform (DCT) based on classical
basis set and Discrete Cosine Transform (DCT) based on a novel randomized basis set (RBT).The video here is considered
as the 3D matrix.DCT transformations are applied to extract the coefficients and hashing was performed. The 3D
transformations extract both spatial and temporal coefficients. The fingerprint is robust against signal processing
modifications and channel transformations. Does not robust against malicious attacks. Security measures are not solved
thoroughly in RBT [9].
Malekesmaeili.M et al generates fingerprints of a video sequence that carries both temporal and spatial
information‟s [5]. This algorithm is applied for a 2D data. Gaussian filtering is applied to the video signals to prevent
aliasing. Then the video signals are pre-processed (re-sampling and spatial resizing) to get the fixed frame size and frame
rate. Then the video is divided into frames and weighted average of the frames is taken to obtain TIRI (Temporally
Informative and Representative Images). DCT based hashing is applied which results in equal number of 0‟s and 1‟s. The
fingerprint is robust to time shift, frame dropping, added Gaussian noise. But the performance is low for rotation and shift
attacks. Hampapur et al uses a combination of feature based matching and inverted index files to detect copies of video
clips [3].
CBCD does not modify the video stream and hence can be applied to find copies of media in circulation. The
Reference Signature extract a set of signatures for the original media (M).The Test Signature extract the same set of
signatures from the test media (T). Then the distance between the test and reference signatures are measured to compare
both the signatures. If distance is lesser than a threshold, then it is a copied video. A set of representative frames are
selected from each video item in the collection. The corresponding representative frames from each set are represented by
an inverted image index table. Once a inverted image index has been created, it can be used to match a query image against
the collection [3].
www.ijmer.com 1748 | Page
3. International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.2, Issue.4, July-Aug. 2012 pp-1747-1753 ISSN: 2249-6645
III. EXTRACTION OF FINGERPRINT
A fingerprint is a content-based signature which is derived from a video (or other form of a multimedia asset) so
that it specifically represents the video or asset. To find a copy of a query video in a video database, one can search for a
close match of its fingerprint in the corresponding fingerprint database[10].
Storing
Query Fingerprint
Video Extraction
Fingerprint Fingerprint
Database Matches
Original Fingerprint
Video Extraction
Database
Searching
Fig.1. A complete Fingerprinting system
A. Tiri-Dct Algorithm
The existing algorithm for extracting the fingerprint is TIRI-DCT (Temporally Informative Representative Images).
This method calculates a weighted average of the frames to generate representative images. This sequence will carry the temporal
as well as spatial informations. The image is then divided into blocks. Then the first horizontal and the first vertical DCT
coefficients (features) are then extracted from each block. The value of the features from all the blocks is concatenated to
form the feature vector.[10] Each feature is then compared to a threshold (which is the median value of the feature vector)
and then a binary fingerprint is generated.
Preprocessing Weighted Average Generate Blocks
Extract 1st Extract 1st
Horizontal Vertical DCT
DCT Coefficient
Coefficient
Concatenate
Threshold
Binary values
Fig.2Finger Print Algorithm Preprocessing Steps
In order to determine whether a query video is an attacked version of a video in a database or not, its fingerprint is
first extracted. The fingerprint database (previously created from the videos in the video database) is then searched for the
closest fingerprint to the extracted query fingerprint.
Two searching techniques are implemented:
Inverted-File-Based Similarity Search
Cluster-Based Similarity Search
1). Inverted-File-Based Similarity Search
The search method is based on the idea that for two fingerprints which are similar enough to be considered as matches, the
probability of an exact match between smaller sub-blocks of those fingerprints is high. Divide each fingerprint into small
non overlapping blocks of bits. [10]The horizontal dimension of this table refers to the position of a word inside a
fingerprint, and the vertical direction corresponds to possible values of the word. The query is then compared to all the
fingerprints that start with the same word. The Hamming distance between these fingerprints and the query is then
www.ijmer.com 1749 | Page
4. International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.2, Issue.4, July-Aug. 2012 pp-1747-1753 ISSN: 2249-6645
calculated. If a fingerprint has a Hamming distance of less than some predefined threshold, it will be announced as the
match. When no match is found in the end, it is stated that the query does not belong to the database.
2). Cluster-Based Similarity Search
Clustering is used to reduce the number of queries that are examined within the database. By assigning each fingerprint to
one and only one cluster (out of K clusters), the fingerprints in the database will be clustered into K non overlapping
groups. To do so, a centroid is chosen for each cluster, termed the cluster head.[10]
A fingerprint will be assigned to a cluster if it is closest to this cluster‟s head. To determine if a query fingerprint matches
a fingerprint in the database, the cluster head closest to the query is found. All the fingerprints (of the videos in the
database) belonging to this cluster are then searched to find a match, i.e., the one which has the minimum Hamming
distance (of less than a certain threshold) from the query. This process continues until a match is found or the farthest
cluster is examined. If no match is found, the query is declared to be out of the database.
B. Problem Description
In existing system the fingerprint which is extracted using TIRI-DCT algorithm is not robust against the content changing
attacks such as changing the background of the video or replacing picture in picture and the performance of the system is
low in the presence of some other attacks, such as cropping, and logo insertion. The security of the fingerprint can be
achieved only with the fingerprints of smaller length. Larger fingerprints results in a decrease in detection speed as they
require more computation in calculating the hamming distance between the fingerprints. Also performance of the detection
speed gets reduced when there are a large number of fingerprints in the database
IV. INTEREST POINT MATCHING ALGORITHM
Corner detection is an approach used to extract certain kinds of features and infer the contents of an image. Corner
detection is frequently used in motion detection, image registration and video tracking. Corner detection overlaps with the
topic of Interest point detection. An interest point is a point in an image which has a well defined position in an image and
can be robustly detected. A good interest point detector has the following three properties:(1)The interest points are
repeatable, (2)the descriptors produced from them are unique, (3) they are well-distributed spatially. An Interest point in an
image has a clear, mathematically well-founded definition and has an well defined position in an image. It is stable under
local and global distortions in an image domain. To increase the robustness of the fingerprint against the content changing
attacks such as changing the background of the video an Interest point Matching algorithm is proposed. The conceptual
basis of this algorithm is the detection of “super points,” those points which have the greatest interest strength (i.e., which
represent the most prominent features) and the subsequent construction of a control network. Sufficient spatial information
is then available to reduce the ambiguity and avoid false matches.
The algorithm proposed in this paper includes two parts: A) Interest-point detection;B) interest-point matching.
A. Interest-Point Detection
The Harris detector is a well-known interest-point detection algorithm[17] to detect and extract the interest points.
The Harris algorithm determines whether a point is a corner based on the Harris matrix A at the point P(x, y).The interest
strength is determined based on the magnitudes of the eigenvalues (γ1 and γ2) of A. The following function Mc was
suggested as the interest strength:
Mc = det(A) − κtrace2(A). The value of κ has to be determined empirically, and in the literature, values in the range of
0.04–0.06. If Mc > 0, it is a corner; otherwise, it is not a corner. Obviously, the corner should be the point with the local
maximum value of Mc. By calculating the interest strength Mc over the whole image, an image which shows the interest
strength can be obtained[17]
B .Interest-Point Matching
After the detection of interest points, a control network is constructed with the correspondences. Correspondences are
defined as those interest points with the minimum difference in position and angle. Then the control network of each frame
is compared.
If the location of the points are same then it is marked as 1 else it is marked as 0. Thus the binary sequences that are
obtained are stored as the fingerprint.
V. EXPERIMENTAL RESULTS
To evaluate the performance of the proposed algorithm the videos are collected and stored in the database. TIRI-
DCT and Interest-point matching algorithm were separately applied to each video in the database. A fingerprint database is
formed for each algorithm and the extracted fingerprints are stored. Then, videos in the database were attacked(disorted)
to generate query videos. The attacks include added Gaussian noise, changes in brightness/contrast, time shift, rotation and
changes in background of the video. True Positive Rate and False Positive Rate are calculated for each algorithm.
Let true positives (TP) be positive examples correctly labelled as positives
www.ijmer.com 1750 | Page
5. International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.2, Issue.4, July-Aug. 2012 pp-1747-1753 ISSN: 2249-6645
TPR=TP/P
False positives (FP) be negative examples incorrectly labelled as positives.
FPR=FP/N
F-Score is calculated to measure the accuracy of the system. If the value of the F-Score is low then it represents the poor
system in terms of both robustness and discrimination. It considers both the precision p and the recall r of the test to
compute the score
p is the number of correct results divided by the number of all returned results.
P = TP /(TP + FN)
and r is the number of correct results divided by the number of results that should have been returned.
R = TP /(TP + FP)
The F1 score can be interpreted as a weighted average of the precision and recall, where an F 1 score reaches its best value at
1 and worst score at 0.
F=(1+β²) (precision. Recall) / (β² precision+recall)
β value is chosen as 0.5 to give precision twice the importance of recall. Following table shows the F-score for different
attack parameters: noise addition, change in brightness, contrast, rotation, time shift and changes in background.
TABLE I
COMPARING TIRI-DCT AND INTEREST-POINT-MATCHING ALGORITHM
TIRI-DCT INTEREST-POINT-MATCHING
Attacks TPR(%) FPR(%) F-SCORE TPR(%) FPR(%) F-SCORE
Noise 91.9724 8.0276 0.8542 97.7549 2.2451 0.9049
Brightness 91.9500 8.0500 0.8615 97.7523 2.2477 0.9023
Contrast 91.2927 8.7073 0.8623 97.6701 2.3299 0.9021
Time shift 91.8374 8.1626 0.8587 97.6856 2.3144 0.9058
Rotate 92.1669 7.8331 0.8583 97.7106 2.2894 0.9023
Background 91.5541 8.4459 0.8582 97.4372 2.5628 0.9057
Changed
Average 91.7955 8.204 0.8585 97.6684 2.3315 0.9038
The proposed Interest-Point-matching algorithm shows the higher F-score value than the existing algorithms. It
maintains higher performance for all the attacks such as noise addition, change in brightness, contrast, rotation, time shift
and changes in background. The algorithm maintains a high True Positive Rate of 97.66% and low False Positive Rate of
2.33%.
Fig .3. False Positive Rate of TIRI-DCT and Interest Point- Matching algorithm for different attack parameters from Table
I
www.ijmer.com 1751 | Page