Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
Distributed Content Based Video Identification in Peer-to-Peer Networks: Requirements and Solutions
Date
2017-03-01
Author
Koz, Alper
Lagendijk, R. (Inald) L.
Metadata
Show full item record
This work is licensed under a
Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License
.
Item Usage Stats
363
views
0
downloads
Cite This
In this paper, we first discuss the essential requirements for a fingerprint (perceptual hash)-based distributed video identification system in peer-to-peer (P2P) networks in comparison with traditional central database implementations of fingerprints. This discussion reveals that first, fingerprint sizes of existing video fingerprint methods are not compatible with the cache sizes of current P2P clients; second, fingerprint extraction durations during a query are not at tolerable levels for a user in the network; third, the repetitive patterns in the extracted fingerprints avoid the uniform distribution of storage and traffic load among the peers; and finally, the existing methods do not provide a solution to synchronize the fingerprint extraction from the shared video and queried video. In order to solve the mentioned requirements, we propose a baseline method using only the difference of video framemeans, which decreases the fingerprint sizes to typical cache sizes, by increasing the granularity levels from seconds to minutes. We then develop a novel algorithm which utilizes reference points on one-dimensional frame mean sequence for the synchronization of fingerprint extraction. This algorithm is extended with a hierarchical decoding approach based on Gaussian scales, which only decodes a subset of video frames without needing a full decoding. Finally, an analysis on the effect of design parameters to the fingerprint probability distribution is performed to avoid repetitive patterns. Our ultimate solution reduces the fingerprint sizes into kilobytes, extraction time to seconds, and search duration into milliseconds, and achieves about 90% detection rates with 1-4 min granularities, while enabling a fair distribution of storage load among the peers at the same time.
Subject Keywords
Video identification
,
Video copy detection
,
Perceptual hash
,
Peer-to-peer (P2P)
,
Gaussian scales
,
Fingerprint
,
Distributed hash table
,
Content search
,
Access right management
URI
https://hdl.handle.net/11511/62596
Journal
IEEE TRANSACTIONS ON MULTIMEDIA
DOI
https://doi.org/10.1109/tmm.2016.2625198
Collections
Center for Image Analysis (OGAM), Article
Suggestions
OpenMETU
Core
Partial encryption of video for communication and storage
Yüksel, Turan; Yarman Vural, Fatoş Tunay; Akar, Gözde Bozdağı; Department of Computer Engineering (2003)
In this study, a new method is proposed to protect video data through partial encryption. Unlike previous methods, the bit rate of the encrypted portion can be controlled. In order to accomplish this task, a simple model for the time to break the partial encryption by a chipertext-only attack is defined. Then, the encrypted bit budget distribution strategy maximizing the time subject to the bitrate constraint is found. An algorithm to estimate the model parameters is constructed and it isthen implemented ov...
Semantic interoperability of the un/cefact ccts based electronic business document standards
Kabak, Yıldıray; Doğaç, Asuman; Department of Computer Engineering (2009)
The interoperability of the electronic documents exchanged in eBusiness applications is an important problem in industry. Currently, this problem is handled by the mapping experts who understand the meaning of every element in the involved document schemas and define the mappings among them which is a very costly and tedious process. In order to improve electronic document interoperability, the UN/CEFACT produced the Core Components Technical Specification (CCTS) which defines a common structure and semanti...
Smart water chain: Immutable, distributed and decentralized water transaction ledgers
Satilmisoglu, Talat Kemal; Keskin, Huzur (2023-01-01)
Blockchain is a transactional data storage system where data can be stored reliably without the need for a central database or trusted authority. The data can be anything like financial transactions, supply chain processes or medical records. It is similar to a classical database but uses a decentralized ledger and allowing each participant in the network to have their own copy of the ledger and be able to see all transactions. Data stored in the distributed ledger can only be read or written, not deleted o...
Multilevel object tracking on big graph data using interval type-2 fuzzy systems in wireless multimedia sensor networks
Küçükkeçeci, Cihan; Yazıcı, Adnan; Department of Computer Engineering (2020)
Wireless multimedia sensor networks (WMSN) are the key elements of automation systems applied in different domains from home security to immigrant surveillance at a border station. In most of the applications, sensor data needs to be processed for data analytics. However, the interpretation of raw sensor data and unveiling the information inside remains a challenging issue from many aspects. As the interval of the sensor data is frequent, data needs to be treated as big data because of the volume and veloci...
Linear codes from weakly regular plateaued functions and their secret sharing schemes
Mesnager, Sihem; Özbudak, Ferruh; Sinak, Ahmet (2019-03-01)
Linear codes, the most significant class of codes in coding theory, have diverse applications in secret sharing schemes, authentication codes, communication, data storage devices and consumer electronics. The main objectives of this paper are twofold: to construct three-weight linear codes from plateaued functions over finite fields, and to analyze the constructed linear codes for secret sharing schemes. To do this, we generalize the recent contribution of Mesnager given in (Cryptogr Commun 9(1):71-84, 2017...
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
A. Koz and R. (. L. Lagendijk, “Distributed Content Based Video Identification in Peer-to-Peer Networks: Requirements and Solutions,”
IEEE TRANSACTIONS ON MULTIMEDIA
, pp. 475–491, 2017, Accessed: 00, 2020. [Online]. Available: https://hdl.handle.net/11511/62596.