Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Pirate video identification method and system

A technology of pirated video and identification method, applied in the field of video retrieval and comparison, can solve problems such as instability, inconsistent video time, easy jitter, etc., to achieve the effect of improving precision and accuracy, solving rights protection issues, and improving recognition rate

Active Publication Date: 2019-09-10
厦门能见易判信息科技有限公司
View PDF15 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Not all pirated videos are continuous, it may be just one or several sections of the original video, or even just 2 to 3 seconds of infringing footage, so the video time that causes the similarity between the original video and the pirated video image is inconsistent Yes, this poses a problem for the comparison of legitimate videos and pirated videos. The current video comparison technology often fails to accurately identify pirated videos when comparing such pirated videos.
[0003] In addition, mobile phones, DV and other equipment with camera functions are used to shoot in dark light environments, and because the photographer is not a professional cameraman, the shooting is not standardized, unstable, and easy to shake, resulting in severe exposure, color distortion, and noise. , incorrect shooting angles, occlusion, deformation of the screen, and shooting of the surrounding environment other than the screen, such as curtains and walls, etc. The precision and accuracy of the comparison results are not high due to the problem, and the pirated video cannot be identified, which cannot meet the real scene

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Pirate video identification method and system
  • Pirate video identification method and system
  • Pirate video identification method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] This embodiment provides a pirated video identification method, such as figure 1 As shown, it mainly includes the following steps:

[0031] Step S1, performing structural analysis on the video to be identified to obtain the first video stream;

[0032] Step S2, performing feature extraction on the time variable motion track of the first video stream;

[0033] Step S3, splitting the first video stream into a plurality of first key frames;

[0034] Step S4, performing feature extraction on the color, shape and texture of multiple first key frames respectively;

[0035] Step S5, calculate according to the feature extracted in step S2 and step S4, obtain the video fingerprint of the video to be identified;

[0036] Step S6, locating similar genuine videos according to the video fingerprint of the video to be identified and the genuine video feature sequence index file;

[0037] In step S7, the Hamming distance and the cosine similarity are respectively calculated accor...

Embodiment 2

[0085] This embodiment provides a pirated video identification system, such as Figure 8 As shown, it mainly includes: a first video stream acquisition module 30, which is used for structural analysis of the video to be identified, and obtains the first video stream; a first feature extraction module 31, connected with the first video stream acquisition module 30, for The time variable motion track of the first video stream carries out feature extraction; The first key frame splitting module 32 is connected with the first video stream acquisition module 30, and is used to split the first video stream into a plurality of first key frames; Two feature extraction modules 33, connected with the first key frame splitting module 32, are used to carry out feature extraction to the color, shape and texture of a plurality of first key frames respectively; the first video fingerprint calculation module 34, respectively with the first feature Extraction module 31 is connected with second...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a pirate video identification method and system, wherein the method comprises the steps of carrying out the structured analysis on a to-be-identified video, and obtaining a first video stream; performing feature extraction on the time variable motion track of the first video stream; splitting the first video stream into a plurality of first key frames; respectively performing feature extraction on the colors, shapes and textures of the plurality of first key frames; calculating according to the extracted features to obtain a video fingerprint of the to-be-identified video; positioning similar genuine videos according to the video fingerprints of the to-be-identified videos and the genuine video feature sequence index files; and respectively calculating a Hamming distance and the cosine similarity according to the video fingerprint, and judging whether the to-be-identified video is a pirate video or not by utilizing cross validation between the Hamming distance and the cosine similarity. Compared with the prior art, the precision and the accuracy of the comparison result of the pirate video and the genuine video can be improved.

Description

technical field [0001] The invention relates to a pirated video identification method and system, belonging to the technical field of video retrieval and comparison. Background technique [0002] The source of pirated films comes from genuine resources, and the main types can be roughly divided into screen videos shown in cinemas, CD-ROM videos, and programs broadcast on TV. Among them, using various hidden equipment to secretly record, screen videos can be turned into pirated videos. Not all pirated videos are continuous, it may be just one or several sections of the original video, or even just 2 to 3 seconds of infringing footage, so the video time that causes the similarity between the original video and the pirated video image is inconsistent Yes, this poses a problem for the comparison of legitimate videos and pirated videos. The current video comparison technology often fails to accurately identify pirated videos when comparing such pirated videos. [0003] In additi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06K9/00G06K9/46G06K9/62G06F16/732G06F21/12
CPCG06F21/12G06F16/732G06V20/46G06V10/56G06F18/22
Inventor 赖华平杨宝英黄小红王丽媛林凡谢伟业
Owner 厦门能见易判信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products