• Title/Summary/Keyword: Video Identification

Search Result 173, Processing Time 0.024 seconds

An ASIC Implementation of Digital NTSC/PAL Video Encoder (디지탈 NTSC/PAL 비디오 부호화기의 ASIC 구현)

  • Oh, Seung-Ho;Lee, Moon-Key
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.35S no.6
    • /
    • pp.109-118
    • /
    • 1998
  • This paper presents an ASIC implementation of video encoder which converts either digital RGB or YCbCr to S-video(Y/C) and composite video signal. The video timing signal of this encoder includes horizontal sync., vertical sync. signal and blanking, and this encoder supports field identification signal which is convenient for video editing. The encoder has been designed in the 4 stages pipeline structure to assure the stable operation of each submodule. The proposed encoder requires only 20K gates ,which is a 40% reduction in hardware compared with [13]. The designed encoder was fabricated in $0.65{\mu}m$ SOG triple metal CMOS technology. Chip size is $3.7478mm {\times} 4.4678mm$ including PAD, gate counts is 19,468 and dissipated power is 0.9W.

  • PDF

Privacy-Preserving H.264 Video Encryption Scheme

  • Choi, Su-Gil;Han, Jong-Wook;Cho, Hyun-Sook
    • ETRI Journal
    • /
    • v.33 no.6
    • /
    • pp.935-944
    • /
    • 2011
  • As a growing number of individuals are exposed to surveillance cameras, the need to prevent captured videos from being used inappropriately has increased. Privacy-related information can be protected through video encryption during transmission or storage, and several algorithms have been proposed for such purposes. However, the simple way of evaluating the security by counting the number of brute-force trials is not proper for measuring the security of video encryption algorithms, considering that attackers can devise specially crafted attacks for specific purposes by exploiting the characteristics of the target video codec. In this paper, we introduce a new attack for recovering contour information from encrypted H.264 video. The attack can thus be used to extract face outlines for the purpose of personal identification. We analyze the security of previous video encryption schemes against the proposed attack and show that the security of these schemes is lower than expected in terms of privacy protection. To enhance security, an advanced block shuffling method is proposed, an analysis of which shows that it is more secure than the previous method and can be an improvement against the proposed attack.

Video Learning Enhances Financial Literacy: A Systematic Review Analysis of the Impact on Video Content Distribution

  • Yin Yin KHOO;Mohamad Rohieszan RAMDAN;Rohaila YUSOF;Chooi Yi WEI
    • Journal of Distribution Science
    • /
    • v.21 no.9
    • /
    • pp.43-53
    • /
    • 2023
  • Purpose: This study aims to examine the demographic similarities and differences in objectives, methodology, and findings of previous studies in the context of gaining financial literacy using videos. This study employs a systematic review design. Research design, data and methodology: Based on the content analysis method, 15 articles were chosen from Scopus and Science Direct during 2015-2020. After formulating the research questions, the paper identification process, screening, eligibility, and quality appraisal are discussed in the methodology. The keywords for the advanced search included "Financial literacy," "Financial Education," and "Video". Results: The results of this study indicate the effectiveness of learning financial literacy using videos. Significant results were obtained when students interacted with the video content distribution. The findings of this study provide an overview and lead to a better understanding of the use of video in financial literacy. Conclusions: This study is important as a guide for educators in future research and practice planning. A systematic review on this topic is the research gap. Video learning was active learning that involved student-centered activities that help students engage with financial literacy. By conducting a systematic review, researchers and readers may also understand how extending an individual's financial literacy may change after financial education.

A real-time multiple vehicle tracking method for traffic congestion identification

  • Zhang, Xiaoyu;Hu, Shiqiang;Zhang, Huanlong;Hu, Xing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.6
    • /
    • pp.2483-2503
    • /
    • 2016
  • Traffic congestion is a severe problem in many modern cities around the world. Real-time and accurate traffic congestion identification can provide the advanced traffic management systems with a reliable basis to take measurements. The most used data sources for traffic congestion are loop detector, GPS data, and video surveillance. Video based traffic monitoring systems have gained much attention due to their enormous advantages, such as low cost, flexibility to redesign the system and providing a rich information source for human understanding. In general, most existing video based systems for monitoring road traffic rely on stationary cameras and multiple vehicle tracking method. However, most commonly used multiple vehicle tracking methods are lack of effective track initiation schemes. Based on the motion of the vehicle usually obeys constant velocity model, a novel vehicle recognition method is proposed. The state of recognized vehicle is sent to the GM-PHD filter as birth target. In this way, we relieve the insensitive of GM-PHD filter for new entering vehicle. Combining with the advanced vehicle detection and data association techniques, this multiple vehicle tracking method is used to identify traffic congestion. It can be implemented in real-time with high accuracy and robustness. The advantages of our proposed method are validated on four real traffic data.

Comparison of Text Beginning Frame Detection Methods in News Video Sequences (뉴스 비디오 시퀀스에서 텍스트 시작 프레임 검출 방법의 비교)

  • Lee, Sanghee;Ahn, Jungil;Jo, Kanghyun
    • Journal of Broadcast Engineering
    • /
    • v.21 no.3
    • /
    • pp.307-318
    • /
    • 2016
  • 비디오 프레임 내의 오버레이 텍스트는 음성과 시각적 내용에 부가적인 정보를 제공한다. 특히, 뉴스 비디오에서 이 텍스트는 비디오 영상 내용을 압축적이고 직접적인 설명을 한다. 그러므로 뉴스 비디오 색인 시스템을 만드는데 있어서 가장 신뢰할 수 있는 실마리이다. 텔레비전 뉴스 프로그램의 색인 시스템을 만들기 위해서는 텍스트를 검출하고 인식하는 것이 중요하다. 이 논문은 뉴스 비디오에서 오버레이 텍스트를 검출하고 인식하는데 도움이 되는 오버레이 텍스트 시작 프레임 식별을 제안한다. 비디오 시퀀스의 모든 프레임이 오버레이 텍스트를 포함하는 것이 아니기 때문에, 모든 프레임에서 오버레이 텍스트의 추출은 불필요하고 시간 낭비다. 그러므로 오버레이 텍스트를 포함하고 있는 프레임에만 초점을 맞춤으로써 오버레이 텍스트 검출의 정확도를 개선할 수 있다. 텍스트 시작 프레임 식별 방법에 대한 비교 실험을 뉴스 비디오에 대해서 실시하고, 적절한 처리 방법을 제안한다.

Robust Watermarking for Compressed Video Using Fingerprints and Its Applications

  • Jung, Soo-Yeun;Lee, Dong-Eun;Lee, Seong-Won;Paik, Joon-Ki
    • International Journal of Control, Automation, and Systems
    • /
    • v.6 no.6
    • /
    • pp.794-799
    • /
    • 2008
  • This paper presents a user identification method at H.264 streaming using watermarking with fingerprints. The watermark can efficiently reduce the potential danger of forgery or alteration. Especially a biometric watermark has convenient, economical advantages. The fingerprint watermark can also improve reliability of verification using automated fingerprint identification systems. These algorithms, however, are not robust against common video compression. To overcome this problem, we analyze H.264 compression pattern and extract watermark after restoring damaged watermark using various filters. The proposed algorithm consists of enhancement of a fingerprint image, watermark insertion using discrete wavelet transform and extraction after restoring. The proposed algorithm can achieve robust watermark extraction against H.264 compressed videos.

Blind Video Fingerprinting Using Temporal Wavelet Transform (시간축 웨이블릿 변환을 이용한 블라인드 비디오 핑거프린팅)

  • Kang Hyun-Ho;Park Ji-Hwan;Lee Hye-Joo;Hong Jin-Woo
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.9
    • /
    • pp.1263-1272
    • /
    • 2004
  • In this paper, we present a novel video fingerprinting implementation method to identify the source of illegal copies. The video fingerprinting is achieved by the insertion of uniform distributed random number is made by seller and buyer's identification key-in the video wavelet coefficients by their temporal wavelet transform. The proposed fingerprinting is able to detect unique fingerprint of video contents even if they have been distorted by collusion attacks and MPEG2 compression. Especially, we use characteristics of the temporal wavelet transform to assign user's embedding area. Experimental results show the traceability of unauthorized distribution of video contents and its robustness to various collusion attacks and MPEG2 compression.

  • PDF

The Improved Joint Bayesian Method for Person Re-identification Across Different Camera

  • Hou, Ligang;Guo, Yingqiang;Cao, Jiangtao
    • Journal of Information Processing Systems
    • /
    • v.15 no.4
    • /
    • pp.785-796
    • /
    • 2019
  • Due to the view point, illumination, personal gait and other background situation, person re-identification across cameras has been a challenging task in video surveillance area. In order to address the problem, a novel method called Joint Bayesian across different cameras for person re-identification (JBR) is proposed. Motivated by the superior measurement ability of Joint Bayesian, a set of Joint Bayesian matrices is obtained by learning with different camera pairs. With the global Joint Bayesian matrix, the proposed method combines the characteristics of multi-camera shooting and person re-identification. Then this method can improve the calculation precision of the similarity between two individuals by learning the transition between two cameras. For investigating the proposed method, it is implemented on two compare large-scale re-ID datasets, the Market-1501 and DukeMTMC-reID. The RANK-1 accuracy significantly increases about 3% and 4%, and the maximum a posterior (MAP) improves about 1% and 4%, respectively.

Image Superimposition for the Individual Identification Using Computer Vision System (컴퓨터 시각 인식 기법을 이용한 영상 중첩법에 의한 개인식별)

  • Ha-Jin Kim
    • Journal of Oral Medicine and Pain
    • /
    • v.21 no.1
    • /
    • pp.37-54
    • /
    • 1996
  • In this thesis, a new superimposition scheme using a computer vision system was proposed with 7 pairs of skull and ante-mortem photographs, which were already identified through other tests and DNA fingerprints at the Korea National Institute of Scientific Investigation. At this computer vision system, an unidentified skull was caught by video-camcoder with the MPEG and a ante-mortem photograph was scanned by scanner. These two images were processed and superimposed using pixel processing. Recognition of the individual identification by anatomical references was performed on the two superimposed images. These results were as followings. 1. For the enhancement of skull and ante-mortem photographs, various image processing schemes, such as SMOOTH, SHARPEN, EMBOSS, MOSAIC, ENGRAVE, INVERT, NEON and COLOR TO MONO, were applied using 3*5 window processing. As an image processing result of these methods, the optimal techniques were NEON, INVERT and ENGRAVE for the edge detection of skull and ante-mortem photograph. 2. Using various superimposition image processing techniques (SRCOR, SRCAND, SRCINVERT, SRCERASE, DSTINVERT, MERGEPAINT) were compared for the enhancement of image recognition. 3. By means of the video camera, the skull image was inputed directly to a computer system : superimposing it on the ante-mortem photograph made the identification more precise and time-saving. As mentioned above, this image processing techniques for the superimposition of skull and ante-mortem photographs simply used the previous approach, In other wrods, taking skull photographs and developing it to the same size as the ante-mortem photographs. This system using various image processing techniques on computer screen, a more precise and time-saving superimposition technique could be able to be applied in the area of individual identification in forensic practice.

  • PDF

People Re-identification: A Multidisciplinary Challenge (사람 재식별: 학제간 연구 과제)

  • Cheng, Dong-Seon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.6
    • /
    • pp.135-139
    • /
    • 2012
  • The wide diffusion of internet and the overall increased reliance on technology for information communication, dissemination and gathering have created an unparalleled mass of data. Sifting through this data is defining and will define in the foreseeable future a big part of contemporary computer science. Within this data, a growing proportion is given by personal information, which represents a unique opportunity to study human activities extensively and live. One important recurring challenge in many disciplines is the problem of people re-identification. In its broadest definition, re-identification is the problem of newly recognizing previously identified people, such as following an unknown person while he walks through many different surveillance cameras in different locations. Our goals is to review how several diverse disciplines define and meet this challenge, from person re-identification in video-surveillance to authorship attribution in text samples to distinguishing users based on their preferences of pictures. We further envision a situation where multidisciplinary solutions might be beneficial.