A Robust Weber’s Local Descriptor for Copy Control
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 3
Abstract
Simple and robust local powerful descriptor called Weber Local Descriptor (WLD), which is put forward for detecting duplicated videos. Matching based on orthogonal moments has high computational complexity, especially for high dimension. Thus, to reduce the time complexity video is segmented into frame by twin threshold segmentation and key frames are extracted from each segment. Then, WLD descriptor is incorporated for feature extraction from each frame. Specifically, WLD consist of two components one is excitation and other is orientation. We use both these components to construct WLD histogram feature.Finally matching takes place between the features extracted from the reference video and the target video to check whether it is a duplicated or original video. The proposed method is more powerful to different noises, photometric and geometric transformations in the frame and detect the copied videos effectively with less computational complexity.
Authors and Affiliations
SabithaT*1
A Study on Image Registration for Remote Sensing Images
Image registration is one of the challenging tasks in image processing problems. The problem of image registration is to find a geometrical transformation that aligns points in one view of an image with correspond...
SAFETY ANALYSIS AND RISK ASSESSMENT FOR BRIDGES HEALTH MONITORING WITH MONTE CARLO METHODS
With the increasing requirements of building safety in the past few decades, healthy monitoring and risk assessment of structures is of more and more importance. Especially since traffic loads are heavier, risk Ass...
Accident Detection and Notification System.
During the last few years the numbers of vehicles travelling in our roads have increased, increasing the driver’s attention requirements. The instant effect of this is the dramatic increase in the amount of accide...
UNDERSTANDING THE DIFFERENT VULNERABILITY METHODS OF ATTACKS IN SECURE DATA
Cipher text-policy attribute based encryption (CPABE) provides an encrypted access control mechanism for broadcasting messages. Basically, a sender encrypts a message with an access control policy tree which is lo...
PERFORMANCE OPTIMIZATION OF LUT IN FPGA USING CNFET
A Leakage power dissipation is becoming a concern in field-programmable gate arrays (FPGAs) due to scaling in FPGA technology. Field programmable gate arrays (FPGAs) are the implementation platform of choice w...