Using Daub achy Wavelet for Shot Boundary Detection  

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 6

Abstract

 Abstract: SHOT Boundary Detection Is A Fundamental Step In Most Video Processing And Manipulation Applications. With The Wide Spread Of Video Usage Nowadays, The Rise For Automated Video Shot Boundary Detection Becomes An Essential. This Paper Summarises The Mostly Used Shot Boundary Detection Techniques, Then Suggests The Implementation Of Daubachy 4 Wavelet Along With Hsv Color Space In Order To Presents An Automated Shot Boundary Technique.

Authors and Affiliations

Ahmed Tariq, Nada Flail, Amaal Ghazi

Keywords

Related Articles

Energy using optimization in wireless sensor networks using the hybrid algorithm

Abstract: Energy limitation is one the most important issues in wireless sensor networks design. Data integration and their multi-step and hierarchical transition is an effective method for reducing energy consumption a...

 Application of Artificial Intelligence in Software Engineering

Software development is a very complex process that, at present, is primarily a human activity. Programming, in software development, requires the use of different types of knowledge. So, automating software development...

 Use Map EstimationFor Image Sharpening

 This paper presents a various paradigms for estimating a single latent sharp image given multiple blurry and/or noisy observations. Whether employing it to make an unusable image good, a good image better or givi...

Security Suite for IT and Telecom Industries

Abstract: Security is the biggest concern nowadays faced by various companies as security threats are more prevalent. This „openness‟ is the reason because of which protecting networks and business data is even more diff...

Download PDF file
  • EP ID EP147732
  • DOI -
  • Views 105
  • Downloads 0

How To Cite

Ahmed Tariq, Nada Flail, Amaal Ghazi (2014). Using Daub achy Wavelet for Shot Boundary Detection  . IOSR Journals (IOSR Journal of Computer Engineering), 16(6), 66-70. https://europub.co.uk/articles/-A-147732