SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 84
Real-Time Video Copy Detection in Big Data
Priyanka Prajapati1, Meenal Mishra2, Snehal Patil3, Mamta Pawar4
1,2,3,4 B.E Computer Engineering, Terna Engineering College, Mumbai university, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract -With the evolution of new technology and
facilities today more number of videos are uploaded all over
the internet but it is not necessary that every video holds
original contents. Video copy detection basically deals with
finding similarities between original and duplicate video.
Existing video copy detection algorithms have certain
limitations such as it takes more searching time and
sometimes gives inaccurate result. We have studied two video
copy detection algorithms which will be implemented using
Hadoop framework which is the method based on brightness
sequence and TIRI-DCT. These are followed by a fast
approximate search algorithm i.e. cluster-based similarity
search. Existing exhaustive search method is time consuming
process. All of these characteristics could just meet the
requirements of real-time video copy detection technology.
Keywords- Hadoop, Cluster-based similarity search,
Inverted file-based similarity search, TIRI-DCT.
1. INTRODUCTION
Due to rapid development of multimedia hardware and
software technologies, the cost of image and video data
collection, creation, and storage is becoming low. Every day
lots of video data are generated and published. Amongthese
huge volumes of videos, there exist large numbers of copies.
According to statics 27 % redundant videos are duplicated
on the most popular version of a video in the search results
from video search engines. Therefore an effective and
efficient method for video copy detection has become more
and more important. Also users are often frustrated when
they need to spend their valuable time to find videos of
interest; they have to go through number of duplicated or
nearly duplicated videos that are streamed overtheinternet
before arriving at an interesting one. Because of these
duplicated video lots of storage space and users time can be
wasted.
Video copy is not a simple copy of the original video but a
new video formed after it is attacked, which is visually not
very different from the original one. The attack forms of
video mainly include adding logo, improving contrast,
reducing contrast, changing video size and so on. Videocopy
detection is to detect the video so as to determine whether it
is the copy of another video or not. Following paperisa brief
summary of the work carried out in this domain. Various
video copy detection algorithms which include spatial
domain and transform domain algorithms are reviewed
here.
Video copy detection is divided into two parts. First, the
features of the video are extracted and a hash library
(Hadoop distributed platformisappliedtocalculatethehash
values) of the videos is formed; secondly, the features of the
querying video are extracted and a hash value of the
querying video is formed and then it is compared with the
hash values of the training videos, so that whether thequery
is a copy video or not can be determined [1].
2. LITERATURE SURVEY
In[4], we studied about watermarking. The limitations of
watermarks are that if the original image is not
watermarked, then it is not possible to know if other images
are copied or not.
In[1], Each video frame has their spatial characteristics, and
the combination of the video frames has time-domain
characteristics. We have also studied about the fingerprint
extraction techniques.
In[2],Size of online video databases can reach tens of
millions of videos, which translates into a very large
fingerprint database size. This means that even if the
fingerprint of a query video can be extracted very quickly,
searching the fingerprint database to find a match may take
a long time. For online applications, however, a reliable
match should be found in almost real-time. Therefore
fingerprint matching forms a practical bottleneck for online
fingerprinting systems.
In[6], A simple exhaustive search method which has a
complexity of , where is the number of the fingerprintsinthe
database. Search methods inverted file-Based Similarity
Search is modified version of search algorithm that was
proposed.
In[5], We learned about fingerprinting technology and
application of video copy detection system in managing
copyrighted content, video tracking, identifying. This paper
has done considerations, such as robustness, compactness
and discriminability for finger printing methods. It also
discusses fingerprint matching technologies complexities.
3. CONTENT BASED COPY DETECTION
It is another method for identification of images and video
clips. It is based on idea of “the media itself is the
watermark,” i.e., the media like video, audio, image contains
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 85
enough unique information for detectingcopies.Signatureis
extracted from the trained media and stored in a database.
The same procedure of signature extraction is done for
query media and compared to the trained media signature
which is already extracted and stored in a database to
determine if the test stream contains a copy of the query
media. The signatures which are extracted are called as
“Fingerprint”.
3.1 Fingerprint
Fingerprints summarize a video signal. These signature
features vectors that uniquely characterize the specific
signal. Video fingerprinting is a technique that can be used
for content based copy detection. The major task is to detect
whether a particular part of the video is based on the same
original video in a database of reference video.
Temporal fingerprints-Initially,a videosequenceisdivided
into shots. Then, the length of each shot is considered as a
temporal signature, and the sequence of concatenated shot
durations form the fingerprint of the video. This feature
works well with long video sequences, but does not perform
well for short video sequences since they do not contain
enough information required.
Spatial fingerprints– This algorithmconvertsa videoimage
into YUV colour space in which the luminance (Y)
component is kept and the chrominance components (U, V)
are discarded. Spatial fingerprints are unique value which
derived from each frame or from a key frame.
Spatio-temporal fingerprints- One disadvantage of spatial
fingerprints is that they are not able to capture the video’s
temporal data, which is an important differentiating
factor[3].
3.2 Algorithm
We have studied the following algorithms of content-based
copy detection.
a)TIRI-DCT Algorithm
Temporally informative representative images - discrete
cosine transform (TIRI-DCT) isdeveloped.TIRI-DCTisbased
on temporally informative representative images which
contains spatial and temporal information of a video
sequence.[2] This method calculates a weighted average of
the frames to generate representativeimages.Thissequence
will carry the temporal as well as spatial information. The
image is then divided into blocks. The first horizontal and
the first vertical DCT coefficients (features) are then
extracted from each block. The value of the feature from all
the blocks is concatenated to form the feature vector. Each
feature is then compared to a threshold(whichisthemedian
value of the feature vector) and then a binary fingerprint is
generated.
Figure 1: Schematic of the TIRI-DCT algorithm.
In order to determine whether a query video is an attacked
version of a video in a database or not, it’s fingerprint is first
extracted. The fingerprintdatabase(previouslycreatedfrom
the videos in the video database) is then searched for the
closest fingerprint to the extracted query fingerprint.
b) Brightness sequence Algorithm
The brightness of each frame is calculated of the video
whose originality is to be found. This brightness values are
compared with the values of the brightness of the original
video at the same instant of time. If the brightness of both
the videos is almost same, then it is said to be copied.
Step 1: Video hash extraction
For a video sequence X = x1,x2,x3,……xn, N is the frame
number of the videos. The hash sequence corresponding to
Video X is H = [f(x1),f(x2),…..f(xn)], f(x) = [a1,a2,a3….am] is
the hash extracting function, M is the number of hash bits
extracted from a single frame. Hash extraction algorithm is:
1: The video frame xi is divided into w* h areas
2: Calculate the average brightness of each block
3: Sort the brightness of each block
4:Now i= i +1, repeat step1, end the process until i= N.
Step 2 : Video hash matching
For video sequences X = x1,x2,x3,……xn, and Y =
y1,y2,y3,……yn,, the hash sequencescorrespondingtovideos
X and Y are Hx = [f(x1),f(x2),…..f(xn) and Hy =
[f(y1),f(y2),…..f(yn) respectively, wherein f(x) =
[a1,a2,a3….am] and f(y) = [b1,b2,b3….bm] .
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 86
The distance between the two video sequences is calculated
ie D(X,Y).When the distance D(X,Y) =T , the two videos are
regarded as the same video. T is the predetermined
threshold.
4. SEARCHING TECHNIQUE
4.1 Inverted-File-Based Similarity Search
Step 1: The binary unique values i.e. fingerprint are divided
into n words each of same bits.
Step 2: The horizontal length of the tableisusedtorepresent
the word position.
Step 3: The vertical length of the table is used to represent
the possible values of words.
Step 4: Index is added to each word of the fingerprints for
entry in column corresponding to the value assigned to the
word.
Step 5: The calculation of hamming distance is done
between the fingerprints in the database and the query
fingerprints.
Step 6: If the calculated distance is less than the threshold
value the query video gets matched and is declared as
matching.
Step 7: Otherwise, it will be declared as videos notmatching.
4.2 Cluster-based similarity Search
 This is another algorithm for binary fingerprints.
 The idea behind this is to make use of clustering to
decrease the number of queries thatareanalysedwithin
the database.
 If the fingerprints are assigned to only one cluster, then
the fingerprints in the database will be clustered into
non-overlapping groups.
 To perform the same, for each cluster a centroid is
chosen and named as cluster head. The cluster will be
assigned a fingerprint if it is closest to this cluster’s
head.
 The cluster head closest to the query is found to
determine if the query fingerprint matchesa fingerprint
in the database.
 The fingerprints which belong to this cluster are
searched to find the match i.e., the one which has the
minimum Hamming distance (of less than a certain
threshold) from the query. If match is not found, then
the cluster which is the next closest to the query is
examined [2].
5. ADVANTAGES
a. The performance on detecting copies from large
data set is satisfactory and Hadoop platform can
significantly improve the efficiency of video copy
detection.
b. It has high fault tolerance, high throughput, easy
scalability and etc.
c. The measurement of copy detections performance
System making result is faster than existingsystem.
d. The video hashing algorithm methods has strong
robustness, high distinction, high compactness and
low complexity.
6. DISADVANTAGES
a. In existing system the fingerprintwhichisextracted
using TIRI-DCT is not robust against the content
changing attacks such as changing the background
of the video or replacing picture in picture and the
performance of the system is low in the presence of
some other attacks, such as cropping, and logo
insertion.
b. The security of the fingerprint can be achieved only
with the fingerprints of smaller length. Larger
fingerprints results in a decrease in detectionspeed
as they require more computation in calculatingthe
hamming distance between the fingerprints.
7. CONCLUSION
In this paper, optimization of both the techniques i.e. TIRI-
DCT and Brightness Sequence Algorithm, their correctness,
speed and efficiency are analysed. The efficiency of Hadoop
platform is also focused which has high processing speed
and is optimum for storing and retrieval of data.
REFERENCES
[1] Jing Li, XuquanLian, Qiang Wu and Jiande Sun “Realtime
Video Copy Detection Based on Hadoop,” Sixth
International Conference on Information Science and
Technology Dalian, China; May 6-8, 2016.
[2] Vaishali V. Sarbhukan, Prof. V.B.Gaikwad ,“Video
FingerprintingExtraction Using TIRI-DCT” ,
International Journal of Engineering Researchand
Development 2013
[3] AbrumJeysudha,SamitShivadekar, “Real Time Video
Copy Detection usingHadoop”,International Journal of
Computer Application 2017.
[4] J. Law-To, L. Chen, A. Joly, I. Laptev, O. Buisson, V. Gouet-
Brunet, N. Boujemaa, and F. Stentiford, Video copy
detection: A comparative study, in Proc. Conf. Image
Video Retrieval (CIVR), 2007.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 87
[5] Jian Lu, “Video fingerprinting for copy identification:
from research to industry applications”, Proceedings of
SPIE - Media Forensics and Security XI, Vol. 7254,
January 2009.
[6] Ms. Laxmi Gupta, Prof. M.B Limkar, Prof. Sanjay. M
Hundiwale, “Search Methods for Fast Matching of Video
Fingerprints within a Large Database”,by SSRG
International Journal of ElectronicsandCommunication
Engineering (SSRG‐IJECE) – volume1 issue 3 May 2014

More Related Content

What's hot

Effective Compression of Digital Video
Effective Compression of Digital VideoEffective Compression of Digital Video
Effective Compression of Digital VideoIRJET Journal
 
Dynamic Threshold in Clip Analysis and Retrieval
Dynamic Threshold in Clip Analysis and RetrievalDynamic Threshold in Clip Analysis and Retrieval
Dynamic Threshold in Clip Analysis and RetrievalCSCJournals
 
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...researchinventy
 
Video copy detection using segmentation method and
Video copy detection using segmentation method andVideo copy detection using segmentation method and
Video copy detection using segmentation method andeSAT Publishing House
 
An Efficient Video Watermarking Using Color Histogram Analysis and Biplanes I...
An Efficient Video Watermarking Using Color Histogram Analysis and Biplanes I...An Efficient Video Watermarking Using Color Histogram Analysis and Biplanes I...
An Efficient Video Watermarking Using Color Histogram Analysis and Biplanes I...IJERA Editor
 
Video Compression Using Block By Block Basis Salience Detection
Video Compression Using Block By Block Basis Salience DetectionVideo Compression Using Block By Block Basis Salience Detection
Video Compression Using Block By Block Basis Salience DetectionIRJET Journal
 
A Video Processing System for Detection and Classification of Cricket Events
A Video Processing System for Detection and Classification of Cricket EventsA Video Processing System for Detection and Classification of Cricket Events
A Video Processing System for Detection and Classification of Cricket EventsIRJET Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Secured Video Watermarking Based On DWT
Secured Video Watermarking Based On DWTSecured Video Watermarking Based On DWT
Secured Video Watermarking Based On DWTEditor IJMTER
 
Performance Analysis of Digital Watermarking Of Video in the Spatial Domain
Performance Analysis of Digital Watermarking Of Video in the Spatial DomainPerformance Analysis of Digital Watermarking Of Video in the Spatial Domain
Performance Analysis of Digital Watermarking Of Video in the Spatial Domainpaperpublications3
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Adaptive Video Watermarking and Quality Estimation
Adaptive Video Watermarking and Quality EstimationAdaptive Video Watermarking and Quality Estimation
Adaptive Video Watermarking and Quality Estimationpaperpublications3
 
10.1.1.184.6612
10.1.1.184.661210.1.1.184.6612
10.1.1.184.6612NITC
 
IRJET - Information Hiding in H.264/AVC using Digital Watermarking
IRJET -  	  Information Hiding in H.264/AVC using Digital WatermarkingIRJET -  	  Information Hiding in H.264/AVC using Digital Watermarking
IRJET - Information Hiding in H.264/AVC using Digital WatermarkingIRJET Journal
 

What's hot (19)

Effective Compression of Digital Video
Effective Compression of Digital VideoEffective Compression of Digital Video
Effective Compression of Digital Video
 
50120140506015
5012014050601550120140506015
50120140506015
 
C1 mala1 akila
C1 mala1 akilaC1 mala1 akila
C1 mala1 akila
 
Dynamic Threshold in Clip Analysis and Retrieval
Dynamic Threshold in Clip Analysis and RetrievalDynamic Threshold in Clip Analysis and Retrieval
Dynamic Threshold in Clip Analysis and Retrieval
 
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
 
Video copy detection using segmentation method and
Video copy detection using segmentation method andVideo copy detection using segmentation method and
Video copy detection using segmentation method and
 
An Efficient Video Watermarking Using Color Histogram Analysis and Biplanes I...
An Efficient Video Watermarking Using Color Histogram Analysis and Biplanes I...An Efficient Video Watermarking Using Color Histogram Analysis and Biplanes I...
An Efficient Video Watermarking Using Color Histogram Analysis and Biplanes I...
 
Video Compression Using Block By Block Basis Salience Detection
Video Compression Using Block By Block Basis Salience DetectionVideo Compression Using Block By Block Basis Salience Detection
Video Compression Using Block By Block Basis Salience Detection
 
A Video Processing System for Detection and Classification of Cricket Events
A Video Processing System for Detection and Classification of Cricket EventsA Video Processing System for Detection and Classification of Cricket Events
A Video Processing System for Detection and Classification of Cricket Events
 
20120140505013
2012014050501320120140505013
20120140505013
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Secured Video Watermarking Based On DWT
Secured Video Watermarking Based On DWTSecured Video Watermarking Based On DWT
Secured Video Watermarking Based On DWT
 
Performance Analysis of Digital Watermarking Of Video in the Spatial Domain
Performance Analysis of Digital Watermarking Of Video in the Spatial DomainPerformance Analysis of Digital Watermarking Of Video in the Spatial Domain
Performance Analysis of Digital Watermarking Of Video in the Spatial Domain
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
A04840107
A04840107A04840107
A04840107
 
Adaptive Video Watermarking and Quality Estimation
Adaptive Video Watermarking and Quality EstimationAdaptive Video Watermarking and Quality Estimation
Adaptive Video Watermarking and Quality Estimation
 
10.1.1.184.6612
10.1.1.184.661210.1.1.184.6612
10.1.1.184.6612
 
Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...
Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...
Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...
 
IRJET - Information Hiding in H.264/AVC using Digital Watermarking
IRJET -  	  Information Hiding in H.264/AVC using Digital WatermarkingIRJET -  	  Information Hiding in H.264/AVC using Digital Watermarking
IRJET - Information Hiding in H.264/AVC using Digital Watermarking
 

Similar to Real-Time Video Copy Detection Big Data

Recent advances in content based video copy detection (IEEE)
Recent advances in content based video copy detection (IEEE)Recent advances in content based video copy detection (IEEE)
Recent advances in content based video copy detection (IEEE)PACE 2.0
 
Key frame extraction methodology for video annotation
Key frame extraction methodology for video annotationKey frame extraction methodology for video annotation
Key frame extraction methodology for video annotationIAEME Publication
 
Inverted File Based Search Technique for Video Copy Retrieval
Inverted File Based Search Technique for Video Copy RetrievalInverted File Based Search Technique for Video Copy Retrieval
Inverted File Based Search Technique for Video Copy Retrievalijcsa
 
PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...
PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...
PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...IJCSEIT Journal
 
Key Frame Extraction in Video Stream using Two Stage Method with Colour and S...
Key Frame Extraction in Video Stream using Two Stage Method with Colour and S...Key Frame Extraction in Video Stream using Two Stage Method with Colour and S...
Key Frame Extraction in Video Stream using Two Stage Method with Colour and S...ijtsrd
 
An Stepped Forward Security System for Multimedia Content Material for Cloud ...
An Stepped Forward Security System for Multimedia Content Material for Cloud ...An Stepped Forward Security System for Multimedia Content Material for Cloud ...
An Stepped Forward Security System for Multimedia Content Material for Cloud ...IRJET Journal
 
IRJET - Applications of Image and Video Deduplication: A Survey
IRJET -  	  Applications of Image and Video Deduplication: A SurveyIRJET -  	  Applications of Image and Video Deduplication: A Survey
IRJET - Applications of Image and Video Deduplication: A SurveyIRJET Journal
 
Video Summarization for Sports
Video Summarization for SportsVideo Summarization for Sports
Video Summarization for SportsIRJET Journal
 
Parking Surveillance Footage Summarization
Parking Surveillance Footage SummarizationParking Surveillance Footage Summarization
Parking Surveillance Footage SummarizationIRJET Journal
 
Key frame extraction for video summarization using motion activity descriptors
Key frame extraction for video summarization using motion activity descriptorsKey frame extraction for video summarization using motion activity descriptors
Key frame extraction for video summarization using motion activity descriptorseSAT Publishing House
 
Key frame extraction for video summarization using motion activity descriptors
Key frame extraction for video summarization using motion activity descriptorsKey frame extraction for video summarization using motion activity descriptors
Key frame extraction for video summarization using motion activity descriptorseSAT Journals
 
A Survey on Multimedia Content Protection Mechanisms
A Survey on Multimedia Content Protection Mechanisms A Survey on Multimedia Content Protection Mechanisms
A Survey on Multimedia Content Protection Mechanisms IJECEIAES
 
How to prepare a perfect video abstract for your research paper – Pubrica.pdf
How to prepare a perfect video abstract for your research paper – Pubrica.pdfHow to prepare a perfect video abstract for your research paper – Pubrica.pdf
How to prepare a perfect video abstract for your research paper – Pubrica.pdfPubrica
 
Action event retrieval from cricket video using audio energy feature for even...
Action event retrieval from cricket video using audio energy feature for even...Action event retrieval from cricket video using audio energy feature for even...
Action event retrieval from cricket video using audio energy feature for even...IAEME Publication
 
Action event retrieval from cricket video using audio energy feature for event
Action event retrieval from cricket video using audio energy feature for eventAction event retrieval from cricket video using audio energy feature for event
Action event retrieval from cricket video using audio energy feature for eventIAEME Publication
 
How to prepare a perfect video abstract for your research paper – Pubrica.pptx
How to prepare a perfect video abstract for your research paper – Pubrica.pptxHow to prepare a perfect video abstract for your research paper – Pubrica.pptx
How to prepare a perfect video abstract for your research paper – Pubrica.pptxPubrica
 
18 17 jan17 13470 rakesh ahuja revised-version(edit)
18 17 jan17 13470 rakesh ahuja revised-version(edit)18 17 jan17 13470 rakesh ahuja revised-version(edit)
18 17 jan17 13470 rakesh ahuja revised-version(edit)IAESIJEECS
 
IRJET-Feature Extraction from Video Data for Indexing and Retrieval
IRJET-Feature Extraction from Video Data for Indexing and Retrieval IRJET-Feature Extraction from Video Data for Indexing and Retrieval
IRJET-Feature Extraction from Video Data for Indexing and Retrieval IRJET Journal
 
An Exploration based on Multifarious Video Copy Detection Strategies
An Exploration based on Multifarious Video Copy Detection StrategiesAn Exploration based on Multifarious Video Copy Detection Strategies
An Exploration based on Multifarious Video Copy Detection Strategiesidescitation
 
VISUAL ATTENTION BASED KEYFRAMES EXTRACTION AND VIDEO SUMMARIZATION
VISUAL ATTENTION BASED KEYFRAMES EXTRACTION AND VIDEO SUMMARIZATIONVISUAL ATTENTION BASED KEYFRAMES EXTRACTION AND VIDEO SUMMARIZATION
VISUAL ATTENTION BASED KEYFRAMES EXTRACTION AND VIDEO SUMMARIZATIONcscpconf
 

Similar to Real-Time Video Copy Detection Big Data (20)

Recent advances in content based video copy detection (IEEE)
Recent advances in content based video copy detection (IEEE)Recent advances in content based video copy detection (IEEE)
Recent advances in content based video copy detection (IEEE)
 
Key frame extraction methodology for video annotation
Key frame extraction methodology for video annotationKey frame extraction methodology for video annotation
Key frame extraction methodology for video annotation
 
Inverted File Based Search Technique for Video Copy Retrieval
Inverted File Based Search Technique for Video Copy RetrievalInverted File Based Search Technique for Video Copy Retrieval
Inverted File Based Search Technique for Video Copy Retrieval
 
PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...
PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...
PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...
 
Key Frame Extraction in Video Stream using Two Stage Method with Colour and S...
Key Frame Extraction in Video Stream using Two Stage Method with Colour and S...Key Frame Extraction in Video Stream using Two Stage Method with Colour and S...
Key Frame Extraction in Video Stream using Two Stage Method with Colour and S...
 
An Stepped Forward Security System for Multimedia Content Material for Cloud ...
An Stepped Forward Security System for Multimedia Content Material for Cloud ...An Stepped Forward Security System for Multimedia Content Material for Cloud ...
An Stepped Forward Security System for Multimedia Content Material for Cloud ...
 
IRJET - Applications of Image and Video Deduplication: A Survey
IRJET -  	  Applications of Image and Video Deduplication: A SurveyIRJET -  	  Applications of Image and Video Deduplication: A Survey
IRJET - Applications of Image and Video Deduplication: A Survey
 
Video Summarization for Sports
Video Summarization for SportsVideo Summarization for Sports
Video Summarization for Sports
 
Parking Surveillance Footage Summarization
Parking Surveillance Footage SummarizationParking Surveillance Footage Summarization
Parking Surveillance Footage Summarization
 
Key frame extraction for video summarization using motion activity descriptors
Key frame extraction for video summarization using motion activity descriptorsKey frame extraction for video summarization using motion activity descriptors
Key frame extraction for video summarization using motion activity descriptors
 
Key frame extraction for video summarization using motion activity descriptors
Key frame extraction for video summarization using motion activity descriptorsKey frame extraction for video summarization using motion activity descriptors
Key frame extraction for video summarization using motion activity descriptors
 
A Survey on Multimedia Content Protection Mechanisms
A Survey on Multimedia Content Protection Mechanisms A Survey on Multimedia Content Protection Mechanisms
A Survey on Multimedia Content Protection Mechanisms
 
How to prepare a perfect video abstract for your research paper – Pubrica.pdf
How to prepare a perfect video abstract for your research paper – Pubrica.pdfHow to prepare a perfect video abstract for your research paper – Pubrica.pdf
How to prepare a perfect video abstract for your research paper – Pubrica.pdf
 
Action event retrieval from cricket video using audio energy feature for even...
Action event retrieval from cricket video using audio energy feature for even...Action event retrieval from cricket video using audio energy feature for even...
Action event retrieval from cricket video using audio energy feature for even...
 
Action event retrieval from cricket video using audio energy feature for event
Action event retrieval from cricket video using audio energy feature for eventAction event retrieval from cricket video using audio energy feature for event
Action event retrieval from cricket video using audio energy feature for event
 
How to prepare a perfect video abstract for your research paper – Pubrica.pptx
How to prepare a perfect video abstract for your research paper – Pubrica.pptxHow to prepare a perfect video abstract for your research paper – Pubrica.pptx
How to prepare a perfect video abstract for your research paper – Pubrica.pptx
 
18 17 jan17 13470 rakesh ahuja revised-version(edit)
18 17 jan17 13470 rakesh ahuja revised-version(edit)18 17 jan17 13470 rakesh ahuja revised-version(edit)
18 17 jan17 13470 rakesh ahuja revised-version(edit)
 
IRJET-Feature Extraction from Video Data for Indexing and Retrieval
IRJET-Feature Extraction from Video Data for Indexing and Retrieval IRJET-Feature Extraction from Video Data for Indexing and Retrieval
IRJET-Feature Extraction from Video Data for Indexing and Retrieval
 
An Exploration based on Multifarious Video Copy Detection Strategies
An Exploration based on Multifarious Video Copy Detection StrategiesAn Exploration based on Multifarious Video Copy Detection Strategies
An Exploration based on Multifarious Video Copy Detection Strategies
 
VISUAL ATTENTION BASED KEYFRAMES EXTRACTION AND VIDEO SUMMARIZATION
VISUAL ATTENTION BASED KEYFRAMES EXTRACTION AND VIDEO SUMMARIZATIONVISUAL ATTENTION BASED KEYFRAMES EXTRACTION AND VIDEO SUMMARIZATION
VISUAL ATTENTION BASED KEYFRAMES EXTRACTION AND VIDEO SUMMARIZATION
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixingviprabot1
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 

Recently uploaded (20)

CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixing
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 

Real-Time Video Copy Detection Big Data

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 84 Real-Time Video Copy Detection in Big Data Priyanka Prajapati1, Meenal Mishra2, Snehal Patil3, Mamta Pawar4 1,2,3,4 B.E Computer Engineering, Terna Engineering College, Mumbai university, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract -With the evolution of new technology and facilities today more number of videos are uploaded all over the internet but it is not necessary that every video holds original contents. Video copy detection basically deals with finding similarities between original and duplicate video. Existing video copy detection algorithms have certain limitations such as it takes more searching time and sometimes gives inaccurate result. We have studied two video copy detection algorithms which will be implemented using Hadoop framework which is the method based on brightness sequence and TIRI-DCT. These are followed by a fast approximate search algorithm i.e. cluster-based similarity search. Existing exhaustive search method is time consuming process. All of these characteristics could just meet the requirements of real-time video copy detection technology. Keywords- Hadoop, Cluster-based similarity search, Inverted file-based similarity search, TIRI-DCT. 1. INTRODUCTION Due to rapid development of multimedia hardware and software technologies, the cost of image and video data collection, creation, and storage is becoming low. Every day lots of video data are generated and published. Amongthese huge volumes of videos, there exist large numbers of copies. According to statics 27 % redundant videos are duplicated on the most popular version of a video in the search results from video search engines. Therefore an effective and efficient method for video copy detection has become more and more important. Also users are often frustrated when they need to spend their valuable time to find videos of interest; they have to go through number of duplicated or nearly duplicated videos that are streamed overtheinternet before arriving at an interesting one. Because of these duplicated video lots of storage space and users time can be wasted. Video copy is not a simple copy of the original video but a new video formed after it is attacked, which is visually not very different from the original one. The attack forms of video mainly include adding logo, improving contrast, reducing contrast, changing video size and so on. Videocopy detection is to detect the video so as to determine whether it is the copy of another video or not. Following paperisa brief summary of the work carried out in this domain. Various video copy detection algorithms which include spatial domain and transform domain algorithms are reviewed here. Video copy detection is divided into two parts. First, the features of the video are extracted and a hash library (Hadoop distributed platformisappliedtocalculatethehash values) of the videos is formed; secondly, the features of the querying video are extracted and a hash value of the querying video is formed and then it is compared with the hash values of the training videos, so that whether thequery is a copy video or not can be determined [1]. 2. LITERATURE SURVEY In[4], we studied about watermarking. The limitations of watermarks are that if the original image is not watermarked, then it is not possible to know if other images are copied or not. In[1], Each video frame has their spatial characteristics, and the combination of the video frames has time-domain characteristics. We have also studied about the fingerprint extraction techniques. In[2],Size of online video databases can reach tens of millions of videos, which translates into a very large fingerprint database size. This means that even if the fingerprint of a query video can be extracted very quickly, searching the fingerprint database to find a match may take a long time. For online applications, however, a reliable match should be found in almost real-time. Therefore fingerprint matching forms a practical bottleneck for online fingerprinting systems. In[6], A simple exhaustive search method which has a complexity of , where is the number of the fingerprintsinthe database. Search methods inverted file-Based Similarity Search is modified version of search algorithm that was proposed. In[5], We learned about fingerprinting technology and application of video copy detection system in managing copyrighted content, video tracking, identifying. This paper has done considerations, such as robustness, compactness and discriminability for finger printing methods. It also discusses fingerprint matching technologies complexities. 3. CONTENT BASED COPY DETECTION It is another method for identification of images and video clips. It is based on idea of “the media itself is the watermark,” i.e., the media like video, audio, image contains
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 85 enough unique information for detectingcopies.Signatureis extracted from the trained media and stored in a database. The same procedure of signature extraction is done for query media and compared to the trained media signature which is already extracted and stored in a database to determine if the test stream contains a copy of the query media. The signatures which are extracted are called as “Fingerprint”. 3.1 Fingerprint Fingerprints summarize a video signal. These signature features vectors that uniquely characterize the specific signal. Video fingerprinting is a technique that can be used for content based copy detection. The major task is to detect whether a particular part of the video is based on the same original video in a database of reference video. Temporal fingerprints-Initially,a videosequenceisdivided into shots. Then, the length of each shot is considered as a temporal signature, and the sequence of concatenated shot durations form the fingerprint of the video. This feature works well with long video sequences, but does not perform well for short video sequences since they do not contain enough information required. Spatial fingerprints– This algorithmconvertsa videoimage into YUV colour space in which the luminance (Y) component is kept and the chrominance components (U, V) are discarded. Spatial fingerprints are unique value which derived from each frame or from a key frame. Spatio-temporal fingerprints- One disadvantage of spatial fingerprints is that they are not able to capture the video’s temporal data, which is an important differentiating factor[3]. 3.2 Algorithm We have studied the following algorithms of content-based copy detection. a)TIRI-DCT Algorithm Temporally informative representative images - discrete cosine transform (TIRI-DCT) isdeveloped.TIRI-DCTisbased on temporally informative representative images which contains spatial and temporal information of a video sequence.[2] This method calculates a weighted average of the frames to generate representativeimages.Thissequence will carry the temporal as well as spatial information. The image is then divided into blocks. The first horizontal and the first vertical DCT coefficients (features) are then extracted from each block. The value of the feature from all the blocks is concatenated to form the feature vector. Each feature is then compared to a threshold(whichisthemedian value of the feature vector) and then a binary fingerprint is generated. Figure 1: Schematic of the TIRI-DCT algorithm. In order to determine whether a query video is an attacked version of a video in a database or not, it’s fingerprint is first extracted. The fingerprintdatabase(previouslycreatedfrom the videos in the video database) is then searched for the closest fingerprint to the extracted query fingerprint. b) Brightness sequence Algorithm The brightness of each frame is calculated of the video whose originality is to be found. This brightness values are compared with the values of the brightness of the original video at the same instant of time. If the brightness of both the videos is almost same, then it is said to be copied. Step 1: Video hash extraction For a video sequence X = x1,x2,x3,……xn, N is the frame number of the videos. The hash sequence corresponding to Video X is H = [f(x1),f(x2),…..f(xn)], f(x) = [a1,a2,a3….am] is the hash extracting function, M is the number of hash bits extracted from a single frame. Hash extraction algorithm is: 1: The video frame xi is divided into w* h areas 2: Calculate the average brightness of each block 3: Sort the brightness of each block 4:Now i= i +1, repeat step1, end the process until i= N. Step 2 : Video hash matching For video sequences X = x1,x2,x3,……xn, and Y = y1,y2,y3,……yn,, the hash sequencescorrespondingtovideos X and Y are Hx = [f(x1),f(x2),…..f(xn) and Hy = [f(y1),f(y2),…..f(yn) respectively, wherein f(x) = [a1,a2,a3….am] and f(y) = [b1,b2,b3….bm] .
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 86 The distance between the two video sequences is calculated ie D(X,Y).When the distance D(X,Y) =T , the two videos are regarded as the same video. T is the predetermined threshold. 4. SEARCHING TECHNIQUE 4.1 Inverted-File-Based Similarity Search Step 1: The binary unique values i.e. fingerprint are divided into n words each of same bits. Step 2: The horizontal length of the tableisusedtorepresent the word position. Step 3: The vertical length of the table is used to represent the possible values of words. Step 4: Index is added to each word of the fingerprints for entry in column corresponding to the value assigned to the word. Step 5: The calculation of hamming distance is done between the fingerprints in the database and the query fingerprints. Step 6: If the calculated distance is less than the threshold value the query video gets matched and is declared as matching. Step 7: Otherwise, it will be declared as videos notmatching. 4.2 Cluster-based similarity Search  This is another algorithm for binary fingerprints.  The idea behind this is to make use of clustering to decrease the number of queries thatareanalysedwithin the database.  If the fingerprints are assigned to only one cluster, then the fingerprints in the database will be clustered into non-overlapping groups.  To perform the same, for each cluster a centroid is chosen and named as cluster head. The cluster will be assigned a fingerprint if it is closest to this cluster’s head.  The cluster head closest to the query is found to determine if the query fingerprint matchesa fingerprint in the database.  The fingerprints which belong to this cluster are searched to find the match i.e., the one which has the minimum Hamming distance (of less than a certain threshold) from the query. If match is not found, then the cluster which is the next closest to the query is examined [2]. 5. ADVANTAGES a. The performance on detecting copies from large data set is satisfactory and Hadoop platform can significantly improve the efficiency of video copy detection. b. It has high fault tolerance, high throughput, easy scalability and etc. c. The measurement of copy detections performance System making result is faster than existingsystem. d. The video hashing algorithm methods has strong robustness, high distinction, high compactness and low complexity. 6. DISADVANTAGES a. In existing system the fingerprintwhichisextracted using TIRI-DCT is not robust against the content changing attacks such as changing the background of the video or replacing picture in picture and the performance of the system is low in the presence of some other attacks, such as cropping, and logo insertion. b. The security of the fingerprint can be achieved only with the fingerprints of smaller length. Larger fingerprints results in a decrease in detectionspeed as they require more computation in calculatingthe hamming distance between the fingerprints. 7. CONCLUSION In this paper, optimization of both the techniques i.e. TIRI- DCT and Brightness Sequence Algorithm, their correctness, speed and efficiency are analysed. The efficiency of Hadoop platform is also focused which has high processing speed and is optimum for storing and retrieval of data. REFERENCES [1] Jing Li, XuquanLian, Qiang Wu and Jiande Sun “Realtime Video Copy Detection Based on Hadoop,” Sixth International Conference on Information Science and Technology Dalian, China; May 6-8, 2016. [2] Vaishali V. Sarbhukan, Prof. V.B.Gaikwad ,“Video FingerprintingExtraction Using TIRI-DCT” , International Journal of Engineering Researchand Development 2013 [3] AbrumJeysudha,SamitShivadekar, “Real Time Video Copy Detection usingHadoop”,International Journal of Computer Application 2017. [4] J. Law-To, L. Chen, A. Joly, I. Laptev, O. Buisson, V. Gouet- Brunet, N. Boujemaa, and F. Stentiford, Video copy detection: A comparative study, in Proc. Conf. Image Video Retrieval (CIVR), 2007.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 87 [5] Jian Lu, “Video fingerprinting for copy identification: from research to industry applications”, Proceedings of SPIE - Media Forensics and Security XI, Vol. 7254, January 2009. [6] Ms. Laxmi Gupta, Prof. M.B Limkar, Prof. Sanjay. M Hundiwale, “Search Methods for Fast Matching of Video Fingerprints within a Large Database”,by SSRG International Journal of ElectronicsandCommunication Engineering (SSRG‐IJECE) – volume1 issue 3 May 2014