Frontiers of Electrical and Electronic Engineering >
0 208 - 215
A sparse representation-based approach for video copy detection
Received date: 28 Apr 2011
Accepted date: 08 Jul 2011
Published date: 05 Jun 2012
Copyright
Content-based video copy detection becomes an active research field due to requirement of copyright protection, business intelligence, video retrieval, etc. Although it is assumed in the existing methods that reference database consists of original videos, these videos are difficult to be obtained in many practical cases. In this paper, a copy detection method based on sparse representation is proposed to make use of some imperfect prototypes of original videos maintained in the reference database. A query video is represented as a linear combination of all the videos in the database. Then we can determine that whether the query has sibling videos in the database based on distribution of coefficients and find them out based on reconstruction error. The experiments show that even with very limited dimensional feature, this method can achieve high performance.
Jianmin LI , Chen SUN , Bo ZHANG . A sparse representation-based approach for video copy detection[J]. Frontiers of Electrical and Electronic Engineering, 0 , 7(2) : 208 -215 . DOI: 10.1007/s11460-011-0171-x
1 |
Great Scott! Over 35 Hours of Video Uploaded Every Minute to YouTube. http://youtube-global.blogspot.com/2010/11/great-scott-over-35-hours-of-video.html
|
2 |
Wu X, Hauptmann A G, Ngo C W. Practical elimination of near-duplicates from web video search. In: Proceedings of the 15th International Conference on Multimedia. 2007, 218-227
|
3 |
Guidelines for the TRECVID 2008 Evaluation. http://www-nlpir.nist.gov/projects/tv2008/tv2008.html
|
4 |
Wright J, Yang A Y, Ganesh A, Sastry S S, Ma Y. Robust face recognition via sparse representation. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2009, 31(2): 210-227
|
5 |
Liu L, Lai W, Hua X S, Yang S Q. Video histogram: A novel video signature for efficient web video duplicate detection. In: Proceedings of the 13th International Multimedia Modeling Conference. Lecture Notes in Computer Science, 2006, 4352: 94-103
|
6 |
Hua X S, Chen X, Zhang H J. Robust video signature based on ordinal measure. In: Proceedings of 2004 International Conference on Image Processing. 2004, 1: 685-688
|
7 |
Law-To J, Chen L, Joly A, Laptev I, Buisson O, Gouet-Brunet V, Boujemaa N, Stentiford F. Video copy detection: A comparative study. In: Proceedings of the 6th ACM International Conference on Image and Video Retrieval. 2007, 371-378
|
8 |
Harris C, Stephens M. A combined corner and edge detector. In: Proceedings of the Fourth Alvey Vision Conference. 1988, 147-151
|
9 |
Joly A, Frelicot C, Buisson O. Robust content-based video copy identification in a large reference database. In: Proceedings of the Second International Conference on Image and Video Retrieval. Lecture Notes in Computer Science, 2003, 2728: 511-516
|
10 |
Joly A, Buisson O, Frelicot C. Content-based copy retrieval using distortion-based probabilistic similarity search. IEEE Transactions on Multimedia, 2007, 9(2): 293-306
|
11 |
Law-To J, Buisson O, Gouet-Brunet V, Boujemaa N. Robust voting algorithm based on labels of behavior for video copy detection. In: Proceedings of the 14th Annual ACM International Conference on Multimedia. 2006, 835-844
|
12 |
Lowe D G. Object recognition from local scale-invariant features. In: Proceedings of the Seventh IEEE International Conference on Computer Vision. 1999, 1150-1157
|
13 |
Mikolajczyk K, Schmid C. Performance evaluation of local descriptors. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2005, 27(10): 1615-1630
|
14 |
Bay H, Tuytelaars T, Van Gool L. Surf: Speeded up robust features. In: Proceedings of the 9th European Conference on Computer Vision. 2006, 404-417
|
15 |
Datar M, Immorlica N, Indyk P, Mirrokni V S. Locality-sensitive hashing scheme based on p-stable distributions. In: Proceedings of the 12th Annual Symposium on Computational Geometry. 2004, 253-262
|
16 |
Coskun B, Sankur B, Menom N. Spatio-temporal transform-based video hashing. IEEE Transactions on Multimedia, 2006, 8(6): 1190-1208
|
17 |
Arya S, Mount D M, Netanyahu N S, Silverman R, Wu A Y. An optimal algorithm for approximate nearest neighbor searching. Journal of the ACM, 1998, 45(6): 891-923
|
18 |
Jegou H, Douze M, Schmid C. Hamming embedding and weak geometric consistency for large scale image search. In: Proceedings of the 10th European Conference on Computer Vision. 2008, 304-317
|
19 |
Chen S, Wang T, Wang J, Li J, Zhang Y, Lu H. A spatial-temporal-scale registration approach for video copy detection. In: Proceedings of the 9th Pacific Rim Conference on Multimedia. Lecture Notes in Computer Science, 2008, 5353: 407-415
|
20 |
Zhang Y, Gao K, Tang S, Wu X, Cao X, Ren H, Wu Y, Yang J. TRECVID 2008 content-based copy detection by MCG-ICT-CAS. In: Proceedings of TRECVID Workshop. 2008
|
21 |
Gengembre N, Brrani S A. A probabilistic framework for fusing frame-based searches within a video copy detection system. In: Proceedings of the 2008 International Conference on Content-based Image and Video Retrieval. 2008, 211-220
|
22 |
Figueiredo M A T, Nowak R D, Wright S J. Gradient projection for sparse reconstruction: Application to compressed sensing and other inverse problems. IEEE Journal of Selected Topics in Signal Processing, 2007, 1(4): 586-597
|
23 |
Osborne M R, Presnell B, Turlach B A. A new approach to variable selection in least squares problems. IMA Journal of Numerical Analysis, 2000, 20(3): 389-403
|
24 |
Wright S J, Nowak R D, Figueiredo M A T. Sparse reconstruction by separable approximation. IEEE Transactions on Signal Processing, 2009, 57(7): 2479-2493
|
25 |
Yang J, Zhang Y. Alternating direction algorithms for
|
26 |
Davis G, Mallat S, Avellaneda M. Adaptive greedy approximations. Constructive Approximation, 1997, 13(1): 57-98
|
27 |
Plumbley M D. Recovery of sparse representations by polytope faces pursuit. In: Proceedings of International Conference on Independent Component Analysis and Blind Source Separation. Lecture Notes in Computer Science, 2006, 3889: 206-213
|
/
〈 | 〉 |