Learn More
Content-based copy detection (CBCD) is drawing increasing attention as an alternative technology to watermarking for video identification and copyright protection. In this article, we present a comprehensive method to detect copies that are subjected to complicated transformations. A multimodal feature representation scheme is designed to exploit the(More)
Content-based video copy detection over large corpus with complex transformations is important but challenging. It is not surprising that most existing methods fall short of either sufficient robustness to detect severely deformed copies or high accuracy to localize copy segments. In this paper, we propose a video copy detection approach which exploits(More)
With the improvement of network bandwidth, multimedia services based on streaming live media have gained much attention recently, among which IPTV has become a hot topic. After emergence of Peer-to-Peer (P2P) technology, P2P based IPTV systems are deployed widely. However, there exists a huge challenge, which is how to manage content. Digital Rights(More)
Content-based copy detection (CBCD) over large corpus with complex transformations is important but challenging for video content analysis. To accomplish the TRECVid 2010 CBCD task, we've proposed a copy detection approach which exploits complementary visual/audio features and sequential pyramid matching (SPM). Several independent detectors first match(More)
Image authentication is usually approached by checking the preservation of some invariant features, which are expected to be both robust and discriminative so that content-preserving operations are accepted while content-altering manipulations are rejected. However, most of existing features have not obtained convincing performance due to insufficiency of(More)
Technology advancements are allowing more and more new media applications and services to be delivered over the Internet. Many of these applications and services require flexibility in media distribution as well as security in protecting the confidentiality of media content and ensuring its authenticity. However, achieving flexibility and achieving security(More)
—The goal of image authentication is to accept content-preserving operations and reject content-altering manipulations. So,it is increasingly approached by extracting content-based invariant features from original images and verifying their preservation in received images at later times. Since sparsity usually implies invariance, sparse feature(More)
In this paper, we describe our system for the surveillance events detection task in TRECVid 2010. We focused on pair-wise events (e.g., PeopleMeet, PeopleSplitUp, Embrace) that need to explore the relationship between two active persons. For our team had participated in the TRECVid SED task in 2009, we developed the system based on the old one. The(More)