SlideShare a Scribd company logo
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 489 
VIDEO COPY DETECTION USING SEGMENTATION METHOD AND MPEG-7 DESCRIPTORS Girija K1, Sabarinathan P2, Saravanan D3, Uma M4 1PG scholar, Department of Computer Science and Engineering, Pavendar Bharathidasan college of Engg. and Tech., Trichy, Tamilnadu, India 2Assistant Professor, Department of Computer Science and Engineering, Pavendar Bharathidasan college of Engg. and Tech., Trichy, Tamilnadu, India 3Associate Professor, Department of Computer Science and Engineering, Pavendar Bharathidasan college of Engg. and Tech., Trichy, Tamilnadu, India 4Assistant Professor Department of Computer Science and Engineering, Pavendar Bharathidasan college of Engg. and Tech., Trichy, Tamilnadu, India Abstract There are a number of methods available for video copy detection. Some of the methods were employing the application of local and global descriptors which were found to be ineffective in detections involving complex transformations. In order to overcome the above specified inefficiency, Scale Invariant Feature Transform (SIFT) descriptor came into picture but was found to have a high computational cost. The method proposed in this paper involving five different types of MPEG-7 descriptors namely Color and Edge Directivity Descriptor (CEDD), Fuzzy Color and Texture Histogram (FCTH), Scalable Color Descriptor (SCD), Edge Histogram Descriptor (EHD), Color Layout Descriptor (CLD) for extracting the features of the frames in the selected video is found to be cost effective and efficient even in case of high level of transformations. This paper also throws light on certain improvements in graph- based video sequence matching method which is used to overcome the level of noise, to detect videos with different frame rates and optimal sequence matching is found automatically from the disordered video sequences by applying spatial features during copy detection. Experimental results have showed that the proposed method is far effective than the previously existing video detection scenarios. Keywords: Video copy detection, graph, SIFT feature, SVD, CEDD, FCTH, SCD, EHD, CLD descriptor, 
-----------------------------------------------------------------------***-------------------------------------------------------------------- 1. INTRODUCTION Now-a-days, server space is becoming a major issue for high level organizations to maintain enormous amount of data. For instance, organizations like YouTube, Google, Metacafe and others dealing with enormous video storage are found to have acres of racks consisting of hard disks each could be holding a capacity of around 1 to 2TB. But we are aware of the fact that most of the videos available in these video storage websites are redundant. According to the recent statistics [14], there are about 27 percent of redundant videos in You Tube, Google videos. Redundant videos are of two types: Copy videos and near duplicate videos. 
A copy can be defined as a segment of video derived from another video, usually undergone a lot of transformations, such as Cam-cording, PiP (Picture in Picture), Insertions of patterns such as captions, subtitles, logo; Strong re-encoding; Change of gamma; Decrease in quality: Blur, frame dropping, compression, ratio and white noise, Post production is shown in TABLE 1. All of the above specified transformations can be done to a specific original video or else some of these transformations can also be done based on the needs of the one who is implementing these transformations. Both of these above specified cases are considered to be a copy of the original version of that respective video which is available in the dataset maintained by us. Near duplicate videos are the ones representing the same sequence of actions or an event which are recorded by two different cameras from different position or angle. Even though these two videos are representing the same sequence of actions, they are not considered to be copies since they are not edited from an existing original video recorded by someone else. So this paper is not concerned about detecting near duplicate videos. 
The ultimate goal of video copy detection is to decide whether a video query is copied from a video available in the video dataset. A copy could have undergone various transformations specified earlier. If the system finds the sequence matching results to be the same in the client and server side, the system would prompt with a message saying that the video input of
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 490 
the user is a copied one whose original video is already available in the server. The framework of video copy detection is done as two parts: 
(1) Client side: Key frames are extracted from the reference video dataset and features are extracted from those key frames. The features extracted should not be vulnerable to video transformation. The features can be stored in a feature database to make similarity comparison effective. 
(2) Server side: Query videos are verified. Features are extracted from the videos and are compared with the features which are already stored in the database. The sequence matching results are returned along with the detection results [5]. 
Based on the study, the transformations involving picture in picture is complicated to be detected [9], [10]. And for detecting such video copies, local feature of SIFT is found to be normally valid. However, matching which is done based on the local features in certain cases involving two videos seems to have a high level of computational complexity. Methods to detect picture in picture and proposing graph-based sequence matching method are focused here. Table 1 Various Types of Transformations 
2. RELATED WORK 
Video copy detection was a problem being handled over a long period of time particularly when the videos are heavily transformed. A lot of research has been done in this area. There was no shot boundary detection algorithm available specialized for Content Based Copy Detection termed as CBCD. So Onur Kucuktunc, Ugur Gudukbay and Ozgur U have proposed an automatic shot boundary detection algorithm meant for videos with heavy transformations applied which is based on Fuzzy color histogram [11]. This method is efficient in the way that we would consider not only the values of perfect true and perfect false but also the values of partial true and false. Apart from this, other problems were copyright violations and image forgery. Although digital watermarking was available to save the day, it was very difficult to design and so Yan Ke, Rahul Sukthankar and Larry H have proposed a copy detection technique using scale and rotation invariant interest point detectors [15]. The efficiency of this method lies in the efficient layout of data on disk. Other issues include representing video shots with the help of histograms which does not represent the spatial information about the pixels and so K. Sze, K. Lam, and G. Qiu have proposed an optimal representation of video shots representing both spatial and global information based on probability [12]. This method has a greater computational complexity compared to alpha trimmed average histogram method. Video similarity detection using visual similarities of video clips is another issue to be dealt with since watermarking is fragile to visual transformations such as cam- coding. Onur Kucuktunc, Muhammet Bastan, Ugur Gudukbay and Ozgur U have proposed an video copy detection framework consisting of three methods namely facial shot matching along with activity subsequence matching and non- facial shot matching [10]. This method is in need of greater potential to detect copies among videos undergone cam- coding or PiP (Picture in Picture) kind of transformations. A video sequence identification method to find a similar content to a short query clip from a long video sequence was required and so Heng Tao Shen, Jie Shao, Zi Huang and Xiao fang Z have proposed an approach based on graph transformation and matching which can even identify different ordering of frames and content editing. A novel batch query algorithm was also been proposed to retrieve similar frames. The merit of this method is that there is no need of pre- segmentation of videos as we frame sub-sampling to identify ambiguous shot boundaries [4]. 3. THE PROBLEM 
Watermarking is one of the classical techniques handled down for a long time for the purpose of representing the ownership of a particular video by means of inserting the logo or any other digital signature of the owner [1]. This information can be either visible to human eye or even can be hidden. This
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 491 
seems to be a better way for representing the ownership but it is vulnerable to the slightest changes. For instance, this watermarking information can be removed easily by anyone by making any small transformation to the watermarked video which includes re-encoding and change of bit rate. It is important to note that watermarking is not destined to retrieve a query video clip. To overcome this demerit, CBCD (Content Based Copy Detection) came into existence. Methods which are employing the use of global descriptors were found to take the low level features into account always for the purpose of video copy detection. But this technique is found to work well only for those videos which have undergone some small amount of transformations. In order to overcome the demerits of global descriptor, local descriptor were employed for video copy detection which makes use of the local spatiotemporal features and then making use of the features around the local features which helps them to be effective even in the case of high level transformations [3]. One of the efficient local descriptor that came into existence was SIFT. In existing system, SIFT descriptor [6] seems to have a good stability to describe video characteristics. The SIFT descriptor (Local Descriptor) is found to give a better performance in identifying the objects is shown in Fig 1. 
Fig-1: The Matching Result Using SIFT 
The methods based on local descriptors on points, lines and also shape found to play an important role in video copy detection. Of the above mentioned properties, spatiotemporal interest points are found to play a vital role in classifying human actions and to detect periodic motions it has a good tolerance to scale changes, illumination variations and image rotations and also it has a greater strength against affine distortion and additive noise. Performance of methods based on local descriptor is found to be far better than the methods based on global descriptor in terms of logo insertion, shifting or cropping. In spite of the above specified merits, high computational cost is found to be highest demerit. 
4. CONTRIBUTION In order to increase the efficiency of video copy detection and make it more effective, we have employed the use of five MPEG7 type descriptors such as CEDD, FCTH, SCD, EHD, CLD descriptors are used to extract the feature for Sequence Matching and also used to reduce the computational complexity. They describe elementary characters such as shape, color, texture or motion among others. 4.1 CEDD – Color & Edge Directivity Descriptor Low computational power for extraction compared to others. It incorporates color and texture information in histogram. CEDD low level features that are extracted from the images can be used for indexing and also for retrieval. 4.2 FCTH – Fuzzy Color & Texture Histogram FCTH is used for extraction of features that combines color and texture information in one histogram. This feature is appropriate for accurately retrieving images even in case of distortion such as deformation. 4.3 SCD –Scalable Color Descriptor SCD derived from a color histogram defined in a Hue Saturation value color space with fixed color space quantization. 4.4 EHD – Edge Histogram Descriptor EHD use global, semi-global, local histogram generated from local histogram bins to increase performance. MPEG-7 is used for the case of video or still images containing texture, color, shape and motion. 4.5 CLD – Color Layout Descriptor CLD is designed to capture spatial distribution of color in image. It is used to describe color relation between sequence and group of images. 4.6 Graph-Based Method Graph method can find the longest path in the frame matching-result graph considering time constraint 
 It can automatically remove the noise caused by visual feature matching. 
 It is adaptive to video frame rate change.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 492 
It can find the optimal sequence matching result automatically. The above specified five types of descriptors are used to extract exact individual features from the frames which are more accurate for comparison of the results. In addition to that graph based method is used to make this method an optimal one for video copy detection. 5. SYSTEM DESIGN The system design involves the different steps involved in the proposed video copy detection method. The entire process is summarized in the Figure 2 which gives a clear cut idea about the proposed method. 5.1 Client Side: It is important to note that the client side and offline process are one and the same which can be represented in any of the descriptions. The procedure followed at the client side involves getting the user input in the form of video. First step would be extracting the key frames from the user given input video. The different features are extracted from the extracted key frames using the different type of descriptors and are stored into the reference database. 5.2 Server Side As specified above, server side is similar to that of online process which can be said in either ways. The process done at the server side is similar to that of the process done at the client side which is the following. Frames are extracted from all the videos available in the server side and the features are already extracted using the proposed five types of descriptors and are stored individually in the server side database for future reference. It is to be noted that each time when the user is uploading a new video into the server, key frames are extracted along with the features and are updated into the database maintained by the server. 5.3 Process When both of the process is done, the next step would be to pick a random key frame from the reference database in the client side and compare it with all the extracted key frames in the client side reference database. Once the comparison is done, the descriptors would individually return the respective similarity matching results with the mathematical values representing the level of similarity such as the exact matches would be indicated with a 0. 
The half matched or unmatched frames are represented with other non-zero values based on their level of matching. The same random frame from the client side is then compared with each and every key frame of all the videos available in the server side dataset and the similarity matching results are returned for each and every comparison. When comparing the similarity results between the client and server side, we can come to a conclusion whether the user input video is already available within the server space or not. This is based on the scenario that similar frames would be having value to be zero and the unmatched frames would be having the non-zero values as specified earlier. Based on the results, system would prompt a message to the user saying “video already exists” in the case of a copied video or “video inserted successfully” in case of a new video. The server also provides additional information such as the timestamp when the video was uploaded, date and whether the upload was a success or a failure and the number of attempts made by a respective user with a copied video since the server supports only the users who were registered with the server. 
Fig-2: System Architecture Showing Client and Server Side 6. SYSTEM IMPLEMENTATION The above specified concepts are implemented in various steps which are described as follows: 6.1 Splitting of Video In order to analyze the video given as input by the user, the different desired properties of the video is found out such as color, size and quality. The input video should have high quality and brightness to achieve better results. Key frame extraction is done at this stage. 6.2 Performance of ROI After key frame extraction is done, the main object features are extracted from the key frames by using ROI (Region Of Interest) and these extracted information is made used to detect the copied videos is shown in Figure 3.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 493 
Fig-3: ROI for Extracting Main Object 6.3 RGB Color Histogram This module can used to find out various RGB properties of the frames such as mean, standard deviation, level, count at different scenarios by applying changes to the image using different types of filters such as HSL color contrast to increase the image brightness, Edge detectors, morphology, binarization and lot more. A histogram is shown in Fig 4. 6.4 Sequence Matching The extracted key frames are stored in the database and the random frame is chosen here to be compared with all the other frames in the dataset which is done effectively with the help of CEDD, FCTH, SCD, EHD, CLD descriptors is shown in Figure 5. 6.5 Similarity Matching Detection The random frame from the user input is matched with all the frames available in the server for each and every video available in the server and based on the similarity matching results, server can allow the user to upload the video if it is an original one (i.e. it is not available in the server) whereas it would not allow the user to proceed with the upload if the video is a copied one. 
Fig-4: Finding RGB Color Histogram for an Image By Applying Filters 
Fig-5: Identifying Sequence Matching Using FCTH Descriptors 7. RESULTS AND DISCUSSIONS The results of the compared videos are formulated in the form of graph with the help of the proposed graph based method. Results show that it is very easy to compare the results in the form of graph which shows the values formulated as a result of the comparison done between the randomly chosen frames along with each and every individual frame in the dataset. The graph also gives a clear comparative study between the values computed by all the five different type of descriptors. TABLE 2 shows the similarity matching result of video A done by five different type of descriptors which is represented in the form of graph in Figure 6 whereas TABLE 3 shows the similarity matching result computed for video B by the descriptors which is graphically represented in Figure 7. Table 2 Similarity Matching Result of Video A 
Table 3 Similarity Matching Result of Video B
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 494 
Fig-6: Graph-Based Method Representing TABLE 2 
Fig-7: Graph-Based Method Representing TABLE 3 On comparing the two graphs, we can come to a conclusion that the values computed by the descriptors are entirely different so that both the videos are not the same or we can say that video A is not a copy of video B. Analyzing the above results, the server would allow the user to upload video A into the server as it is not available within the server space. 8. CONCLUSIONS 
Video copies are analyzed and the features are used for copy detection. Based on the analysis, local feature of SIFT was used for describing video frames. Since large number of SIFT points are extracted from a video, the copy detection involving SIFT features has high computational cost. And so the new descriptors have been introduced: EHD, CLD, SCD, CEDD, and FCTH. 
Edge Histogram Descriptor (EHD) captures the edge spatial distribution around the image in five orientations: horizontal, vertical, 45° degrees, 135° degrees and non-directional. Color Layout Descriptor (CLD) is used for capturing the spatial distribution of color in an image. Scalable Color Descriptor (SCD) can obtain good performance in case of retrieval accuracy and fast matching of the image. Color and Edge Directivity Descriptor (CEDD) captures and relates shape, texture and color from an image. Fuzzy Color and Texture Histogram (FCTH) aims at capturing the image texture, shape and color. By using these descriptors, the computational cost will be decreased and it can be used for obtaining the effectiveness in key frame feature extraction. Experimental results prove that the proposed method is found to have an optimal tradeoff between the effectiveness and efficiency of video copy detection. 9. REFERENCES [1]. Arun Hampapur, Ki-Ho Hyun and Ruud B. (2002) “Comparison of Sequence Matching Techniques for Video Copy Detection,” Proc. SPIE, Storage and Retrieval for Media Databases, vol. 4676, pp. 194-201. [2]. Delponte E., Isgro F., Odone F. and Verri A. (2006) “SVD-Matching Using Sift Features,” Graphical Models, vol. 68, no. 5, pp. 415-431. [3]. Geert Willems, Tinne Tuytelaars and Luc Van G. (2008) “Spatio-Temporal Features for Robust Content-Based Video Copy Detection,” Proc. ACM Int’1 Conf. Multimedia Information Retrieval (MIR), pp. 283-290. [4]. Heng Tao Shen, Jie Shao, Zi Huang and Xiao fang Z. (2009) “Effective and Efficient Query Processing for Video Subsequence identification,” IEEE Trans. Knowledge and Data Eng., vol. 21, no. 3. [5]. Hong Liu, Hong Lu and Xiangyang Xue (2013) “A Segmentation and Graph-Based Video Sequence Matching Method for Video Copy Detection,” IEEE Transaction on Knowledge and Data Engineering, vol. 25. [6]. Hong Liu, Hong Lu and Xiang yang X. (2010) “SVD- SIFT for Web near duplicate image detection,” Proc. IEEE Int”1 Conf. Image Processing (ICIP ’10), pp. 1445-1448. [7]. Julien Law-To, Li Chen and Alexis J. (2007) “Video Copy Detection: a Comparative Study,” Proc. ACM Int’1 Conf. Retrieval, pp. 371-378. [8]. Li Chenal and Stentifordb. F.W.M. (2008) “Video Sequence Matching based on Temporal Ordinal Measurement,” Pattern Recognition Letters, vol. 29, no.13, pp. 1824-1831. 
[9]. Mattijs Douze, Herve Jegou and Cordelia S. (2010) “An Image-Based Approach to Video Copy Detection with Spatio-
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 495 
Temporal Post-Filtering,” IEEE Trans. Multimedia, vol. 12, no. 4, pp. 257-266. 
[10]. Onur Kucuktunc, Muhammet Bastan, Ugur Gudukbay and Ozgur U. (2010) “Video Copy Detection using multiple visual cues and MPEG-7 descriptors,” J. Visual Comm. Image Representation. [11]. Onur Kucuktunc, Ugur Gudukbay and Ozgur U. (2010) “Fuzzy Color Histogram-Based Video Segmentation,” Computer Vision and Image Understanding, vol. 114, no. 1,pp. 125-134. 
[12]. Sze K., Lam K., and Qiu G. (Sept. 2005) “A New Key Frame Representation for Video Segment Retrieval,” IEEE Trans. Circuits and Systems VideoTechnology, vol. 15, no. 9, pp. 1148-1155. [13]. Thomas S. (2001) “The MPEG-7 Visual Standard for Content Description – An Overview,” IEEE Transactions on circuits and systems for video technology, vol. 11, no. 6. [14]. Xiao Wu, Chong- Wah N., Alexander G.H. and Hung- Khoon T.(2009) “Real-Time Near-Duplicate Elimination for Web Video Search with Content and Context,” IEEE Trans. Multimedia, vol. 11, no. 2, pp. 196-207. [15]. Yan Ke, Rahul Sukthankar and Larry H. (2004) “Efficient Near Duplicate Detection and Sub image Retrieval,” Pro Ann. ACM Int’1 Conf. Multimedia pp. 860- 876. [16]. Yuan J., Duan L.Y., Tian Q., Ranganath S. and Xu C. (2004) “Fast and Robust Short Video Clip Search for Copy Detection,” Proc. Pacific Rim Conf. Multimedia. [17]. Zi Huang, Jie Shao and Xiaofang Z. (2007) “UQLIPS: A Real-time Near-Duplicate Video Clip Detection System,” Proc. 33rd Int’1 Conf. Very Large Data Bases (VLDB), pp. 1374-1377. BIOGRAPHIES 
Ms. Girija K received the B.E degree in Computer Science and Engineering from SKP Engineering College, Tiruvannamalai in 2012. She is currently doing the M.E in the same stream in Pavendar Bharathidasan College of Engineering and Technology, Mathur, Tiruchirappalli. 
Mr. Sabarinathan P received the B.E degree in Computer Science and Engineering from Annai Mathammal Sheela Engineering College, Namakkal in 2007 and received the M.E degree in the same stream in 2010 from Dhanalakshmi Srinivasan Engineering College, Perambalur. He is currently working as an Assistant Professor in Pavendar Bharathidasan College of Engineering and Technology, Tiruchirappalli and his area of interest includes MANET and networks. 
Mr. Saravanan D received the B.E degree in Electrical and Electronics Engineering from Maharaja Engineering College, Tiruppur in 2000 and received the M.E degree in Computer Science and Engineering from Annamalai University, Chidambaram in 2005. He is currently doing his Ph.d in the area of MANET and also working as an Associate Professor in Pavendar Bharathidasan College of Engineering and Technology, Tiruchirappalli with 11 years of teaching experience and his area of interest include MANET. 
Mrs. Uma M received the B.Tech degree in Computer Science and Engineering from VIT University, Vellore in 2003 and received the M.E degree in Computer Science and Engineering from Pavendar Bharathidasan College of Engineering and Technology, Tiruchirappalli in 2006. She is currently doing her Ph.d in the area of MANET and also working as an Assistant Professor in Pavendar Bharathidasan College of Engineering and Technology, Tiruchirappalli with 8 years of teaching experience and her area of interest include MANET.

More Related Content

What's hot

International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...
PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...
PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...
IJCSEIT Journal
 
A04840107
A04840107A04840107
A04840107
IOSR-JEN
 
Secured Video Watermarking Based On DWT
Secured Video Watermarking Based On DWTSecured Video Watermarking Based On DWT
Secured Video Watermarking Based On DWT
Editor IJMTER
 
Robust Video Watermarking Scheme Based on Intra-Coding Process in MPEG-2 Style
Robust Video Watermarking Scheme Based on Intra-Coding Process in MPEG-2 Style Robust Video Watermarking Scheme Based on Intra-Coding Process in MPEG-2 Style
Robust Video Watermarking Scheme Based on Intra-Coding Process in MPEG-2 Style
IJECEIAES
 
50120140506015
5012014050601550120140506015
50120140506015
IAEME Publication
 
IRJET- Framework for Image Forgery Detection
IRJET-  	  Framework for Image Forgery DetectionIRJET-  	  Framework for Image Forgery Detection
IRJET- Framework for Image Forgery Detection
IRJET Journal
 
Chris Varekamp (Philips Group Innovation, Research): Depth estimation, Proces...
Chris Varekamp (Philips Group Innovation, Research): Depth estimation, Proces...Chris Varekamp (Philips Group Innovation, Research): Depth estimation, Proces...
Chris Varekamp (Philips Group Innovation, Research): Depth estimation, Proces...
AugmentedWorldExpo
 
Semantic Concept Detection in Video Using Hybrid Model of CNN and SVM Classif...
Semantic Concept Detection in Video Using Hybrid Model of CNN and SVM Classif...Semantic Concept Detection in Video Using Hybrid Model of CNN and SVM Classif...
Semantic Concept Detection in Video Using Hybrid Model of CNN and SVM Classif...
CSCJournals
 
Real-Time Video Copy Detection in Big Data
Real-Time Video Copy Detection in Big DataReal-Time Video Copy Detection in Big Data
Real-Time Video Copy Detection in Big Data
IRJET Journal
 
Ac02417471753
Ac02417471753Ac02417471753
Ac02417471753IJMER
 
Ls3520052009
Ls3520052009Ls3520052009
Ls3520052009
IJERA Editor
 
IRJET- Human Fall Detection using Co-Saliency-Enhanced Deep Recurrent Convolu...
IRJET- Human Fall Detection using Co-Saliency-Enhanced Deep Recurrent Convolu...IRJET- Human Fall Detection using Co-Saliency-Enhanced Deep Recurrent Convolu...
IRJET- Human Fall Detection using Co-Saliency-Enhanced Deep Recurrent Convolu...
IRJET Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
A Survey on Deblur The License Plate Image from Fast Moving Vehicles Using Sp...
A Survey on Deblur The License Plate Image from Fast Moving Vehicles Using Sp...A Survey on Deblur The License Plate Image from Fast Moving Vehicles Using Sp...
A Survey on Deblur The License Plate Image from Fast Moving Vehicles Using Sp...
IRJET Journal
 
Ieee projects 2012 2013 - bio medicine
Ieee projects 2012 2013 - bio medicineIeee projects 2012 2013 - bio medicine
Ieee projects 2012 2013 - bio medicine
K Sundaresh Ka
 
IRJET- A Hybrid Image and Video Compression of DCT and DWT Techniques for H.2...
IRJET- A Hybrid Image and Video Compression of DCT and DWT Techniques for H.2...IRJET- A Hybrid Image and Video Compression of DCT and DWT Techniques for H.2...
IRJET- A Hybrid Image and Video Compression of DCT and DWT Techniques for H.2...
IRJET Journal
 
Development of a Location Invariant Crack Detection and Localisation Model (L...
Development of a Location Invariant Crack Detection and Localisation Model (L...Development of a Location Invariant Crack Detection and Localisation Model (L...
Development of a Location Invariant Crack Detection and Localisation Model (L...
CSCJournals
 

What's hot (19)

International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...
PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...
PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...
 
A04840107
A04840107A04840107
A04840107
 
Secured Video Watermarking Based On DWT
Secured Video Watermarking Based On DWTSecured Video Watermarking Based On DWT
Secured Video Watermarking Based On DWT
 
Robust Video Watermarking Scheme Based on Intra-Coding Process in MPEG-2 Style
Robust Video Watermarking Scheme Based on Intra-Coding Process in MPEG-2 Style Robust Video Watermarking Scheme Based on Intra-Coding Process in MPEG-2 Style
Robust Video Watermarking Scheme Based on Intra-Coding Process in MPEG-2 Style
 
50120140506015
5012014050601550120140506015
50120140506015
 
IRJET- Framework for Image Forgery Detection
IRJET-  	  Framework for Image Forgery DetectionIRJET-  	  Framework for Image Forgery Detection
IRJET- Framework for Image Forgery Detection
 
Chris Varekamp (Philips Group Innovation, Research): Depth estimation, Proces...
Chris Varekamp (Philips Group Innovation, Research): Depth estimation, Proces...Chris Varekamp (Philips Group Innovation, Research): Depth estimation, Proces...
Chris Varekamp (Philips Group Innovation, Research): Depth estimation, Proces...
 
Semantic Concept Detection in Video Using Hybrid Model of CNN and SVM Classif...
Semantic Concept Detection in Video Using Hybrid Model of CNN and SVM Classif...Semantic Concept Detection in Video Using Hybrid Model of CNN and SVM Classif...
Semantic Concept Detection in Video Using Hybrid Model of CNN and SVM Classif...
 
AcademicProject
AcademicProjectAcademicProject
AcademicProject
 
Real-Time Video Copy Detection in Big Data
Real-Time Video Copy Detection in Big DataReal-Time Video Copy Detection in Big Data
Real-Time Video Copy Detection in Big Data
 
Ac02417471753
Ac02417471753Ac02417471753
Ac02417471753
 
Ls3520052009
Ls3520052009Ls3520052009
Ls3520052009
 
IRJET- Human Fall Detection using Co-Saliency-Enhanced Deep Recurrent Convolu...
IRJET- Human Fall Detection using Co-Saliency-Enhanced Deep Recurrent Convolu...IRJET- Human Fall Detection using Co-Saliency-Enhanced Deep Recurrent Convolu...
IRJET- Human Fall Detection using Co-Saliency-Enhanced Deep Recurrent Convolu...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
A Survey on Deblur The License Plate Image from Fast Moving Vehicles Using Sp...
A Survey on Deblur The License Plate Image from Fast Moving Vehicles Using Sp...A Survey on Deblur The License Plate Image from Fast Moving Vehicles Using Sp...
A Survey on Deblur The License Plate Image from Fast Moving Vehicles Using Sp...
 
Ieee projects 2012 2013 - bio medicine
Ieee projects 2012 2013 - bio medicineIeee projects 2012 2013 - bio medicine
Ieee projects 2012 2013 - bio medicine
 
IRJET- A Hybrid Image and Video Compression of DCT and DWT Techniques for H.2...
IRJET- A Hybrid Image and Video Compression of DCT and DWT Techniques for H.2...IRJET- A Hybrid Image and Video Compression of DCT and DWT Techniques for H.2...
IRJET- A Hybrid Image and Video Compression of DCT and DWT Techniques for H.2...
 
Development of a Location Invariant Crack Detection and Localisation Model (L...
Development of a Location Invariant Crack Detection and Localisation Model (L...Development of a Location Invariant Crack Detection and Localisation Model (L...
Development of a Location Invariant Crack Detection and Localisation Model (L...
 

Viewers also liked

Analysis and mitigation of unbalance due to load in
Analysis and mitigation of unbalance due to load inAnalysis and mitigation of unbalance due to load in
Analysis and mitigation of unbalance due to load in
eSAT Publishing House
 
A simulation study of wi max based communication system using deliberately cl...
A simulation study of wi max based communication system using deliberately cl...A simulation study of wi max based communication system using deliberately cl...
A simulation study of wi max based communication system using deliberately cl...
eSAT Publishing House
 
Multisensor data fusion based autonomous mobile
Multisensor data fusion based autonomous mobileMultisensor data fusion based autonomous mobile
Multisensor data fusion based autonomous mobile
eSAT Publishing House
 
Microstructural and electrical study of
Microstructural and electrical study ofMicrostructural and electrical study of
Microstructural and electrical study of
eSAT Publishing House
 
Passive control of structures using sliding isolators at intermediate floor l...
Passive control of structures using sliding isolators at intermediate floor l...Passive control of structures using sliding isolators at intermediate floor l...
Passive control of structures using sliding isolators at intermediate floor l...
eSAT Publishing House
 
Survey on clustering based color image segmentation
Survey on clustering based color image segmentationSurvey on clustering based color image segmentation
Survey on clustering based color image segmentation
eSAT Publishing House
 
Life cycle assessment and simulation enablers of sustainable product design
Life cycle assessment and simulation enablers of sustainable product designLife cycle assessment and simulation enablers of sustainable product design
Life cycle assessment and simulation enablers of sustainable product design
eSAT Publishing House
 
Technical engineering in industrial ippc as a key tool for ambient air qualit...
Technical engineering in industrial ippc as a key tool for ambient air qualit...Technical engineering in industrial ippc as a key tool for ambient air qualit...
Technical engineering in industrial ippc as a key tool for ambient air qualit...
eSAT Publishing House
 
Survey on sensor protocol for information via negotiation (spin) protocol
Survey on sensor protocol for information via negotiation (spin) protocolSurvey on sensor protocol for information via negotiation (spin) protocol
Survey on sensor protocol for information via negotiation (spin) protocol
eSAT Publishing House
 
The effect of watercement ratio on the sulfate
The effect of watercement ratio on the sulfateThe effect of watercement ratio on the sulfate
The effect of watercement ratio on the sulfate
eSAT Publishing House
 
Investigations on the performance of diesel in an air
Investigations on the performance of diesel in an airInvestigations on the performance of diesel in an air
Investigations on the performance of diesel in an air
eSAT Publishing House
 
Experimental study on bending behaviour of triangular
Experimental study on bending behaviour of triangularExperimental study on bending behaviour of triangular
Experimental study on bending behaviour of triangular
eSAT Publishing House
 
Design of a wind power generation system using a
Design of a wind power generation system using aDesign of a wind power generation system using a
Design of a wind power generation system using a
eSAT Publishing House
 
Study and comparative analysis of resonat frequency for microsrtip fractal an...
Study and comparative analysis of resonat frequency for microsrtip fractal an...Study and comparative analysis of resonat frequency for microsrtip fractal an...
Study and comparative analysis of resonat frequency for microsrtip fractal an...
eSAT Publishing House
 
Intelligent pollution monitoring using wireless
Intelligent pollution monitoring using wirelessIntelligent pollution monitoring using wireless
Intelligent pollution monitoring using wireless
eSAT Publishing House
 
Testing the flexural fatigue behavior of e glass epoxy laminates
Testing the flexural fatigue behavior of e glass epoxy laminatesTesting the flexural fatigue behavior of e glass epoxy laminates
Testing the flexural fatigue behavior of e glass epoxy laminates
eSAT Publishing House
 
Phytotoxicity analysis of various plants using industrial sludge
Phytotoxicity analysis of various plants using industrial sludgePhytotoxicity analysis of various plants using industrial sludge
Phytotoxicity analysis of various plants using industrial sludge
eSAT Publishing House
 
Near equatorial orbit small sar constellation for developing nations
Near equatorial orbit small sar constellation for developing nationsNear equatorial orbit small sar constellation for developing nations
Near equatorial orbit small sar constellation for developing nations
eSAT Publishing House
 
A review on energy efficient clustering routing
A review on energy efficient clustering routingA review on energy efficient clustering routing
A review on energy efficient clustering routing
eSAT Publishing House
 
Studies and mechanical tries regarding the cutting
Studies and mechanical tries regarding the cuttingStudies and mechanical tries regarding the cutting
Studies and mechanical tries regarding the cutting
eSAT Publishing House
 

Viewers also liked (20)

Analysis and mitigation of unbalance due to load in
Analysis and mitigation of unbalance due to load inAnalysis and mitigation of unbalance due to load in
Analysis and mitigation of unbalance due to load in
 
A simulation study of wi max based communication system using deliberately cl...
A simulation study of wi max based communication system using deliberately cl...A simulation study of wi max based communication system using deliberately cl...
A simulation study of wi max based communication system using deliberately cl...
 
Multisensor data fusion based autonomous mobile
Multisensor data fusion based autonomous mobileMultisensor data fusion based autonomous mobile
Multisensor data fusion based autonomous mobile
 
Microstructural and electrical study of
Microstructural and electrical study ofMicrostructural and electrical study of
Microstructural and electrical study of
 
Passive control of structures using sliding isolators at intermediate floor l...
Passive control of structures using sliding isolators at intermediate floor l...Passive control of structures using sliding isolators at intermediate floor l...
Passive control of structures using sliding isolators at intermediate floor l...
 
Survey on clustering based color image segmentation
Survey on clustering based color image segmentationSurvey on clustering based color image segmentation
Survey on clustering based color image segmentation
 
Life cycle assessment and simulation enablers of sustainable product design
Life cycle assessment and simulation enablers of sustainable product designLife cycle assessment and simulation enablers of sustainable product design
Life cycle assessment and simulation enablers of sustainable product design
 
Technical engineering in industrial ippc as a key tool for ambient air qualit...
Technical engineering in industrial ippc as a key tool for ambient air qualit...Technical engineering in industrial ippc as a key tool for ambient air qualit...
Technical engineering in industrial ippc as a key tool for ambient air qualit...
 
Survey on sensor protocol for information via negotiation (spin) protocol
Survey on sensor protocol for information via negotiation (spin) protocolSurvey on sensor protocol for information via negotiation (spin) protocol
Survey on sensor protocol for information via negotiation (spin) protocol
 
The effect of watercement ratio on the sulfate
The effect of watercement ratio on the sulfateThe effect of watercement ratio on the sulfate
The effect of watercement ratio on the sulfate
 
Investigations on the performance of diesel in an air
Investigations on the performance of diesel in an airInvestigations on the performance of diesel in an air
Investigations on the performance of diesel in an air
 
Experimental study on bending behaviour of triangular
Experimental study on bending behaviour of triangularExperimental study on bending behaviour of triangular
Experimental study on bending behaviour of triangular
 
Design of a wind power generation system using a
Design of a wind power generation system using aDesign of a wind power generation system using a
Design of a wind power generation system using a
 
Study and comparative analysis of resonat frequency for microsrtip fractal an...
Study and comparative analysis of resonat frequency for microsrtip fractal an...Study and comparative analysis of resonat frequency for microsrtip fractal an...
Study and comparative analysis of resonat frequency for microsrtip fractal an...
 
Intelligent pollution monitoring using wireless
Intelligent pollution monitoring using wirelessIntelligent pollution monitoring using wireless
Intelligent pollution monitoring using wireless
 
Testing the flexural fatigue behavior of e glass epoxy laminates
Testing the flexural fatigue behavior of e glass epoxy laminatesTesting the flexural fatigue behavior of e glass epoxy laminates
Testing the flexural fatigue behavior of e glass epoxy laminates
 
Phytotoxicity analysis of various plants using industrial sludge
Phytotoxicity analysis of various plants using industrial sludgePhytotoxicity analysis of various plants using industrial sludge
Phytotoxicity analysis of various plants using industrial sludge
 
Near equatorial orbit small sar constellation for developing nations
Near equatorial orbit small sar constellation for developing nationsNear equatorial orbit small sar constellation for developing nations
Near equatorial orbit small sar constellation for developing nations
 
A review on energy efficient clustering routing
A review on energy efficient clustering routingA review on energy efficient clustering routing
A review on energy efficient clustering routing
 
Studies and mechanical tries regarding the cutting
Studies and mechanical tries regarding the cuttingStudies and mechanical tries regarding the cutting
Studies and mechanical tries regarding the cutting
 

Similar to Video copy detection using segmentation method and

Parking Surveillance Footage Summarization
Parking Surveillance Footage SummarizationParking Surveillance Footage Summarization
Parking Surveillance Footage Summarization
IRJET Journal
 
IRJET - Applications of Image and Video Deduplication: A Survey
IRJET -  	  Applications of Image and Video Deduplication: A SurveyIRJET -  	  Applications of Image and Video Deduplication: A Survey
IRJET - Applications of Image and Video Deduplication: A Survey
IRJET Journal
 
Efficient and Robust Detection of Duplicate Videos in a Database
Efficient and Robust Detection of Duplicate Videos in a DatabaseEfficient and Robust Detection of Duplicate Videos in a Database
Efficient and Robust Detection of Duplicate Videos in a Database
rahulmonikasharma
 
Efficient and Robust Detection of Duplicate Videos in a Database
Efficient and Robust Detection of Duplicate Videos in a DatabaseEfficient and Robust Detection of Duplicate Videos in a Database
Efficient and Robust Detection of Duplicate Videos in a Database
rahulmonikasharma
 
Video inpainting using backgroung registration
Video inpainting using backgroung registrationVideo inpainting using backgroung registration
Video inpainting using backgroung registration
eSAT Publishing House
 
Secure IoT Systems Monitor Framework using Probabilistic Image Encryption
Secure IoT Systems Monitor Framework using Probabilistic Image EncryptionSecure IoT Systems Monitor Framework using Probabilistic Image Encryption
Secure IoT Systems Monitor Framework using Probabilistic Image Encryption
IJAEMSJORNAL
 
Content based video retrieval system
Content based video retrieval systemContent based video retrieval system
Content based video retrieval system
eSAT Publishing House
 
Video Stabilization using Python and open CV
Video Stabilization using Python and open CVVideo Stabilization using Python and open CV
Video Stabilization using Python and open CV
IRJET Journal
 
Key frame extraction methodology for video annotation
Key frame extraction methodology for video annotationKey frame extraction methodology for video annotation
Key frame extraction methodology for video annotationIAEME Publication
 
Key frame extraction for video summarization using motion activity descriptors
Key frame extraction for video summarization using motion activity descriptorsKey frame extraction for video summarization using motion activity descriptors
Key frame extraction for video summarization using motion activity descriptors
eSAT Journals
 
Key frame extraction for video summarization using motion activity descriptors
Key frame extraction for video summarization using motion activity descriptorsKey frame extraction for video summarization using motion activity descriptors
Key frame extraction for video summarization using motion activity descriptors
eSAT Publishing House
 
IRJET- A Reliable and Robust Video Watermarking Scheme Over Cloud
IRJET- A Reliable and Robust Video Watermarking Scheme Over CloudIRJET- A Reliable and Robust Video Watermarking Scheme Over Cloud
IRJET- A Reliable and Robust Video Watermarking Scheme Over Cloud
IRJET Journal
 
Video saliency-recognition by applying custom spatio temporal fusion technique
Video saliency-recognition by applying custom spatio temporal fusion techniqueVideo saliency-recognition by applying custom spatio temporal fusion technique
Video saliency-recognition by applying custom spatio temporal fusion technique
IAESIJAI
 
Video Content Identification using Video Signature: Survey
Video Content Identification using Video Signature: SurveyVideo Content Identification using Video Signature: Survey
Video Content Identification using Video Signature: Survey
IRJET Journal
 
IRJET-Feature Extraction from Video Data for Indexing and Retrieval
IRJET-Feature Extraction from Video Data for Indexing and Retrieval IRJET-Feature Extraction from Video Data for Indexing and Retrieval
IRJET-Feature Extraction from Video Data for Indexing and Retrieval
IRJET Journal
 
Recent advances in content based video copy detection (IEEE)
Recent advances in content based video copy detection (IEEE)Recent advances in content based video copy detection (IEEE)
Recent advances in content based video copy detection (IEEE)
PACE 2.0
 
Flip invariant video copy detection using sparse-coded features
Flip invariant video copy detection using sparse-coded featuresFlip invariant video copy detection using sparse-coded features
Flip invariant video copy detection using sparse-coded features
eSAT Publishing House
 
SUMMARY GENERATION FOR LECTURING VIDEOS
SUMMARY GENERATION FOR LECTURING VIDEOSSUMMARY GENERATION FOR LECTURING VIDEOS
SUMMARY GENERATION FOR LECTURING VIDEOS
IRJET Journal
 
Key Frame Extraction in Video Stream using Two Stage Method with Colour and S...
Key Frame Extraction in Video Stream using Two Stage Method with Colour and S...Key Frame Extraction in Video Stream using Two Stage Method with Colour and S...
Key Frame Extraction in Video Stream using Two Stage Method with Colour and S...
ijtsrd
 
An Stepped Forward Security System for Multimedia Content Material for Cloud ...
An Stepped Forward Security System for Multimedia Content Material for Cloud ...An Stepped Forward Security System for Multimedia Content Material for Cloud ...
An Stepped Forward Security System for Multimedia Content Material for Cloud ...
IRJET Journal
 

Similar to Video copy detection using segmentation method and (20)

Parking Surveillance Footage Summarization
Parking Surveillance Footage SummarizationParking Surveillance Footage Summarization
Parking Surveillance Footage Summarization
 
IRJET - Applications of Image and Video Deduplication: A Survey
IRJET -  	  Applications of Image and Video Deduplication: A SurveyIRJET -  	  Applications of Image and Video Deduplication: A Survey
IRJET - Applications of Image and Video Deduplication: A Survey
 
Efficient and Robust Detection of Duplicate Videos in a Database
Efficient and Robust Detection of Duplicate Videos in a DatabaseEfficient and Robust Detection of Duplicate Videos in a Database
Efficient and Robust Detection of Duplicate Videos in a Database
 
Efficient and Robust Detection of Duplicate Videos in a Database
Efficient and Robust Detection of Duplicate Videos in a DatabaseEfficient and Robust Detection of Duplicate Videos in a Database
Efficient and Robust Detection of Duplicate Videos in a Database
 
Video inpainting using backgroung registration
Video inpainting using backgroung registrationVideo inpainting using backgroung registration
Video inpainting using backgroung registration
 
Secure IoT Systems Monitor Framework using Probabilistic Image Encryption
Secure IoT Systems Monitor Framework using Probabilistic Image EncryptionSecure IoT Systems Monitor Framework using Probabilistic Image Encryption
Secure IoT Systems Monitor Framework using Probabilistic Image Encryption
 
Content based video retrieval system
Content based video retrieval systemContent based video retrieval system
Content based video retrieval system
 
Video Stabilization using Python and open CV
Video Stabilization using Python and open CVVideo Stabilization using Python and open CV
Video Stabilization using Python and open CV
 
Key frame extraction methodology for video annotation
Key frame extraction methodology for video annotationKey frame extraction methodology for video annotation
Key frame extraction methodology for video annotation
 
Key frame extraction for video summarization using motion activity descriptors
Key frame extraction for video summarization using motion activity descriptorsKey frame extraction for video summarization using motion activity descriptors
Key frame extraction for video summarization using motion activity descriptors
 
Key frame extraction for video summarization using motion activity descriptors
Key frame extraction for video summarization using motion activity descriptorsKey frame extraction for video summarization using motion activity descriptors
Key frame extraction for video summarization using motion activity descriptors
 
IRJET- A Reliable and Robust Video Watermarking Scheme Over Cloud
IRJET- A Reliable and Robust Video Watermarking Scheme Over CloudIRJET- A Reliable and Robust Video Watermarking Scheme Over Cloud
IRJET- A Reliable and Robust Video Watermarking Scheme Over Cloud
 
Video saliency-recognition by applying custom spatio temporal fusion technique
Video saliency-recognition by applying custom spatio temporal fusion techniqueVideo saliency-recognition by applying custom spatio temporal fusion technique
Video saliency-recognition by applying custom spatio temporal fusion technique
 
Video Content Identification using Video Signature: Survey
Video Content Identification using Video Signature: SurveyVideo Content Identification using Video Signature: Survey
Video Content Identification using Video Signature: Survey
 
IRJET-Feature Extraction from Video Data for Indexing and Retrieval
IRJET-Feature Extraction from Video Data for Indexing and Retrieval IRJET-Feature Extraction from Video Data for Indexing and Retrieval
IRJET-Feature Extraction from Video Data for Indexing and Retrieval
 
Recent advances in content based video copy detection (IEEE)
Recent advances in content based video copy detection (IEEE)Recent advances in content based video copy detection (IEEE)
Recent advances in content based video copy detection (IEEE)
 
Flip invariant video copy detection using sparse-coded features
Flip invariant video copy detection using sparse-coded featuresFlip invariant video copy detection using sparse-coded features
Flip invariant video copy detection using sparse-coded features
 
SUMMARY GENERATION FOR LECTURING VIDEOS
SUMMARY GENERATION FOR LECTURING VIDEOSSUMMARY GENERATION FOR LECTURING VIDEOS
SUMMARY GENERATION FOR LECTURING VIDEOS
 
Key Frame Extraction in Video Stream using Two Stage Method with Colour and S...
Key Frame Extraction in Video Stream using Two Stage Method with Colour and S...Key Frame Extraction in Video Stream using Two Stage Method with Colour and S...
Key Frame Extraction in Video Stream using Two Stage Method with Colour and S...
 
An Stepped Forward Security System for Multimedia Content Material for Cloud ...
An Stepped Forward Security System for Multimedia Content Material for Cloud ...An Stepped Forward Security System for Multimedia Content Material for Cloud ...
An Stepped Forward Security System for Multimedia Content Material for Cloud ...
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
eSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
eSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
eSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
eSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
eSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
eSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
eSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
eSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
eSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
eSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 

Recently uploaded (20)

Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 

Video copy detection using segmentation method and

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 489 VIDEO COPY DETECTION USING SEGMENTATION METHOD AND MPEG-7 DESCRIPTORS Girija K1, Sabarinathan P2, Saravanan D3, Uma M4 1PG scholar, Department of Computer Science and Engineering, Pavendar Bharathidasan college of Engg. and Tech., Trichy, Tamilnadu, India 2Assistant Professor, Department of Computer Science and Engineering, Pavendar Bharathidasan college of Engg. and Tech., Trichy, Tamilnadu, India 3Associate Professor, Department of Computer Science and Engineering, Pavendar Bharathidasan college of Engg. and Tech., Trichy, Tamilnadu, India 4Assistant Professor Department of Computer Science and Engineering, Pavendar Bharathidasan college of Engg. and Tech., Trichy, Tamilnadu, India Abstract There are a number of methods available for video copy detection. Some of the methods were employing the application of local and global descriptors which were found to be ineffective in detections involving complex transformations. In order to overcome the above specified inefficiency, Scale Invariant Feature Transform (SIFT) descriptor came into picture but was found to have a high computational cost. The method proposed in this paper involving five different types of MPEG-7 descriptors namely Color and Edge Directivity Descriptor (CEDD), Fuzzy Color and Texture Histogram (FCTH), Scalable Color Descriptor (SCD), Edge Histogram Descriptor (EHD), Color Layout Descriptor (CLD) for extracting the features of the frames in the selected video is found to be cost effective and efficient even in case of high level of transformations. This paper also throws light on certain improvements in graph- based video sequence matching method which is used to overcome the level of noise, to detect videos with different frame rates and optimal sequence matching is found automatically from the disordered video sequences by applying spatial features during copy detection. Experimental results have showed that the proposed method is far effective than the previously existing video detection scenarios. Keywords: Video copy detection, graph, SIFT feature, SVD, CEDD, FCTH, SCD, EHD, CLD descriptor, -----------------------------------------------------------------------***-------------------------------------------------------------------- 1. INTRODUCTION Now-a-days, server space is becoming a major issue for high level organizations to maintain enormous amount of data. For instance, organizations like YouTube, Google, Metacafe and others dealing with enormous video storage are found to have acres of racks consisting of hard disks each could be holding a capacity of around 1 to 2TB. But we are aware of the fact that most of the videos available in these video storage websites are redundant. According to the recent statistics [14], there are about 27 percent of redundant videos in You Tube, Google videos. Redundant videos are of two types: Copy videos and near duplicate videos. A copy can be defined as a segment of video derived from another video, usually undergone a lot of transformations, such as Cam-cording, PiP (Picture in Picture), Insertions of patterns such as captions, subtitles, logo; Strong re-encoding; Change of gamma; Decrease in quality: Blur, frame dropping, compression, ratio and white noise, Post production is shown in TABLE 1. All of the above specified transformations can be done to a specific original video or else some of these transformations can also be done based on the needs of the one who is implementing these transformations. Both of these above specified cases are considered to be a copy of the original version of that respective video which is available in the dataset maintained by us. Near duplicate videos are the ones representing the same sequence of actions or an event which are recorded by two different cameras from different position or angle. Even though these two videos are representing the same sequence of actions, they are not considered to be copies since they are not edited from an existing original video recorded by someone else. So this paper is not concerned about detecting near duplicate videos. The ultimate goal of video copy detection is to decide whether a video query is copied from a video available in the video dataset. A copy could have undergone various transformations specified earlier. If the system finds the sequence matching results to be the same in the client and server side, the system would prompt with a message saying that the video input of
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 490 the user is a copied one whose original video is already available in the server. The framework of video copy detection is done as two parts: (1) Client side: Key frames are extracted from the reference video dataset and features are extracted from those key frames. The features extracted should not be vulnerable to video transformation. The features can be stored in a feature database to make similarity comparison effective. (2) Server side: Query videos are verified. Features are extracted from the videos and are compared with the features which are already stored in the database. The sequence matching results are returned along with the detection results [5]. Based on the study, the transformations involving picture in picture is complicated to be detected [9], [10]. And for detecting such video copies, local feature of SIFT is found to be normally valid. However, matching which is done based on the local features in certain cases involving two videos seems to have a high level of computational complexity. Methods to detect picture in picture and proposing graph-based sequence matching method are focused here. Table 1 Various Types of Transformations 2. RELATED WORK Video copy detection was a problem being handled over a long period of time particularly when the videos are heavily transformed. A lot of research has been done in this area. There was no shot boundary detection algorithm available specialized for Content Based Copy Detection termed as CBCD. So Onur Kucuktunc, Ugur Gudukbay and Ozgur U have proposed an automatic shot boundary detection algorithm meant for videos with heavy transformations applied which is based on Fuzzy color histogram [11]. This method is efficient in the way that we would consider not only the values of perfect true and perfect false but also the values of partial true and false. Apart from this, other problems were copyright violations and image forgery. Although digital watermarking was available to save the day, it was very difficult to design and so Yan Ke, Rahul Sukthankar and Larry H have proposed a copy detection technique using scale and rotation invariant interest point detectors [15]. The efficiency of this method lies in the efficient layout of data on disk. Other issues include representing video shots with the help of histograms which does not represent the spatial information about the pixels and so K. Sze, K. Lam, and G. Qiu have proposed an optimal representation of video shots representing both spatial and global information based on probability [12]. This method has a greater computational complexity compared to alpha trimmed average histogram method. Video similarity detection using visual similarities of video clips is another issue to be dealt with since watermarking is fragile to visual transformations such as cam- coding. Onur Kucuktunc, Muhammet Bastan, Ugur Gudukbay and Ozgur U have proposed an video copy detection framework consisting of three methods namely facial shot matching along with activity subsequence matching and non- facial shot matching [10]. This method is in need of greater potential to detect copies among videos undergone cam- coding or PiP (Picture in Picture) kind of transformations. A video sequence identification method to find a similar content to a short query clip from a long video sequence was required and so Heng Tao Shen, Jie Shao, Zi Huang and Xiao fang Z have proposed an approach based on graph transformation and matching which can even identify different ordering of frames and content editing. A novel batch query algorithm was also been proposed to retrieve similar frames. The merit of this method is that there is no need of pre- segmentation of videos as we frame sub-sampling to identify ambiguous shot boundaries [4]. 3. THE PROBLEM Watermarking is one of the classical techniques handled down for a long time for the purpose of representing the ownership of a particular video by means of inserting the logo or any other digital signature of the owner [1]. This information can be either visible to human eye or even can be hidden. This
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 491 seems to be a better way for representing the ownership but it is vulnerable to the slightest changes. For instance, this watermarking information can be removed easily by anyone by making any small transformation to the watermarked video which includes re-encoding and change of bit rate. It is important to note that watermarking is not destined to retrieve a query video clip. To overcome this demerit, CBCD (Content Based Copy Detection) came into existence. Methods which are employing the use of global descriptors were found to take the low level features into account always for the purpose of video copy detection. But this technique is found to work well only for those videos which have undergone some small amount of transformations. In order to overcome the demerits of global descriptor, local descriptor were employed for video copy detection which makes use of the local spatiotemporal features and then making use of the features around the local features which helps them to be effective even in the case of high level transformations [3]. One of the efficient local descriptor that came into existence was SIFT. In existing system, SIFT descriptor [6] seems to have a good stability to describe video characteristics. The SIFT descriptor (Local Descriptor) is found to give a better performance in identifying the objects is shown in Fig 1. Fig-1: The Matching Result Using SIFT The methods based on local descriptors on points, lines and also shape found to play an important role in video copy detection. Of the above mentioned properties, spatiotemporal interest points are found to play a vital role in classifying human actions and to detect periodic motions it has a good tolerance to scale changes, illumination variations and image rotations and also it has a greater strength against affine distortion and additive noise. Performance of methods based on local descriptor is found to be far better than the methods based on global descriptor in terms of logo insertion, shifting or cropping. In spite of the above specified merits, high computational cost is found to be highest demerit. 4. CONTRIBUTION In order to increase the efficiency of video copy detection and make it more effective, we have employed the use of five MPEG7 type descriptors such as CEDD, FCTH, SCD, EHD, CLD descriptors are used to extract the feature for Sequence Matching and also used to reduce the computational complexity. They describe elementary characters such as shape, color, texture or motion among others. 4.1 CEDD – Color & Edge Directivity Descriptor Low computational power for extraction compared to others. It incorporates color and texture information in histogram. CEDD low level features that are extracted from the images can be used for indexing and also for retrieval. 4.2 FCTH – Fuzzy Color & Texture Histogram FCTH is used for extraction of features that combines color and texture information in one histogram. This feature is appropriate for accurately retrieving images even in case of distortion such as deformation. 4.3 SCD –Scalable Color Descriptor SCD derived from a color histogram defined in a Hue Saturation value color space with fixed color space quantization. 4.4 EHD – Edge Histogram Descriptor EHD use global, semi-global, local histogram generated from local histogram bins to increase performance. MPEG-7 is used for the case of video or still images containing texture, color, shape and motion. 4.5 CLD – Color Layout Descriptor CLD is designed to capture spatial distribution of color in image. It is used to describe color relation between sequence and group of images. 4.6 Graph-Based Method Graph method can find the longest path in the frame matching-result graph considering time constraint  It can automatically remove the noise caused by visual feature matching.  It is adaptive to video frame rate change.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 492 It can find the optimal sequence matching result automatically. The above specified five types of descriptors are used to extract exact individual features from the frames which are more accurate for comparison of the results. In addition to that graph based method is used to make this method an optimal one for video copy detection. 5. SYSTEM DESIGN The system design involves the different steps involved in the proposed video copy detection method. The entire process is summarized in the Figure 2 which gives a clear cut idea about the proposed method. 5.1 Client Side: It is important to note that the client side and offline process are one and the same which can be represented in any of the descriptions. The procedure followed at the client side involves getting the user input in the form of video. First step would be extracting the key frames from the user given input video. The different features are extracted from the extracted key frames using the different type of descriptors and are stored into the reference database. 5.2 Server Side As specified above, server side is similar to that of online process which can be said in either ways. The process done at the server side is similar to that of the process done at the client side which is the following. Frames are extracted from all the videos available in the server side and the features are already extracted using the proposed five types of descriptors and are stored individually in the server side database for future reference. It is to be noted that each time when the user is uploading a new video into the server, key frames are extracted along with the features and are updated into the database maintained by the server. 5.3 Process When both of the process is done, the next step would be to pick a random key frame from the reference database in the client side and compare it with all the extracted key frames in the client side reference database. Once the comparison is done, the descriptors would individually return the respective similarity matching results with the mathematical values representing the level of similarity such as the exact matches would be indicated with a 0. The half matched or unmatched frames are represented with other non-zero values based on their level of matching. The same random frame from the client side is then compared with each and every key frame of all the videos available in the server side dataset and the similarity matching results are returned for each and every comparison. When comparing the similarity results between the client and server side, we can come to a conclusion whether the user input video is already available within the server space or not. This is based on the scenario that similar frames would be having value to be zero and the unmatched frames would be having the non-zero values as specified earlier. Based on the results, system would prompt a message to the user saying “video already exists” in the case of a copied video or “video inserted successfully” in case of a new video. The server also provides additional information such as the timestamp when the video was uploaded, date and whether the upload was a success or a failure and the number of attempts made by a respective user with a copied video since the server supports only the users who were registered with the server. Fig-2: System Architecture Showing Client and Server Side 6. SYSTEM IMPLEMENTATION The above specified concepts are implemented in various steps which are described as follows: 6.1 Splitting of Video In order to analyze the video given as input by the user, the different desired properties of the video is found out such as color, size and quality. The input video should have high quality and brightness to achieve better results. Key frame extraction is done at this stage. 6.2 Performance of ROI After key frame extraction is done, the main object features are extracted from the key frames by using ROI (Region Of Interest) and these extracted information is made used to detect the copied videos is shown in Figure 3.
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 493 Fig-3: ROI for Extracting Main Object 6.3 RGB Color Histogram This module can used to find out various RGB properties of the frames such as mean, standard deviation, level, count at different scenarios by applying changes to the image using different types of filters such as HSL color contrast to increase the image brightness, Edge detectors, morphology, binarization and lot more. A histogram is shown in Fig 4. 6.4 Sequence Matching The extracted key frames are stored in the database and the random frame is chosen here to be compared with all the other frames in the dataset which is done effectively with the help of CEDD, FCTH, SCD, EHD, CLD descriptors is shown in Figure 5. 6.5 Similarity Matching Detection The random frame from the user input is matched with all the frames available in the server for each and every video available in the server and based on the similarity matching results, server can allow the user to upload the video if it is an original one (i.e. it is not available in the server) whereas it would not allow the user to proceed with the upload if the video is a copied one. Fig-4: Finding RGB Color Histogram for an Image By Applying Filters Fig-5: Identifying Sequence Matching Using FCTH Descriptors 7. RESULTS AND DISCUSSIONS The results of the compared videos are formulated in the form of graph with the help of the proposed graph based method. Results show that it is very easy to compare the results in the form of graph which shows the values formulated as a result of the comparison done between the randomly chosen frames along with each and every individual frame in the dataset. The graph also gives a clear comparative study between the values computed by all the five different type of descriptors. TABLE 2 shows the similarity matching result of video A done by five different type of descriptors which is represented in the form of graph in Figure 6 whereas TABLE 3 shows the similarity matching result computed for video B by the descriptors which is graphically represented in Figure 7. Table 2 Similarity Matching Result of Video A Table 3 Similarity Matching Result of Video B
  • 6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 494 Fig-6: Graph-Based Method Representing TABLE 2 Fig-7: Graph-Based Method Representing TABLE 3 On comparing the two graphs, we can come to a conclusion that the values computed by the descriptors are entirely different so that both the videos are not the same or we can say that video A is not a copy of video B. Analyzing the above results, the server would allow the user to upload video A into the server as it is not available within the server space. 8. CONCLUSIONS Video copies are analyzed and the features are used for copy detection. Based on the analysis, local feature of SIFT was used for describing video frames. Since large number of SIFT points are extracted from a video, the copy detection involving SIFT features has high computational cost. And so the new descriptors have been introduced: EHD, CLD, SCD, CEDD, and FCTH. Edge Histogram Descriptor (EHD) captures the edge spatial distribution around the image in five orientations: horizontal, vertical, 45° degrees, 135° degrees and non-directional. Color Layout Descriptor (CLD) is used for capturing the spatial distribution of color in an image. Scalable Color Descriptor (SCD) can obtain good performance in case of retrieval accuracy and fast matching of the image. Color and Edge Directivity Descriptor (CEDD) captures and relates shape, texture and color from an image. Fuzzy Color and Texture Histogram (FCTH) aims at capturing the image texture, shape and color. By using these descriptors, the computational cost will be decreased and it can be used for obtaining the effectiveness in key frame feature extraction. Experimental results prove that the proposed method is found to have an optimal tradeoff between the effectiveness and efficiency of video copy detection. 9. REFERENCES [1]. Arun Hampapur, Ki-Ho Hyun and Ruud B. (2002) “Comparison of Sequence Matching Techniques for Video Copy Detection,” Proc. SPIE, Storage and Retrieval for Media Databases, vol. 4676, pp. 194-201. [2]. Delponte E., Isgro F., Odone F. and Verri A. (2006) “SVD-Matching Using Sift Features,” Graphical Models, vol. 68, no. 5, pp. 415-431. [3]. Geert Willems, Tinne Tuytelaars and Luc Van G. (2008) “Spatio-Temporal Features for Robust Content-Based Video Copy Detection,” Proc. ACM Int’1 Conf. Multimedia Information Retrieval (MIR), pp. 283-290. [4]. Heng Tao Shen, Jie Shao, Zi Huang and Xiao fang Z. (2009) “Effective and Efficient Query Processing for Video Subsequence identification,” IEEE Trans. Knowledge and Data Eng., vol. 21, no. 3. [5]. Hong Liu, Hong Lu and Xiangyang Xue (2013) “A Segmentation and Graph-Based Video Sequence Matching Method for Video Copy Detection,” IEEE Transaction on Knowledge and Data Engineering, vol. 25. [6]. Hong Liu, Hong Lu and Xiang yang X. (2010) “SVD- SIFT for Web near duplicate image detection,” Proc. IEEE Int”1 Conf. Image Processing (ICIP ’10), pp. 1445-1448. [7]. Julien Law-To, Li Chen and Alexis J. (2007) “Video Copy Detection: a Comparative Study,” Proc. ACM Int’1 Conf. Retrieval, pp. 371-378. [8]. Li Chenal and Stentifordb. F.W.M. (2008) “Video Sequence Matching based on Temporal Ordinal Measurement,” Pattern Recognition Letters, vol. 29, no.13, pp. 1824-1831. [9]. Mattijs Douze, Herve Jegou and Cordelia S. (2010) “An Image-Based Approach to Video Copy Detection with Spatio-
  • 7. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 495 Temporal Post-Filtering,” IEEE Trans. Multimedia, vol. 12, no. 4, pp. 257-266. [10]. Onur Kucuktunc, Muhammet Bastan, Ugur Gudukbay and Ozgur U. (2010) “Video Copy Detection using multiple visual cues and MPEG-7 descriptors,” J. Visual Comm. Image Representation. [11]. Onur Kucuktunc, Ugur Gudukbay and Ozgur U. (2010) “Fuzzy Color Histogram-Based Video Segmentation,” Computer Vision and Image Understanding, vol. 114, no. 1,pp. 125-134. [12]. Sze K., Lam K., and Qiu G. (Sept. 2005) “A New Key Frame Representation for Video Segment Retrieval,” IEEE Trans. Circuits and Systems VideoTechnology, vol. 15, no. 9, pp. 1148-1155. [13]. Thomas S. (2001) “The MPEG-7 Visual Standard for Content Description – An Overview,” IEEE Transactions on circuits and systems for video technology, vol. 11, no. 6. [14]. Xiao Wu, Chong- Wah N., Alexander G.H. and Hung- Khoon T.(2009) “Real-Time Near-Duplicate Elimination for Web Video Search with Content and Context,” IEEE Trans. Multimedia, vol. 11, no. 2, pp. 196-207. [15]. Yan Ke, Rahul Sukthankar and Larry H. (2004) “Efficient Near Duplicate Detection and Sub image Retrieval,” Pro Ann. ACM Int’1 Conf. Multimedia pp. 860- 876. [16]. Yuan J., Duan L.Y., Tian Q., Ranganath S. and Xu C. (2004) “Fast and Robust Short Video Clip Search for Copy Detection,” Proc. Pacific Rim Conf. Multimedia. [17]. Zi Huang, Jie Shao and Xiaofang Z. (2007) “UQLIPS: A Real-time Near-Duplicate Video Clip Detection System,” Proc. 33rd Int’1 Conf. Very Large Data Bases (VLDB), pp. 1374-1377. BIOGRAPHIES Ms. Girija K received the B.E degree in Computer Science and Engineering from SKP Engineering College, Tiruvannamalai in 2012. She is currently doing the M.E in the same stream in Pavendar Bharathidasan College of Engineering and Technology, Mathur, Tiruchirappalli. Mr. Sabarinathan P received the B.E degree in Computer Science and Engineering from Annai Mathammal Sheela Engineering College, Namakkal in 2007 and received the M.E degree in the same stream in 2010 from Dhanalakshmi Srinivasan Engineering College, Perambalur. He is currently working as an Assistant Professor in Pavendar Bharathidasan College of Engineering and Technology, Tiruchirappalli and his area of interest includes MANET and networks. Mr. Saravanan D received the B.E degree in Electrical and Electronics Engineering from Maharaja Engineering College, Tiruppur in 2000 and received the M.E degree in Computer Science and Engineering from Annamalai University, Chidambaram in 2005. He is currently doing his Ph.d in the area of MANET and also working as an Associate Professor in Pavendar Bharathidasan College of Engineering and Technology, Tiruchirappalli with 11 years of teaching experience and his area of interest include MANET. Mrs. Uma M received the B.Tech degree in Computer Science and Engineering from VIT University, Vellore in 2003 and received the M.E degree in Computer Science and Engineering from Pavendar Bharathidasan College of Engineering and Technology, Tiruchirappalli in 2006. She is currently doing her Ph.d in the area of MANET and also working as an Assistant Professor in Pavendar Bharathidasan College of Engineering and Technology, Tiruchirappalli with 8 years of teaching experience and her area of interest include MANET.