Open Access   Article Go Back

An Actual Tactic for Video Reproduction Detection and Documentation Of Naughty Users

G. Anu1 , S. Padmavathi2

Section:Research Paper, Product Type: Journal Paper
Volume-2 , Issue-9 , Page no. 130-136, Sep-2014

Online published on Oct 04, 2014

Copyright © G. Anu, S. Padmavathi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: G. Anu, S. Padmavathi, “An Actual Tactic for Video Reproduction Detection and Documentation Of Naughty Users,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.9, pp.130-136, 2014.

MLA Style Citation: G. Anu, S. Padmavathi "An Actual Tactic for Video Reproduction Detection and Documentation Of Naughty Users." International Journal of Computer Sciences and Engineering 2.9 (2014): 130-136.

APA Style Citation: G. Anu, S. Padmavathi, (2014). An Actual Tactic for Video Reproduction Detection and Documentation Of Naughty Users. International Journal of Computer Sciences and Engineering, 2(9), 130-136.

BibTex Style Citation:
@article{Anu_2014,
author = {G. Anu, S. Padmavathi},
title = {An Actual Tactic for Video Reproduction Detection and Documentation Of Naughty Users},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2014},
volume = {2},
Issue = {9},
month = {9},
year = {2014},
issn = {2347-2693},
pages = {130-136},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=266},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=266
TI - An Actual Tactic for Video Reproduction Detection and Documentation Of Naughty Users
T2 - International Journal of Computer Sciences and Engineering
AU - G. Anu, S. Padmavathi
PY - 2014
DA - 2014/10/04
PB - IJCSE, Indore, INDIA
SP - 130-136
IS - 9
VL - 2
SN - 2347-2693
ER -

VIEWS PDF XML
3649 3465 downloads 3444 downloads
  
  
           

Abstract

Debauched development in the arena of hypermedia skill has grown calmer to store and admittance big quantity of video data. This skill has editing and duplication of video figures that will aim to violation of numerical rights. So, reproduction privileges care develops a dangerous problematic for the enormous volume of video data. This has led to the needful Video reproduction detection has remained actively learned in a big variety of the hypermedia applications. The auto dual-threshold method is utilized and it is segmenting the videos hooked on sections with the gratified of alike and then the key edge is excerpt after each segment. The sift topographies are detached after that sections of key frames. Then suggest a svd-based method to competition two video edges with the sift opinion set descriptors. To get the video order corresponding consequence suggest a graph- based method. It is used to change the video order hooked on identifying the lengthiest trail in the edges to classify the video matching-result with time constraint. As the future Work, suppose if the enquiry video is coordinated then waiter classifies the unauthorized user and part that recognized user at exact time. I.e. based on timestamp, again the alike user enquiries the alike video then that exact user timing will upsurges (i.e. 2 in to preceding part time). Currently we also deliver chance to all users� i.e. (user�s tries to login 3 attempts). Suppose if exertion of user is traversed the limit then that exact user will abandon after the network.

Key-Words / Index Term

Video reproduction Detection, SVD-SIFT, Keyframes, Features, chart based order method, timestamp

References

[1] Shikui Wei ; Inst. of Inf. Sci., Beijing Jiaotong Univ., Beijing, China ; Yao Zhao ; Ce Zhu ; Changsheng Xu more authors �Frame Fusion for Video Copy Detection� Published in: Circuits and Systems for Video Technology, IEEE Transactions on (Volume:21 , Issue:1 ) Date of Publication: Jan. 2011 Page(s): 15 � 28.
[2] Hyun-seok Min ; Image & Video Syst. Lab., Korea Adv. Inst. of Sci. & Technol. (KAIST), Daejeon, South Korea ; Se Min Kim ; De Neve, W. ; Yong Man Ro �Video Copy Detection Using Inclined Video Tomography and Bag-of-Visual-Words� Published in: Multimedia and Expo (ICME), 2012 IEEE International Conference on Date of Conference: 9-13 July 2012 Page(s): 562 � 567.
[3] Gupta, V.; Centre de Rech. Inf. de Montreal (CRIM), Montréal, QC, Canada ; Varcheie, P.D.Z.; Gagnon, L. ; Boulianne, G. �Content-based video copy detection using nearest-neighbor mapping� Published in: Information Science, Signal Processing and their Applications (ISSPA), 2012 11th International Conference on Date of Conference: 2-5 July 2012 Page(s): 918 � 923.
[4] Zheng Cao ; Dept. of Autom., Univ. of Sci. & Technol. of China, Hefei, China ; Ming Zhu �An efficient video copy detection method based on video signature� Published in: Automation and Logistics, 2009. ICAL `09. IEEE International Conference on Date of Conference: 5-7 Aug. 2009 Page(s): 855 � 859.
[5] Hong Liu; Sch. of Comput. Sci., Fudan Univ., Shanghai, China; Hong Lu; Xiangyang Xue �A Segmentation and Graph-Based Video Sequence Matching Method for Video Copy Detection� Published in: Knowledge and Data Engineering, IEEE Transactions on (Volume: 25, Issue: 8) Date of Publication: Aug. 2013 Page(s): 1706 � 1718.
[6] Wan-Lei Zhao; INRIA-Rennes, Rennes, France; Chong-Wah Ngo �Flip-Invariant SIFT for Copy and Object Detection� Published in: Image Processing, IEEE Transactions on (Volume: 22, Issue: 3) Date of Publication: March 2013 Page(s): 980 � 991.
[7] Huanjing Yue ; Tianjin Univ., Tianjin, China ; Xiaoyan Sun ; Feng Wu ; Jingyu Yang �SIFT-Based Image Compression� Published in: Multimedia and Expo (ICME), 2012 IEEE International Conference on Date of Conference: 9-13 July 2012 Page(s): 473 � 478.
[8] Whisnant, K. ; Sun MicroSysterms Inc., San Diego, CA, USA ; Iyer, R.K. ; Kalbarczyk, Z.T. ; Jones, P.H., III more authors �The Effects of an ARMOR-based SIFT environment on the performance and dependability of user applications� Published in: Software Engineering, IEEE Transactions on (Volume:30, Issue: 4 ) Date of Publication: April 2004 Page(s): 257 � 277.
[9] Zhouxin Yang ; Grad. Sch. of Eng., Hiroshima Univ., Higashi-hiroshima, Japan ; Kurita, T. �Improvements to the Descriptor of SIFT by BOF Approaches� Published in: Pattern Recognition (ACPR), 2013 2nd IAPR Asian Conference on Date of Conference: 5-8 Nov. 2013 Page(s): 95 � 99.
[10] Zhou Yonglong ; Xian Jiaotong Univ., Xian, China ; Mei Kuizhi ; Ji Xiang ; Dong Peixiang �Parallelization and Optimization of SIFT on GPU Using CUDA� Published in: High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing (HPCC_EUC), 2013 IEEE 10th International Conference on Date of Conference: 13-15 Nov. 2013 Page(s): 1351 � 1358.
[11] Areia, J.D. ; Inst. de Telecomun., Inst. Super. Tecnico, Lisbon ; Pereira, F. ; Fernando, W.A.C. �Impact of the key frames quality on the overall Wyner-Ziv video coding performance� Published in: ELMAR, 2008. 50th International Symposium (Volume:2 ) Date of Conference: 10-12 Sept. 2008 Page(s): 467 � 470.
[12] Brandi, F. ; Electr. Eng. Dept., Univ. de Brasilia Brasilia, Brasilia; de Queiroz, Ricardo; Mukherjee, D. �Super resolution of video using key frames� Published in: Circuits and Systems, 2008. ISCAS 2008. IEEE International Symposium on Date of Conference: 18-21 May 2008 Page(s): 1608 � 1611.
[13] Qing Xu ; Sch. of Comput. Secience & Technol., Tianjin Univ., Tianjin, China ; Pengcheng Wang ; Bin Long ; Sbert, M. more authors �Selection and 3D visualization of video key frames� Published in: Systems Man and Cybernetics (SMC), 2010 IEEE International Conference on Date of Conference: 10-13 Oct. 2010 Page(s): 52 � 59.
[14] Jing Ge ; Sch. of Inf. Sci. & Eng., Shandong Univ., Jinan, China ; Boyang Zhang ; Ju Liu ; Feng Wang more authors �Key frames-based video super-resolution using adaptive overlapped block motion compensation� Published in: Intelligent Control and Automation (WCICA), 2012 10th World Congress on Date of Conference: 6-8 July 2012 Page(s): 4712 � 4716.
[15] Tianming Liu ; Microsoft Res. Asia, Beijing, China ; Hong-Jiang Zhang ; Feihu Qi �A novel video key-frame-extraction algorithm based on perceived motion energy model� Published in: Circuits and Systems for Video Technology, IEEE Transactions on (Volume:13 , Issue: 10 ) Date of Publication: Oct. 2003 Page(s): 1006 � 1013.
[16] Hong Liu; Sch. of Comput. Sci., Fudan Univ., Shanghai, China ; Hong Lu ; Xiangyang Xue �A Segmentation and Graph-Based Video Sequence Matching Method for Video Copy Detection� Published in: Knowledge and Data Engineering, IEEE Transactions on (Volume:25 , Issue: 8 ) Date of Publication: Aug. 2013 Page(s): 1706 � 1718.
[17] Yan Yan ; Div. of Biomed. Eng., Univ. of Saskatchewan, Saskatoon, SK, Canada ; Kusalik, A.J. ; Fang-Xiang Wu �A multi-edge graph based de novo peptide sequencing method for HCD spectra� Published in: Bioinformatics and Biomedicine (BIBM), 2013 IEEE International Conference on Date of Conference: 18-21 Dec. 2013 Page(s): 176 � 181.
[18] Jiang, Hua ; National OMS Engineering Research Center, Tsinghua University, Beijing 100084 ; Zhang, Yuyun ; Xiong, Guangleng ; Zhou, Ji �Assembly sequence planning for mechanical products� Published in: Tsinghua Science and Technology (Volume:4 , Issue: 2 ) Date of Publication: June 1999 Page(s): 1436 � 1439.
[19] Aziz Muslim, M.; Dept. of Brain Sci. & Eng., Kyushu Inst. of Technol., Iizuka ; Ishikawa, M. �Formation of graph-based maps for mobile robots using Hidden Markov Models� Published in: Neural Networks, 2008. IJCNN 2008. (IEEE World Congress on Computational Intelligence). IEEE International Joint Conference on Date of Conference: 1-8 June 2008 Page(s): 3099 � 3105.
[20] Xu Jinghu ; Sch. of Comput., Nat. Univ. of Defense Technol., Changsha, China ; Li Aiping ; Zhao Hui ; Yin Hong �A multi-step attack pattern discovery method based on graph mining� Published in: Computer Science and Network Technology (ICCSNT), 2012 2nd International Conference on Date of Conference: 29-31 Dec. 2012 Page(s): 376 � 380.