Robust video copy detection approach based on local tangent space alignment

被引:2
作者
Nie, Xiushan [1 ]
Qiao, Qianping [2 ]
机构
[1] Shandong Univ Finance & Econ, Sch Comp Sci & Technol, Jinan 250014, Peoples R China
[2] Shandong Normal Univ, Sch Phys & Elect, Jinan 2500014, Peoples R China
基金
中国国家自然科学基金;
关键词
video copy detection; video fingerprinting; dimensionality reduction; local tangent space alignment;
D O I
10.1117/1.OE.51.4.047001
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
We propose a robust content-based video copy detection approach based on local tangent space alignment (LTSA), which is an efficient dimensionality reduction algorithm. The idea is motivated by the fact that the content of video becomes richer and the dimension of content becomes higher. It does not give natural tools for video analysis and understanding because of the high dimensionality. The proposed approach reduces the dimensionality of video content using LTSA, and then generates video fingerprints in low dimensional space for video copy detection. Furthermore, a dynamic sliding window is applied to fingerprint matching. Experimental results show that the video copy detection approach has good robustness and discrimination. (C) 2012 Society of PhotoOptical Instrumentation Engineers (SPIE). [DOI: 10.1117/1.OE.51.4.047001]
引用
收藏
页数:8
相关论文
共 18 条
  • [1] Spatio-temporal transform based video hashing
    Coskun, Baris
    Sankur, Bulent
    Memon, Nasir
    [J]. IEEE TRANSACTIONS ON MULTIMEDIA, 2006, 8 (06) : 1190 - 1208
  • [2] A Robust and Fast Video Copy Detection System Using Content-Based Fingerprinting
    Esmaeili, Mani Malek
    Fatourechi, Mehrdad
    Ward, Rabab Kreidieh
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (01) : 213 - 226
  • [3] Hampapur A., 2001, Proc. IEEE Intl Conf. Multimedia and Expo (ICME), P188
  • [4] Indyk P., 1999, FINDING PIRATED VIDE
  • [5] Content-based copy retrieval using distortion-based probabilistic similarity search
    Joly, Alexis
    Buisson, Olivier
    Frelicot, Carl
    [J]. IEEE TRANSACTIONS ON MULTIMEDIA, 2007, 9 (02) : 293 - 306
  • [6] Lee S, 2006, P ITN C AC SPEECH, V2, P401, DOI DOI 10.1109/ICASSP.2006.1660364
  • [7] Li C. G., 2008, THESIS BEIJING U POS
  • [8] A robust image authentication method distinguishing JPEG compression from malicious manipulation
    Lin, CY
    Chang, SF
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2001, 11 (02) : 153 - 168
  • [9] Nie XS, 2010, INT CONF SIGN PROCES, P1837, DOI 10.1109/ICOSP.2010.5656914
  • [10] Visual hashing of digital video: applications and techniques
    Oostveen, J
    Kalker, T
    Haitsma, J
    [J]. APPLICATIONS OF DIGITAL IMAGE PROCESSING XXIV, 2001, 4472 : 121 - 131