SlideShare a Scribd company logo
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.1, February 2012
DOI : 10.5121/ijcseit.2012.2105 45
PERFORMANCE ANALYSIS OF FINGERPRINTING
EXTRACTION ALGORITHM IN VIDEO COPY
DETECTION SYSTEM
Ms.R.Gnana Rubini1
, Prof.P.Tamije Selvy2
, Ms.P.Anantha Prabha3
1
PG Student, 2
Assistant Professor(SG), 3
Assistant Professor
1,2,3
Department of Computer Science and Engineering, Sri Krishna College of
Technology, Coimbatore, India
1
gnanrajrad@gmail.com,2
tamijeselvy@gmail.com,3
ap.prabha@gmail.com
ABSTRACT
A video fingerprint is a recognizer that is derived from a piece of video content. The video fingerprinting
methods obtain unique features of a video that differentiates one video clip from another. It aims to identify
whether a query video segment is a copy of video from the video database or not based on the signature of
the video. It is difficult to find whether a video is a copied video or a similar video, since the features of the
content are very similar from one video to the other. The main focus of this paper is to detect that the query
video is present in the video database with robustness depending on the content of video and also by fast
search of fingerprints. The Fingerprint Extraction Algorithm and Fast Search Algorithms are adopted in
this paper to achieve robust, fast, efficient and accurate video copy detection. As a first step, the
Fingerprint Extraction algorithm is employed which extracts a fingerprint through the features from the
image content of video. The images are represented as Temporally Informative Representative Images
(TIRI). Then, the second step is to find the presence of copy of a query video in a video database, in which
a close match of its fingerprint in the corresponding fingerprint database is searched using inverted-file-
based method. The proposed system is tested against various attacks like noise, brightness, contrast,
rotation and frame drop. Thus the performance of the proposed system on an average shows high true
positive rate of 98% and low false positive rate of 1.3% for different attacks.
KEYWORDS
Video copy detection, Content-based fingerprinting, multimedia fingerprinting, video copy retrieval
1. INTRODUCTION
Image Mining deals with extraction of implicit knowledge, image data relationship or other
patterns not explicitly stored in images and uses ideas from computer vision, image processing,
image retrieval, data mining, machine learning, databases and AI. The fundamental challenge in
image mining is to determine how low-level, pixel representation contained in an image or an
image sequence can be effectively and efficiently processed to identify high-level spatial objects
and relationships. Typical image mining process involves preprocessing, transformations and
feature extraction, mining to discover significant patterns out of extracted features, evaluation and
interpretation and obtaining the final knowledge. Various techniques are also applied to image
mining and include object recognition, learning, clustering and classification.
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.1, February 2012
46
Video Copy Detection is based on detecting video copies from a video sample. Thus, copyright
violations can be avoided. In video copy detection based on the content[4], the signature which
defines the video in terms of content. The function of the video copy retrieval algorithms based
on its content extract the fingerprint[10] through the features of the visual content of video. Then
the fingerprint is used to compare with fingerprints from videos in a database. The problem
associated with this type of algorithms is difficult to find whether a video is a copied video or a
similar video. The features of the content are very similar from one video to the other and appear
as a copied image. For example, film archives.
Video fingerprinting methods extract several unique features of a digital video that can be stored
as a fingerprint of the video content. Fingerprints are feature vectors that can uniquely
characterize the video signal. The goal of a video fingerprinting system is to judge whether two
videos have the same contents by measuring distance between fingerprints extracted from the
videos. To find a copy of a query video in a video database, one can search for a close match of
its fingerprint in the corresponding fingerprint database, which is extracted from the videos in the
database. The closeness of two fingerprints represents a similarity between the corresponding
videos; two perceptually different videos should have different fingerprints. The overall structure
of the fingerprinting system is shown in Fig. 1.
Figure 1. Fingerprinting system.
1.1 Properties of Fingerprints
The video fingerprints generally need to satisfy the following properties:
a) Robustness: The fingerprints extracted from a degraded video should be similar to
fingerprints of the original video.
b) Pairwise independence: When two different videos are considered, the fingerprint
extracted from those videos should also be different.
c) Database search efficiency: For large-scale database applications, the fingerprints should
be efficient for DB search.
1.2. Types of Fingerprints
The existing video fingerprint extraction algorithms can be classified into four groups based on
the features that they extract: color-space-based, temporal, spatial, and spatio-temporal
fingerprinting. Color-space-based fingerprints are derived from the histograms of the colors in
specific regions over a particular time and/or space within the video. The color features are
popular because the features change with different video formats, at the same time these are not
applicable to black and white videos. Temporal fingerprints are derived from the characteristics
of a video sequence over time. Although these features perform work well with long video
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.1, February 2012
47
sequences, they do not perform well for short video clips since they do not contain sufficient
discriminant temporal information. Because short video clips occupy a large share of online video
databases, temporal fingerprints alone do not suit online applications. Spatial fingerprints are
features derived from each and every frame or from a key frame. They are widely used for both
video and image fingerprinting. Spatial fingerprints are subdivided into global and local
fingerprints. Global fingerprints represent the global properties of a frame or a subsection of it
(e.g., image histograms), while local fingerprints represent local information around some interest
points within a frame (e.g., edges). The space time interest points correspond to points where the
image values have significant local variation in both space and time. A spatial-temporal
fingerprinting is based on the differential of luminance of partitioned grids in spatial and temporal
regions.
2. RELATED WORK
Sunil lee, Member, IEEE, and Chang D. Yoo, [4] states that the centroid of gradient orientations
is chosen due to its pairwise independence and robustness against common video processing steps
that include lossy compression, resizing, frame rate change, etc. A threshold used to find a
fingerprint match derived by modeling this fingerprint. The performance of this fingerprint
system is compared with that of other widely-used features.
M. Malekesmaeili, M. Fatourechi, and R. K.Ward, [5] proposes an approach for generating
representative images of a video sequence that carry the temporal as well as the spatial
information. These images are denoted as TIRIs, Temporally Informative Representative
Images[5]. Performance of the approach is demonstrated by applying a simple image hashing
technique on TIRIs of a video database.
A. Gionis, P. Indyk, and R. Motwani, suggested a novel scheme for approximate similarity search
is examined based on hashing[2]. The hashing technique used here is based on locality-sensitive
hashing. The basic idea is to hash the points from the database so as to ensure that the probability
of collision is much higher for objects that are close to each other than for those that are far apart.
The query time improves even by allowing small error and storage overhead. This technique
provides a better result for large number of dimensions and data size.
B. Coskun, B. Sankur, and N. Memon [1] proposes two robust hash algorithms for video are
based both on the Discrete Cosine Transform (DCT), one on the classical basis set and the other
on a novel randomized basis set (RBT). The robustness and randomness properties of the hash
functions are resistant to signal processing and transmission impairments, and therefore can be
instrumental in building database search, broadcast monitoring and watermarking applications for
video. The DCT hash is more robust, but lacks security aspect, as it is easy to find different video
clips with the same hash value.
Roover et al. extracted the variance of the pixels in different radial regions passing through the
center of the key frames [9] based on a set of radial projections of the image pixel luminance
values. A drawback of the key-frame-based techniques is the sensitivity of the key frames to
frame dropping and noise [9]. This might adversely affect copyright protection applications as a
pirate can change the hash by manipulating the key frames or shot boundaries.
3. PROPOSED SCHEME
This paper relies on a fingerprint extraction algorithm followed by a fast approximate search
algorithm. Fingerprints are feature vectors that can uniquely characterize the video signal. Video
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.1, February 2012
48
fingerprinting methods extract several unique features of a digital video that can be stored as a
fingerprint of the video content. Video fingerprinting is technology that has proven to be effective
in identifying and comparing digital video data. The goal of a video fingerprinting system is to
judge whether two videos have the same contents by measuring distance between fingerprints
extracted from the videos. The fingerprint extraction algorithm[4] extracts compact content-based
fingerprint[8] from special images constructed from the video. Each such image represents a short
segment of the video and contains temporal as well as spatial information about the video
segment[7]. These images are denoted by temporally informative representative images (tiri)
[5],[11]. The image also contains information about possible existing motions in the video. The
fast search algorithms used for finding the match between the videos are inverted file based
method. To find whether a query video (or a part of it) is copied from a video in a video database,
the fingerprints of all the videos in the database are extracted and stored in advance as shown in
Fig. 2. The search algorithm[6] searches the stored fingerprints to find close enough matches for
the fingerprints of the query video.
Figure 2. Overall process of fingerprinting system.
3.1 Feature Extraction
3.1.1 Generating TIRI-DCT
The fingerprint algorithm would be robust to changes in the frame size by applying pre-
processing. Down-sampling can increase the robustness of a fingerprinting algorithm to these
changes. This step consists of resizing of the video into fixed W×H, where W×H is the frame
size. After this pre-processing step, the video is segmented into fixed short segments. Therefore
the frames obtained from the videos are resized.
The preprocessed images are converted to grayscale images, in order to obtain luminance value of
the pixels of all available frames. This will be used to compute the weighted sum of the frames,
i.e., the pixels of representative images[5]. The weighted average method used here is an
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.1, February 2012
49
exponential method. This exponential weighting function produces perceptually better results and
also generates images that best capture the motion of video. The pixels of representative images
are used for the generation of DCT (Discrete Cosine Transform)[1]. The steps involved in TIRI-
DCT are as follows:
a) Extract frames from given video input.
b) Pre-process the frames obtained.
c) Convert RGB image into grayscale image.
d) Compute pixels of TIRI as the weighted sum of frames using
J
l’
m,n=∑ wklm,n,k
k=1
where l’
m,n - pixels of TIRI.
wk - weighted average.
lm,n,k - luminance value of (m,n)th
pixel of kth
frame.
e) Generate DCT for TIRI.
3.1.2 Binary Fingerprint
TIRI-DCT is segmented into number of blocks. The DCT-based hash, which uses low frequency
2D-DCT coefficients of the TIRIs is used because of its better detection characteristics. The
features of input video are derived by applying a 2D-DCT on the blocks of size n x n from each
TIRI. From each of these blocks, 1st horizontal and 1st vertical coefficients are extracted. These
coefficients[5] of each block of representative images are concatenated and will be used to
calculate the median as shown in Fig. 3.
The binary fingerprints[4] are generated by comparing the median value(threshold) and the values
of coefficients as follows: If the values of coefficients are greater than or equal to median value,
then the value 1 is assigned to binary hash. If the values of coefficients are less than median
value, then the value 0 is assigned to binary hash.
Figure 3. Steps involved in generating binary fingerprint.
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.1, February 2012
50
The steps involved in generating binary fingerprint are:
a) TIRI-DCT is segmented into number of blocks.
b) Extract 1st
horizontal coefficients of DCT.
c) Extract 1st
vertical coefficients of DCT.
d) Concatenate horizontal and vertical coefficients.
e) Compute median m from the concatenated values.
f) Compare coefficients with median.
g) If the values of coefficients are greater than or equal to median value, then the value
1 is assigned to it.
h) If the values of coefficients are greater than or equal to median value, then the value
1 is assigned to it.
3.2 Inverted File Based Similarity Search
The binary fingerprints are divided into n words with m equal number of bits. Each of those m
bits are termed as words, which are used to create table of size, 2m
*n where 2m
represents the
possible values of words and n represents position of word. The horizontal and vertical
dimensions of the table represent the possible values and position of a word respectively. To
generate this table[3], consider the first word of each fingerprints and add the index of the
fingerprint to the entry in the first column corresponding to the value of this word. This process is
continued for all the words in each fingerprint and all the columns in the inverted file table[9].
Once a inverted file index has been created, it can be used to match a fingerprint of query video
against the collection. To find a query fingerprint in the database, first the fingerprint is divided
into words. The query is then compared to all the fingerprints that start with the same word. The
indices[2] of these fingerprints are found from the corresponding entry in the first column of the
inverted file table.
The Hamming distance[12] is calculated between fingerprints in database and query fingerprint.
If the distance is less than threshold value, then the query video will be announced as matching,
otherwise as not matching with the database. The steps involved are as follows:
a) Binary fingerprints are divided into n words of equal bits.
b) The horizontal dimension of the table represents the position of a words.
c) The vertical dimension of the table represents the possible values of words.
d) Add index for each word of the fingerprint to the entry in column corresponding to
the value of the word.
e) Hamming distance is calculated between fingerprints in database and query
fingerprint.
f) If the distance is less than threshold value, then the query video will be announced as
matching.
g) Otherwise, it will be announced as not matching.
In the fingerprint matching process, two videos are declared similar if the distance between their
fingerprints is below a certain threshold.
4. EXPERIMENTAL RESULT
The performance of the proposed video fingerprinting method is evaluated using the fingerprint
Database generated. The length and the resolution of the videos in the DB
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.1, February 2012
51
range up to 4 minutes, and from 384 X 288. The frame rate is 25 fps for all videos. The videos are
chosen to be in avi(Audio Video Interleaved) format. This system announces whether the query
video matches video in database using inverted file based similarity search method.
Figure 4. Input video
The Fig. 4 shows the video of avi format from input video database. By iteration, all videos in
video database can be read. Depending on the frame rate and duration of the video, number of
frames present in it varies. Frames of all videos are extracted.
Figure 5. DCT of video
For all the frames extracted from the video, preprocessing is performed. The preprocessing
technique used in this process is down sampling. Here, the sizes of frames are reduced uniformly
for all videos in database. The reduced size of frame is 128*128. The RGB images are converted
into grayscale images, in order to obtain luminance value of the pixels of all available frames.
This will be used to compute the weighted sum of the frames, i.e., the pixels of representative
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.1, February 2012
52
images. The Fig. 5 shows DCT being applied to representative image of video and segmented
into number of blocks. From each blocks, horizontal and vertical coefficients are extracted.
Figure 6. Binary fingerprint of video
Concatenate all coefficients of each block of DCT video to find the value of median, which will
be used to compare with coefficients to generate binary fingerprint. If the values of coefficients
are greater than or equal to median value, then the value 1 is assigned to it. If the values of
coefficients are less than median value, then the value 0 is assigned to it. The Fig. 6 shows binary
fingerprint of video obtained.
Figure 7. Selection of query video
Figure 8. Announcement of match in database
The Fig. 7 shows the selection of query video, for which match in database will be found. The
binary fingerprint of query video is obtained by following similar procedure as that in generation
of binary fingerprint of a video in video database. The Fig. 8 shows announcement of matching of
query video with video in database based on the distance between the fingerprints in database and
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.1, February 2012
53
query fingerprint using inverted file based similarity search method. If the DB position with the
minimum distance exactly corresponds to the input fingerprint sequence in the processed video, it
is assumed that the input fingerprint sequence is correctly identified.
Table 1. Performance of Inverted File Based Similarity Search
Figure 9. Accuracy based on various attacks
The attacks are mounted independently on the videos to generate the queries. Table 1 represents
performance of inverted file based similarity search based on true positive rate (TPR) and false
positive rate (FPR). Percentage of accuracy in detecting similarity between the query video and
videos in the database using inverted file based similarity search is shown in Fig. 9. Thus the
inverted file based similarity search provides better performance in detecting the exact match
between the videos.
5. CONCLUSION
The proposed fingerprinting algorithm, TIRI-DCT extracts robust, discriminant, and compact
fingerprints from videos in a fast and reliable fashion. These fingerprints are extracted from TIRIs
containing both spatial and temporal information about a video segment. The proposed fast
approximate search algorithm, the inverted file based method, which is a generalization of an
existing search method is fast in detecting whether the query video is present in video database.
By using inverted file based similarity search for detecting the similarity among the videos, the
performance of the system yield high true positive rate and low false positive rate. Future work
Attacks Noise Rotation Brightness Contrast Frame drop
TPR(%) 98.15 99.10 98.73 97.91 96.46
FPR(%) 1.64 0.87 0.90 1.52 1.78
F-Score 0.98 0.98 0.99 0.98 0.99
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.1, February 2012
54
includes implementation of cluster based similarity search method and product quantizer method
detects whether the query video is present in video database. The performance of all the above
similarity search methods will be evaluated in order to find the best similarity search technique in
an efficient manner.
REFERENCES
[1] B. Coskun, B. Sankur, and N. Memon, “Spatiotemporal transform based video hashing,” IEEE
Trans. Multimedia, vol. 8, no. 6, pp.1190–1208, Dec. 2006.
[2] A. Gionis, P. Indyk, and R. Motwani, “Similarity search in high dimen- sions via hashing,” in
Proc. Int. Conf. Very Large Data Bases (VLDB), San Francisco, CA, 1999, pp. 518–529, Morgan
Kaufmann Publishers Inc..
[3] A. Hampapur and R. M. Bolle, Videogrep: Video copy detection using inverted file indices IBM
Research Division Thomas. J. Watson Research Center, Tech. Rep., 2001.
[4] S. Lee and C. Yoo, “Robust video fingerprinting for content-based video identification,” IEEE
Trans. Circuits Syst. Video Technol., vol.18, no. 7, pp. 983–988, Jul. 2008.
[5] M. Malekesmaeili, M. Fatourechi, and R. K. Ward, “Video copy detec- tion using temporally
informative representative images,” in Proc. Int.Conf. Machine Learning and Applications, Dec.
2009, pp. 69–74.
[6] Mani Malek Esmaeili, Mehrdad Fatourechi, and Rabab Kreidieh Ward,Fellow, IEEE, “A robust
and fast video copy detection system using content-based fingerprinting,” IEEE Trans. on
Information Forensics and Security, vol. 6, no. 1, Mar. 2011.
[7] J. Law-To, L. Chen, A. Joly, I. Laptev, O. Buisson, V. Gouet-Brunet, N.Boujemaa, and F.
Stentiford, “Video copy detection: A comparative study,” in Proc. ACM Int. Conf. Image and
Video Retrieval, New York, NY, 2007, pp. 371–378, ACM.
[8] R. Radhakrishnan and C. Bauer, “Content-based video signatures based on projections of
difference images,” in Proc. MMSP, Oct. 2007, pp.341–344.
[9] C. De Roover, C. De Vleeschouwer, F. Lefebvre, and B. Macq, “Robust video hashing based on
radial projections of key frames,” IEEE Trans.Signal Process., vol. 53, no. 10, pp. 4020–4037,
Oct. 2005.
[10] G. Willems, T. Tuytelaars, and L. Van Gool, “Spatio-temporal features for robust content-based
video copy detection,” in Proc. ACM Int. Conf Multimedia Information Retrieval, New York, NY,
2008, pp. 283–290, ACM.
[11] M. Malekesmaeili and R. K. Ward, “Robust video hashing based on temporally informative
representative images,” in Proc. IEEE Int. Conf.Consumer Electronics, Jan. 2010, pp. 179–180.
[12] M. L. Miller, “Audio fingerprinting: Nearest neighbour search in high dimensional binary spaces,”
in IEEE Workshop on 2002, Multimedia Signal Processing, 2002, 2002, pp. 182–185.
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.1, February 2012
55
Authors
Ms.R.Gnana Rubini has received Bachelor of Technology degree in
Information Technology under Anna University, Chennai in 2010. She is
currently pursuing Master of Engineering degree in Computer Science and
Engineering under Anna University, Coimbatore, India. Her areas of interest
are Data Mining and Image Processing.
Prof. P.Tamije Selvy received B.Tech (CSE), M.Tech (CSE) in 1996 and 1998
respectively from Pondicherry university. Since 1999, she has been working as
faculty in reputed Engineering Colleges. At Present, she is working as
Assistant Professor(SG) in the department of Computer Science &
Engineering, Sri Krishna College of Technology, Coimbatore. She is currently
pursuing Ph.D under Anna University, Chennai. Her Research interests include
Image Processing, Data Mining, Pattern Recognition and Artificial
Intelligence.
Ms.P.Anantha Prabha obtained B.E in Electronics and Communication
Engineering and Master of Engineering in Computer Science and Engineering
from V.L.B. Janakiammal College of Engineering and Technology,
Coimbatore, India in 2001 and 2008 respectively. She has been working in
various Engineering Colleges for 9 years. She is currently working as an
Assistant Professor in Sri Krishna College of Technology, Coimbatore. Her
areas of interest are Clouding Computing, Mobile Computing and Image
Processing.

More Related Content

PDF
Inverted File Based Search Technique for Video Copy Retrieval
ijcsa
 
PDF
Ac02417471753
IJMER
 
PDF
Hv2615441548
IJERA Editor
 
PDF
Performance Comparison of Digital Image Watermarking Techniques: A Survey
Editor IJCATR
 
PDF
LOCALIZATION OF OVERLAID TEXT BASED ON NOISE INCONSISTENCIES
aciijournal
 
PDF
ADAPTIVE WATERMARKING TECHNIQUE FOR SPEECH SIGNAL AUTHENTICATION
ijcsit
 
PDF
AcademicProject
Anvesh Kolluri
 
PPTX
Unsupervised object-level video summarization with online motion auto-encoder
NEERAJ BAGHEL
 
Inverted File Based Search Technique for Video Copy Retrieval
ijcsa
 
Ac02417471753
IJMER
 
Hv2615441548
IJERA Editor
 
Performance Comparison of Digital Image Watermarking Techniques: A Survey
Editor IJCATR
 
LOCALIZATION OF OVERLAID TEXT BASED ON NOISE INCONSISTENCIES
aciijournal
 
ADAPTIVE WATERMARKING TECHNIQUE FOR SPEECH SIGNAL AUTHENTICATION
ijcsit
 
AcademicProject
Anvesh Kolluri
 
Unsupervised object-level video summarization with online motion auto-encoder
NEERAJ BAGHEL
 

What's hot (19)

PDF
D010312230
IOSR Journals
 
PDF
IRJET- Wearable AI Device for Blind
IRJET Journal
 
PDF
International Journal of Computer Science and Security (IJCSS) Volume (3) Iss...
CSCJournals
 
PPTX
Biometric recognition using deep learning
SwatiNarkhede1
 
PDF
Video content analysis and retrieval system using video storytelling and inde...
IJECEIAES
 
PDF
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
IOSRJVSP
 
PDF
MULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNING
sipij
 
PPTX
M.tech Third progress Presentation
NEERAJ BAGHEL
 
PDF
L026070074
ijceronline
 
PDF
A Framework for Human Action Detection via Extraction of Multimodal Features
CSCJournals
 
PDF
370 374
Editor IJARCET
 
PDF
Discovering Anomalies Based on Saliency Detection and Segmentation in Surveil...
ijtsrd
 
PDF
Volume 2-issue-6-2119-2124
Editor IJARCET
 
PPTX
Mtech Fourth progress presentation
NEERAJ BAGHEL
 
DOC
Ramprakash Resume
Ram Prakash
 
PDF
Information technology
bikram ...
 
PDF
PCS 2016 presentation
Ashek Ahmmed
 
PDF
Modelling Framework of a Neural Object Recognition
IJERA Editor
 
PPTX
Mtech Second progresspresentation ON VIDEO SUMMARIZATION
NEERAJ BAGHEL
 
D010312230
IOSR Journals
 
IRJET- Wearable AI Device for Blind
IRJET Journal
 
International Journal of Computer Science and Security (IJCSS) Volume (3) Iss...
CSCJournals
 
Biometric recognition using deep learning
SwatiNarkhede1
 
Video content analysis and retrieval system using video storytelling and inde...
IJECEIAES
 
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
IOSRJVSP
 
MULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNING
sipij
 
M.tech Third progress Presentation
NEERAJ BAGHEL
 
L026070074
ijceronline
 
A Framework for Human Action Detection via Extraction of Multimodal Features
CSCJournals
 
Discovering Anomalies Based on Saliency Detection and Segmentation in Surveil...
ijtsrd
 
Volume 2-issue-6-2119-2124
Editor IJARCET
 
Mtech Fourth progress presentation
NEERAJ BAGHEL
 
Ramprakash Resume
Ram Prakash
 
Information technology
bikram ...
 
PCS 2016 presentation
Ashek Ahmmed
 
Modelling Framework of a Neural Object Recognition
IJERA Editor
 
Mtech Second progresspresentation ON VIDEO SUMMARIZATION
NEERAJ BAGHEL
 
Ad

Similar to PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DETECTION SYSTEM (20)

PDF
An Exploration based on Multifarious Video Copy Detection Strategies
idescitation
 
PDF
Real-Time Video Copy Detection in Big Data
IRJET Journal
 
PDF
E0704019023
IJERD Editor
 
PDF
Video Fingerprinting and Applications: A Review
Jian Lu
 
PDF
Efficient and Robust Detection of Duplicate Videos in a Database
rahulmonikasharma
 
PDF
Efficient and Robust Detection of Duplicate Videos in a Database
rahulmonikasharma
 
PDF
Efficient and Robust Detection of Duplicate Videos in a Database
rahulmonikasharma
 
PDF
A Survey on Multimedia Content Protection Mechanisms
IJECEIAES
 
PDF
Video Content Identification using Video Signature: Survey
IRJET Journal
 
PDF
Bn32416419
IJERA Editor
 
PDF
Video copy detection using segmentation method and
eSAT Publishing House
 
PDF
A Segmentation Based Sequential Pattern Matching for Efficient Video Copy Det...
Best Jobs
 
PDF
Content based indexing and retrieval from vehicle surveillance videos
IAEME Publication
 
PDF
IRJET-Survey of Image Object Recognition Techniques
IRJET Journal
 
PDF
Survey of Image Object Recognition Techniques
IRJET Journal
 
PDF
Vdfp audio and video fingerprinting
WietskevdHeuvel
 
DOCX
Cloud-Based Multimedia Content Protection System
nexgentechnology
 
DOCX
CLOUD-BASED MULTIMEDIA CONTENT PROTECTION SYSTEM
Nexgen Technology
 
DOCX
Cloud based multimedia content protection system3
nexgentech15
 
An Exploration based on Multifarious Video Copy Detection Strategies
idescitation
 
Real-Time Video Copy Detection in Big Data
IRJET Journal
 
E0704019023
IJERD Editor
 
Video Fingerprinting and Applications: A Review
Jian Lu
 
Efficient and Robust Detection of Duplicate Videos in a Database
rahulmonikasharma
 
Efficient and Robust Detection of Duplicate Videos in a Database
rahulmonikasharma
 
Efficient and Robust Detection of Duplicate Videos in a Database
rahulmonikasharma
 
A Survey on Multimedia Content Protection Mechanisms
IJECEIAES
 
Video Content Identification using Video Signature: Survey
IRJET Journal
 
Bn32416419
IJERA Editor
 
Video copy detection using segmentation method and
eSAT Publishing House
 
A Segmentation Based Sequential Pattern Matching for Efficient Video Copy Det...
Best Jobs
 
Content based indexing and retrieval from vehicle surveillance videos
IAEME Publication
 
IRJET-Survey of Image Object Recognition Techniques
IRJET Journal
 
Survey of Image Object Recognition Techniques
IRJET Journal
 
Vdfp audio and video fingerprinting
WietskevdHeuvel
 
Cloud-Based Multimedia Content Protection System
nexgentechnology
 
CLOUD-BASED MULTIMEDIA CONTENT PROTECTION SYSTEM
Nexgen Technology
 
Cloud based multimedia content protection system3
nexgentech15
 
Ad

More from IJCSEIT Journal (20)

PDF
ANALYSIS OF EXISTING TRAILERS’ CONTAINER LOCK SYSTEMS
IJCSEIT Journal
 
PDF
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
IJCSEIT Journal
 
PDF
BIOMETRIC APPLICATION OF INTELLIGENT AGENTS IN FAKE DOCUMENT DETECTION OF JOB...
IJCSEIT Journal
 
PDF
FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...
IJCSEIT Journal
 
PDF
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
IJCSEIT Journal
 
PDF
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...
IJCSEIT Journal
 
PDF
FUZZY WEIGHTED ASSOCIATIVE CLASSIFIER: A PREDICTIVE TECHNIQUE FOR HEALTH CARE...
IJCSEIT Journal
 
PDF
GENDER RECOGNITION SYSTEM USING SPEECH SIGNAL
IJCSEIT Journal
 
PDF
DETECTION OF CONCEALED WEAPONS IN X-RAY IMAGES USING FUZZY K-NN
IJCSEIT Journal
 
PDF
META-HEURISTICS BASED ARF OPTIMIZATION FOR IMAGE RETRIEVAL
IJCSEIT Journal
 
PDF
ERROR PERFORMANCE ANALYSIS USING COOPERATIVE CONTENTION-BASED ROUTING IN WIRE...
IJCSEIT Journal
 
PDF
M-FISH KARYOTYPING - A NEW APPROACH BASED ON WATERSHED TRANSFORM
IJCSEIT Journal
 
PDF
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
IJCSEIT Journal
 
PDF
A NOVEL WINDOW FUNCTION YIELDING SUPPRESSED MAINLOBE WIDTH AND MINIMUM SIDELO...
IJCSEIT Journal
 
PDF
CSHURI – Modified HURI algorithm for Customer Segmentation and Transaction Pr...
IJCSEIT Journal
 
PDF
AN EFFICIENT IMPLEMENTATION OF TRACKING USING KALMAN FILTER FOR UNDERWATER RO...
IJCSEIT Journal
 
PDF
USING DATA MINING TECHNIQUES FOR DIAGNOSIS AND PROGNOSIS OF CANCER DISEASE
IJCSEIT Journal
 
PDF
FACTORS AFFECTING ACCEPTANCE OF WEB-BASED TRAINING SYSTEM: USING EXTENDED UTA...
IJCSEIT Journal
 
PDF
PROBABILISTIC INTERPRETATION OF COMPLEX FUZZY SET
IJCSEIT Journal
 
PDF
ALGORITHMIC AND ARCHITECTURAL OPTIMIZATION OF A 3D RECONSTRUCTION MEDICAL IMA...
IJCSEIT Journal
 
ANALYSIS OF EXISTING TRAILERS’ CONTAINER LOCK SYSTEMS
IJCSEIT Journal
 
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
IJCSEIT Journal
 
BIOMETRIC APPLICATION OF INTELLIGENT AGENTS IN FAKE DOCUMENT DETECTION OF JOB...
IJCSEIT Journal
 
FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...
IJCSEIT Journal
 
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
IJCSEIT Journal
 
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...
IJCSEIT Journal
 
FUZZY WEIGHTED ASSOCIATIVE CLASSIFIER: A PREDICTIVE TECHNIQUE FOR HEALTH CARE...
IJCSEIT Journal
 
GENDER RECOGNITION SYSTEM USING SPEECH SIGNAL
IJCSEIT Journal
 
DETECTION OF CONCEALED WEAPONS IN X-RAY IMAGES USING FUZZY K-NN
IJCSEIT Journal
 
META-HEURISTICS BASED ARF OPTIMIZATION FOR IMAGE RETRIEVAL
IJCSEIT Journal
 
ERROR PERFORMANCE ANALYSIS USING COOPERATIVE CONTENTION-BASED ROUTING IN WIRE...
IJCSEIT Journal
 
M-FISH KARYOTYPING - A NEW APPROACH BASED ON WATERSHED TRANSFORM
IJCSEIT Journal
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
IJCSEIT Journal
 
A NOVEL WINDOW FUNCTION YIELDING SUPPRESSED MAINLOBE WIDTH AND MINIMUM SIDELO...
IJCSEIT Journal
 
CSHURI – Modified HURI algorithm for Customer Segmentation and Transaction Pr...
IJCSEIT Journal
 
AN EFFICIENT IMPLEMENTATION OF TRACKING USING KALMAN FILTER FOR UNDERWATER RO...
IJCSEIT Journal
 
USING DATA MINING TECHNIQUES FOR DIAGNOSIS AND PROGNOSIS OF CANCER DISEASE
IJCSEIT Journal
 
FACTORS AFFECTING ACCEPTANCE OF WEB-BASED TRAINING SYSTEM: USING EXTENDED UTA...
IJCSEIT Journal
 
PROBABILISTIC INTERPRETATION OF COMPLEX FUZZY SET
IJCSEIT Journal
 
ALGORITHMIC AND ARCHITECTURAL OPTIMIZATION OF A 3D RECONSTRUCTION MEDICAL IMA...
IJCSEIT Journal
 

Recently uploaded (20)

PDF
dse_final_merit_2025_26 gtgfffffcjjjuuyy
rushabhjain127
 
PPTX
Lesson 3_Tessellation.pptx finite Mathematics
quakeplayz54
 
PPTX
Unit 5 BSP.pptxytrrftyyydfyujfttyczcgvcd
ghousebhasha2007
 
PDF
Structs to JSON How Go Powers REST APIs.pdf
Emily Achieng
 
PPTX
Module_II_Data_Science_Project_Management.pptx
anshitanarain
 
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
sangeethamtech26
 
PDF
Top 10 read articles In Managing Information Technology.pdf
IJMIT JOURNAL
 
PDF
LEAP-1B presedntation xxxxxxxxxxxxxxxxxxxxxxxxxxxxx
hatem173148
 
PDF
Principles of Food Science and Nutritions
Dr. Yogesh Kumar Kosariya
 
PPTX
Edge to Cloud Protocol HTTP WEBSOCKET MQTT-SN MQTT.pptx
dhanashri894551
 
PPTX
Module2 Data Base Design- ER and NF.pptx
gomathisankariv2
 
PDF
오픈소스 LLM, vLLM으로 Production까지 (Instruct.KR Summer Meetup, 2025)
Hyogeun Oh
 
PPT
SCOPE_~1- technology of green house and poyhouse
bala464780
 
PPTX
The-Looming-Shadow-How-AI-Poses-Dangers-to-Humanity.pptx
shravanidabhane8
 
PPTX
ANIMAL INTERVENTION WARNING SYSTEM (4).pptx
dodultrongaming
 
PPTX
Azure-DevOps-Training presentation downloadable
NamanGoyal428595
 
PDF
Activated Carbon for Water and Wastewater Treatment_ Integration of Adsorptio...
EmilianoRodriguezTll
 
PDF
A Framework for Securing Personal Data Shared by Users on the Digital Platforms
ijcncjournal019
 
PDF
Cryptography and Information :Security Fundamentals
Dr. Madhuri Jawale
 
PDF
Unit I Part II.pdf : Security Fundamentals
Dr. Madhuri Jawale
 
dse_final_merit_2025_26 gtgfffffcjjjuuyy
rushabhjain127
 
Lesson 3_Tessellation.pptx finite Mathematics
quakeplayz54
 
Unit 5 BSP.pptxytrrftyyydfyujfttyczcgvcd
ghousebhasha2007
 
Structs to JSON How Go Powers REST APIs.pdf
Emily Achieng
 
Module_II_Data_Science_Project_Management.pptx
anshitanarain
 
Strings in CPP - Strings in C++ are sequences of characters used to store and...
sangeethamtech26
 
Top 10 read articles In Managing Information Technology.pdf
IJMIT JOURNAL
 
LEAP-1B presedntation xxxxxxxxxxxxxxxxxxxxxxxxxxxxx
hatem173148
 
Principles of Food Science and Nutritions
Dr. Yogesh Kumar Kosariya
 
Edge to Cloud Protocol HTTP WEBSOCKET MQTT-SN MQTT.pptx
dhanashri894551
 
Module2 Data Base Design- ER and NF.pptx
gomathisankariv2
 
오픈소스 LLM, vLLM으로 Production까지 (Instruct.KR Summer Meetup, 2025)
Hyogeun Oh
 
SCOPE_~1- technology of green house and poyhouse
bala464780
 
The-Looming-Shadow-How-AI-Poses-Dangers-to-Humanity.pptx
shravanidabhane8
 
ANIMAL INTERVENTION WARNING SYSTEM (4).pptx
dodultrongaming
 
Azure-DevOps-Training presentation downloadable
NamanGoyal428595
 
Activated Carbon for Water and Wastewater Treatment_ Integration of Adsorptio...
EmilianoRodriguezTll
 
A Framework for Securing Personal Data Shared by Users on the Digital Platforms
ijcncjournal019
 
Cryptography and Information :Security Fundamentals
Dr. Madhuri Jawale
 
Unit I Part II.pdf : Security Fundamentals
Dr. Madhuri Jawale
 

PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DETECTION SYSTEM

  • 1. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.1, February 2012 DOI : 10.5121/ijcseit.2012.2105 45 PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DETECTION SYSTEM Ms.R.Gnana Rubini1 , Prof.P.Tamije Selvy2 , Ms.P.Anantha Prabha3 1 PG Student, 2 Assistant Professor(SG), 3 Assistant Professor 1,2,3 Department of Computer Science and Engineering, Sri Krishna College of Technology, Coimbatore, India 1 [email protected],2 [email protected],3 [email protected] ABSTRACT A video fingerprint is a recognizer that is derived from a piece of video content. The video fingerprinting methods obtain unique features of a video that differentiates one video clip from another. It aims to identify whether a query video segment is a copy of video from the video database or not based on the signature of the video. It is difficult to find whether a video is a copied video or a similar video, since the features of the content are very similar from one video to the other. The main focus of this paper is to detect that the query video is present in the video database with robustness depending on the content of video and also by fast search of fingerprints. The Fingerprint Extraction Algorithm and Fast Search Algorithms are adopted in this paper to achieve robust, fast, efficient and accurate video copy detection. As a first step, the Fingerprint Extraction algorithm is employed which extracts a fingerprint through the features from the image content of video. The images are represented as Temporally Informative Representative Images (TIRI). Then, the second step is to find the presence of copy of a query video in a video database, in which a close match of its fingerprint in the corresponding fingerprint database is searched using inverted-file- based method. The proposed system is tested against various attacks like noise, brightness, contrast, rotation and frame drop. Thus the performance of the proposed system on an average shows high true positive rate of 98% and low false positive rate of 1.3% for different attacks. KEYWORDS Video copy detection, Content-based fingerprinting, multimedia fingerprinting, video copy retrieval 1. INTRODUCTION Image Mining deals with extraction of implicit knowledge, image data relationship or other patterns not explicitly stored in images and uses ideas from computer vision, image processing, image retrieval, data mining, machine learning, databases and AI. The fundamental challenge in image mining is to determine how low-level, pixel representation contained in an image or an image sequence can be effectively and efficiently processed to identify high-level spatial objects and relationships. Typical image mining process involves preprocessing, transformations and feature extraction, mining to discover significant patterns out of extracted features, evaluation and interpretation and obtaining the final knowledge. Various techniques are also applied to image mining and include object recognition, learning, clustering and classification.
  • 2. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.1, February 2012 46 Video Copy Detection is based on detecting video copies from a video sample. Thus, copyright violations can be avoided. In video copy detection based on the content[4], the signature which defines the video in terms of content. The function of the video copy retrieval algorithms based on its content extract the fingerprint[10] through the features of the visual content of video. Then the fingerprint is used to compare with fingerprints from videos in a database. The problem associated with this type of algorithms is difficult to find whether a video is a copied video or a similar video. The features of the content are very similar from one video to the other and appear as a copied image. For example, film archives. Video fingerprinting methods extract several unique features of a digital video that can be stored as a fingerprint of the video content. Fingerprints are feature vectors that can uniquely characterize the video signal. The goal of a video fingerprinting system is to judge whether two videos have the same contents by measuring distance between fingerprints extracted from the videos. To find a copy of a query video in a video database, one can search for a close match of its fingerprint in the corresponding fingerprint database, which is extracted from the videos in the database. The closeness of two fingerprints represents a similarity between the corresponding videos; two perceptually different videos should have different fingerprints. The overall structure of the fingerprinting system is shown in Fig. 1. Figure 1. Fingerprinting system. 1.1 Properties of Fingerprints The video fingerprints generally need to satisfy the following properties: a) Robustness: The fingerprints extracted from a degraded video should be similar to fingerprints of the original video. b) Pairwise independence: When two different videos are considered, the fingerprint extracted from those videos should also be different. c) Database search efficiency: For large-scale database applications, the fingerprints should be efficient for DB search. 1.2. Types of Fingerprints The existing video fingerprint extraction algorithms can be classified into four groups based on the features that they extract: color-space-based, temporal, spatial, and spatio-temporal fingerprinting. Color-space-based fingerprints are derived from the histograms of the colors in specific regions over a particular time and/or space within the video. The color features are popular because the features change with different video formats, at the same time these are not applicable to black and white videos. Temporal fingerprints are derived from the characteristics of a video sequence over time. Although these features perform work well with long video
  • 3. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.1, February 2012 47 sequences, they do not perform well for short video clips since they do not contain sufficient discriminant temporal information. Because short video clips occupy a large share of online video databases, temporal fingerprints alone do not suit online applications. Spatial fingerprints are features derived from each and every frame or from a key frame. They are widely used for both video and image fingerprinting. Spatial fingerprints are subdivided into global and local fingerprints. Global fingerprints represent the global properties of a frame or a subsection of it (e.g., image histograms), while local fingerprints represent local information around some interest points within a frame (e.g., edges). The space time interest points correspond to points where the image values have significant local variation in both space and time. A spatial-temporal fingerprinting is based on the differential of luminance of partitioned grids in spatial and temporal regions. 2. RELATED WORK Sunil lee, Member, IEEE, and Chang D. Yoo, [4] states that the centroid of gradient orientations is chosen due to its pairwise independence and robustness against common video processing steps that include lossy compression, resizing, frame rate change, etc. A threshold used to find a fingerprint match derived by modeling this fingerprint. The performance of this fingerprint system is compared with that of other widely-used features. M. Malekesmaeili, M. Fatourechi, and R. K.Ward, [5] proposes an approach for generating representative images of a video sequence that carry the temporal as well as the spatial information. These images are denoted as TIRIs, Temporally Informative Representative Images[5]. Performance of the approach is demonstrated by applying a simple image hashing technique on TIRIs of a video database. A. Gionis, P. Indyk, and R. Motwani, suggested a novel scheme for approximate similarity search is examined based on hashing[2]. The hashing technique used here is based on locality-sensitive hashing. The basic idea is to hash the points from the database so as to ensure that the probability of collision is much higher for objects that are close to each other than for those that are far apart. The query time improves even by allowing small error and storage overhead. This technique provides a better result for large number of dimensions and data size. B. Coskun, B. Sankur, and N. Memon [1] proposes two robust hash algorithms for video are based both on the Discrete Cosine Transform (DCT), one on the classical basis set and the other on a novel randomized basis set (RBT). The robustness and randomness properties of the hash functions are resistant to signal processing and transmission impairments, and therefore can be instrumental in building database search, broadcast monitoring and watermarking applications for video. The DCT hash is more robust, but lacks security aspect, as it is easy to find different video clips with the same hash value. Roover et al. extracted the variance of the pixels in different radial regions passing through the center of the key frames [9] based on a set of radial projections of the image pixel luminance values. A drawback of the key-frame-based techniques is the sensitivity of the key frames to frame dropping and noise [9]. This might adversely affect copyright protection applications as a pirate can change the hash by manipulating the key frames or shot boundaries. 3. PROPOSED SCHEME This paper relies on a fingerprint extraction algorithm followed by a fast approximate search algorithm. Fingerprints are feature vectors that can uniquely characterize the video signal. Video
  • 4. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.1, February 2012 48 fingerprinting methods extract several unique features of a digital video that can be stored as a fingerprint of the video content. Video fingerprinting is technology that has proven to be effective in identifying and comparing digital video data. The goal of a video fingerprinting system is to judge whether two videos have the same contents by measuring distance between fingerprints extracted from the videos. The fingerprint extraction algorithm[4] extracts compact content-based fingerprint[8] from special images constructed from the video. Each such image represents a short segment of the video and contains temporal as well as spatial information about the video segment[7]. These images are denoted by temporally informative representative images (tiri) [5],[11]. The image also contains information about possible existing motions in the video. The fast search algorithms used for finding the match between the videos are inverted file based method. To find whether a query video (or a part of it) is copied from a video in a video database, the fingerprints of all the videos in the database are extracted and stored in advance as shown in Fig. 2. The search algorithm[6] searches the stored fingerprints to find close enough matches for the fingerprints of the query video. Figure 2. Overall process of fingerprinting system. 3.1 Feature Extraction 3.1.1 Generating TIRI-DCT The fingerprint algorithm would be robust to changes in the frame size by applying pre- processing. Down-sampling can increase the robustness of a fingerprinting algorithm to these changes. This step consists of resizing of the video into fixed W×H, where W×H is the frame size. After this pre-processing step, the video is segmented into fixed short segments. Therefore the frames obtained from the videos are resized. The preprocessed images are converted to grayscale images, in order to obtain luminance value of the pixels of all available frames. This will be used to compute the weighted sum of the frames, i.e., the pixels of representative images[5]. The weighted average method used here is an
  • 5. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.1, February 2012 49 exponential method. This exponential weighting function produces perceptually better results and also generates images that best capture the motion of video. The pixels of representative images are used for the generation of DCT (Discrete Cosine Transform)[1]. The steps involved in TIRI- DCT are as follows: a) Extract frames from given video input. b) Pre-process the frames obtained. c) Convert RGB image into grayscale image. d) Compute pixels of TIRI as the weighted sum of frames using J l’ m,n=∑ wklm,n,k k=1 where l’ m,n - pixels of TIRI. wk - weighted average. lm,n,k - luminance value of (m,n)th pixel of kth frame. e) Generate DCT for TIRI. 3.1.2 Binary Fingerprint TIRI-DCT is segmented into number of blocks. The DCT-based hash, which uses low frequency 2D-DCT coefficients of the TIRIs is used because of its better detection characteristics. The features of input video are derived by applying a 2D-DCT on the blocks of size n x n from each TIRI. From each of these blocks, 1st horizontal and 1st vertical coefficients are extracted. These coefficients[5] of each block of representative images are concatenated and will be used to calculate the median as shown in Fig. 3. The binary fingerprints[4] are generated by comparing the median value(threshold) and the values of coefficients as follows: If the values of coefficients are greater than or equal to median value, then the value 1 is assigned to binary hash. If the values of coefficients are less than median value, then the value 0 is assigned to binary hash. Figure 3. Steps involved in generating binary fingerprint.
  • 6. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.1, February 2012 50 The steps involved in generating binary fingerprint are: a) TIRI-DCT is segmented into number of blocks. b) Extract 1st horizontal coefficients of DCT. c) Extract 1st vertical coefficients of DCT. d) Concatenate horizontal and vertical coefficients. e) Compute median m from the concatenated values. f) Compare coefficients with median. g) If the values of coefficients are greater than or equal to median value, then the value 1 is assigned to it. h) If the values of coefficients are greater than or equal to median value, then the value 1 is assigned to it. 3.2 Inverted File Based Similarity Search The binary fingerprints are divided into n words with m equal number of bits. Each of those m bits are termed as words, which are used to create table of size, 2m *n where 2m represents the possible values of words and n represents position of word. The horizontal and vertical dimensions of the table represent the possible values and position of a word respectively. To generate this table[3], consider the first word of each fingerprints and add the index of the fingerprint to the entry in the first column corresponding to the value of this word. This process is continued for all the words in each fingerprint and all the columns in the inverted file table[9]. Once a inverted file index has been created, it can be used to match a fingerprint of query video against the collection. To find a query fingerprint in the database, first the fingerprint is divided into words. The query is then compared to all the fingerprints that start with the same word. The indices[2] of these fingerprints are found from the corresponding entry in the first column of the inverted file table. The Hamming distance[12] is calculated between fingerprints in database and query fingerprint. If the distance is less than threshold value, then the query video will be announced as matching, otherwise as not matching with the database. The steps involved are as follows: a) Binary fingerprints are divided into n words of equal bits. b) The horizontal dimension of the table represents the position of a words. c) The vertical dimension of the table represents the possible values of words. d) Add index for each word of the fingerprint to the entry in column corresponding to the value of the word. e) Hamming distance is calculated between fingerprints in database and query fingerprint. f) If the distance is less than threshold value, then the query video will be announced as matching. g) Otherwise, it will be announced as not matching. In the fingerprint matching process, two videos are declared similar if the distance between their fingerprints is below a certain threshold. 4. EXPERIMENTAL RESULT The performance of the proposed video fingerprinting method is evaluated using the fingerprint Database generated. The length and the resolution of the videos in the DB
  • 7. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.1, February 2012 51 range up to 4 minutes, and from 384 X 288. The frame rate is 25 fps for all videos. The videos are chosen to be in avi(Audio Video Interleaved) format. This system announces whether the query video matches video in database using inverted file based similarity search method. Figure 4. Input video The Fig. 4 shows the video of avi format from input video database. By iteration, all videos in video database can be read. Depending on the frame rate and duration of the video, number of frames present in it varies. Frames of all videos are extracted. Figure 5. DCT of video For all the frames extracted from the video, preprocessing is performed. The preprocessing technique used in this process is down sampling. Here, the sizes of frames are reduced uniformly for all videos in database. The reduced size of frame is 128*128. The RGB images are converted into grayscale images, in order to obtain luminance value of the pixels of all available frames. This will be used to compute the weighted sum of the frames, i.e., the pixels of representative
  • 8. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.1, February 2012 52 images. The Fig. 5 shows DCT being applied to representative image of video and segmented into number of blocks. From each blocks, horizontal and vertical coefficients are extracted. Figure 6. Binary fingerprint of video Concatenate all coefficients of each block of DCT video to find the value of median, which will be used to compare with coefficients to generate binary fingerprint. If the values of coefficients are greater than or equal to median value, then the value 1 is assigned to it. If the values of coefficients are less than median value, then the value 0 is assigned to it. The Fig. 6 shows binary fingerprint of video obtained. Figure 7. Selection of query video Figure 8. Announcement of match in database The Fig. 7 shows the selection of query video, for which match in database will be found. The binary fingerprint of query video is obtained by following similar procedure as that in generation of binary fingerprint of a video in video database. The Fig. 8 shows announcement of matching of query video with video in database based on the distance between the fingerprints in database and
  • 9. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.1, February 2012 53 query fingerprint using inverted file based similarity search method. If the DB position with the minimum distance exactly corresponds to the input fingerprint sequence in the processed video, it is assumed that the input fingerprint sequence is correctly identified. Table 1. Performance of Inverted File Based Similarity Search Figure 9. Accuracy based on various attacks The attacks are mounted independently on the videos to generate the queries. Table 1 represents performance of inverted file based similarity search based on true positive rate (TPR) and false positive rate (FPR). Percentage of accuracy in detecting similarity between the query video and videos in the database using inverted file based similarity search is shown in Fig. 9. Thus the inverted file based similarity search provides better performance in detecting the exact match between the videos. 5. CONCLUSION The proposed fingerprinting algorithm, TIRI-DCT extracts robust, discriminant, and compact fingerprints from videos in a fast and reliable fashion. These fingerprints are extracted from TIRIs containing both spatial and temporal information about a video segment. The proposed fast approximate search algorithm, the inverted file based method, which is a generalization of an existing search method is fast in detecting whether the query video is present in video database. By using inverted file based similarity search for detecting the similarity among the videos, the performance of the system yield high true positive rate and low false positive rate. Future work Attacks Noise Rotation Brightness Contrast Frame drop TPR(%) 98.15 99.10 98.73 97.91 96.46 FPR(%) 1.64 0.87 0.90 1.52 1.78 F-Score 0.98 0.98 0.99 0.98 0.99
  • 10. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.1, February 2012 54 includes implementation of cluster based similarity search method and product quantizer method detects whether the query video is present in video database. The performance of all the above similarity search methods will be evaluated in order to find the best similarity search technique in an efficient manner. REFERENCES [1] B. Coskun, B. Sankur, and N. Memon, “Spatiotemporal transform based video hashing,” IEEE Trans. Multimedia, vol. 8, no. 6, pp.1190–1208, Dec. 2006. [2] A. Gionis, P. Indyk, and R. Motwani, “Similarity search in high dimen- sions via hashing,” in Proc. Int. Conf. Very Large Data Bases (VLDB), San Francisco, CA, 1999, pp. 518–529, Morgan Kaufmann Publishers Inc.. [3] A. Hampapur and R. M. Bolle, Videogrep: Video copy detection using inverted file indices IBM Research Division Thomas. J. Watson Research Center, Tech. Rep., 2001. [4] S. Lee and C. Yoo, “Robust video fingerprinting for content-based video identification,” IEEE Trans. Circuits Syst. Video Technol., vol.18, no. 7, pp. 983–988, Jul. 2008. [5] M. Malekesmaeili, M. Fatourechi, and R. K. Ward, “Video copy detec- tion using temporally informative representative images,” in Proc. Int.Conf. Machine Learning and Applications, Dec. 2009, pp. 69–74. [6] Mani Malek Esmaeili, Mehrdad Fatourechi, and Rabab Kreidieh Ward,Fellow, IEEE, “A robust and fast video copy detection system using content-based fingerprinting,” IEEE Trans. on Information Forensics and Security, vol. 6, no. 1, Mar. 2011. [7] J. Law-To, L. Chen, A. Joly, I. Laptev, O. Buisson, V. Gouet-Brunet, N.Boujemaa, and F. Stentiford, “Video copy detection: A comparative study,” in Proc. ACM Int. Conf. Image and Video Retrieval, New York, NY, 2007, pp. 371–378, ACM. [8] R. Radhakrishnan and C. Bauer, “Content-based video signatures based on projections of difference images,” in Proc. MMSP, Oct. 2007, pp.341–344. [9] C. De Roover, C. De Vleeschouwer, F. Lefebvre, and B. Macq, “Robust video hashing based on radial projections of key frames,” IEEE Trans.Signal Process., vol. 53, no. 10, pp. 4020–4037, Oct. 2005. [10] G. Willems, T. Tuytelaars, and L. Van Gool, “Spatio-temporal features for robust content-based video copy detection,” in Proc. ACM Int. Conf Multimedia Information Retrieval, New York, NY, 2008, pp. 283–290, ACM. [11] M. Malekesmaeili and R. K. Ward, “Robust video hashing based on temporally informative representative images,” in Proc. IEEE Int. Conf.Consumer Electronics, Jan. 2010, pp. 179–180. [12] M. L. Miller, “Audio fingerprinting: Nearest neighbour search in high dimensional binary spaces,” in IEEE Workshop on 2002, Multimedia Signal Processing, 2002, 2002, pp. 182–185.
  • 11. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.1, February 2012 55 Authors Ms.R.Gnana Rubini has received Bachelor of Technology degree in Information Technology under Anna University, Chennai in 2010. She is currently pursuing Master of Engineering degree in Computer Science and Engineering under Anna University, Coimbatore, India. Her areas of interest are Data Mining and Image Processing. Prof. P.Tamije Selvy received B.Tech (CSE), M.Tech (CSE) in 1996 and 1998 respectively from Pondicherry university. Since 1999, she has been working as faculty in reputed Engineering Colleges. At Present, she is working as Assistant Professor(SG) in the department of Computer Science & Engineering, Sri Krishna College of Technology, Coimbatore. She is currently pursuing Ph.D under Anna University, Chennai. Her Research interests include Image Processing, Data Mining, Pattern Recognition and Artificial Intelligence. Ms.P.Anantha Prabha obtained B.E in Electronics and Communication Engineering and Master of Engineering in Computer Science and Engineering from V.L.B. Janakiammal College of Engineering and Technology, Coimbatore, India in 2001 and 2008 respectively. She has been working in various Engineering Colleges for 9 years. She is currently working as an Assistant Professor in Sri Krishna College of Technology, Coimbatore. Her areas of interest are Clouding Computing, Mobile Computing and Image Processing.