• Title/Summary/Keyword: Similar Video Detection

Search Result 62, Processing Time 0.031 seconds

Dynamic Hand Gesture Recognition using Guide Lines (가이드라인을 이용한 동적 손동작 인식)

  • Kim, Kun-Woo;Lee, Won-Joo;Jeon, Chang-Ho
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.5
    • /
    • pp.1-9
    • /
    • 2010
  • Generally, dynamic hand gesture recognition is formed through preprocessing step, hand tracking step and hand shape detection step. In this paper, we present advanced dynamic hand gesture recognizing method that improves performance in preprocessing step and hand shape detection step. In preprocessing step, we remove noise fast by using dynamic table and detect skin color exactly on complex background for controling skin color range in skin color detection method using YCbCr color space. Especially, we increase recognizing speed in hand shape detection step through detecting Start Image and Stop Image, that are elements of dynamic hand gesture recognizing, using Guideline. Guideline is edge of input hand image and hand shape for comparing. We perform various experiments with nine web-cam video clips that are separated to complex background and simple background for dynamic hand gesture recognition method in the paper. The result of experiment shows similar recognition ratio but high recognition speed, low cpu usage, low memory usage than recognition method using learning exercise.

The Development of Efficient Multimedia Retrieval System of the Object-Based using the Hippocampal Neural Network (해마신경망을 이용한 관심 객체 기반의 효율적인 멀티미디어 검색 시스템의 개발)

  • Jeong Seok-Hoon;Kang Dae-Seong
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.43 no.2 s.308
    • /
    • pp.57-64
    • /
    • 2006
  • Tn this paper, We propose a user friendly object-based multimedia retrieval system using the HCNN(HippoCampus Neural Network. Most existing approaches to content-based retrieval rely on query by example or user based low-level features such as color, shape, texture. In this paper we perform a scene change detection and key frame extraction for the compressed video stream that is video compression standard such as MPEG. We propose a method for automatic color object extraction and ACE(Adaptive Circular filter and Edge) of content-based multimedia retrieval system. And we compose multimedia retrieval system after learned by the HCNN such extracted features. Proposed HCNN makes an adaptive real-time content-based multimedia retrieval system using excitatory teaming method that forwards important features to long-term memories and inhibitory learning method that forwards unimportant features to short-term memories controlled by impression.

Automatic Detection of Dissimilar Regions through Multiple Feature Analysis (다중의 특징 분석을 통한 비 유사 영역의 자동적인 검출)

  • Jang, Seok-Woo;Jung, Myunghee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.2
    • /
    • pp.160-166
    • /
    • 2020
  • As mobile-based hardware technology develops, many kinds of applications are also being developed. In addition, there is an increasing demand to automatically check that the interface of these applications works correctly. In this paper, we describe a method for accurately detecting faulty images from applications by comparing major characteristics from input color images. For this purpose, our method first extracts major characteristics of the input image, then calculates the differences in the extracted major features, and decides if the test image is a normal image or a faulty image dissimilar to the reference image. Experiment results show that the suggested approach robustly determines similar and dissimilar images by comparing major characteristics from input color images. The suggested method is expected to be useful in many real application areas related to computer vision, like video indexing, object detection and tracking, image surveillance, and so on.

Development of a CNN-based Cross Point Detection Algorithm for an Air Duct Cleaning Robot (CNN 기반 공조 덕트 청소 로봇의 교차점 검출 알고리듬 개발)

  • Yi, Sarang;Noh, Eunsol;Hong, Seokmoo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.8
    • /
    • pp.1-8
    • /
    • 2020
  • Air ducts installed for ventilation inside buildings accumulate contaminants during their service life. Robots are installed to clean the air duct at low cost, but they are still not fully automated and depend on manpower. In this study, an intersection detection algorithm for autonomous driving was applied to an air duct cleaning robot. Autonomous driving of the robot was achieved by calculating the distance and angle between the extracted point and the center point through the intersection detection algorithm from the camera image mounted on the robot. The training data consisted of CAD images of the duct interior as well as the cross-point coordinates and angles between the two boundary lines. The deep learning-based CNN model was applied as a detection algorithm. For training, the cross-point coordinates were obtained from CAD images. The accuracy was determined based on the differences in the actual and predicted areas and distances. A cleaning robot prototype was designed, consisting of a frame, a Raspberry Pi computer, a control unit and a drive unit. The algorithm was validated by video imagery of the robot in operation. The algorithm can be applied to vehicles operating in similar environments.

Detecting Vehicles That Are Illegally Driving on Road Shoulders Using Faster R-CNN (Faster R-CNN을 이용한 갓길 차로 위반 차량 검출)

  • Go, MyungJin;Park, Minju;Yeo, Jiho
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.1
    • /
    • pp.105-122
    • /
    • 2022
  • According to the statistics about the fatal crashes that have occurred on the expressways for the last 5 years, those who died on the shoulders of the road has been as 3 times high as the others who died on the expressways. It suggests that the crashes on the shoulders of the road should be fatal, and that it would be important to prevent the traffic crashes by cracking down on the vehicles intruding the shoulders of the road. Therefore, this study proposed a method to detect a vehicle that violates the shoulder lane by using the Faster R-CNN. The vehicle was detected based on the Faster R-CNN, and an additional reading module was configured to determine whether there was a shoulder violation. For experiments and evaluations, GTAV, a simulation game that can reproduce situations similar to the real world, was used. 1,800 images of training data and 800 evaluation data were processed and generated, and the performance according to the change of the threshold value was measured in ZFNet and VGG16. As a result, the detection rate of ZFNet was 99.2% based on Threshold 0.8 and VGG16 93.9% based on Threshold 0.7, and the average detection speed for each model was 0.0468 seconds for ZFNet and 0.16 seconds for VGG16, so the detection rate of ZFNet was about 7% higher. The speed was also confirmed to be about 3.4 times faster. These results show that even in a relatively uncomplicated network, it is possible to detect a vehicle that violates the shoulder lane at a high speed without pre-processing the input image. It suggests that this algorithm can be used to detect violations of designated lanes if sufficient training datasets based on actual video data are obtained.

A COMPARISON OF PERIAPICAL RADIOGRAPHS AND THEIR DIGITAL IMAGES FOR THE DETECTION OF SIMULATED INTERPROXIMAL CARIOUS LESIONS (모의 인접면 치아우식병소의 진단을 위한 구내 표준방사선사진과 그 디지털 영상의 비교)

  • Kim Hyun;Chung Hyun-Dae
    • Journal of Korean Academy of Oral and Maxillofacial Radiology
    • /
    • v.24 no.2
    • /
    • pp.279-290
    • /
    • 1994
  • The purpose of this study was to compare the diagnostic accuracy of periapical radiographs and their digitized images for the detection of simulated interproximal carious lesions. A total of 240 interproximal surfaces was used in this study. The case sample was composed of 80 anterior teeth, 80 bicuspids and 80 molars which were prepared in order to distribute the surfaces from carious free to those containing simulated carious lesions of varying depths (0.5㎜, 0.8㎜, and 1.2㎜). The periapical radiographs were taken by paralleling technique and film used was Kodak Ektaspeed(E group). All radiographs were evaluated by five dentist to recognize the true status of simulated carious lesion. They were asked to give a score of 0, 1, 2, or 3. Digitized images were obtained using a commercial video processor(FOTOVIX Ⅱ- XS). And the computer system was 486 DX PC with PC Vision and frame grabber. The 17' display monitor had a resolution of 1280×1024 pixels(0.26㎜ dot pitch). But the one frame of the intraoral radiograph has a resolution of 700×480 pixels and each pixel has a grey level value of 256. All the radiographs and digital images were viewed under uniform subdued lighting in the same reading room. After a week the second interpretation was performed in the same condition. The detection of lesions on the monitor was compared with the finding of simulated interproximal carious lesions on the film images. The results were as follows: 1. When the scoring criteria was dichotomous ; lesion present and not present 1) The overall sensitivity, specificity and diagnostic accuracy of periapical radiographs and their digital images showed no statistically significant difference. 2) The sensitivity and specificity according to the region of teeth and the grade of lesions showed no statistically significant difference between periapical radiographs and their digital images. 2. When estimate the grade of lesions ; score 0, 1, 2, 3 1) The overall diagnostic accuracy was 53.3% on the intraoral films and 52.9% on digital images. There was no significant difference. 2) The diagnostic accuracy according to the region of teeth showed no statistically significant difference between periapical radiographs and their digital images. 3. The degree of agreement and reliability 1) Using gamma value to show the degree of agreement, there was similarity between periapical films and digital images. 2) The reliability of each twice interpretation of periapical films and digital images showed no statistically significant difference. In all cases P value was greater than 0.05, showing that both techniques can be used to detect the incipient and moderate interproximal carious lesions with similar accuracy.

  • PDF

FPGA Implementation of Extreme Contour Point Algorithm to detect rotated angle of High Definition Image (고해상 영상의 회전된 각도를 검출하기 위한 Extreme Contour Point 알고리즘의 FPGA 설계)

  • Jeong, Min-woo;Pack, Chan-su;Kim, Hi-Seok
    • Journal of IKEEE
    • /
    • v.20 no.4
    • /
    • pp.344-350
    • /
    • 2016
  • In this Paper, we propose an optimized method of hardware design based on Field Programmable Gate Array (FPGA) to detect rotated angle of high definition image about Extreme Contour Point (ECP) algorithm with moving video image could be not happened to translation motion, but also physical rotation motion. It was evaluated by XC7Z020 xc7z020-3clg400 FPGA board by using xilinx 14.2 tool. The much well-known method, the Coordinate Rotation Digital Integrated Computation (CORDIC) is an algorithm to estimate rotated angle between point and point. Through the result both ECP and CORDIC, our proposed design are confirmed to have similar operating speed of about 4ns with CORDIC. However, it is verified to have high performance result in terms of the hardware cost, is much better than CORDIC with cost reduction of registers and Look Up Tables (LUTs) of 108% and 91%, respectively.

Research of video based Vibraimage technology stimulation examination KOCOSA (영상기반의 바이브라이미지 기술을 이용한 자극 검사에 대한 연구)

  • Lee, Jai-Suk;Lee, Il-ho;Lee, Tae-hyun;Choi, Jin-kwan;Chung, Suk-hwa;Han, Ji-soo
    • Convergence Security Journal
    • /
    • v.15 no.3_1
    • /
    • pp.41-51
    • /
    • 2015
  • Human have more complicate and skilled ability for lying even cheat ourself. It is not easy to cheat unconscious things like sweat, eyes, or voice, but if some one cheat own self, he can cheat every of that. Lie is one of the way to spread our gene and our instinct make a lie. Every living organism even bacteria or virus use similar trick to survive. In human body, there are more complicate and profound mechanism for lying like breathe, sweat, eyes, face or voice. We can control some of that and make a fake, but it can't be perfect. Human also called 'Homo Fallax' cause we have a language and skill to lie with it. In present, we can detect lie with polygraph, but it has few weakness. So we try to use Vibraimage technology for resolve it. In this paper, we describe how to use Vibraimage for lie detection and the research history.

Object Tracking Based on Exactly Reweighted Online Total-Error-Rate Minimization (정확히 재가중되는 온라인 전체 에러율 최소화 기반의 객체 추적)

  • JANG, Se-In;PARK, Choong-Shik
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.4
    • /
    • pp.53-65
    • /
    • 2019
  • Object tracking is one of important steps to achieve video-based surveillance systems. Object tracking is considered as an essential task similar to object detection and recognition. In order to perform object tracking, various machine learning methods (e.g., least-squares, perceptron and support vector machine) can be applied for different designs of tracking systems. In general, generative methods (e.g., principal component analysis) were utilized due to its simplicity and effectiveness. However, the generative methods were only focused on modeling the target object. Due to this limitation, discriminative methods (e.g., binary classification) were adopted to distinguish the target object and the background. Among the machine learning methods for binary classification, total error rate minimization can be used as one of successful machine learning methods for binary classification. The total error rate minimization can achieve a global minimum due to a quadratic approximation to a step function while other methods (e.g., support vector machine) seek local minima using nonlinear functions (e.g., hinge loss function). Due to this quadratic approximation, the total error rate minimization could obtain appropriate properties in solving optimization problems for binary classification. However, this total error rate minimization was based on a batch mode setting. The batch mode setting can be limited to several applications under offline learning. Due to limited computing resources, offline learning could not handle large scale data sets. Compared to offline learning, online learning can update its solution without storing all training samples in learning process. Due to increment of large scale data sets, online learning becomes one of essential properties for various applications. Since object tracking needs to handle data samples in real time, online learning based total error rate minimization methods are necessary to efficiently address object tracking problems. Due to the need of the online learning, an online learning based total error rate minimization method was developed. However, an approximately reweighted technique was developed. Although the approximation technique is utilized, this online version of the total error rate minimization could achieve good performances in biometric applications. However, this method is assumed that the total error rate minimization can be asymptotically achieved when only the number of training samples is infinite. Although there is the assumption to achieve the total error rate minimization, the approximation issue can continuously accumulate learning errors according to increment of training samples. Due to this reason, the approximated online learning solution can then lead a wrong solution. The wrong solution can make significant errors when it is applied to surveillance systems. In this paper, we propose an exactly reweighted technique to recursively update the solution of the total error rate minimization in online learning manner. Compared to the approximately reweighted online total error rate minimization, an exactly reweighted online total error rate minimization is achieved. The proposed exact online learning method based on the total error rate minimization is then applied to object tracking problems. In our object tracking system, particle filtering is adopted. In particle filtering, our observation model is consisted of both generative and discriminative methods to leverage the advantages between generative and discriminative properties. In our experiments, our proposed object tracking system achieves promising performances on 8 public video sequences over competing object tracking systems. The paired t-test is also reported to evaluate its quality of the results. Our proposed online learning method can be extended under the deep learning architecture which can cover the shallow and deep networks. Moreover, online learning methods, that need the exact reweighting process, can use our proposed reweighting technique. In addition to object tracking, the proposed online learning method can be easily applied to object detection and recognition. Therefore, our proposed methods can contribute to online learning community and object tracking, detection and recognition communities.

A DDoS Attack Detection of private mobile network using Time Series Analysis (시계열 분석을 적용한 사설 모바일 네트워크의 DDoS 공격 탐지)

  • Kim, Dae Hwan;Lee, Soo Jin;Pyo, Sang Ho
    • Convergence Security Journal
    • /
    • v.16 no.4
    • /
    • pp.17-24
    • /
    • 2016
  • Many companies and organizations are building a mobile office environment using the LTE network, the national disaster network and Air Force LTE network are built for public safety and national defense. However the recent threats on information security have been evolving from information leakage to DDoS attacks to neutralize the service. Especially, the type of device such as Smart phones, smart pad, tablet PC, and the numbers are growing exponentially and As performance of mobile device and speed of line develop rapidly, DDoS attacks in the mobile environment is becoming a threat. So far, universal countermeasure to DDoS attacks has been interception the network and server step, Yet problem regarding DDoS attack traffic on mobile network and expenditure of network resources still remains. Therefore, this paper analyzes the traffic type distributed in the private mobile network such as the National Disaster Network, and Air Force LTE network in order to preemptively detect DDoS attacks on terminal step. However, as direct analysis on traffic distributed in the National Disaster Network, and Air Force LTE network is restricted, transmission traffics in Minecraft and uploading video file upload which exhibit similar traffic information are analyzed in time series, thereby verifing its effectiveness through establishment of DDoS attacks standard in mobile network and application that detects and protects DDoS attacks