In this paper, the duplicate detection method is to retrieve the best matching model video for a given query video using fingerprint. We have used the Color Layout Descriptor method and Opponent Color Space to extract feature from frame and perform k-means based clustering to generate fingerprints which are further encoded by Vector Quantization. The model-to-query video distance is computed using a new distance measure to find the similarity. To perform efficient search coarse-to-fine matching scheme is used to retrieve best match. We perform experiments on query videos and real time video with an average duration of 60 sec; the duplicate video is detected with high similarity.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
The proposed scheme embedded the watermark during the differential pulse code modulation process and extracted through decoding the entropy details. This technique utilize the moving picture expert groups standard (MPEG-2) in which discrete cosine transform coefficients are adjusted from selected instantaneous decoder refresh frames for watermarking purpose. The subsets of frames as candidate I-frames are chosen to achieve better perceptibility and robustness. A secret key based cryptographic technique is used to select the candidate frames. Three more keys are required to extract the watermark whereas one of the key is used to stop the extraction process and the remaining two are used to display the scrambled watermark. The toughness is evaluated by testing spatial and temporal synchronization attacks. High sturdiness is achieved against video specific attacks frequently occurs in the real world. Even a single frame can accommodate thousand of watermark bits which reflect that high watermark capacity can be obtained.
VIDEO SUMMARIZATION: CORRELATION FOR SUMMARIZATION AND SUBTRACTION FOR RARE E...Journal For Research
The ever increasing number of surveillance camera networks being deployed all over the world has not only resulted in a high interest in the development of algorithms to automatically analyze the video footage, but has also opened new questions as how to efficiently manage the vast amount of information generated. The user may not have sufficient time to watch the entire video or the whole of video content may not be of interest to the user. In such cases, the user may just want to view the summary of the video instead of watching the whole video. In this paper, we present a video summarization technique developed in order to efficiently access the points of interest in the video footage. The technique aims to eliminate the sequences which contain no activity of significance. The system being developed actually captures each frame from the video, then it processes the frame; if the frame is of its interest, it retains the frames otherwise it discards the frame; hence the resultant video is very short. The proposed method is extended to obtain rare event detection for security systems. These rare event detections refer to suspicious scenarios. The system will consider a particular frame of interest from a video footage taken at given time and search for actions from video footages across the particular area of interest specified by the user. The user is then notified about the objects and actions occurred in the area of interest. This helps in detecting suspicious behavior that would have otherwise been deemed unsuspicious and gone unnoticed in the context of a narrow timeframe.
A novel cryptographic technique that emphasis visual quality and efficieny by...eSAT Journals
Abstract Visual cryptography is a cryptographic technique which allows visual information to be encrypted in such a way that decryption becomes a mechanical operation that does not require a computer. The original image can be split into shares, where unauthorized person cannot get the data which we hide within that share images. By stacking the two shares, the secret data can be revealed. The highlighted issue in VC is, the size and quality of the reconstructed image should be same as the original image. In this paper, a novel k out of k extended visual cryptography scheme (EVCS) is used, to improve security and to produce meaningful shares. Halftone visual cryptography (VC) encodes a secret image into k halftone meaningful image shares through Floyd Steinberg error diffusion algorithm. The algorithm achieves dithering using error diffusion, meaning it pushes (adds) the residual quantization error of a pixel onto its neighboring pixels, to be dealt with later. This algorithm takes a substantial time for encryption and decryption in a considerably calmer manner. Comparisons with previous approaches show the superior performance of the new method.
Keywords: k out of k, extended visual cryptography, halftone visual cryptography, Floyd Steinberg error diffusion algorithm.
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH acijjournal
Image watermarking has come to wide use in the recent past. It is by the authentication problems and limitation means that the setting accuracy of the image watermarking operation is minimized. Different types of integration schemes have been proposed in the past to improve efficiency and makes the
embedding resistant against various attacks .Although transformation, spatial domain approaches have been developed PSNR improvements in image artifacts due to the fringes are still to be observed. To improvise the embedding, image artifacts in this paper a forward – based image embedding scheme is proposed.
Inverted File Based Search Technique for Video Copy Retrievalijcsa
A video copy detection system is a content-based search engine focusing on Spatio-temporal features. It
aims to find whether a query video segment is a copy of video from the video database or not based on the
signature of the video. It is hard to find whether a video is a copied video or a similar video since the
features of the content are very similar from one video to the other. The main focus is to detect that the
query video is present in the video database with robustness depending on the content of video and also by
fast search of fingerprints. The Fingerprint Extraction Algorithm and Fast Search Algorithm are adopted
to achieve robust, fast, efficient and accurate video copy detection. As a first step, the Fingerprint
Extraction algorithm is employed which extracts a fingerprint through the features from the image content
of video. The images are represented as Temporally Informative Representative Images (TIRI). Then the
next step is to find the presence of copy of a query video in a video database, in which a close match of its
fingerprint in the corresponding fingerprint database is searched using inverted-file-based method.
A Deterministic Eviction Model for Removing Redundancies in Video Corpus IJECEIAES
The traditional storage approaches are being challenged by huge data volumes. In multimedia content, every file does not necessarily get tagged as an exact duplicate; rather they are prone to editing and resulting in similar copies of the same file. This paper proposes the similarity-based deduplication approach to evict similar duplicates from the archive storage, which compares the samples of binary hashes to identify the duplicates. This eviction is done by initially dividing the query video into dynamic key frames based on the video length. Binary hash codes of these frames are then compared with existing key frames to identify the differences. The similarity score is determined based on these differences, which decides the eradication strategy of duplicate copy. Duplicate elimination goes through two levels, namely removal of exact duplicates and similar duplicates. The proposed approach has shortened the comparison window by comparing only the candidate hash codes based on the dynamic key frames and aims the accurate lossless duplicate removals. The presented work is executed and tested on the produced synthetic video dataset. Results show the reduction in redundant data and increase in the storage space. Binary hashes and similarity scores contributed to achieving good deduplication ratio and overall performance.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
The proposed scheme embedded the watermark during the differential pulse code modulation process and extracted through decoding the entropy details. This technique utilize the moving picture expert groups standard (MPEG-2) in which discrete cosine transform coefficients are adjusted from selected instantaneous decoder refresh frames for watermarking purpose. The subsets of frames as candidate I-frames are chosen to achieve better perceptibility and robustness. A secret key based cryptographic technique is used to select the candidate frames. Three more keys are required to extract the watermark whereas one of the key is used to stop the extraction process and the remaining two are used to display the scrambled watermark. The toughness is evaluated by testing spatial and temporal synchronization attacks. High sturdiness is achieved against video specific attacks frequently occurs in the real world. Even a single frame can accommodate thousand of watermark bits which reflect that high watermark capacity can be obtained.
VIDEO SUMMARIZATION: CORRELATION FOR SUMMARIZATION AND SUBTRACTION FOR RARE E...Journal For Research
The ever increasing number of surveillance camera networks being deployed all over the world has not only resulted in a high interest in the development of algorithms to automatically analyze the video footage, but has also opened new questions as how to efficiently manage the vast amount of information generated. The user may not have sufficient time to watch the entire video or the whole of video content may not be of interest to the user. In such cases, the user may just want to view the summary of the video instead of watching the whole video. In this paper, we present a video summarization technique developed in order to efficiently access the points of interest in the video footage. The technique aims to eliminate the sequences which contain no activity of significance. The system being developed actually captures each frame from the video, then it processes the frame; if the frame is of its interest, it retains the frames otherwise it discards the frame; hence the resultant video is very short. The proposed method is extended to obtain rare event detection for security systems. These rare event detections refer to suspicious scenarios. The system will consider a particular frame of interest from a video footage taken at given time and search for actions from video footages across the particular area of interest specified by the user. The user is then notified about the objects and actions occurred in the area of interest. This helps in detecting suspicious behavior that would have otherwise been deemed unsuspicious and gone unnoticed in the context of a narrow timeframe.
A novel cryptographic technique that emphasis visual quality and efficieny by...eSAT Journals
Abstract Visual cryptography is a cryptographic technique which allows visual information to be encrypted in such a way that decryption becomes a mechanical operation that does not require a computer. The original image can be split into shares, where unauthorized person cannot get the data which we hide within that share images. By stacking the two shares, the secret data can be revealed. The highlighted issue in VC is, the size and quality of the reconstructed image should be same as the original image. In this paper, a novel k out of k extended visual cryptography scheme (EVCS) is used, to improve security and to produce meaningful shares. Halftone visual cryptography (VC) encodes a secret image into k halftone meaningful image shares through Floyd Steinberg error diffusion algorithm. The algorithm achieves dithering using error diffusion, meaning it pushes (adds) the residual quantization error of a pixel onto its neighboring pixels, to be dealt with later. This algorithm takes a substantial time for encryption and decryption in a considerably calmer manner. Comparisons with previous approaches show the superior performance of the new method.
Keywords: k out of k, extended visual cryptography, halftone visual cryptography, Floyd Steinberg error diffusion algorithm.
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH acijjournal
Image watermarking has come to wide use in the recent past. It is by the authentication problems and limitation means that the setting accuracy of the image watermarking operation is minimized. Different types of integration schemes have been proposed in the past to improve efficiency and makes the
embedding resistant against various attacks .Although transformation, spatial domain approaches have been developed PSNR improvements in image artifacts due to the fringes are still to be observed. To improvise the embedding, image artifacts in this paper a forward – based image embedding scheme is proposed.
Inverted File Based Search Technique for Video Copy Retrievalijcsa
A video copy detection system is a content-based search engine focusing on Spatio-temporal features. It
aims to find whether a query video segment is a copy of video from the video database or not based on the
signature of the video. It is hard to find whether a video is a copied video or a similar video since the
features of the content are very similar from one video to the other. The main focus is to detect that the
query video is present in the video database with robustness depending on the content of video and also by
fast search of fingerprints. The Fingerprint Extraction Algorithm and Fast Search Algorithm are adopted
to achieve robust, fast, efficient and accurate video copy detection. As a first step, the Fingerprint
Extraction algorithm is employed which extracts a fingerprint through the features from the image content
of video. The images are represented as Temporally Informative Representative Images (TIRI). Then the
next step is to find the presence of copy of a query video in a video database, in which a close match of its
fingerprint in the corresponding fingerprint database is searched using inverted-file-based method.
A Deterministic Eviction Model for Removing Redundancies in Video Corpus IJECEIAES
The traditional storage approaches are being challenged by huge data volumes. In multimedia content, every file does not necessarily get tagged as an exact duplicate; rather they are prone to editing and resulting in similar copies of the same file. This paper proposes the similarity-based deduplication approach to evict similar duplicates from the archive storage, which compares the samples of binary hashes to identify the duplicates. This eviction is done by initially dividing the query video into dynamic key frames based on the video length. Binary hash codes of these frames are then compared with existing key frames to identify the differences. The similarity score is determined based on these differences, which decides the eradication strategy of duplicate copy. Duplicate elimination goes through two levels, namely removal of exact duplicates and similar duplicates. The proposed approach has shortened the comparison window by comparing only the candidate hash codes based on the dynamic key frames and aims the accurate lossless duplicate removals. The presented work is executed and tested on the produced synthetic video dataset. Results show the reduction in redundant data and increase in the storage space. Binary hashes and similarity scores contributed to achieving good deduplication ratio and overall performance.
A Review of BSS Based Digital Image Watermarking and Extraction MethodsIOSR Journals
The field of Signal Processing has witnessed the strong emergence of a new technique, the Blind
Signal Processing (BSP) which is based on sound theoretical foundation. An offshoot of the BSP is known as
Blind Source Separation (BSS). This digital signal processing techniques have a wide and varied potential
applications. The term blind is indicative of the fact that both the source signal and the mixing procedures are
unknown. One of the more interesting applications of BSS is in field of image data security/authentication where
digital watermarking is proposed. Watermarking is a promising technique to help protect data security and
intellectual property rights. The plethora digital image watermarking methods are surveyed and discussed here
with their features and limitations. Thus literature survey is presented in two major categories-Digital image
watermarking methods and BSS based techniques in digital image watermarking and extraction
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...sipij
In this paper we propose a DWT based dual watermarking technique wherein both blind and non-blind algorithms are used for the copyright protection of the cover/host image and the watermark respectively. We use the concept of embedding two watermarks into the cover image by actually embedding only one, to authenticate the source image and protect the watermark simultaneously. Here the DWT coefficients of the primary watermark (logo) are modified using another smaller secondary binary image (sign) and the midfrequency coefficients of the cover/host image. Since the watermark has some features of host image embedded in it, the security is increased two-fold and it also protects the watermark from any misuse or copy attack. For this purpose a new pseudorandom generator based on the mathematical constant π has been developed and used successfully in various stages of the algorithm. We have also proposed a new approach of applying pseudo-randomness in selecting the watermark pixel values for embedding in the cover image. In all the existing techniques the randomness is incorporated in selecting the location to embed the watermark. This makes the embedding process more unpredictable. The cover image which is watermarked with the signed-logo is subjected to various attacks like cropping, rotation, JPEG compression, scaling and noising. From the results it has been found that it is very robust and has good invisibility as well.
Robust Video Watermarking Scheme Based on Intra-Coding Process in MPEG-2 Style IJECEIAES
The proposed scheme implemented a semi blind digital watermarking method for video exploiting MPEG-2 standard. The watermark is inserted into selected high frequency coefficients of plain types of discrete cosine transform blocks instead of edge and texture blocks during intra coding process. The selection is essential because the error in such type of blocks is less sensitive to human eyes as compared to other categories of blocks. Therefore, the perceptibility of watermarked video does not degraded sharply. Visual quality is also maintained as motion vectors used for generating the motion compensated images are untouched during the entire watermarking process. Experimental results revealed that the scheme is not only robust to re-compression attack, spatial synchronization attacks like cropping, rotation but also strong to temporal synchronization attacks like frame inserting, deleting, swapping and averaging. The superiority of the anticipated method is obtaining the best sturdiness results contrast to the recently delivered schemes.
The embedding of a digital signature, or tag data is carried out in the frequency domain. The
high frequency varieties are chosen by any LH and HL in the wavelet domain which are to be
applicable in DCT. Coefficients are changed mid-frequency DCT coefficients such transactions by a
low frequency of the watermark to be embedded. Watermark can be recovered from the video by
selecting a random watermark of any reference framework. The proposed techniques are more
secure, robust and are efficient due to the use of static DCT. Watermark techniques uses a bands HL
and LH for adding watermark where the movement does not impact the quality the extracted
watermark until if the video displays for different types of malware attacks.
In this work we have taken three video watermarking techniques i.e. BIT GET (spatial),
DWT, DCT and one video formats ie.MPEG video to perform a comparative analysis of different
techniques using single video formats, to obtain the best performing technique for video
watermarking. Such that to increase robustness of the video and decrease the embedding time
Video content analysis and retrieval system using video storytelling and inde...IJECEIAES
Videos are used often for communicating ideas, concepts, experience, and situations, because of the significant advances made in video communication technology. The social media platforms enhanced the video usage expeditiously. At, present, recognition of a video is done, using the metadata like video title, video descriptions, and video thumbnails. There are situations like video searcher requires only a video clip on a specific topic from a long video. This paper proposes a novel methodology for the analysis of video content and using video storytelling and indexing techniques for the retrieval of the intended video clip from a long duration video. Video storytelling technique is used for video content analysis and to produce a description of the video. The video description thus created is used for preparation of an index using wormhole algorithm, guarantying the search of a keyword of definite length L, within the minimum worst-case time. This video index can be used by video searching algorithm to retrieve the relevant part of the video by virtue of the frequency of the word in the keyword search of the video index. Instead of downloading and transferring a whole video, the user can download or transfer the specifically necessary video clip. The network constraints associated with the transfer of videos are considerably addressed.
PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...IJCSEIT Journal
A video fingerprint is a recognizer that is derived from a piece of video content. The video fingerprinting
methods obtain unique features of a video that differentiates one video clip from another. It aims to identify
whether a query video segment is a copy of video from the video database or not based on the signature of
the video. It is difficult to find whether a video is a copied video or a similar video, since the features of the
content are very similar from one video to the other. The main focus of this paper is to detect that the query
video is present in the video database with robustness depending on the content of video and also by fast
search of fingerprints. The Fingerprint Extraction Algorithm and Fast Search Algorithms are adopted in
this paper to achieve robust, fast, efficient and accurate video copy detection. As a first step, the
Fingerprint Extraction algorithm is employed which extracts a fingerprint through the features from the
image content of video. The images are represented as Temporally Informative Representative Images
(TIRI). Then, the second step is to find the presence of copy of a query video in a video database, in which
a close match of its fingerprint in the corresponding fingerprint database is searched using inverted-filebased
method. The proposed system is tested against various attacks like noise, brightness, contrast,
rotation and frame drop. Thus the performance of the proposed system on an average shows high true
positive rate of 98% and low false positive rate of 1.3% for different attacks.
The Cryptographic Schemes for Secret ImagesIJERA Editor
Visual cryptography is one of the techniques used to encrypt the images by dividing the original image into transparencies [1]. The transparencies can be sent to the intended person, and at the other end the transparencies received person can decrypt the transparencies using our tool, thus gets the original image. Our proposed Visual cryptography provides the demonstration to the users to show how encryption and decryption can be done to the images. In this technology, the end user identifies an image, which is not the correct image. That is, while transmitting the image the sender will encrypt the image using our application here sender gets the two or more transparencies of the same image. Our application provides an option to the end user of encryption. The end user can divide the original image into number of different images. Using our application we can send encrypted images that are in the format of GIF and PNG. The encrypted transparencies can be saved in the machine and can be sent to the intended person by other means [source].
Blind Image Watermarking Based on Chaotic MapsITIIIndustries
Security of a watermark refers to its resistance to unauthorized detecting and decoding, while watermark robustness refers to the watermark’s resistance against common processing. Many watermarking schemes emphasize robustness more than security. However, a robust watermark is not enough to accomplish protection because the range of hostile attacks is not limited to common processing and distortions. In this paper, we give consideration to watermark security. To achieve this, we employ chaotic maps due to their extreme sensitivity to the initial values. If one fails to provide these values, the watermark will be wrongly extracted. While the chaotic maps provide perfect watermarking security, the proposed scheme is also intended to achieve robustness.
Jiri ece-01-03 adaptive temporal averaging and frame prediction based surveil...Ijripublishers Ijri
Global interconnect planning becomes a challenge as semiconductor technology continuously scales. Because of the increasing wire resistance and higher capacitive coupling in smaller features, the delay of global interconnects becomes large compared with the delay of a logic gate, introducing a huge performance gap that needs to be resolved A novel equalized global link architecture and driver– receiver co design flow are proposed for high-speed and low-energy on-chip communication by utilizing a continuous-time linear equalizer (CTLE). The proposed global link is analyzed using a linear system method, and the formula of CTLE eye opening is derived to provide high-level design guidelines and insights.
Compared with the separate driver–receiver design flow, over 50% energy reduction is observed.
A Survey on Multimedia Content Protection Mechanisms IJECEIAES
Cloud computing has emerged to influence multimedia content providers like Disney to render their multimedia services. When content providers use the public cloud, there are chances to have pirated copies further leading to a loss in revenues. At the same time, technological advancements regarding content recording and hosting made it easy to duplicate genuine multimedia objects. This problem has increased with increased usage of a cloud platform for rendering multimedia content to users across the globe. Therefore it is essential to have mechanisms to detect video copy, discover copyright infringement of multimedia content and protect the interests of genuine content providers. It is a challenging and computationally expensive problem to be addressed considering the exponential growth of multimedia content over the internet. In this paper, we surveyed multimedia-content protection mechanisms which throw light on different kinds of multimedia, multimedia content modification methods, and techniques to protect intellectual property from abuse and copyright infringement. It also focuses on challenges involved in protecting multimedia content and the research gaps in the area of cloud-based multimedia content protection.
Automatic Synthesis and Formal Verification of Interfaces Between Incompatibl...IDES Editor
In this work, we are concerned with automatic
synthesis and formal verification of interfaces between
incompatible soft intellectual properties (IPs) for System On
Chip (SOC) design. IPs Structural and dynamic aspects are
modeled via UML2.x diagrams such as structural, timing and
Statecharts diagrams. From these diagrams, interfaces are
generated automatically between incompatible IPs following
an interface synthesis algorithm. Interfaces behaviors
verification is performed by the model checker that is
integrated in Maude language. A Maude specification
including interface specification and properties for verification
are generated automatically from UML diagrams.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A Review of BSS Based Digital Image Watermarking and Extraction MethodsIOSR Journals
The field of Signal Processing has witnessed the strong emergence of a new technique, the Blind
Signal Processing (BSP) which is based on sound theoretical foundation. An offshoot of the BSP is known as
Blind Source Separation (BSS). This digital signal processing techniques have a wide and varied potential
applications. The term blind is indicative of the fact that both the source signal and the mixing procedures are
unknown. One of the more interesting applications of BSS is in field of image data security/authentication where
digital watermarking is proposed. Watermarking is a promising technique to help protect data security and
intellectual property rights. The plethora digital image watermarking methods are surveyed and discussed here
with their features and limitations. Thus literature survey is presented in two major categories-Digital image
watermarking methods and BSS based techniques in digital image watermarking and extraction
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...sipij
In this paper we propose a DWT based dual watermarking technique wherein both blind and non-blind algorithms are used for the copyright protection of the cover/host image and the watermark respectively. We use the concept of embedding two watermarks into the cover image by actually embedding only one, to authenticate the source image and protect the watermark simultaneously. Here the DWT coefficients of the primary watermark (logo) are modified using another smaller secondary binary image (sign) and the midfrequency coefficients of the cover/host image. Since the watermark has some features of host image embedded in it, the security is increased two-fold and it also protects the watermark from any misuse or copy attack. For this purpose a new pseudorandom generator based on the mathematical constant π has been developed and used successfully in various stages of the algorithm. We have also proposed a new approach of applying pseudo-randomness in selecting the watermark pixel values for embedding in the cover image. In all the existing techniques the randomness is incorporated in selecting the location to embed the watermark. This makes the embedding process more unpredictable. The cover image which is watermarked with the signed-logo is subjected to various attacks like cropping, rotation, JPEG compression, scaling and noising. From the results it has been found that it is very robust and has good invisibility as well.
Robust Video Watermarking Scheme Based on Intra-Coding Process in MPEG-2 Style IJECEIAES
The proposed scheme implemented a semi blind digital watermarking method for video exploiting MPEG-2 standard. The watermark is inserted into selected high frequency coefficients of plain types of discrete cosine transform blocks instead of edge and texture blocks during intra coding process. The selection is essential because the error in such type of blocks is less sensitive to human eyes as compared to other categories of blocks. Therefore, the perceptibility of watermarked video does not degraded sharply. Visual quality is also maintained as motion vectors used for generating the motion compensated images are untouched during the entire watermarking process. Experimental results revealed that the scheme is not only robust to re-compression attack, spatial synchronization attacks like cropping, rotation but also strong to temporal synchronization attacks like frame inserting, deleting, swapping and averaging. The superiority of the anticipated method is obtaining the best sturdiness results contrast to the recently delivered schemes.
The embedding of a digital signature, or tag data is carried out in the frequency domain. The
high frequency varieties are chosen by any LH and HL in the wavelet domain which are to be
applicable in DCT. Coefficients are changed mid-frequency DCT coefficients such transactions by a
low frequency of the watermark to be embedded. Watermark can be recovered from the video by
selecting a random watermark of any reference framework. The proposed techniques are more
secure, robust and are efficient due to the use of static DCT. Watermark techniques uses a bands HL
and LH for adding watermark where the movement does not impact the quality the extracted
watermark until if the video displays for different types of malware attacks.
In this work we have taken three video watermarking techniques i.e. BIT GET (spatial),
DWT, DCT and one video formats ie.MPEG video to perform a comparative analysis of different
techniques using single video formats, to obtain the best performing technique for video
watermarking. Such that to increase robustness of the video and decrease the embedding time
Video content analysis and retrieval system using video storytelling and inde...IJECEIAES
Videos are used often for communicating ideas, concepts, experience, and situations, because of the significant advances made in video communication technology. The social media platforms enhanced the video usage expeditiously. At, present, recognition of a video is done, using the metadata like video title, video descriptions, and video thumbnails. There are situations like video searcher requires only a video clip on a specific topic from a long video. This paper proposes a novel methodology for the analysis of video content and using video storytelling and indexing techniques for the retrieval of the intended video clip from a long duration video. Video storytelling technique is used for video content analysis and to produce a description of the video. The video description thus created is used for preparation of an index using wormhole algorithm, guarantying the search of a keyword of definite length L, within the minimum worst-case time. This video index can be used by video searching algorithm to retrieve the relevant part of the video by virtue of the frequency of the word in the keyword search of the video index. Instead of downloading and transferring a whole video, the user can download or transfer the specifically necessary video clip. The network constraints associated with the transfer of videos are considerably addressed.
PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...IJCSEIT Journal
A video fingerprint is a recognizer that is derived from a piece of video content. The video fingerprinting
methods obtain unique features of a video that differentiates one video clip from another. It aims to identify
whether a query video segment is a copy of video from the video database or not based on the signature of
the video. It is difficult to find whether a video is a copied video or a similar video, since the features of the
content are very similar from one video to the other. The main focus of this paper is to detect that the query
video is present in the video database with robustness depending on the content of video and also by fast
search of fingerprints. The Fingerprint Extraction Algorithm and Fast Search Algorithms are adopted in
this paper to achieve robust, fast, efficient and accurate video copy detection. As a first step, the
Fingerprint Extraction algorithm is employed which extracts a fingerprint through the features from the
image content of video. The images are represented as Temporally Informative Representative Images
(TIRI). Then, the second step is to find the presence of copy of a query video in a video database, in which
a close match of its fingerprint in the corresponding fingerprint database is searched using inverted-filebased
method. The proposed system is tested against various attacks like noise, brightness, contrast,
rotation and frame drop. Thus the performance of the proposed system on an average shows high true
positive rate of 98% and low false positive rate of 1.3% for different attacks.
The Cryptographic Schemes for Secret ImagesIJERA Editor
Visual cryptography is one of the techniques used to encrypt the images by dividing the original image into transparencies [1]. The transparencies can be sent to the intended person, and at the other end the transparencies received person can decrypt the transparencies using our tool, thus gets the original image. Our proposed Visual cryptography provides the demonstration to the users to show how encryption and decryption can be done to the images. In this technology, the end user identifies an image, which is not the correct image. That is, while transmitting the image the sender will encrypt the image using our application here sender gets the two or more transparencies of the same image. Our application provides an option to the end user of encryption. The end user can divide the original image into number of different images. Using our application we can send encrypted images that are in the format of GIF and PNG. The encrypted transparencies can be saved in the machine and can be sent to the intended person by other means [source].
Blind Image Watermarking Based on Chaotic MapsITIIIndustries
Security of a watermark refers to its resistance to unauthorized detecting and decoding, while watermark robustness refers to the watermark’s resistance against common processing. Many watermarking schemes emphasize robustness more than security. However, a robust watermark is not enough to accomplish protection because the range of hostile attacks is not limited to common processing and distortions. In this paper, we give consideration to watermark security. To achieve this, we employ chaotic maps due to their extreme sensitivity to the initial values. If one fails to provide these values, the watermark will be wrongly extracted. While the chaotic maps provide perfect watermarking security, the proposed scheme is also intended to achieve robustness.
Jiri ece-01-03 adaptive temporal averaging and frame prediction based surveil...Ijripublishers Ijri
Global interconnect planning becomes a challenge as semiconductor technology continuously scales. Because of the increasing wire resistance and higher capacitive coupling in smaller features, the delay of global interconnects becomes large compared with the delay of a logic gate, introducing a huge performance gap that needs to be resolved A novel equalized global link architecture and driver– receiver co design flow are proposed for high-speed and low-energy on-chip communication by utilizing a continuous-time linear equalizer (CTLE). The proposed global link is analyzed using a linear system method, and the formula of CTLE eye opening is derived to provide high-level design guidelines and insights.
Compared with the separate driver–receiver design flow, over 50% energy reduction is observed.
A Survey on Multimedia Content Protection Mechanisms IJECEIAES
Cloud computing has emerged to influence multimedia content providers like Disney to render their multimedia services. When content providers use the public cloud, there are chances to have pirated copies further leading to a loss in revenues. At the same time, technological advancements regarding content recording and hosting made it easy to duplicate genuine multimedia objects. This problem has increased with increased usage of a cloud platform for rendering multimedia content to users across the globe. Therefore it is essential to have mechanisms to detect video copy, discover copyright infringement of multimedia content and protect the interests of genuine content providers. It is a challenging and computationally expensive problem to be addressed considering the exponential growth of multimedia content over the internet. In this paper, we surveyed multimedia-content protection mechanisms which throw light on different kinds of multimedia, multimedia content modification methods, and techniques to protect intellectual property from abuse and copyright infringement. It also focuses on challenges involved in protecting multimedia content and the research gaps in the area of cloud-based multimedia content protection.
Automatic Synthesis and Formal Verification of Interfaces Between Incompatibl...IDES Editor
In this work, we are concerned with automatic
synthesis and formal verification of interfaces between
incompatible soft intellectual properties (IPs) for System On
Chip (SOC) design. IPs Structural and dynamic aspects are
modeled via UML2.x diagrams such as structural, timing and
Statecharts diagrams. From these diagrams, interfaces are
generated automatically between incompatible IPs following
an interface synthesis algorithm. Interfaces behaviors
verification is performed by the model checker that is
integrated in Maude language. A Maude specification
including interface specification and properties for verification
are generated automatically from UML diagrams.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Flip invariant video copy detection using sparse-coded featureseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Abstract The traffic of digital images and video has grown rapidly in the internet. Security becomes important for several applications like military image database, confidential video conferencing. Real-time secure image and video communication is challenging due to the processing time and computational requirement for encryption and decryption. Also the speed of most internet connections is very limited so the amount of data to be transmitted must be reduced. In this research, we shall introduce partial encryption technique on compressed images and videos. Another algorithm decomposes images into several different parts. We apply encryption algorithm to encrypt only the crucial parts, which are considerably smaller than original image, which result in significant reduction in processing time and computational requirement for encryption and decryption as well as reduce the bit rate and bandwidth requirement. Keywords-Compression, MPEG-4, Partial Encryption
Key Frame Extraction in Video Stream using Two Stage Method with Colour and S...ijtsrd
Key Frame Extraction is the summarization of videos for different applications like video object recognition and classification, video retrieval and archival and surveillance is an active research area in computer vision. In this paper describe a new criterion for well presentative key frames and correspondingly, create a key frame selection algorithm based Two stage Method. A two stage method is used to extract accurate key frames to cover the content for the whole video sequence. Firstly, an alternative sequence is got based on color characteristic difference between adjacent frames from original sequence. Secondly, by analyzing structural characteristic difference between adjacent frames from the alternative sequence, the final key frame sequence is obtained. And then, an optimization step is added based on the number of final key frames in order to ensure the effectiveness of key frame extraction. Khaing Thazin Min | Wit Yee Swe | Yi Yi Aung | Khin Chan Myae Zin "Key Frame Extraction in Video Stream using Two-Stage Method with Colour and Structure" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd27971.pdfPaper URL: https://www.ijtsrd.com/computer-science/data-processing/27971/key-frame-extraction-in-video-stream-using-two-stage-method-with-colour-and-structure/khaing-thazin-min
IRJET-Feature Extraction from Video Data for Indexing and Retrieval IRJET Journal
Amanpreet Kaur ,Rimanpal Kaur "Feature Extraction from Video Data for Indexing and Retrieval ", International Research Journal of Engineering and Technology (IRJET), Vol2,issue-01 March 2015. e-ISSN:2395-0056, p-ISSN:2395-0072. www.irjet.net
Abstract
In recent years, the multimedia storage grows and the cost for storing multimedia data is cheaper. So there is huge number of videos available in the video repositories. With the development of multimedia data types and available bandwidth there is huge demand of video retrieval systems, as users shift from text based retrieval systems to content based retrieval systems. Selection of extracted features play an important role in content based video retrieval regardless of video attributes being under consideration. These features are intended for selecting, indexing and ranking according to their potential interest to the user. Good features selection also allows the time and space costs of the retrieval process to be reduced. This survey reviews the interesting features that can be extracted from video data for indexing and retrieval along with similarity measurement methods.
Review on content based video lecture retrievaleSAT Journals
Abstract Recent advances in multimedia technologies allow the capture and storage of video data with relatively inexpensive computers. Furthermore, the new possibilities offered by the information highways have made a large amount of video data publicly available. However, without appropriate search techniques all these data are hardly usable. Users are not satisfied with the video retrieval systems that provide analogue VCR functionality. For example, a user analyses a soccer video will ask for specific events such as goals. Content-based search and retrieval of video data becomes a challenging and important problem. Therefore, the need for tools that can be manipulate the video content in the same way as traditional databases manage numeric and textual data is significant. Therefore, a more efficient method for video retrieval in WWW or within large lecture video archives is urgently needed. This project presents an approach for automated video indexing and video search in large lecture video archives. First of all, we apply automatic video segmentation and key-frame detection to offer a visual guideline for the video content navigation. Subsequently, we extract textual metadata by applying video Optical Character Recognition (OCR) technology on key-frames and Automatic Speech Recognition on lecture audio tracks. Keywords—Feature extraction, video annotation, video browsing, video retrieval, video structure analysis
System analysis and design for multimedia retrieval systemsijma
Due to the extensive use of information technology and the recent developments in multimedia systems, the
amount of multimedia data available to users has increased exponentially. Video is an example of
multimedia data as it contains several kinds of data such as text, image, meta-data, visual and audio.
Content based video retrieval is an approach for facilitating the searching and browsing of large
multimedia collections over WWW. In order to create an effective video retrieval system, visual perception
must be taken into account. We conjectured that a technique which employs multiple features for indexing
and retrieval would be more effective in the discrimination and search tasks of videos. In order to validate
this, content based indexing and retrieval systems were implemented using color histogram, Texture feature
(GLCM), edge density and motion..
Secure IoT Systems Monitor Framework using Probabilistic Image EncryptionIJAEMSJORNAL
In recent years, the modeling of human behaviors and patterns of activity for recognition or detection of special events has attracted considerable research interest. Various methods abounding to build intelligent vision systems aimed at understanding the scene and making correct semantic inferences from the observed dynamics of moving targets. Many systems include detection, storage of video information, and human-computer interfaces. Here we present not only an update that expands previous similar surveys but also a emphasis on contextual abnormal detection of human activity , especially in video surveillance applications. The main purpose of this survey is to identify existing methods extensively, and to characterize the literature in a manner that brings to attention key challenges.
Data Mining is a significant field in today’s data-driven world. Understanding and implementing its concepts can lead to discovery of useful insights. This paper discusses the main concepts of data mining, focusing on two main concepts namely Association Rule Mining and Time Series Analysis
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...rahulmonikasharma
We are describes the technique for real time human face detection and counting the number of passengers in vehicle and also gender of the passengers.The Image processing technology is very popular,now at present all are going to use it for various purpose. It can be applied to various applications for detecting and processing the digital images. Face detection is a part of image processing. It is used for finding the face of human in a given area. Face detection is used in many applications such as face recognition, people tracking, or photography. In this paper,The webcam is installed in public vehicle and connected with Raspberry Pi model. We use face detection technique for detecting and counting the number of passengers in public vehicle via webcam with the help of image processing and Raspberry Pi.
Considering Two Sides of One Review Using Stanford NLP Frameworkrahulmonikasharma
Sentiment analysis is a type of natural language processing for tracking the mood of the public about a particular product or a topic and is useful in several ways. Polarity shift is the most classical task which aims at classifying the reviews either positive or negative. But in many cases, in addition to the positive and negative reviews, there still many neutral reviews exist. However, the performance sometimes limited due to the fundamental deficiencies in handling the polarity shift problem. We propose an Improvised Dual Sentiment Analysis (IDSA) model to address this problem for sentiment classification. We first propose a novel data expansion technique by creating sentiment-reversed review for each training and test review. We develop a corpus based method to construct a pseudo-antonym dictionary. It removes DSA’s dependency on an external antonym dictionary for review reversion. We conduct a range of experiments and the results demonstrates the effectiveness of DSA in addressing the polarity shift in sentiment classification. .
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systemsrahulmonikasharma
The requirements of fifth generation new radio (5G- NR) access networks are very high capacity and ultra-reliability. In this paper, we proposed a V-BLAST2 × N_r MIMO system that is analyzed, improved, and expected to achieve both very high throughput and ultra- reliability simultaneously.A new detection technique called parallel detection algorithm is proposed. The performance of the proposed algorithm compared with existing linear detection algorithms. It was seen that the proposed technique increases the speed of signal transmission and prevents error propagation which may be present in serial decoding techniques. The new algorithm reduces the bit error probability and increases the capacity simultaneouslywithout using a standard STC technique. However, it was seen that the BER of systems using the proposed algorithm is slightly higher than a similar system using only STC technique. Simulation results show the advantages of using the proposed technique.
Broadcasting Scenario under Different Protocols in MANET: A Surveyrahulmonikasharma
A wireless network enables people to communicate and access applications and information without wires. This provides freedom of movement and the ability to extend applications to different parts of a building, city, or nearly anywhere in the world. Wireless networks allow people to interact with e-mail or browse the Internet from a location that they prefer. Adhoc Networks are self-organizing wireless networks, absent any fixed infrastructure. broadcasting of data through proper channel is essential. Various protocols are designed to avoid the loss of data. In this paper an overview of different broadcast protocols are discussed.
Sybil Attack Analysis and Detection Techniques in MANETrahulmonikasharma
Security is important for many sensor network applications. A particularly harmful attack against sensor and ad hoc networks is known as the Sybil attack [6], where a node Illegitimately claims multiple identities.Mobility cause a main problem when we talk about security in Mobile Ad-hoc networks. It doesn’t depend on fixed architecture, the nodes are continuously moving in a random fashion. In this article we will focus on identifying the Sybil attack in MANET. It uses air medium for communication so it is more prone to the attack. Sybil attack is one in which single node present multiple fake identities to other nodes, which cause destruction.
A Landmark Based Shortest Path Detection by Using A* and Haversine Formularahulmonikasharma
In 1900, less than 20 percent of the world populace lived in cities, in 2007, fair more than 50 percent of the world populace lived in cities. In 2050, it has been anticipated that more than 70 percent of the worldwide population (about 6.4 billion individuals) will be city tenants. There's more weight being set on cities through this increment in population [1]. With approach of keen cities, data and communication technology is progressively transforming the way city regions and city inhabitants organize and work in reaction to urban development. In this paper, we create a nonspecific plot for navigating a route throughout city A asked route is given by utilizing combination of A* Algorithm and Haversine equation. Haversine Equation gives least distance between any two focuses on spherical body by utilizing latitude and longitude. This least distance is at that point given to A* calculation to calculate minimum distance. The method for identifying the shortest path is specify in this paper.
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...rahulmonikasharma
Internet of Things (IoT) is the developing technologies that would be the biggest agents to modify the current world. Machine-to-machine communications perform with virtual, mobile and instantaneous connections. In IoT system, it consists of data-gathering sensors various other household devices. Intended for protecting IoT system, the end-to-end secure communication is a necessary measure to protect against unauthorized entities (e.g., modification attacks and eavesdropping,) and the data unprotected on the Cloud. The most important concern hereby is how to preserve the insightful information and to provide the privacy of user data. In IoT, the encrypted data computing is based on techniques appear to be promising approaches. In this paper, we discuss about the recent secure database systems, which are capable to execute SQL queries over encrypted data.
Quality Determination and Grading of Tomatoes using Raspberry Pirahulmonikasharma
In India cultivation of tomatoes is carried out by traditional methods and techniques. Today tremendous improvement in field of agriculture technologies and products can be seen. The tomatoes affect the overall production drastically. Image processing technique can be key technique for finding good qualities of tomatoes and grading. This work aimed to study different types of algorithms used for quality grading and sorting of fruit from the acquire image. In previous years several types of techniques are applied to analyses the good quality fruits. A simple system can be implemented using Raspberry pi with computer vision technology and image processing algorithms.
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...rahulmonikasharma
Network management and Routing is supportively done by performing with the nodes, due to infrastructure-less nature of the network in Ad hoc networks or MANET. The nodes are maintained itself from the functioning of the network, for that reason the MANET security challenges several defects. Routing process and Scheduling is a significant idea to enhance the security in MANET. Other than, scheduling has been recognized to be a key issue for implementing throughput/capacity optimization in Ad hoc networks. Designed underneath conventional (LT) light tailed assumptions, traffic fundamentally faces Heavy-tailed (HT) assumption of the validity of scheduling algorithms. Scheduling policies are utilized for communication networks such as Max-Weight, backpressure and ACO, which are provably throughput optimality and the Pareto frontier of the feasible throughput region under maximal throughput vector. In wireless ad-hoc network, the issue of routing and optimal scheduling performs with time varying channel reliability and multiple traffic streams. Depending upon the security issues within MANETs in this paper presents a comparative analysis of existing scheduling policies based on their performance to progress the delay performance in most scenarios. The security issues of MANETs considered from this paper presents a relative analysis of existing scheduling policies depend on their performance to progress the delay performance in most developments.
DC Conductivity Study of Cadmium Sulfide Nanoparticlesrahulmonikasharma
The dc conductivity of consolidated nanoparticle of CdS has been studied over the temperature range from 303 K to 523 K and the conductivity has been found to be much larger than that of single crystals.
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDMrahulmonikasharma
OFDM (Orthogonal Frequency Division Multiplexing) is generally preferred for high data rate transmission in digital communication. The Long-Term Evolution (LTE) standards for the fourth generation (4G) wireless communication systems. Orthogonal Frequency Division Multiple Access (OFDMA) and Single Carrier Frequency Division Multiple Access (SC-FDMA) are the two multiple access techniques which are generally used in LTE.OFDM system has a major shortcoming of high peak to average power ratio (PAPR) value. This paper explains different PAPR reduction techniques and presents a comparison of the various techniques based on theoretical results. It also presents a survey of the various PAPR reduction techniques and the state of the art in this area.
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoringrahulmonikasharma
Home automation has been a dream of sciences for so many years. It could wind up conceivable in twentieth century simply after power all family units and web administrations were begun being utilized on across the board level. The point of home robotization is to give enhanced accommodation, comfort, vitality effectiveness and security. Vitality checking and protection holds prime significance in this day and age in view of the irregularity between control age and request observing frameworks accessible in the market. Ordinarily, customers are disappointed with the power charge as it doesn't demonstrate the power devoured at the gadget level. This paper shows the outline and execution of a vitality meter utilizing Arduino microcontroller which can be utilized to gauge the power devoured by any individual electrical apparatus. The primary expectation of the proposed vitality meter is to screen the power utilization at the gadget level, transfer it to the server and build up remote control of any apparatus. So we can screen the power utilization remotely and close down gadgets if vital. The car segment is additionally one of the application spaces where vehicle can be made keen by utilizing "IOT". So a vehicle following framework is additionally executed to screen development of vehicles remotely.
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...rahulmonikasharma
An anticipated outcome that is intended chapter is to investigate effects of magnetic field on an oscillatory flow of a viscoelastic fluid with thermal radiation, viscous dissipation with Ohmic heating which bounded by a vertical plane surface, have been studied. Analytical solutions for the quasi – linear hyperbolic partial differential equations are obtained by perturbation technique. Solutions for velocity and temperature distributions are discussed for various values of physical parameters involving in the problem. The effects of cooling and heating of a viscoelastic fluid compared to the Newtonian fluid have been discussed.
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...rahulmonikasharma
In fast growing database repository system, image as data is one of the important concern despite text or numeric. Still we can’t replace test on any cost but for advancement, information may be managed with images. Therefore image processing is a wide area for the researcher. Many stages of processing of image provide researchers with new ideas to keep information safe with better way. Feature extraction, segmentation, recognition are the key areas of the image processing which helps to enhance the quality of working with images. Paper presents the comparison between image formats like .jpg, .png, .bmp, .gif. This paper is focused on the feature extraction and segmentation stages with background removal process. There are two filters, one is integer filter and second one is floating point Filter, which is used for the key feature extraction from image. These filters applied on the different images of different formats and visually compare the results.
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM Systemrahulmonikasharma
The examination on various looks into on MIMO STBC framework in order to accomplish the higher framework execution is standard that the execution of the remote correspondence frameworks can be improved by usage numerous transmit and get radio wires, that is normally gathered on the grounds that the MIMO procedure, and has been incorporated. The Alamouti STBC might be a promising because of notice the pick up inside the remote interchanges framework misuse MIMO. To broaden the code rate and furthermore the yield of the symmetrical zone time square code for more than 4 transmit reception apparatuses is examined. The outlined framework is beated once forced with M-PSK (i.e upto 32-PSK) regulation. The channel estimation examine in these conditions.
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosisrahulmonikasharma
A vibration investigation is about the specialty of searching for changes in the vibration example, and after that relating those progressions back to the machines mechanical outline. The level of vibration and the example of the vibration reveal to us something about the interior state of the turning segment. The vibration example can let us know whether the machine is out of adjust or twisted. Al-so blames with the moving components and coupling issues can be distinguished. This paper shows an approach for equip blame investigation utilizing signal handling plans. The information has been taken from college of ohio, joined states. The investigation has done utilizing MATLAB software.
This paper discusses a new algorithm of a univariate method, which is vitally important to develop a short-term load forecasting module for planning and operation of distribution system. It has many applications including purchasing of energy, generation and infrastructure development etc. We have discussed different time series forecasting approaches in this paper. But ARIMA has proved itself as the most appropriate method in forecasting of the load profile for West Bengal using the historical data of the year of 2017. Auto Regressive Integrated Moving Average model gives more accuracy level of load forecast than any other techniques. Mean Absolute Percentage Error (MAPE) has been calculated for the mentioned forecasted model.
Impact of Coupling Coefficient on Coupled Line Couplerrahulmonikasharma
The coupled line coupler is a type of directional coupler which finds practical utility. It is mainly used for sampling the microwave power. In this paper, 3 couplers A,B & C are designed with different values of coupling coefficient 6dB,10dB & 18dB respectively at a frequency of 2.5GHz using ADS tool. The return loss, isolation loss & transmission loss are determined. The design & simulation is done using microstrip line technology.
Design Evaluation and Temperature Rise Test of Flameproof Induction Motorrahulmonikasharma
The ignition of flammable gases, vapours or dust in presence of oxygen contained in the surrounding atmosphere may lead to explosion. Flameproof three phase induction motors are the most common and frequently used in the process industries such as oil refineries, oil rigs, petrochemicals, fertilizers, etc. The design of flameproof motor is such that it allows and sustain explosion within the enclosure caused by ignition of hazardous gases without transmitting it to the external flammable atmosphere. The enclosure is mechanically strong enough to withstand the explosion pressure developed inside it. To prevent an explosion due to hot spot on the surface of the motor, flameproof induction motors are subjected to heat run test to determine the maximum surface temperature and temperature class with respect to the ignition temperature of the surrounding flammable gas atmosphere. This paper highlights the design features of flameproof motors and their surface temperature classification for different sizes.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Efficient and Robust Detection of Duplicate Videos in a Database
1. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 11 139 – 142
_______________________________________________________________________________________________
139
IJRITCC | November 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Efficient and Robust Detection of Duplicate Videos in a Database
Ragho Soni R.
Department of Computer Science and Engineering
M. S. Bidve Engineering College, Latur
e-mail: sonirragho@gmail.com
Shah H.P.
Department of Computer Science and Engineering
M. S. Bidve Engineering College, Latur
e-mail: shahhemali@gmail.com
Abstract— In this paper, the duplicate detection method is to retrieve the best matching model video for a given query video using fingerprint.
We have used the Color Layout Descriptor method and Opponent Color Space to extract feature from frame and perform k-means based
clustering to generate fingerprints which are further encoded by Vector Quantization. The model-to-query video distance is computed using a
new distance measure to find the similarity. To perform efficient search coarse-to-fine matching scheme is used to retrieve best match. We
perform experiments on query videos and real time video with an average duration of 60 sec; the duplicate video is detected with high similarity.
Keywords-Video fingerprintingt; color layout descriptor; distance mesure; vector quantization.
__________________________________________________*****_________________________________________________
I. INTRODUCTION
With the fast development of technology and increasing
use of the widespread accessibility of ADSL and the World
Wide Web, people can easily find and upload tons of videos
on the internet. There exist too many duplicated and
transformed video clips online and some of them may be
illegally copied or broadcasted, so database and copyright
management have become big issues nowadays.
Copyright infringements and data piracy have recently
become serious concerns for the ever increasing online video
database management. Videos on commercial sites e.g.,
www.google.com, www.YouTube.com, www.metacafe.com,
are mainly textually tagged. These tags are of little help in
monitoring the content and preventing illegal upload. There
are two approaches to detect such infringements that are
watermarking and Content-Based Copy Detection (CBCD).
The watermarking approach tests inserting distinct pattern in
video to decide if it is copyrighted. The other approach CBCD
detects the duplicate by comparing the fingerprint of the query
video with the fingerprint of the original video.
A video ―fingerprint‖ is a feature extracted from the video
that should represent the video compactly, allowing faster
search without compromising the retrieval accuracy. The
bottleneck of watermarking is that the inserted marks are
likely to be destroyed or distorted as the format of the video
get transformed or during the transmission so noise robustness
of the watermarking schemes is not ensured in general [1],
where as the video fingerprint extraction of the Content-Based
Copy Detection can be mostly unchanged after various noise
attacks, that’s why video fingerprinting approach has been
more successful.
Duplicate video is derived from only one database video it
consists entirely of a subset of frames in the original video.
The individual frames may be further processed. The temporal
order of the frames may also be altered. In [2], a set of 24
queries searched in YouTube, Google video and yahoo video,
27% of the returned relevant videos are duplicates or nearly
duplicate to the most popular version of video in the search
result. In [3], each web video in the database is reported to
have an average of five similar copies. Also, for some popular
queries to the yahoo video search engine, there were two or
three duplicates among the top ten retrievals [4].
II. RELATED WORK
Feature representation: In the feature extraction process,
feature extracted from the video and image fall into three
categories as global image, keypoint based, and Entire Video
based Features. Many technique use global features for a fast
initial search to find duplicates using color histogram
computed over the entire video [2] for coarse search and
keyframe-based features are use for a more refined search. A
comparative study for video copy detection methods can be
found in [5].
Global Image Features are derived from sets of time-
sequential video keyframes. A combination of MPEG-7
features such as the Scalable Color Descriptor, Color Layout
Descriptor (CLD) [6] and the Edge Histogram Descriptor
(EHD) has been used for video-clip matching [7], using a
string-edit distance measure.
Keypoint based feature technique described in [8] by Joly,
this includes a key-frame detection, an interest point detection
in these key-frames, and the computation of local differential
descriptors around each interest point. Interest points are ideal
for matching applications because of their local uniqueness
and their high information content. In [9]The SIFT descriptors
by Lowe use the Divergence of Gaussian (DoG) interest point
detector which better handles significant changes in the scale
of images. The SIFT descriptors then encode the image
gradients and their orientations around the points into a 128-
dimensional histogram. The PCA-SIFT descriptors simply
apply PCA on Lowe's SIFT descriptors, reducing their
dimensionality to 36. From the SIFT family this scheme is
called EFF2
as these descriptors are computed EFFiciently and
yield EFFective search results. Overall, local descriptor
schemes handle rotations, translations of objects in images,
changes in color and to some extent compression and scale
changes.
Entire video based features derived from the whole video
sequence, such descriptors like ordinal measure, have poor
performance with local transformations such as shift, cropping
and cam coding.
Indexing method: a number of indexing techniques have
been used for speed up the detection process .In [10] For the
videntifier system the NV-Tree [9], which is able to perform
accurate approximate High-dimensional nearest neighbor
2. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 11 139 – 142
_______________________________________________________________________________________________
140
IJRITCC | November 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
queries in constant time, independent size of the video
descriptor collection. In [11] author evaluate approximate
search paradigm, called Statistical Similarity Search (S3) in a
complete CBCD scheme based on video local fingerprints.
The proposed statistical query paradigm relies on the
distribution of the relevant similar fingerprints. Joly [8] use an
indexing method based on the Hilbert’s space filling curve
principle and a simple search method is used to find closest
derived key in the database.
Hash-based Index: Locality Sensitive Hashing (LSH)
[12], have been effectively useful for similarity indexing in
vector spaces and string spaces under the Hamming distance (a
well-liked approximate for L2 distances and in this proposed
distance function is non-metric). LSH formalism is not
applicable for analyzing the behavior of these tables as index
structures DBH is a hash-based indexing method that is
distance based. Consequently, DBH can be applied in
arbitrary (and not necessarily metric) spaces and distance
measures, Whereas LSH cannot.
Final Duplicate Confirmation: From the top ten Nearest
Neighbors, the system is supposed to return answer whether or
not it is a duplicate of an already existing copyrighted database
video. In[5][13],the partial result must be post-processed to
compute a similarity measure and to decide if the more similar
video is copy of copyrighted video using voting strategy. A
robust voting algorithm utilizes trajectory information, spatio
temporal registration, and label of behavior indexing to make a
final decision.
III. IMPLEMENTATION DETAILS
A. System Architecture
In Fig. 1, denotes system architecture of duplicate video
detection. This system works in two phases, offline phase and
online phase. Offline phase (model related) consists of the un-
quantized model fingerprint generation, VQ design and
encoding of the model signatures, and computation and storing
of appropriate distance matrices. Online phase (query related)
consist query video is decoded, sub-sampled, key frames are
identified, and features are computed per keyframe. It obtain
k-means based compact signatures, perform VQ-based
encoding on the signatures to obtain sparse histogram-based
representations, compute the relevant lookup tables, and then
perform two-stage search to return the best matched model
video.
In this paper the database video referred as original or
model videos. Model video is decoded and sub-sampled at a
factor of number to get (T) frames and feature (P) is extracted
from per frame. To summarize feature, we perform k-means
clustering and save the cluster centroid as fingerprint (F).The
duplicate video detection task return best matching model
fingerprint for query fingerprint. The model video to query
video distance is computed using distance measure. Two phase
procedure is used for search; coarse search is used for to return
top K Nearest Neighbors, refine search returns best match for
given query video. The final module decides whether the
return video is duplicate video or not.
Figure 1. System Architecture
B. Feature Extraction
1) CLD: The video is decoded frames are sub-sampled at a
factor of value to obtain frames and a vector dimensional
feature is extracted per frame using CLD technique. The CLD
is very compact and resolution invariant representation of
color for high speed image retrieval and it has been designed
to efficiently represent spatial distribution of color. The
extraction process of this color descriptor is obtained by
converting the frame to 8*8 into 64 blocks to guarantee the
invariance to resolution or scale. After the image partitioning
stage, a single representative color is selected from each block,
on averaging, along each(Y/Cb/Cr) channel. Y/Cb/Cr is
transformed by 8x8 DCT, so three sets of 64 DCT coefficients
are obtained. A zigzag scanning is performed with these three
sets of 64 DCT coefficients, The DC and first few AC DCT
coefficients for each channel constitute the CLD feature
dimension. Color Layout Descriptor (CLD) [6] achieved
higher detection accuracy than other candidate features. To
summarize feature, we perform k-means based clustering and
store the cluster centroids as its fingerprint. The number of
TQ
Query frames
Qoring:Query
Features
P
T
Q
p
Signature:Q
P
M
Query Symbol
sQ1
sQM
TN
Videos frames
Feature Set per
Video
P
T
N
p
Video
Fingerprint
P
FN
VQ Model
Symbol
sX1
sXF1
VQ based Pruned
Search and Return Top
K Neighbors
Naive Linear
Search on Top K
Neighbors using
Qorig
Return best match
Vi*, Decide
whether the best
match is a
duplicate
Database video Query Video
3. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 11 139 – 142
_______________________________________________________________________________________________
141
IJRITCC | November 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
0
20
40
60
80
100
Video1 Video 2 Video 3 Video 4 Video 5
CLD
OCS
clusters is fixed at a certain fraction of video frames.
Therefore, the fingerprint size varies with the video length. K-
means based clustering generally produces compact video
signatures, perform VQ based encoding on the signatures to
obtain sparse histogram-based representations, compute the
relevant keyframes, and then perform two-stage search to
return the best matched model video.
2) OCS:Perception of color is usually not best represented
in RGB. A better model of HVS is the so-call opponent color
model. In [14], the opponent histogram is a combination of
three 1-D histograms based on the channels of the opponent
color space. The intensity is represented in channel O3 and the
color information is in channels O1 and O2. Due to the
subtraction in O1 and O2, the offsets will cancel out if they are
equal for all channels (e.g. a white light source). Therefore,
these color models are shift-invariant with respect to light
intensity. The intensity channel O3 has no invariance
properties. The histogram intervals for the opponent color
space have ranges different from the RGB model.
C. Distance Mesure
The duplicate detection task is to retrieve the best matching
model video fingerprint for a given query fingerprint. The
model-to-query distance is computed using a non-metric
distance measure between the fingerprints. The distance
function to compare a (Fi × p) sized model fingerprint Xi with
the (M × p) sized query signature Q is d(Xi ,Q).
d(Xi, Q) = {M
k=1 ║Xj
i
- Qk
Where ║Xj
i
− Qk║ refers to the L1 distance between Xj
i
,
the jth
feature vector of Xi
and Qk , the kth
feature vector of Q.
Previous technique effectively depend on a single query frame
and model video frame, and errors occur when this query (or
model) frame is not representative of the query (or model)
video. In distance function (1), d (Xi
,Q) is computed
considering all the ―minimum query frame-to-model video‖
terms and hence, the effect of one (or more) mismatched query
feature vector is compensated. The summation of the best-
matching distance of each vector in Q with all the vectors in
the signature for the original video (Xi
) will yield a small
distance. Hence, the model-to-query distance is small when
the query is a (noisy) subset of the original model video.
D. Video Matching
To perform efficient search, we propose a two phase
procedure. The first phase is a coarse search to return the top-
K nearest neighbors (NN) from all the N model videos. The
second Phase uses the unquantized features for the top-K NN
videos to find the best matching video Vi*.The NLS algorithm
implements the two-pass method without any pruning. In the
first pass, it retrieves the top-K candidates based on the
smaller query signature Q by performing a full dataset scan,
the first pass compares the model fingerprint Xi
with the query
signature Q, and returns the K nearest videos. The second pass
finds the best matched video Vi from these K videos, based on
the larger query signature Qorig.
When the feature vectors are vector quantized, an inter-
vector distance reduces to an inter-symbol distance, which is
fixed once the VQ codevectors are fixed. Hence, we vector
quantize the feature vectors and represent the signatures as
histograms, whose bins are the VQ symbol indices. For a
given VQ, we store and pre-compute the inter-symbol distance
matrix in memory. Describe the VQ-based signature creation
[1]. Using the CLD features extracted from the database video
frames, a VQ of size U is constructed using the Linde Buzo
Gray (LBG) algorithm [10].
1) Algorithm
Step1: Query video is converted to number of frames.
Step2: Feature is extracted from frames of query videos by
using CLD method.
Step3: The model-to-query distance is computed using
distance measure
Step4: Coarse search return top k-NN from all the model
videos
Step5: refined search find the best matching video Vi*
Step6: decides whether the query is indeed a duplicate
derived from Vi*.
Duplicate confirmation, After finding the best matched
video Vi*, to confirm whether it is indeed a duplicate use
threshold approach on the model-to-query distance.
IV. EXPERIMENTAL RESULT
We describe the duplicate detection experiment for feature
comparison. A database contains 100 videos, worth about 1
hours of video content. 20 original videos are used to generate
the query videos. We use various image processing and noise
addition operations to generate the queries. gamma correction,
JPEG compression at quality different factors, varying frame
rates, We have experimented with different query lengths, as a
duplicate can be constructed as a subset of a model video full-
length, 35% of the original model video length.
We also perform experiment on video queries collected
form YouTube. These web videos are identical or
approximately identical videos close to the exact duplicate of
each other, but different in file formats, encoding parameters,
photometric variations (color, lighting changes), editing
operations (caption, logo and border insertion), different
lengths, and certain modifications (frames add/remove).
TABLE I. COMPARISON OF THE SIMILARITY OF CLD AND OCS
Similarity value
Input videos CLD OCS
Video1 65.21 76.19
Video 2 79.5 87.14
Video 3 69.28 74.78
Video 4 71.0 81.0
Video 5 64.70 87.5
Figure 2. Similarity between videos with CLD and OCS
4. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 11 139 – 142
_______________________________________________________________________________________________
142
IJRITCC | November 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
V. CONCLUSION
This paper can deal with various kinds of video
transformations, such as video compression, blurred, video
cutting. As well, two feature extraction methods are used for
extract feature from video, and find the similarity between
videos using distance measure, and indexing method used to
speed up the matching process. We retrieve the duplicate
video, an average detection accuracy of over 97% when the
query video as a noisy subset of the original video, and 80%
detection accuracy when the query videos are real time videos.
REFRENCES
[1] Anindya Sarkar, Vishwarkarma Singh, Pratim Ghosh, B. S.
Manjunath, and Ambuj Singh. Efficient and Robust Detection of
Duplicate Videos in a Large Database,2011.
[2] X. Wu, A. G. Hauptmann, and C. Ngo. Practical elimination of
near-duplicates from web video search. In Proceedings of the
15th
International Conference on Multimedia, pages 218–227.
ACM, 2007.
[3] S. Cheung and A. Zakhor. Estimation of web video multiplicity.
In Proc. SPIE–Internet Imaging, volume 3964, pages 34–36,
1999.
[4] L. Liu, W. Lai, X. Hua, and S. Yang. Video Histogram: A Novel
Video Signature for Efficient Web Video Duplicate Detection.
Lecture Notes in Computer Science, 4352:94–103, 2007.
[5] J. Law-To, L. Chen, A. Joly, I. Laptev, O. Buisson, V. Gouet-
Brunet, N. Boujemaa, and F. Stentiford. Video copy detection: a
comparative study. In Proc. of CIVR, pages 371–378. ACM,
2007.
[6] E. Kasutani and A. Yamada. The MPEG-7 color layout
descriptor: a compact image feature description for high-speed
image/video segment retrieval. In Proc. of ICIP, volume 1, pages
674–677, 2001.
[7] M. Bertini, A. D. Bimbo, and W. Nunziati. Video clip matching
using MPEG-7 descriptors and edit distance. In Proc. of CIVR,
pages 133–142, 2006.
[8] A. Joly, C. Frelicot, and O. Buisson. Robust content-based
video copy identification in a large reference database. In Int.
Conf. onImage and Video Retrieval, pages 414–424, 2003.
[9] H. Lejsek, F. H. Asmundsson, B. Jonsson, and L. Amsaleg. NV-
tree: An efficient disk-based index for approximate search in
very large high-dimensional collections. IEEE Transactions on
Pattern Analysis and Machine Intelligence, 99(1), 2008.
[10] K. Dadason, H. Lejsek, F. Asmundsson, B. Jonsson, and L.
Amsaleg. Videntifier: identifying pirated videos in real-time. In
Proc. Of the 15th International Conference on Multimedia, pages
471–472. ACM, 2007.
[11] A. Joly, O. Buisson, and C. Frelicot. Statistical similarity search
applied to content-based video copy detection. Int. Conf. on
Data Engineering Workshops, page 1285, 2005.
[12] V. Athitsos, M. Potamias, P. Papapetrou, and G. Kollios.
Nearest neighbor retrieval using distance-based hashing. Proc. of
ICDE, pages 327–336, April 2008.
[13] A. Joly, O. Buisson, and C. Frelicot. Content-based copy
retrieval using distortion-based probabilistic similarity search.
Multimedia,IEEE Transactions on, 9(2):293–306, Feb. 2007.
[14] Koen E. A. van de Sande and Theo Gevers and Cees G. M.
Snoek. Evaluation of Color Descriptors for Object and Scene
Recognition. IEEE Transactions on Pattern Analysis and
Machine Intelligence, volume 32, pages1582 -1596.