Submit Search
Upload
Real-Time Video Copy Detection Big Data
•
0 likes
•
53 views
AI-enhanced title
IRJET Journal
Follow
https://www.irjet.net/archives/V4/i11/IRJET-V4I1117.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 4
Download now
Download to read offline
Recommended
E0704019023
E0704019023
IJERD Editor
VIDEO SUMMARIZATION: CORRELATION FOR SUMMARIZATION AND SUBTRACTION FOR RARE E...
VIDEO SUMMARIZATION: CORRELATION FOR SUMMARIZATION AND SUBTRACTION FOR RARE E...
Journal For Research
Hv2615441548
Hv2615441548
IJERA Editor
Video Content Identification using Video Signature: Survey
Video Content Identification using Video Signature: Survey
IRJET Journal
Ac02417471753
Ac02417471753
IJMER
Design of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulink
eSAT Publishing House
F0953235
F0953235
IOSR Journals
Unsupervised object-level video summarization with online motion auto-encoder
Unsupervised object-level video summarization with online motion auto-encoder
NEERAJ BAGHEL
Recommended
E0704019023
E0704019023
IJERD Editor
VIDEO SUMMARIZATION: CORRELATION FOR SUMMARIZATION AND SUBTRACTION FOR RARE E...
VIDEO SUMMARIZATION: CORRELATION FOR SUMMARIZATION AND SUBTRACTION FOR RARE E...
Journal For Research
Hv2615441548
Hv2615441548
IJERA Editor
Video Content Identification using Video Signature: Survey
Video Content Identification using Video Signature: Survey
IRJET Journal
Ac02417471753
Ac02417471753
IJMER
Design of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulink
eSAT Publishing House
F0953235
F0953235
IOSR Journals
Unsupervised object-level video summarization with online motion auto-encoder
Unsupervised object-level video summarization with online motion auto-encoder
NEERAJ BAGHEL
Effective Compression of Digital Video
Effective Compression of Digital Video
IRJET Journal
50120140506015
50120140506015
IAEME Publication
C1 mala1 akila
C1 mala1 akila
Jasline Presilda
Dynamic Threshold in Clip Analysis and Retrieval
Dynamic Threshold in Clip Analysis and Retrieval
CSCJournals
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
researchinventy
Video copy detection using segmentation method and
Video copy detection using segmentation method and
eSAT Publishing House
An Efficient Video Watermarking Using Color Histogram Analysis and Biplanes I...
An Efficient Video Watermarking Using Color Histogram Analysis and Biplanes I...
IJERA Editor
Video Compression Using Block By Block Basis Salience Detection
Video Compression Using Block By Block Basis Salience Detection
IRJET Journal
A Video Processing System for Detection and Classification of Cricket Events
A Video Processing System for Detection and Classification of Cricket Events
IRJET Journal
20120140505013
20120140505013
IAEME Publication
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
Secured Video Watermarking Based On DWT
Secured Video Watermarking Based On DWT
Editor IJMTER
Performance Analysis of Digital Watermarking Of Video in the Spatial Domain
Performance Analysis of Digital Watermarking Of Video in the Spatial Domain
paperpublications3
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
A04840107
A04840107
IOSR-JEN
Adaptive Video Watermarking and Quality Estimation
Adaptive Video Watermarking and Quality Estimation
paperpublications3
10.1.1.184.6612
10.1.1.184.6612
NITC
Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...
Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...
International Journal of Engineering Inventions www.ijeijournal.com
IRJET - Information Hiding in H.264/AVC using Digital Watermarking
IRJET - Information Hiding in H.264/AVC using Digital Watermarking
IRJET Journal
Recent advances in content based video copy detection (IEEE)
Recent advances in content based video copy detection (IEEE)
PACE 2.0
Key frame extraction methodology for video annotation
Key frame extraction methodology for video annotation
IAEME Publication
Inverted File Based Search Technique for Video Copy Retrieval
Inverted File Based Search Technique for Video Copy Retrieval
ijcsa
More Related Content
What's hot
Effective Compression of Digital Video
Effective Compression of Digital Video
IRJET Journal
50120140506015
50120140506015
IAEME Publication
C1 mala1 akila
C1 mala1 akila
Jasline Presilda
Dynamic Threshold in Clip Analysis and Retrieval
Dynamic Threshold in Clip Analysis and Retrieval
CSCJournals
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
researchinventy
Video copy detection using segmentation method and
Video copy detection using segmentation method and
eSAT Publishing House
An Efficient Video Watermarking Using Color Histogram Analysis and Biplanes I...
An Efficient Video Watermarking Using Color Histogram Analysis and Biplanes I...
IJERA Editor
Video Compression Using Block By Block Basis Salience Detection
Video Compression Using Block By Block Basis Salience Detection
IRJET Journal
A Video Processing System for Detection and Classification of Cricket Events
A Video Processing System for Detection and Classification of Cricket Events
IRJET Journal
20120140505013
20120140505013
IAEME Publication
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
Secured Video Watermarking Based On DWT
Secured Video Watermarking Based On DWT
Editor IJMTER
Performance Analysis of Digital Watermarking Of Video in the Spatial Domain
Performance Analysis of Digital Watermarking Of Video in the Spatial Domain
paperpublications3
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
A04840107
A04840107
IOSR-JEN
Adaptive Video Watermarking and Quality Estimation
Adaptive Video Watermarking and Quality Estimation
paperpublications3
10.1.1.184.6612
10.1.1.184.6612
NITC
Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...
Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...
International Journal of Engineering Inventions www.ijeijournal.com
IRJET - Information Hiding in H.264/AVC using Digital Watermarking
IRJET - Information Hiding in H.264/AVC using Digital Watermarking
IRJET Journal
What's hot
(19)
Effective Compression of Digital Video
Effective Compression of Digital Video
50120140506015
50120140506015
C1 mala1 akila
C1 mala1 akila
Dynamic Threshold in Clip Analysis and Retrieval
Dynamic Threshold in Clip Analysis and Retrieval
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
Video copy detection using segmentation method and
Video copy detection using segmentation method and
An Efficient Video Watermarking Using Color Histogram Analysis and Biplanes I...
An Efficient Video Watermarking Using Color Histogram Analysis and Biplanes I...
Video Compression Using Block By Block Basis Salience Detection
Video Compression Using Block By Block Basis Salience Detection
A Video Processing System for Detection and Classification of Cricket Events
A Video Processing System for Detection and Classification of Cricket Events
20120140505013
20120140505013
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
Secured Video Watermarking Based On DWT
Secured Video Watermarking Based On DWT
Performance Analysis of Digital Watermarking Of Video in the Spatial Domain
Performance Analysis of Digital Watermarking Of Video in the Spatial Domain
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
A04840107
A04840107
Adaptive Video Watermarking and Quality Estimation
Adaptive Video Watermarking and Quality Estimation
10.1.1.184.6612
10.1.1.184.6612
Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...
Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...
IRJET - Information Hiding in H.264/AVC using Digital Watermarking
IRJET - Information Hiding in H.264/AVC using Digital Watermarking
Similar to Real-Time Video Copy Detection Big Data
Recent advances in content based video copy detection (IEEE)
Recent advances in content based video copy detection (IEEE)
PACE 2.0
Key frame extraction methodology for video annotation
Key frame extraction methodology for video annotation
IAEME Publication
Inverted File Based Search Technique for Video Copy Retrieval
Inverted File Based Search Technique for Video Copy Retrieval
ijcsa
PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...
PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...
IJCSEIT Journal
Key Frame Extraction in Video Stream using Two Stage Method with Colour and S...
Key Frame Extraction in Video Stream using Two Stage Method with Colour and S...
ijtsrd
An Stepped Forward Security System for Multimedia Content Material for Cloud ...
An Stepped Forward Security System for Multimedia Content Material for Cloud ...
IRJET Journal
IRJET - Applications of Image and Video Deduplication: A Survey
IRJET - Applications of Image and Video Deduplication: A Survey
IRJET Journal
Video Summarization for Sports
Video Summarization for Sports
IRJET Journal
Parking Surveillance Footage Summarization
Parking Surveillance Footage Summarization
IRJET Journal
Key frame extraction for video summarization using motion activity descriptors
Key frame extraction for video summarization using motion activity descriptors
eSAT Publishing House
Key frame extraction for video summarization using motion activity descriptors
Key frame extraction for video summarization using motion activity descriptors
eSAT Journals
A Survey on Multimedia Content Protection Mechanisms
A Survey on Multimedia Content Protection Mechanisms
IJECEIAES
How to prepare a perfect video abstract for your research paper – Pubrica.pdf
How to prepare a perfect video abstract for your research paper – Pubrica.pdf
Pubrica
Action event retrieval from cricket video using audio energy feature for even...
Action event retrieval from cricket video using audio energy feature for even...
IAEME Publication
Action event retrieval from cricket video using audio energy feature for event
Action event retrieval from cricket video using audio energy feature for event
IAEME Publication
How to prepare a perfect video abstract for your research paper – Pubrica.pptx
How to prepare a perfect video abstract for your research paper – Pubrica.pptx
Pubrica
18 17 jan17 13470 rakesh ahuja revised-version(edit)
18 17 jan17 13470 rakesh ahuja revised-version(edit)
IAESIJEECS
IRJET-Feature Extraction from Video Data for Indexing and Retrieval
IRJET-Feature Extraction from Video Data for Indexing and Retrieval
IRJET Journal
An Exploration based on Multifarious Video Copy Detection Strategies
An Exploration based on Multifarious Video Copy Detection Strategies
idescitation
VISUAL ATTENTION BASED KEYFRAMES EXTRACTION AND VIDEO SUMMARIZATION
VISUAL ATTENTION BASED KEYFRAMES EXTRACTION AND VIDEO SUMMARIZATION
cscpconf
Similar to Real-Time Video Copy Detection Big Data
(20)
Recent advances in content based video copy detection (IEEE)
Recent advances in content based video copy detection (IEEE)
Key frame extraction methodology for video annotation
Key frame extraction methodology for video annotation
Inverted File Based Search Technique for Video Copy Retrieval
Inverted File Based Search Technique for Video Copy Retrieval
PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...
PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...
Key Frame Extraction in Video Stream using Two Stage Method with Colour and S...
Key Frame Extraction in Video Stream using Two Stage Method with Colour and S...
An Stepped Forward Security System for Multimedia Content Material for Cloud ...
An Stepped Forward Security System for Multimedia Content Material for Cloud ...
IRJET - Applications of Image and Video Deduplication: A Survey
IRJET - Applications of Image and Video Deduplication: A Survey
Video Summarization for Sports
Video Summarization for Sports
Parking Surveillance Footage Summarization
Parking Surveillance Footage Summarization
Key frame extraction for video summarization using motion activity descriptors
Key frame extraction for video summarization using motion activity descriptors
Key frame extraction for video summarization using motion activity descriptors
Key frame extraction for video summarization using motion activity descriptors
A Survey on Multimedia Content Protection Mechanisms
A Survey on Multimedia Content Protection Mechanisms
How to prepare a perfect video abstract for your research paper – Pubrica.pdf
How to prepare a perfect video abstract for your research paper – Pubrica.pdf
Action event retrieval from cricket video using audio energy feature for even...
Action event retrieval from cricket video using audio energy feature for even...
Action event retrieval from cricket video using audio energy feature for event
Action event retrieval from cricket video using audio energy feature for event
How to prepare a perfect video abstract for your research paper – Pubrica.pptx
How to prepare a perfect video abstract for your research paper – Pubrica.pptx
18 17 jan17 13470 rakesh ahuja revised-version(edit)
18 17 jan17 13470 rakesh ahuja revised-version(edit)
IRJET-Feature Extraction from Video Data for Indexing and Retrieval
IRJET-Feature Extraction from Video Data for Indexing and Retrieval
An Exploration based on Multifarious Video Copy Detection Strategies
An Exploration based on Multifarious Video Copy Detection Strategies
VISUAL ATTENTION BASED KEYFRAMES EXTRACTION AND VIDEO SUMMARIZATION
VISUAL ATTENTION BASED KEYFRAMES EXTRACTION AND VIDEO SUMMARIZATION
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
Asst.prof M.Gokilavani
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
VICTOR MAESTRE RAMIREZ
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
LewisJB
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
k795866
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
britheesh05
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
hassan khalil
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
rehmti665
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
roselinkalist12
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
eptoze12
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
C Sai Kiran
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
PoojaBan
Effects of rheological properties on mixing
Effects of rheological properties on mixing
viprabot1
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
KartikeyaDwivedi3
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
null - The Open Security Community
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
jennyeacort
Recently uploaded
(20)
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
Effects of rheological properties on mixing
Effects of rheological properties on mixing
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Real-Time Video Copy Detection Big Data
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 84 Real-Time Video Copy Detection in Big Data Priyanka Prajapati1, Meenal Mishra2, Snehal Patil3, Mamta Pawar4 1,2,3,4 B.E Computer Engineering, Terna Engineering College, Mumbai university, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract -With the evolution of new technology and facilities today more number of videos are uploaded all over the internet but it is not necessary that every video holds original contents. Video copy detection basically deals with finding similarities between original and duplicate video. Existing video copy detection algorithms have certain limitations such as it takes more searching time and sometimes gives inaccurate result. We have studied two video copy detection algorithms which will be implemented using Hadoop framework which is the method based on brightness sequence and TIRI-DCT. These are followed by a fast approximate search algorithm i.e. cluster-based similarity search. Existing exhaustive search method is time consuming process. All of these characteristics could just meet the requirements of real-time video copy detection technology. Keywords- Hadoop, Cluster-based similarity search, Inverted file-based similarity search, TIRI-DCT. 1. INTRODUCTION Due to rapid development of multimedia hardware and software technologies, the cost of image and video data collection, creation, and storage is becoming low. Every day lots of video data are generated and published. Amongthese huge volumes of videos, there exist large numbers of copies. According to statics 27 % redundant videos are duplicated on the most popular version of a video in the search results from video search engines. Therefore an effective and efficient method for video copy detection has become more and more important. Also users are often frustrated when they need to spend their valuable time to find videos of interest; they have to go through number of duplicated or nearly duplicated videos that are streamed overtheinternet before arriving at an interesting one. Because of these duplicated video lots of storage space and users time can be wasted. Video copy is not a simple copy of the original video but a new video formed after it is attacked, which is visually not very different from the original one. The attack forms of video mainly include adding logo, improving contrast, reducing contrast, changing video size and so on. Videocopy detection is to detect the video so as to determine whether it is the copy of another video or not. Following paperisa brief summary of the work carried out in this domain. Various video copy detection algorithms which include spatial domain and transform domain algorithms are reviewed here. Video copy detection is divided into two parts. First, the features of the video are extracted and a hash library (Hadoop distributed platformisappliedtocalculatethehash values) of the videos is formed; secondly, the features of the querying video are extracted and a hash value of the querying video is formed and then it is compared with the hash values of the training videos, so that whether thequery is a copy video or not can be determined [1]. 2. LITERATURE SURVEY In[4], we studied about watermarking. The limitations of watermarks are that if the original image is not watermarked, then it is not possible to know if other images are copied or not. In[1], Each video frame has their spatial characteristics, and the combination of the video frames has time-domain characteristics. We have also studied about the fingerprint extraction techniques. In[2],Size of online video databases can reach tens of millions of videos, which translates into a very large fingerprint database size. This means that even if the fingerprint of a query video can be extracted very quickly, searching the fingerprint database to find a match may take a long time. For online applications, however, a reliable match should be found in almost real-time. Therefore fingerprint matching forms a practical bottleneck for online fingerprinting systems. In[6], A simple exhaustive search method which has a complexity of , where is the number of the fingerprintsinthe database. Search methods inverted file-Based Similarity Search is modified version of search algorithm that was proposed. In[5], We learned about fingerprinting technology and application of video copy detection system in managing copyrighted content, video tracking, identifying. This paper has done considerations, such as robustness, compactness and discriminability for finger printing methods. It also discusses fingerprint matching technologies complexities. 3. CONTENT BASED COPY DETECTION It is another method for identification of images and video clips. It is based on idea of “the media itself is the watermark,” i.e., the media like video, audio, image contains
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 85 enough unique information for detectingcopies.Signatureis extracted from the trained media and stored in a database. The same procedure of signature extraction is done for query media and compared to the trained media signature which is already extracted and stored in a database to determine if the test stream contains a copy of the query media. The signatures which are extracted are called as “Fingerprint”. 3.1 Fingerprint Fingerprints summarize a video signal. These signature features vectors that uniquely characterize the specific signal. Video fingerprinting is a technique that can be used for content based copy detection. The major task is to detect whether a particular part of the video is based on the same original video in a database of reference video. Temporal fingerprints-Initially,a videosequenceisdivided into shots. Then, the length of each shot is considered as a temporal signature, and the sequence of concatenated shot durations form the fingerprint of the video. This feature works well with long video sequences, but does not perform well for short video sequences since they do not contain enough information required. Spatial fingerprints– This algorithmconvertsa videoimage into YUV colour space in which the luminance (Y) component is kept and the chrominance components (U, V) are discarded. Spatial fingerprints are unique value which derived from each frame or from a key frame. Spatio-temporal fingerprints- One disadvantage of spatial fingerprints is that they are not able to capture the video’s temporal data, which is an important differentiating factor[3]. 3.2 Algorithm We have studied the following algorithms of content-based copy detection. a)TIRI-DCT Algorithm Temporally informative representative images - discrete cosine transform (TIRI-DCT) isdeveloped.TIRI-DCTisbased on temporally informative representative images which contains spatial and temporal information of a video sequence.[2] This method calculates a weighted average of the frames to generate representativeimages.Thissequence will carry the temporal as well as spatial information. The image is then divided into blocks. The first horizontal and the first vertical DCT coefficients (features) are then extracted from each block. The value of the feature from all the blocks is concatenated to form the feature vector. Each feature is then compared to a threshold(whichisthemedian value of the feature vector) and then a binary fingerprint is generated. Figure 1: Schematic of the TIRI-DCT algorithm. In order to determine whether a query video is an attacked version of a video in a database or not, it’s fingerprint is first extracted. The fingerprintdatabase(previouslycreatedfrom the videos in the video database) is then searched for the closest fingerprint to the extracted query fingerprint. b) Brightness sequence Algorithm The brightness of each frame is calculated of the video whose originality is to be found. This brightness values are compared with the values of the brightness of the original video at the same instant of time. If the brightness of both the videos is almost same, then it is said to be copied. Step 1: Video hash extraction For a video sequence X = x1,x2,x3,……xn, N is the frame number of the videos. The hash sequence corresponding to Video X is H = [f(x1),f(x2),…..f(xn)], f(x) = [a1,a2,a3….am] is the hash extracting function, M is the number of hash bits extracted from a single frame. Hash extraction algorithm is: 1: The video frame xi is divided into w* h areas 2: Calculate the average brightness of each block 3: Sort the brightness of each block 4:Now i= i +1, repeat step1, end the process until i= N. Step 2 : Video hash matching For video sequences X = x1,x2,x3,……xn, and Y = y1,y2,y3,……yn,, the hash sequencescorrespondingtovideos X and Y are Hx = [f(x1),f(x2),…..f(xn) and Hy = [f(y1),f(y2),…..f(yn) respectively, wherein f(x) = [a1,a2,a3….am] and f(y) = [b1,b2,b3….bm] .
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 86 The distance between the two video sequences is calculated ie D(X,Y).When the distance D(X,Y) =T , the two videos are regarded as the same video. T is the predetermined threshold. 4. SEARCHING TECHNIQUE 4.1 Inverted-File-Based Similarity Search Step 1: The binary unique values i.e. fingerprint are divided into n words each of same bits. Step 2: The horizontal length of the tableisusedtorepresent the word position. Step 3: The vertical length of the table is used to represent the possible values of words. Step 4: Index is added to each word of the fingerprints for entry in column corresponding to the value assigned to the word. Step 5: The calculation of hamming distance is done between the fingerprints in the database and the query fingerprints. Step 6: If the calculated distance is less than the threshold value the query video gets matched and is declared as matching. Step 7: Otherwise, it will be declared as videos notmatching. 4.2 Cluster-based similarity Search This is another algorithm for binary fingerprints. The idea behind this is to make use of clustering to decrease the number of queries thatareanalysedwithin the database. If the fingerprints are assigned to only one cluster, then the fingerprints in the database will be clustered into non-overlapping groups. To perform the same, for each cluster a centroid is chosen and named as cluster head. The cluster will be assigned a fingerprint if it is closest to this cluster’s head. The cluster head closest to the query is found to determine if the query fingerprint matchesa fingerprint in the database. The fingerprints which belong to this cluster are searched to find the match i.e., the one which has the minimum Hamming distance (of less than a certain threshold) from the query. If match is not found, then the cluster which is the next closest to the query is examined [2]. 5. ADVANTAGES a. The performance on detecting copies from large data set is satisfactory and Hadoop platform can significantly improve the efficiency of video copy detection. b. It has high fault tolerance, high throughput, easy scalability and etc. c. The measurement of copy detections performance System making result is faster than existingsystem. d. The video hashing algorithm methods has strong robustness, high distinction, high compactness and low complexity. 6. DISADVANTAGES a. In existing system the fingerprintwhichisextracted using TIRI-DCT is not robust against the content changing attacks such as changing the background of the video or replacing picture in picture and the performance of the system is low in the presence of some other attacks, such as cropping, and logo insertion. b. The security of the fingerprint can be achieved only with the fingerprints of smaller length. Larger fingerprints results in a decrease in detectionspeed as they require more computation in calculatingthe hamming distance between the fingerprints. 7. CONCLUSION In this paper, optimization of both the techniques i.e. TIRI- DCT and Brightness Sequence Algorithm, their correctness, speed and efficiency are analysed. The efficiency of Hadoop platform is also focused which has high processing speed and is optimum for storing and retrieval of data. REFERENCES [1] Jing Li, XuquanLian, Qiang Wu and Jiande Sun “Realtime Video Copy Detection Based on Hadoop,” Sixth International Conference on Information Science and Technology Dalian, China; May 6-8, 2016. [2] Vaishali V. Sarbhukan, Prof. V.B.Gaikwad ,“Video FingerprintingExtraction Using TIRI-DCT” , International Journal of Engineering Researchand Development 2013 [3] AbrumJeysudha,SamitShivadekar, “Real Time Video Copy Detection usingHadoop”,International Journal of Computer Application 2017. [4] J. Law-To, L. Chen, A. Joly, I. Laptev, O. Buisson, V. Gouet- Brunet, N. Boujemaa, and F. Stentiford, Video copy detection: A comparative study, in Proc. Conf. Image Video Retrieval (CIVR), 2007.
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 87 [5] Jian Lu, “Video fingerprinting for copy identification: from research to industry applications”, Proceedings of SPIE - Media Forensics and Security XI, Vol. 7254, January 2009. [6] Ms. Laxmi Gupta, Prof. M.B Limkar, Prof. Sanjay. M Hundiwale, “Search Methods for Fast Matching of Video Fingerprints within a Large Database”,by SSRG International Journal of ElectronicsandCommunication Engineering (SSRG‐IJECE) – volume1 issue 3 May 2014
Download now