A Comparative based study of Different Video-Shot Boundary Detection algorithms
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 1
Abstract
A shot in a digital video sequence may be defined as a set of images (frames) from a single camera. A shot boundary is determined when one shot changes to another shot. A scene is a collection of one or more shots focusing on one or more objects of interest. Video shot boundary detection is a fundamental step for content based video analysis. Various methods have been proposed and developed to detect boundaries in video sequence which uses information from feature extraction, color histogram, boundary histogram, pixel differences, motion features. Some novel shot boundary methods have developed which use features above and can detect cut and gradual shot simultaneously and distinguish them. More recent algorithms designed explicitly to detect specific complex editing operations such as fades and dissolves are taken into account, and their ability to classify the types and locate the boundaries of such edits are examined. The algorithms’ performance is measured in terms of hit rate, number of false hits, and miss rate for hard cuts, fades, and dissolves over a large and diverse set of video sequences This paper gives introduction and a comparative study of all those algorithms
Authors and Affiliations
Mr. Ravi Mishra , Dr. S. K. Singhai , Dr. Monisha Sharma
A Survey on Access Control of Cloud Data
t-Among the emerging technologies, cloud computing provides a flexible, on-demand computing infrastructure for a number of applications. Cloud computing is about moving computing from the single desktop pc/data c...
Survey on virtual machine security
Virtualization takes a major role in cloud environment. It is the creation of a virtual (rather than actual) version of something, such as a hardware platform, operating system (OS), storage device, or network re...
An Efficient Authentication and Access Control Scheme to Protect Integrity of Anonymous Networks
Concerns about privacy and security have received greater attention with the rapid growth and public acceptance of the Internet and the pervasive deployment of various network technologies. Anonymous network servic...
Face Recognition Using Principal Component Analysis Method
This paper mainly addresses the building of face recognition system by using Principal Component Analysis (PCA). PCA is a statistical approach used for reducing the number of variables in face recognition. In PCA...
THROUGHPUT OPTIMIZATION IN MOBILE NETWORKS USING MILP ON EB BILLING APPLICATIONS
This paper describes new algorithms for throughput optimization in a mobile backbone networks. This hierarchical communication framework combines mobile backbone node, which have superior mobility and communication...