| 研究生: |
蔡鐘琦 Zhong-qi Cai |
|---|---|
| 論文名稱: |
基於時間域與空間域特徵擷取之影片複製偵測機制 A Video Copy Detection Scheme Based on Spatial and Temporal Feature Extraction |
| 指導教授: |
蘇柏齊
Po-Chyi Su |
| 口試委員: | |
| 學位類別: |
碩士 Master |
| 系所名稱: |
資訊電機學院 - 資訊工程學系 Department of Computer Science & Information Engineering |
| 畢業學年度: | 97 |
| 語文別: | 英文 |
| 論文頁數: | 53 |
| 中文關鍵詞: | 關鍵畫面。 、場景偵測 、向量量化 、MPEG 、複製影片偵測 |
| 外文關鍵詞: | keyframe., VQ, MPEG, Video copy detection, Scene-chnaged detection |
| 相關次數: | 點閱:17 下載:0 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
隨著個人電腦與各式錄影設備的普及, 配合寬頻網路的建置, 以及先進的視訊編碼技術, 大量的數位視訊得以廣泛地傳播與流通。同時,許多視訊共享網站被建立, 提供多樣的途徑讓使用者上傳與分享數位視訊, 而目前的網路頻寬有相當大的部分即為傳遞此類網站視訊資料所使用, 由此可看出其受歡迎的程度。然而, 對於擁有內容版權的電影/電視公司來說, 這樣的任意分享並不為他們所支持, 他們不願意讓內容被無償使用, 而大量未經授權的影片被放置於分享平台也可能影響其獲利。因此, 越來越多的著名視訊分享網站被要求移除某些違反版權的影片片段, 甚至遭到以違反著作權條款為由所控告。如何保護著作權並減少版權問題所引發的爭議成為這些視訊分享網站所要面對的重要議題。
本研究的目的在於提供一個藉由視訊內容比對來偵測視訊複製的機制。簡言之, 當視訊片段被上傳後, 該片段經處理後所產生的特徵資料會與儲存於視訊網站上的原始特徵資料比對, 以判斷上傳資料是否來自於原版影片的複製。為有效達成此目的, 我們將由視訊資料中擷取基於內容所產生的簽章或是雜湊函數以增進執行效率, 避免大量視訊資料的儲存。我們將先利用場景切換偵測技術將影片分成多個片段, 並由這些切換場景畫面中找出關鍵畫面, 再由這些關鍵畫面上取得空間域或像素域上的雜湊函數值。我們利用向量量化以及奇異值分解等方式產生所需比對的像素域特徵資料。利用正確比對所得到的畫面做為定位點, 然後我們再使用時間域特徵來確認視訊內容比對的準確性。本研究的主要挑戰在於如何於視訊雜湊函數的強健性、視訓分辨性與比對效率三者間取得平衡。我們相信本研究的產出不僅能夠提供一個視訊複製偵測的方式, 並且將有助於多媒體內容分析研究及其相關應用。
Digital videos are distributed widely these days on various kinds of media thanks to the proliferation of cheaper but increasingly powerful personal computers, the prevalence of high-speed networking facilities and the advanced video coding technologies. Many video web servers are available nowadays to provide convenient platforms for users to upload and share digital videos. However, video content providers do not always support these video web servers since many videos are uploaded/shared without their permission and infringe their intellectual property rights (IPR). The popular video servers may often be requested to remove certain video clips or even be sued for copyright violation. Therefore, the issues of copyright protection become very critical for the owners of popular video web servers to reduce such controversies or disputes.
In this research, we aim at providing a feasible content-based video copy detection scheme. The content of the uploaded video with be matched with those of original videos stored in the video web servers to determine whether it is a duplicate copy that may infringe the copyright. To be more specific, the content matching will be based on the comparison of the significant features, which are extracted from the uploaded and original videos and act as the signature or video hash, instead of the videos themselves to avoid the requirement of extremely large storage. First, the shot boundary detection is applied on the video to determine the candidates of key frames. The key frames with large motions or unique visual characteristics will be selected as the anchor points for content matching. Then the spatial or pixel domain hash will be extracted from the anchor frame.We apply vector quantization and singular value decomposition. Finally, the temporal features, i.e. the shot lengths, will be matched to further ensure the correctness of content matching. The research objective is to maintain a good balance between robustness, discrimination and efficiency. We believe that the contribution of this research will also be helpful to such fields as consumer multimedia collection, multimedia linking and content analysis.
[1] S.-F. C. A. Jaimes and A. Loui, “Detection of non-identical duplicate consumer photographs,” 2003, pp. 16–20.
[2] D.-Q. Zhang and S.-F. Chang, “Detecting image near-duplicate graph matching with learning,” in ACM Int. Conf. Multimedia, New York, 2004.
[3] M. Swain and D. Ballard, “Color indexing,” Int. J. Comput. Vis, vol. 7, 1991.
[4] K. Kashino, T. Kurozumi, and H. Murase, “A quick search method for audio and video signals based on histogram pruning,” IEEE Trans. Multimedia, vol. 5, pp. 348–357, 2003.
[5] A. Ferman, M. Tekalp, and R. Mehrotra, “Robust color histogram descriptors for video segment retrieval and identification,” IEEE Trans. on Multimedia, vol. 11, pp. 497–508, 2002.
[6] A. Hampapur and R. M. Bolle, “Comparison of distance measures for video copy detection,” 2001, pp. 737–740.
[7] W. Hsu, T. S. Chua, and H. K. Pung, “An integrated color-spatial approach to content-based image retrieval,” in Proc. ACM Multimedia, pp. 305–313, 1995.
[8] X. C. X. S. Hua and H. J. Zhang, “Robust video signature based on ordinal measure,” in Proc. IEEE Int. Conf. Image Process., Singapore, 2004.
[9] Q. T. J. Yuan and S. Ranganath, “Fast and robust search method for short video clips from large video collection,” in Proc. Int. Conf. Pattern Recogni., Cambridge, U.K, 2004.
[10] C. Kim and B. Vasudev, “Spatiotemporal sequence matching for efficient video copy detection,” IEEE Trans. Circuits Syst. Video Technol, vol. 15, pp. 127–132, 2005.
[11] E. Y. C. Y. Meng and B. Li, “Enhancing dpf for near-replica image recognition,” in in Proc. Int. Conf. Pattern Recognition, 2004.
[12] C.-S. Lu and C.-Y. Hsu, “Geometric distortion-resilent image hashing scheme and its applications on copy detection and authentication,” ACM Multimedia Systems Journal, specia issue on Multimedia and Security, vol. 11, no.2, pp. 159–173, 2005.
[13] C. G. Harris and M. J. Stephens, “A combined corner and edge detector,” in in Proceedings of the 4th Alvey Vision Conference ,Manchester, England, 1988.
[14] O. B. A. Joly and C. Frelicot, “Content-based copy detection using distortion-based probabilistic similarity search,” IEEE Transactions on Multimedia, vol. 9, No.2, pp. 147–151, 2007.
[15] D. G. Lowe, “Distinctive image features from scale-invariant keypoints,”IEEE Transactions on Multimedia, vol. 60, No.2, pp. 91–110, 2004.
[16] V. G.-B. J. Law-To, O. Buisson and N. Boujemaa, “Robust voting algorithm based on labels of behavior for video copy detection,” in Proceedings of the ACM International Conference on Multimedia (MM), Santa Barbara, CA, USA, 2006.
[17] C. C. Y. C. Y. Chiu and C. S. Chen, “Efficient and effective video copy detection based on spatiotemporal analysis,” in in Proceedings of the IEEE International Symposium on Multimedia (ISM), Taichung, Taiwan, 2007.
[18] A. G. H. X. Wu and C. W. Ngo, “Practical elimination of near-duplicates from web video search,” in Proceedings of the ACM International Conference on Multimedia(MM), Augsburg, Bavaria, Germany, 2007.
[19] H.-M. W. Chih-Yi Chiu, “A novel video matching framework for copy detection,” in CVGIP, YiLan, Taiwan, 2008.
[20] V. Monga and M. K. Mihcak, “Robust and secure image hashing via non-negative matrix factorizations,” IEEE Transactions on Information Forensics and Security, vol. 2, No.3, 2007.
[21] I. P. C Cotsaces, N Nikolaidis, “Video shot detection and condensed respresentation. a review,” IEEE Signal Processing Magazine, vol. 23, No. 2, pp. 28–37, 2006.
[22] Y. Zhuang, Y. Rui, T. S. Huang, and S. Mehrotra, “Adaptive key frame extracting using unsupervised clustering,” in Proc. of IEEE Int Conf on Image Processing, 1998.
[23] T. Wang, Y. Wu, and L. Chen, “An approach to video key-frame extraction based on rough set,” 2007, pp. 590–596.
[24] T. Liu, H.-J. Zhang, and F. Qi, “A novel video key-frame-extraction algorithm based on perceived motion energy mode,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, pp. 1006–1013, 2003.
[25] C. D. Roover, C. D. Vleeschouwer, F. Lefebvre, and B. Macq, “Robust video hashing based on radial projections of key frames,” IEEE Transactions on Signal Processing, pp. 4020–4037, 2005.
[26] B. Coskun, B. Sankur, and N. Memon, “Spatio-temporal transform based video hashing,” IEEE Transactions on Multimedia, pp. 1190–1208, 2006.
[27] P.-H. Wu, T. Thaipanich, and C.-C. J. Kuo, “A suffix array approach to video copy detection in video sharing social networks,” in IEEE International Conference on Acoustics, Speech, and Signal Processing, Taipei, Taiwan, Apr. 2009.
[28] P.-C. Su, C.-C. Chen, and H.-M. Chang, “Towards effective content authentication for digital videos by employing feature extraction and quantization,” in IEEE Trans. on Circuits and Systems for Video Technology, to appear.
[29] I. Katsavounidis, C.-C. Kuo, and Z. Zhang, “A new initialization technique for generalized Lloyd iteration,” in IEEE Signal Processing Letters, vol. 1, Oct. 1994, pp. 144–146.