Design of a home video behavior recognition system based on visual privacy security mechanism

被引:0
作者
Zhao, D. M. [1 ,2 ]
机构
[1] Dongguan City Univ, Lab Ctr, Acad Affairs Off, 1 Wenchang Rd,Songshan Lake Ave, Dongguan 523419, Peoples R China
[2] Univ Perpetual Help Syst Laguna, Grad Sch, City Of Binan 4024, Laguna, Philippines
关键词
visual privacy security; home videos; behavior recognition; time series adaptive network; compression perception; NETWORK; ONLINE;
D O I
10.18287/2412-6179-CO-1456
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
The rapid development of the Internet and advanced technology has brought great convenience to people's lives; However, real-time video and other privacy information obtained from computers can be leaked, resulting in economic losses and not conducive to the construction of computer network security. In response to the above issues, this study introduces compressed perception theory and temporal adaptive modules to achieve visual shielding, and based on this, designs a home video behavior system based on visual privacy security mechanism. The research results show that in the comparison of measurement matrices at different levels, the Bernoulli random matrix has the highest recognition accuracy, with recognition accuracy rates of 100 %, 98.73 %, 98.76 %, and 85.62 % from the first layer to the fourth layer, respectively. In the recognition performance results of different video behavior recognition systems in the YouTube database, UCF Sports database, and Hollywood2 database, the average recognition accuracy of the proposed system is the highest in most cases, with 94.6 %, 73.5 %, and 77.1 %, respectively. In summary, the system proposed in the study can achieve accurate recognition of home video behavior after visual masking, and has good results in practical applications.
引用
收藏
页码:263 / 272
页数:10
相关论文
共 20 条
[1]   Research on satellite remote sensing image fusion algorithm based on compression perception theory [J].
Chi, Zhifeng .
JOURNAL OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING, 2021, 21 (02) :341-356
[2]  
Dey P., 2022, J COMPUT COGN ENG, V2, P133, DOI DOI 10.47852/BONVIEWJCC2022158
[3]  
Fante K.A., 2020, Trans Environ Electr Eng, V4, P18, DOI DOI 10.22149/TEEE.V4I1.139
[4]  
Gangwar G, 2020, Civ Eng Archit, V8, P379, DOI [10.13189/cea.2020.080323, DOI 10.13189/CEA.2020.080323]
[5]   Pedestrian Behavior Prediction for Automated Driving: Requirements, Metrics, and Relevant Features [J].
Herman, Michael ;
Wagner, Joerg ;
Prabhakaran, Vishnu ;
Moeser, Nicolas ;
Ziesche, Hanna ;
Ahmed, Waleed ;
Buerkle, Lutz ;
Kloppenburg, Ernst ;
Glaeser, Claudius .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (09) :14922-14937
[6]   Progressive perception-oriented network for single image super-resolution [J].
Hui, Zheng ;
Li, Jie ;
Gao, Xinbo ;
Wang, Xiumei .
INFORMATION SCIENCES, 2021, 546 :769-786
[7]  
Lei Y, 2022, J. Comput. Cogn. Eng., V1, P83
[8]  
Li yangzhi, 2021, Journal of Computer Applications, P1915, DOI 10.11772/j.issn.1001-9081.2020091515
[9]  
Liu J X, 2021, 2021 6 INT C COMM IM, P150, DOI [10.1109/CCISP52774.2021.9639335, DOI 10.1109/CCISP52774.2021.9639335]
[10]   EQRC: A secure QR code-based E-coupon framework supporting online and offline transactions [J].
Liu, Rui ;
Song, Jun ;
Huang, Zhiming ;
Pan, Jianping .
JOURNAL OF COMPUTER SECURITY, 2020, 28 (05) :577-605