VIDEO COPY DETECTION UTILIZING THE LOG-POLAR TRANSFORMATION
DOI:
https://doi.org/10.47839/ijc.15.1.825Keywords:
Video Copy Detection, Log-Polar Transform.Abstract
Video copy detection is the process of comparing and analyzing videos to extract a measure of their similarity in order to determine if they are copies, modified versions, or completely different videos. With video frame sizes increasing rapidly, it is important to allow for a data reduction process to take place in order to achieve fast video comparisons. Further, detecting video streaming and storage of legal and illegal video data necessitates the fast and efficient implementation of video copy detection algorithms. In this paper some commonly used algorithms for video copy detection are implemented with the Log-Polar transformation being used as a pre-processing step to reduce the frame size prior to signature calculation. Two global based algorithms were chosen to validate the use of Log-Polar as an acceptable data reduction stage. The results of this research demonstrate that the addition of this pre-processing step significantly reduces the computation time of the overall video copy detection process while not significantly affecting the detection accuracy of the algorithm used for the detection process.References
M. A. Abbott and R. A. Messner, “Use of coordinate mapping as amethod for image data reduction,” in Proceedings of the Conference Boston-DL tentative, (1991), pp. 272-282.
R. A. Messner and H. H. Szu, An image processing architecture for real time generation of scale and rotation invariant patterns, Computer Vision, Graphics, and Image Processing, (31) 1 (1985), pp. 50-66.
J. Law-to, O. Buisson, L. Chen, M. H. Ipswich, V.Gouet-brunet, A. Joly,N. Boujemaa, I. Laptev, F. Stentiford, and M. H. Ipswich, Video copy detection: a comparative study, in Proceedings of the ACM International Conference on Image and Video Retrieval CIVR’07, (2007), pp. 371-378.
N. Guil, J. M. González-Linares, J. R. Cózar, and E. L. Zapata, A clustering technique for video copy detection, in Proceedings of the 3rd Iberian conference on Pattern Recognition and Image Analysis, Part I,ser. IbPRIA’07, (2007), pp. 451-458.
H.-S. Kim, J. Lee, H. Liu, and D. Lee, Video linkage: group based copied video detection, in Proceedings of the International Conference on Content-based Image and Video Retrieval, ser. CIVR’08, (2008), pp. 397-406.
T. S. Kok, C. Manders, and L. Chaisorn, Evaluation and analysis of an ordinal-based approach to video signature, in Proceedings of the IEEE Region 10 Conference TENCON’2009, (2009), pp. 1-5.
C. Wu, J. Zhu, and J. Zhang, A content-based video copy detection method with randomly projected binary features, in Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops CVPRW’2012, (2012), pp. 21-26.
X. Liu, J. Sun, and J. Liu, Shot-based temporally respective frame generation algorithm for video hashing, in Proceedings of the IEEE International Workshop on Information Forensics and Security WIFS’13, (November 2013), pp.109-114.
J. Baber, N. Afzulpurkar, M. Dailey, and M. Bakhtyar, Shot boundary detection from videos using entropy and local descriptor, in Proceedings of the 17th International Conference on Digital Signal Processing DSP’11, (July2011), pp. 1-6.
P.-H. Wu, T. Thaipanich, and C.-C.Kuo, A suffix array approach to video copy detection in video sharing social networks, in Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP’09, (2009), pp. 3465-3468.
J. Kim and J. Nam, Content-based video copy detection using spatiotemporal compact feature, in Proceedings of the 11th International Conference on Advanced Communication Technology ICACT’09, vol. 03, (2009), pp. 1667-1671.
W.-L. Zhao and C.-W. Ngo, Flip-invariant sift for copy and object detection, IEEE Transactions on Image Processing, (22) 3 (2013), pp. 980-991.
S. Asha and M. Sreeraj, F-surf feature descriptor for video copy detection, in Proceedings of the Fourth International Conference on Advances in Computing and Communications ICACC’12, (August 2014), pp. 93-96.
D. G. Lowe, Distinctive image features from scale-invariant keypoints, International Journal of Computer Vision, (60) 2 (2004), pp. 91-110.
H. Bay, A. Ess, T. Tuytelaars, and L. Van Gool, Speeded-up robust features (surf), Comput. Vis. Image Underst., (110) 3 (2008), pp. 346-359.
M. Corvaglia, F. Guerrini, R. Leonardi, P. Migliorati, and E. Rossi, Toward a multi-feature approach to content-based copy detection, in Proceedings of the 17th IEEE International Conference on Image Processing ICIP’10, (2010), pp. 2345-2348.
Y. Tian, M. Jiang, L. Mou, X. Fang, and T. Huang, A multimodal video copy detection approach with sequential pyramid matching, in Proceedings of the 18th IEEE International Conference on Image Processing ICIP’11, 2011, pp. 3629-3632.
H. Ren, S. Lin, D. Zhang, S. Tang, and K. Gao, Visual words based spatiotemporal sequence matching in video copy detection, in Proceedings of the IEEE International Conference on Multimedia and Expo ICME’09, 2009, pp. 1382-1385.
M. Esmaeili, M. Fatourechi, and R. Ward, A robust and fast video copy detection system using content-based fingerprinting, IEEE Transactions on Information and Security, (6) 1 (20011), pp. 213-226
D. Dutta, S. Saha, and B. Chanda, Photometric attack invariant video sequence matching, in Proceedings of the 3rd International Conference on Electronics Computer Technology ICECT’11, vol. 1, (2011), pp. 340-344.
G. Strang, Introduction to Linear Algebra, 3rd ed. Wellesley-Cambridge Press, 2003.
L. Chen, F. W. M. Stentiford, L. C. A, and F. W. M. S. B, Video sequence matching based on temporal ordinal measurement, Tech. Rep., 2006.
Downloads
Published
How to Cite
Issue
Section
License
International Journal of Computing is an open access journal. Authors who publish with this journal agree to the following terms:• Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
• Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
• Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.