SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1641
APPLICATIONS OF IMAGE AND VIDEO DEDUPLICATION: A SURVEY
Nivetha.L1, Gowri.V2, Dr.J.Jane Rubel Angelina3
1UG Student, Dept. of Computer Science and Engineering, Thiagarajar College of Engineering, Madurai,
Tamil Nadu, India
2UG Student, Dept. of Computer Science and Engineering, Thiagarajar College of Engineering, Madurai,
Tamil Nadu, India
3Assistant Professor, Dept. of Computer Science and Engineering, Thiagarajar College of Engineering, Madurai,
Tamil Nadu, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - In this digitizing technology world, people are
curious about uploading and sharing information mainly in
picture and video format. This growth has resulted in an
increase in storage capacity that includes a lot of redundant
multimedia data. Deduplication is one of the new techniques
dealing with redundant data which is stored at different
storage locations. Deduplication is one of the new techniques
dealing with redundant data which is stored at different
storage locations. In deduplication, a single copy is preserved
when more than one copy of the same data is identified, and
the other data is replaced with pointers pointing to the
preserved copy. Storage may effectively be used to store a lot
of other data. While there are various types of techniques for
deduplication, researchers concentrate a lot on image and
video deduplication techniques and their implementations as
it is a difficult one. This article discusses the implementations
of the real-time system image and video deduplication
techniques.
Key Words: Image deduplication, Video deduplication,
Storage optimization.
1. INTRODUCTION
The planet is being packed with variousformsofmultimedia
data in the last few years. We've experienced the explosion
of video content over the Internet in recent years as billions
of videos are stored and exchanged in the cloud, a large
portion of which consists of near-duplicate video copies.
Rapid advances in multimedia technologies fueled this
growth. So, deduplication is needed to eliminate the
occupied storage space that could be used efficiently for
some other purpose.Deduplicationhasbeencommonlyused
in backup and archival systems to significantly increase
storage use.
There are different types of deduplication techniques like
data deduplication, image deduplication, and video
deduplication. There are many methods to manage file
deduplication out of the above forms. Yet removing image
and video duplicates is a difficult task. That is because the
data will be exactly replicated in case of file deduplication.
But in case of an image or video, one should also think about
different formats in which the same image or video could be
stored. So, handling images and videos is a quite challenging
task.
1.1 Image deduplication
Image deduplication recognizes duplicate images,
removes all images but maintains one copy to create local
references to the information that users can access without
any problem. The main concept in the deduplication of
images is to delete duplicate images by five stages [1]
comprising feature extraction, high-dimensional indexing
(scaling, changing storage format), accuracy optimization by
extracting image edge information, centroid selection using
cluster formation, and fixing the centroid image and
deduplication evaluation followed by comparison. When a
new picture comes in, the client first extracts the
fingerprinter and sends the fingerprint to the sides of the
storage. When the storage side cannot locate the
corresponding fingerprinter in index tables, the next image
will be processed and the imagefingerprintermovedtoindex
tables. Alternatively, the sideof the storage willmaintainthe
higher image perception-quality as the centroid image, and
create a point pointing to the centroid image.
1.2 Video deduplication:
Video data is an important part of the today's Internet
data and it creates a lot of flexibility in storage and
distribution. Video deduplication is the repetition of scenes
or frames within the video and also among other videos.
Consider two similar videos, for example, where the action
performed in the first frame of the first video is replicated in
the last frame of the second video. Then the last frame of the
second video is redundant and should be replaced with a
pointer. This not only saves storage space effectively, but
also greatly increases the accuracy of duplicate images to be
retrieved. The original videos have to be chunked into
frames for further processing to perform video
deduplication. In the case of variable-sized frames the
frames are of the same fixed size (in fixed-sized frames) or
different sizes. Similar to the technique of image
deduplication, fingerprints are created for each frame and
compared with the other ones of same or different videos. It
can be indexed using data structures such as inverted index,
B+ tree etc to maintain the order of the frames. So that the
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1642
videos can be recovered in order and viewed by the users
without any inconvenience.
Fig -1: Process of Deduplication
2. Literature Review:
Researchers have been proposed certain applications for
image and video deduplication in real time. Let us discuss a
few of those applications using different types of methods
that would deliver a better result in day-to-day activities.
Ashish Kumar Layeket al [2] proposed a novel
methodology for identifying and grouping near-duplicates
from image streams posted on online social media. This is
viewed as the problem of clustering the imagesinthestream,
such that each cluster consists of a series of near-duplicate
images. The proposed technique is a hierarchical one
consisting of two levels – a global feature descriptor-based
similarity check at the top level to minimize search space,
followedbyLocalitySensitiveHashing(LSH)-basedsimilarity
checking at the next level to detect similarity with only a few
images, thus maximizing both precision and processingtime.
The technique is composed of two distinct stages. The first
stage is the training process in which a wide set of random
images shared on social media sites are used to create a
training dataset. This process also involves clustering the
collection of random imagesusingmoment-basedfeaturesas
they are invariant to translation, rotation and scaling and
generation of visual vocabulary generation.Thesecondstage
is an online near-duplicate process of detection. Here, some
candidate images are to be found such that each candidate
image is a representation of a distinct set (cluster) of near-
duplicate images and then LSH-based similarity check
between the test image and theidentifiedcandidateimagesis
performed.
D Wen et al [4] designed a face spoof detection system
that finds the identical images on various types of images for
the same person. The person's face is identified in this
system, and is normalized. This is focused on an Study of
Image Distortion Analysis (IDA).Four forms of IDA features
(specular reflection,blurriness, colormoments andvariation
of color) were designed to catch imagedistortioninthe spoof
face images . The normalized image features are extracted
and compared with the classifiers learned from different
training data groups. Ultimately, if the image matches all of
the images in the classifier then the program determinesthat
the picture is a spoof or fake image.
Zhili Zhou et al [5] presented an effective and efficient
global context verification scheme for image copy detection.
The framework consists of three main components, namely
Scale Invariant Feature Transform (SIFT) feature matching,
OR-GCD extraction, and verification of SIFT matches. To
obtain initial SIFT matches, the first one matches the SIFT
features between images based on the Bag of Words (BOW)
quantization. The global context of every matched SIFT
function is defined in the OR-GCD extraction. Then, by
comparing their corresponding OR-GCDs, the matched SIFT
features are checked by extracting and concatenating two
kinds of binary vectors — one based on intensities and the
other based on gradients, and then the verification resultcan
be further used to calculate image similarities for copy
detection. The approach suggested is expanded to cover the
function of partial-duplicate image detection. Potential
duplicated region location is a crucial stage for partial-
duplicate image detection. SGV strategy is suggested that
takes into account not only the relative positions of local
features but also their characteristic relationships to filter
geometrically inconsistent matches for potential duplicated
region location.
Z Zhou et al [6] designed to eliminate the near-duplicate
image quickly andaccuratelyforvisualsensornetworks.This
is because visual sensor nodes, that is the camera nodes,
produces a lot of visual data, such as digital images and
videos, that gets transmitted on visual sensor networks.
Among those, there are many near-duplicate images, which
cause a serious wastage in storage. Here the images are split
into a 3*3 matrix andconvertedtohashcode. Near-duplicate
clustering is the first and crucial step towards the removal of
near duplicates. Next, they suggest a novel seed image
selection method based on the PageRank algorithm, which
can pick the most appropriate images accurately as seed
images and delete the other redundant images to complete
the near-duplicate elimination. Locality Sensitive Hashing
(LSH) is a famous inverted index file building technique for
matching high-dimensional features. The hash values of a
given query function are looked up from inverted index file
entries, and then an additional comparison is applied
between the original features to further validate whether or
not two features are a match.
Etienne Gadeski et al [7] suggested a solution to the issue
of indexing and finding duplicates of images while streaming
visual data in asocialmediaintelligencescenario.Rescalingis
done in the proposed method to transform the image into a
grayscale and to reduce its size to pixels. Based on
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1643
comparisons of the pixel value, hash is determined, and each
hash value is encoded to construct the descriptor.
The hamming distance is then used to calculate the distance.
Therefore the Hamming distance counts the number of bits
that vary between two values. That can recognize duplicates
that have been flipped. Due to the efficient use of the
Hamming distance we can calculate a descriptor for one
image andscan a large set of images for duplicatesonasingle
core processor in less than a second. This has resulted in an
effective and robust description of the image that is well
suited for indexing and searching large visual data streams.
NP Ramaiah et al[8] developed a similarity-based
image deduplication with photographs of family cards from
various districts. The authors invented a Content-Based
Image Retrieval (CBIR) model in this process. This model
consists of three steps: feature extraction, clustering and
deduplication. In feature extraction, the color content and
texture content are extracted with the help of histogram
refinement technique. The extracted features are divided
into 23 clusters for each district. The clusters are further
clustered based on similarities using the k-means clustering
algorithm into separate groups. Inthededuplicationprocess,
the histogram of the image is determined andcomparedwith
the other images.Theimageswhicharelessidenticalthanthe
empirical threshold are viewed and manually checked to
avoid false positive images. The new approachremovesupto
0.35 million redundant images.
Javed Akhtar Khan [9] suggested a method for the
identification of duplicate frames in Closed Circuit
Television(CCTV) DVR by correlation coefficient factor.
Unused frame identification is filtered by correlation
coefficient and finds similar frame images which helptosave
storage space.
Q Chen et al [3] proposed a novel face deduplication
system in Video Surveillance. This system consists mainly of
two parts: face detection and face quality evaluation.Thekey
method is to locate all facial images through facial detection,
obtain multiple faces belonging to the same person as a face
subset, and then pick a limited number of high-quality faces
using image deduplication. For face recognition,Normalized
Pixel Difference (NPD)featuresareextractedfromeachofthe
frame image in the video sequences from the surveillance
videos. Some of the most discriminative featuresareselected
from all the features using gentle AdaBoost algorithm to
create classifiers. Now, using soft-cascade structure, strong
classifier is created. It will give the face confidence as the
output. (The greater confidence means greater possibility of
being a human face will be greater). Assessment parameters
such as facial confidence, image sharpnessandresolutionare
used forcalculating thefacialqualityscoresinthefacequality
assessment. The higher the score, the betteristhequalityofa
face. The aim of deduplication is to ignore the low-quality
faces that have been identified and to retain the high-quality
faces for face recognition to be more accurate.
Jayashree Kharat et al [10] developed a novel passive
blind forgery detection to identifyframeduplicationattackin
Moving PictureExperts Group-4(MPEG-4)codedvideos.The
frame duplication attack is nothing but one or more frames
are copied and the same gets pasted in the same video at
different location to hide particular operation. The method
proposed is composed of two phases. Firstly, the suspicious
frames (most likely faked frames) are marked by measuring
the motion vector from the test video for all frames. Then,
Scale Invariant Feature Transform (SIFT) is a computer
vision algorithm used to detect and extract descriptors of
local featuresas the forger mayadjusttheilluminationoradd
noise to the framebefore pasting it at anotherlocation.When
the frames are a duplicate of each other, then both frames
will have the samesift key-points. The SIFT featuresareused
to compare suspicious frames, and Random sample
consensus (RANSAC) is eventually used to identify and find
duplicate frames for identification of forgeries.
Donghyeok Lee et al[11] developed a secureand efficient
model based on blockchain and deduplicationtechnologyfor
Intelligent CCTV surveillance. The proposed approach
ensures data integrity of CCTV video data based on edge
blockchain region and by deduplication, it increases the
efficiency of video data transmission. Here a method of
building the blockchain separately is proposed in the trusted
edge blockchain area. With this, the object's privacy can be
securedagainst CCTV image data, and the image information
can be safelysubmitted to the cloud server. Also, throughthe
event-based deduplication technology,the event analysis is
actually carried out to compare the image blocks in the file
byte unit, even if they have several different contents in the
file data, the comparison value for the outcome of the event
analysis is regarded as the same image and can be defined as
duplicates. This helps the bandwidth to be reduced at the
time of transmission and a safe and effective video
surveillance environment can be constructed.
Hongyang yan et al [12] build a centralized privacy-
preserving duplicate removal video storage system in IoT.
Because of the data redundancy, the large volume of data
generated by IoT devices results in theuseofcommunication
bandwidth and storage space. All the operations and
computations must be carried out in encrypted form to
protect data privacy. In video files there is a high level of
redundancy due to the adjacent video frames which are
strongly correlated with each other. In the proposed block-
level deduplication method, deduplication is not only
performed on the blocks of a single image to perform
deduplication on video data; but also to increase the
performance on the blocks ofdifferentimages.Itisfoundthat
the duplicated privacy-preserving removal system will be
helpful withenhanceddeduplicationcapabilityandincreased
protection for IoT's centralized storage environment.
Heng Tao Shen et al [13] developed a prototype
framework for online near-duplicate video clip (NDVC)
detection,calledUQLIPS.It'saparticularcontent-basedvideo
retrieval (CBVR) issue that looks for the near-duplicates of a
query clip. UQLIPS core consistsoftwonovelcomplementary
schemes forthe identificationofNDVCs.BoundedCoordinate
System (BCS), a compact representation model that ignores
temporal information aimed at capturing the video's
dominant content and evolving content trends, summarizes
each video globally to a single vector that captures the
dominant content and evolving content trends in each clip.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1644
The other idea, called FRAme Symbolisation (FRAS), maps
each clip to a sequence ofsymbols,andtakesvideosequences
in temporary order. Next, FRAS generates a symbol
dictionary by conducting hierarchical clustering (for ex, k-
means) through the entire datasetofframes.Thisdescription
is more compact, since every frame is represented by a
cluster id. The similarity between video clips can be
calculated by Probability-based Edit Distance (PED), which
extends string edit distance and thus the whole systemleads
to more actuate NDVC search action.
Table -1: Comparison of different applications in image
and video Deduplication
Type of
deduplic
ation
Application Technique
used
Analysi
s based
on
Perform
ance
analysed
Image
Dedupli
cation
Fast and
accurate
near-
duplicate
image
elimination
for visual
sensor
network [6]
Improvised
k-means
clustering,
simple
random
sampling
and
systematic
sampling
Dedupl
ication
Rate
Dedupli
cation
rate of
89.94%
has been
achieved
Image
Dedupli
cation
De-
duplication
of
photograph
images using
histogram
refinement
[8]
k-means
clustering
Accura
cy
90%
accuracy
has been
achieved
Image
Dedupli
cation
A passive
blind forgery
detection
technique to
identify
frame
duplication
attack [10]
Scale
Invariant
Feature
Transform
(SIFT)
algorithm
Simulat
ion
time
33
seconds
Video
Dedupli
cation
Face
deduplicatio
n in video
surveillance
[3]
Ada Boost
Algorithm
Accura
cy
Accurac
y
increase
s when
N ≤ 16
(N = No.
of faces)
Video
Dedupli
cation
Centralized
Duplicate
Removal
Video
Storage
System with
Privacy
Preservation
in IoT [12]
Encrypted
deduplicate
d data
(Block-level
deduplicati
on)
Dedupl
ication
rate
84.04%
of
deduplic
ation
rate has
been
achieved
3. CONCLUSION
This article deals with the various applications that can be
used for the multimedia data deduplication in real time. We
have explained, analyzed and compared the several
applications suggested by different authors in order to
improve the efficiency, rate of deduplication and accuracy.
Measures could be taken to improve the performance of
these applications without disturbing the other features.
REFERENCES
[1] Chen, M., Wang, S., & Tian, L. (2013). A High-precision
Duplicate Image Deduplication Approach. JCP, 8(11),
2768-2775.
[2] Layek, A. K., Gupta, A., Ghosh, S., & Mandal, S. (2016,
December). Fast near-duplicate detection from image
streams on online social media during disaster events.
In 2016 IEEE Annual India Conference (INDICON) (pp.1-
6). IEEE.
[3] Chen, Q., Yang, L., Zhang, D., Shen, Y., & Huang, S. (2018).
Face deduplication in video surveillance. International
Journal of Pattern Recognition and Artificial
Intelligence, 32(03), 1856001.
[4] Wen, D., Han, H., & Jain, A. K. (2015). Face spoof
detection with image distortion analysis. IEEE
Transactions on Information Forensics and
Security, 10(4), 746-761.
[5] Zhou, Z., Wang, Y., Wu, Q. J., Yang, C. N., & Sun, X. (2016).
Effective and efficient global context verification for
image copy detection. IEEE Transactions on Information
Forensics and Security, 12(1), 48-63.
[6] Zhou, Z., Wu, Q. J., Huang, F., & Sun, X. (2017). Fast and
accurate near-duplicate image elimination for visual
sensor networks. International Journal of Distributed
Sensor Networks, 13(2), 1550147717694172.
[7] Gadeski, E., Le Borgne, H., & Popescu, A. (2015, June).
Duplicate image detection in a stream of web visual
data. In 2015 13th International Workshop on Content-
Based Multimedia Indexing (CBMI) (pp. 1-6). IEEE.
[8] Ramaiah, N. P., & Mohan, C. K. (2011, September). De-
duplication of photograph images using histogram
refinement. In 2011 IEEE Recent AdvancesinIntelligent
Computational Systems (pp. 391-395). IEEE.
[9] Khan, J. (2018, February). Identification of Duplicate
Frame In CCTV DVR by Correlation CoefficientFactor.In
2018 Second International Conference on Computing
Methodologies and Communication (ICCMC) (pp. 235-
239). IEEE.
[10] Kharat, J., & Chougule, S. (2020). A passive blind forgery
detection technique to identifyframeduplicationattack.
Multimedia Tools and Applications, 1-17.
[11] Lee, D., & Park, N. (2019). CCTV Video Data
Deduplication Method using Blockchain and Big Data
Analysis. International Journal of Advanced Science and
Technology, 28(3), 267 - 275. Retrieved from
http://sersc.org/journals/index.php/IJAST/article/view
/328
[12] Yan, H., Li, X., Wang, Y., & Jia, C. (2018). Centralized
duplicate removal video storage system with privacy
preservation in IoT. Sensors, 18(6), 1814.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1645
[13] Shen, H. T., Zhou, X., Huang, Z., Shao, J., & Zhou, X. (2007,
September). UQLIPS: a real-time near-duplicate video
clip detection system. In Proceedings of the 33rd
international conference on Very large data bases (pp.
1374-1377).

Weitere ähnliche Inhalte

Was ist angesagt?

Iaetsd literature review on generic lossless visible watermarking &
Iaetsd literature review on generic lossless visible watermarking &Iaetsd literature review on generic lossless visible watermarking &
Iaetsd literature review on generic lossless visible watermarking &Iaetsd Iaetsd
 
A Review on Overview of Image Processing Techniques
A Review on Overview of Image Processing TechniquesA Review on Overview of Image Processing Techniques
A Review on Overview of Image Processing Techniquesijtsrd
 
Object Detection using SURF features
Object Detection using SURF featuresObject Detection using SURF features
Object Detection using SURF featuresIRJET Journal
 
Review of Pose Recognition Systems
Review of Pose Recognition SystemsReview of Pose Recognition Systems
Review of Pose Recognition Systemsvivatechijri
 
Volume 2-issue-6-1974-1978
Volume 2-issue-6-1974-1978Volume 2-issue-6-1974-1978
Volume 2-issue-6-1974-1978Editor IJARCET
 
TVSum: Summarizing Web Videos Using Titles
TVSum: Summarizing Web Videos Using TitlesTVSum: Summarizing Web Videos Using Titles
TVSum: Summarizing Web Videos Using TitlesNEERAJ BAGHEL
 
Fuzzy Forest Learning based Online Facial Biometric Verification for Privacy ...
Fuzzy Forest Learning based Online Facial Biometric Verification for Privacy ...Fuzzy Forest Learning based Online Facial Biometric Verification for Privacy ...
Fuzzy Forest Learning based Online Facial Biometric Verification for Privacy ...IRJET Journal
 
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical Images
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical ImagesAdvanced Fuzzy Logic Based Image Watermarking Technique for Medical Images
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical ImagesIJARIIT
 
Independent Research
Independent ResearchIndependent Research
Independent ResearchNAVEEN KAVVADI
 
Ijarcet vol-2-issue-3-938-941
Ijarcet vol-2-issue-3-938-941Ijarcet vol-2-issue-3-938-941
Ijarcet vol-2-issue-3-938-941Editor IJARCET
 
Retrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS TechniqueRetrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS TechniqueEditor IJMTER
 
THE EFFECT OF PHYSICAL BASED FEATURES FOR RECOGNITION OF RECAPTURED IMAGES
THE EFFECT OF PHYSICAL BASED FEATURES FOR RECOGNITION OF RECAPTURED IMAGESTHE EFFECT OF PHYSICAL BASED FEATURES FOR RECOGNITION OF RECAPTURED IMAGES
THE EFFECT OF PHYSICAL BASED FEATURES FOR RECOGNITION OF RECAPTURED IMAGESijcsit
 
IRJET- Kidney Stone Classification using Deep Neural Networks and Facilitatin...
IRJET- Kidney Stone Classification using Deep Neural Networks and Facilitatin...IRJET- Kidney Stone Classification using Deep Neural Networks and Facilitatin...
IRJET- Kidney Stone Classification using Deep Neural Networks and Facilitatin...IRJET Journal
 
F04613040
F04613040F04613040
F04613040IOSR-JEN
 
Comprehensive Study of the Work Done In Image Processing and Compression Tech...
Comprehensive Study of the Work Done In Image Processing and Compression Tech...Comprehensive Study of the Work Done In Image Processing and Compression Tech...
Comprehensive Study of the Work Done In Image Processing and Compression Tech...IRJET Journal
 
IRJET- Human Fall Detection using Co-Saliency-Enhanced Deep Recurrent Convolu...
IRJET- Human Fall Detection using Co-Saliency-Enhanced Deep Recurrent Convolu...IRJET- Human Fall Detection using Co-Saliency-Enhanced Deep Recurrent Convolu...
IRJET- Human Fall Detection using Co-Saliency-Enhanced Deep Recurrent Convolu...IRJET Journal
 
PCS 2016 presentation
PCS 2016 presentationPCS 2016 presentation
PCS 2016 presentationAshek Ahmmed
 

Was ist angesagt? (20)

Iaetsd literature review on generic lossless visible watermarking &
Iaetsd literature review on generic lossless visible watermarking &Iaetsd literature review on generic lossless visible watermarking &
Iaetsd literature review on generic lossless visible watermarking &
 
A Review on Overview of Image Processing Techniques
A Review on Overview of Image Processing TechniquesA Review on Overview of Image Processing Techniques
A Review on Overview of Image Processing Techniques
 
Object Detection using SURF features
Object Detection using SURF featuresObject Detection using SURF features
Object Detection using SURF features
 
Review of Pose Recognition Systems
Review of Pose Recognition SystemsReview of Pose Recognition Systems
Review of Pose Recognition Systems
 
Volume 2-issue-6-1974-1978
Volume 2-issue-6-1974-1978Volume 2-issue-6-1974-1978
Volume 2-issue-6-1974-1978
 
TVSum: Summarizing Web Videos Using Titles
TVSum: Summarizing Web Videos Using TitlesTVSum: Summarizing Web Videos Using Titles
TVSum: Summarizing Web Videos Using Titles
 
Fuzzy Forest Learning based Online Facial Biometric Verification for Privacy ...
Fuzzy Forest Learning based Online Facial Biometric Verification for Privacy ...Fuzzy Forest Learning based Online Facial Biometric Verification for Privacy ...
Fuzzy Forest Learning based Online Facial Biometric Verification for Privacy ...
 
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical Images
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical ImagesAdvanced Fuzzy Logic Based Image Watermarking Technique for Medical Images
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical Images
 
Independent Research
Independent ResearchIndependent Research
Independent Research
 
Ijarcet vol-2-issue-3-938-941
Ijarcet vol-2-issue-3-938-941Ijarcet vol-2-issue-3-938-941
Ijarcet vol-2-issue-3-938-941
 
Retrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS TechniqueRetrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS Technique
 
THE EFFECT OF PHYSICAL BASED FEATURES FOR RECOGNITION OF RECAPTURED IMAGES
THE EFFECT OF PHYSICAL BASED FEATURES FOR RECOGNITION OF RECAPTURED IMAGESTHE EFFECT OF PHYSICAL BASED FEATURES FOR RECOGNITION OF RECAPTURED IMAGES
THE EFFECT OF PHYSICAL BASED FEATURES FOR RECOGNITION OF RECAPTURED IMAGES
 
E0704019023
E0704019023E0704019023
E0704019023
 
IRJET- Kidney Stone Classification using Deep Neural Networks and Facilitatin...
IRJET- Kidney Stone Classification using Deep Neural Networks and Facilitatin...IRJET- Kidney Stone Classification using Deep Neural Networks and Facilitatin...
IRJET- Kidney Stone Classification using Deep Neural Networks and Facilitatin...
 
MAJOR PROJECT
MAJOR PROJECT MAJOR PROJECT
MAJOR PROJECT
 
F04613040
F04613040F04613040
F04613040
 
Comprehensive Study of the Work Done In Image Processing and Compression Tech...
Comprehensive Study of the Work Done In Image Processing and Compression Tech...Comprehensive Study of the Work Done In Image Processing and Compression Tech...
Comprehensive Study of the Work Done In Image Processing and Compression Tech...
 
IRJET- Human Fall Detection using Co-Saliency-Enhanced Deep Recurrent Convolu...
IRJET- Human Fall Detection using Co-Saliency-Enhanced Deep Recurrent Convolu...IRJET- Human Fall Detection using Co-Saliency-Enhanced Deep Recurrent Convolu...
IRJET- Human Fall Detection using Co-Saliency-Enhanced Deep Recurrent Convolu...
 
G010245056
G010245056G010245056
G010245056
 
PCS 2016 presentation
PCS 2016 presentationPCS 2016 presentation
PCS 2016 presentation
 

Ă„hnlich wie IRJET - Applications of Image and Video Deduplication: A Survey

VIDEO SUMMARIZATION: CORRELATION FOR SUMMARIZATION AND SUBTRACTION FOR RARE E...
VIDEO SUMMARIZATION: CORRELATION FOR SUMMARIZATION AND SUBTRACTION FOR RARE E...VIDEO SUMMARIZATION: CORRELATION FOR SUMMARIZATION AND SUBTRACTION FOR RARE E...
VIDEO SUMMARIZATION: CORRELATION FOR SUMMARIZATION AND SUBTRACTION FOR RARE E...Journal For Research
 
An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...
An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...
An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...IRJET Journal
 
Automatic Visual Concept Detection in Videos: Review
Automatic Visual Concept Detection in Videos: ReviewAutomatic Visual Concept Detection in Videos: Review
Automatic Visual Concept Detection in Videos: ReviewIRJET Journal
 
USING IMAGE CLASSIFICATION TO INCENTIVIZE RECYCLING
USING IMAGE CLASSIFICATION TO INCENTIVIZE RECYCLINGUSING IMAGE CLASSIFICATION TO INCENTIVIZE RECYCLING
USING IMAGE CLASSIFICATION TO INCENTIVIZE RECYCLINGIRJET Journal
 
A Deterministic Eviction Model for Removing Redundancies in Video Corpus
A Deterministic Eviction Model for Removing Redundancies in Video Corpus A Deterministic Eviction Model for Removing Redundancies in Video Corpus
A Deterministic Eviction Model for Removing Redundancies in Video Corpus IJECEIAES
 
A Review of Digital Watermarking Technique for the Copyright Protection of Di...
A Review of Digital Watermarking Technique for the Copyright Protection of Di...A Review of Digital Watermarking Technique for the Copyright Protection of Di...
A Review of Digital Watermarking Technique for the Copyright Protection of Di...IRJET Journal
 
Video inpainting using backgroung registration
Video inpainting using backgroung registrationVideo inpainting using backgroung registration
Video inpainting using backgroung registrationeSAT Publishing House
 
IRJET- Saliency based Image Co-Segmentation
IRJET- Saliency based Image Co-SegmentationIRJET- Saliency based Image Co-Segmentation
IRJET- Saliency based Image Co-SegmentationIRJET Journal
 
Image super resolution using Generative Adversarial Network.
Image super resolution using Generative Adversarial Network.Image super resolution using Generative Adversarial Network.
Image super resolution using Generative Adversarial Network.IRJET Journal
 
Recent advances in content based video copy detection (IEEE)
Recent advances in content based video copy detection (IEEE)Recent advances in content based video copy detection (IEEE)
Recent advances in content based video copy detection (IEEE)PACE 2.0
 
System analysis and design for multimedia retrieval systems
System analysis and design for multimedia retrieval systemsSystem analysis and design for multimedia retrieval systems
System analysis and design for multimedia retrieval systemsijma
 
IRJET - A Research on Video Forgery Detection using Machine Learning
IRJET -  	  A Research on Video Forgery Detection using Machine LearningIRJET -  	  A Research on Video Forgery Detection using Machine Learning
IRJET - A Research on Video Forgery Detection using Machine LearningIRJET Journal
 
IRJET- A Survey on the Enhancement of Video Action Recognition using Semi-Sup...
IRJET- A Survey on the Enhancement of Video Action Recognition using Semi-Sup...IRJET- A Survey on the Enhancement of Video Action Recognition using Semi-Sup...
IRJET- A Survey on the Enhancement of Video Action Recognition using Semi-Sup...IRJET Journal
 
IRJET- Object Detection and Recognition for Blind Assistance
IRJET- Object Detection and Recognition for Blind AssistanceIRJET- Object Detection and Recognition for Blind Assistance
IRJET- Object Detection and Recognition for Blind AssistanceIRJET Journal
 
An Stepped Forward Security System for Multimedia Content Material for Cloud ...
An Stepped Forward Security System for Multimedia Content Material for Cloud ...An Stepped Forward Security System for Multimedia Content Material for Cloud ...
An Stepped Forward Security System for Multimedia Content Material for Cloud ...IRJET Journal
 
Lossless Image Compression Techniques Comparative Study
Lossless Image Compression Techniques Comparative StudyLossless Image Compression Techniques Comparative Study
Lossless Image Compression Techniques Comparative StudyIRJET Journal
 
Parking Surveillance Footage Summarization
Parking Surveillance Footage SummarizationParking Surveillance Footage Summarization
Parking Surveillance Footage SummarizationIRJET Journal
 
Secure IoT Systems Monitor Framework using Probabilistic Image Encryption
Secure IoT Systems Monitor Framework using Probabilistic Image EncryptionSecure IoT Systems Monitor Framework using Probabilistic Image Encryption
Secure IoT Systems Monitor Framework using Probabilistic Image EncryptionIJAEMSJORNAL
 
5 ijaems sept-2015-9-video feature extraction based on modified lle using ada...
5 ijaems sept-2015-9-video feature extraction based on modified lle using ada...5 ijaems sept-2015-9-video feature extraction based on modified lle using ada...
5 ijaems sept-2015-9-video feature extraction based on modified lle using ada...INFOGAIN PUBLICATION
 
Motion capture for Animation
Motion capture for AnimationMotion capture for Animation
Motion capture for AnimationIRJET Journal
 

Ă„hnlich wie IRJET - Applications of Image and Video Deduplication: A Survey (20)

VIDEO SUMMARIZATION: CORRELATION FOR SUMMARIZATION AND SUBTRACTION FOR RARE E...
VIDEO SUMMARIZATION: CORRELATION FOR SUMMARIZATION AND SUBTRACTION FOR RARE E...VIDEO SUMMARIZATION: CORRELATION FOR SUMMARIZATION AND SUBTRACTION FOR RARE E...
VIDEO SUMMARIZATION: CORRELATION FOR SUMMARIZATION AND SUBTRACTION FOR RARE E...
 
An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...
An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...
An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...
 
Automatic Visual Concept Detection in Videos: Review
Automatic Visual Concept Detection in Videos: ReviewAutomatic Visual Concept Detection in Videos: Review
Automatic Visual Concept Detection in Videos: Review
 
USING IMAGE CLASSIFICATION TO INCENTIVIZE RECYCLING
USING IMAGE CLASSIFICATION TO INCENTIVIZE RECYCLINGUSING IMAGE CLASSIFICATION TO INCENTIVIZE RECYCLING
USING IMAGE CLASSIFICATION TO INCENTIVIZE RECYCLING
 
A Deterministic Eviction Model for Removing Redundancies in Video Corpus
A Deterministic Eviction Model for Removing Redundancies in Video Corpus A Deterministic Eviction Model for Removing Redundancies in Video Corpus
A Deterministic Eviction Model for Removing Redundancies in Video Corpus
 
A Review of Digital Watermarking Technique for the Copyright Protection of Di...
A Review of Digital Watermarking Technique for the Copyright Protection of Di...A Review of Digital Watermarking Technique for the Copyright Protection of Di...
A Review of Digital Watermarking Technique for the Copyright Protection of Di...
 
Video inpainting using backgroung registration
Video inpainting using backgroung registrationVideo inpainting using backgroung registration
Video inpainting using backgroung registration
 
IRJET- Saliency based Image Co-Segmentation
IRJET- Saliency based Image Co-SegmentationIRJET- Saliency based Image Co-Segmentation
IRJET- Saliency based Image Co-Segmentation
 
Image super resolution using Generative Adversarial Network.
Image super resolution using Generative Adversarial Network.Image super resolution using Generative Adversarial Network.
Image super resolution using Generative Adversarial Network.
 
Recent advances in content based video copy detection (IEEE)
Recent advances in content based video copy detection (IEEE)Recent advances in content based video copy detection (IEEE)
Recent advances in content based video copy detection (IEEE)
 
System analysis and design for multimedia retrieval systems
System analysis and design for multimedia retrieval systemsSystem analysis and design for multimedia retrieval systems
System analysis and design for multimedia retrieval systems
 
IRJET - A Research on Video Forgery Detection using Machine Learning
IRJET -  	  A Research on Video Forgery Detection using Machine LearningIRJET -  	  A Research on Video Forgery Detection using Machine Learning
IRJET - A Research on Video Forgery Detection using Machine Learning
 
IRJET- A Survey on the Enhancement of Video Action Recognition using Semi-Sup...
IRJET- A Survey on the Enhancement of Video Action Recognition using Semi-Sup...IRJET- A Survey on the Enhancement of Video Action Recognition using Semi-Sup...
IRJET- A Survey on the Enhancement of Video Action Recognition using Semi-Sup...
 
IRJET- Object Detection and Recognition for Blind Assistance
IRJET- Object Detection and Recognition for Blind AssistanceIRJET- Object Detection and Recognition for Blind Assistance
IRJET- Object Detection and Recognition for Blind Assistance
 
An Stepped Forward Security System for Multimedia Content Material for Cloud ...
An Stepped Forward Security System for Multimedia Content Material for Cloud ...An Stepped Forward Security System for Multimedia Content Material for Cloud ...
An Stepped Forward Security System for Multimedia Content Material for Cloud ...
 
Lossless Image Compression Techniques Comparative Study
Lossless Image Compression Techniques Comparative StudyLossless Image Compression Techniques Comparative Study
Lossless Image Compression Techniques Comparative Study
 
Parking Surveillance Footage Summarization
Parking Surveillance Footage SummarizationParking Surveillance Footage Summarization
Parking Surveillance Footage Summarization
 
Secure IoT Systems Monitor Framework using Probabilistic Image Encryption
Secure IoT Systems Monitor Framework using Probabilistic Image EncryptionSecure IoT Systems Monitor Framework using Probabilistic Image Encryption
Secure IoT Systems Monitor Framework using Probabilistic Image Encryption
 
5 ijaems sept-2015-9-video feature extraction based on modified lle using ada...
5 ijaems sept-2015-9-video feature extraction based on modified lle using ada...5 ijaems sept-2015-9-video feature extraction based on modified lle using ada...
5 ijaems sept-2015-9-video feature extraction based on modified lle using ada...
 
Motion capture for Animation
Motion capture for AnimationMotion capture for Animation
Motion capture for Animation
 

Mehr von IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

Mehr von IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

KĂĽrzlich hochgeladen

Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadhamedmustafa094
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Call Girls Mumbai
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxchumtiyababu
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X79953056974 Low Rate Call Girls In Saket, Delhi NCR
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxmaisarahman1
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARKOUSTAV SARKAR
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesMayuraD1
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"mphochane1998
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 

KĂĽrzlich hochgeladen (20)

Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 

IRJET - Applications of Image and Video Deduplication: A Survey

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1641 APPLICATIONS OF IMAGE AND VIDEO DEDUPLICATION: A SURVEY Nivetha.L1, Gowri.V2, Dr.J.Jane Rubel Angelina3 1UG Student, Dept. of Computer Science and Engineering, Thiagarajar College of Engineering, Madurai, Tamil Nadu, India 2UG Student, Dept. of Computer Science and Engineering, Thiagarajar College of Engineering, Madurai, Tamil Nadu, India 3Assistant Professor, Dept. of Computer Science and Engineering, Thiagarajar College of Engineering, Madurai, Tamil Nadu, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - In this digitizing technology world, people are curious about uploading and sharing information mainly in picture and video format. This growth has resulted in an increase in storage capacity that includes a lot of redundant multimedia data. Deduplication is one of the new techniques dealing with redundant data which is stored at different storage locations. Deduplication is one of the new techniques dealing with redundant data which is stored at different storage locations. In deduplication, a single copy is preserved when more than one copy of the same data is identified, and the other data is replaced with pointers pointing to the preserved copy. Storage may effectively be used to store a lot of other data. While there are various types of techniques for deduplication, researchers concentrate a lot on image and video deduplication techniques and their implementations as it is a difficult one. This article discusses the implementations of the real-time system image and video deduplication techniques. Key Words: Image deduplication, Video deduplication, Storage optimization. 1. INTRODUCTION The planet is being packed with variousformsofmultimedia data in the last few years. We've experienced the explosion of video content over the Internet in recent years as billions of videos are stored and exchanged in the cloud, a large portion of which consists of near-duplicate video copies. Rapid advances in multimedia technologies fueled this growth. So, deduplication is needed to eliminate the occupied storage space that could be used efficiently for some other purpose.Deduplicationhasbeencommonlyused in backup and archival systems to significantly increase storage use. There are different types of deduplication techniques like data deduplication, image deduplication, and video deduplication. There are many methods to manage file deduplication out of the above forms. Yet removing image and video duplicates is a difficult task. That is because the data will be exactly replicated in case of file deduplication. But in case of an image or video, one should also think about different formats in which the same image or video could be stored. So, handling images and videos is a quite challenging task. 1.1 Image deduplication Image deduplication recognizes duplicate images, removes all images but maintains one copy to create local references to the information that users can access without any problem. The main concept in the deduplication of images is to delete duplicate images by five stages [1] comprising feature extraction, high-dimensional indexing (scaling, changing storage format), accuracy optimization by extracting image edge information, centroid selection using cluster formation, and fixing the centroid image and deduplication evaluation followed by comparison. When a new picture comes in, the client first extracts the fingerprinter and sends the fingerprint to the sides of the storage. When the storage side cannot locate the corresponding fingerprinter in index tables, the next image will be processed and the imagefingerprintermovedtoindex tables. Alternatively, the sideof the storage willmaintainthe higher image perception-quality as the centroid image, and create a point pointing to the centroid image. 1.2 Video deduplication: Video data is an important part of the today's Internet data and it creates a lot of flexibility in storage and distribution. Video deduplication is the repetition of scenes or frames within the video and also among other videos. Consider two similar videos, for example, where the action performed in the first frame of the first video is replicated in the last frame of the second video. Then the last frame of the second video is redundant and should be replaced with a pointer. This not only saves storage space effectively, but also greatly increases the accuracy of duplicate images to be retrieved. The original videos have to be chunked into frames for further processing to perform video deduplication. In the case of variable-sized frames the frames are of the same fixed size (in fixed-sized frames) or different sizes. Similar to the technique of image deduplication, fingerprints are created for each frame and compared with the other ones of same or different videos. It can be indexed using data structures such as inverted index, B+ tree etc to maintain the order of the frames. So that the
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1642 videos can be recovered in order and viewed by the users without any inconvenience. Fig -1: Process of Deduplication 2. Literature Review: Researchers have been proposed certain applications for image and video deduplication in real time. Let us discuss a few of those applications using different types of methods that would deliver a better result in day-to-day activities. Ashish Kumar Layeket al [2] proposed a novel methodology for identifying and grouping near-duplicates from image streams posted on online social media. This is viewed as the problem of clustering the imagesinthestream, such that each cluster consists of a series of near-duplicate images. The proposed technique is a hierarchical one consisting of two levels – a global feature descriptor-based similarity check at the top level to minimize search space, followedbyLocalitySensitiveHashing(LSH)-basedsimilarity checking at the next level to detect similarity with only a few images, thus maximizing both precision and processingtime. The technique is composed of two distinct stages. The first stage is the training process in which a wide set of random images shared on social media sites are used to create a training dataset. This process also involves clustering the collection of random imagesusingmoment-basedfeaturesas they are invariant to translation, rotation and scaling and generation of visual vocabulary generation.Thesecondstage is an online near-duplicate process of detection. Here, some candidate images are to be found such that each candidate image is a representation of a distinct set (cluster) of near- duplicate images and then LSH-based similarity check between the test image and theidentifiedcandidateimagesis performed. D Wen et al [4] designed a face spoof detection system that finds the identical images on various types of images for the same person. The person's face is identified in this system, and is normalized. This is focused on an Study of Image Distortion Analysis (IDA).Four forms of IDA features (specular reflection,blurriness, colormoments andvariation of color) were designed to catch imagedistortioninthe spoof face images . The normalized image features are extracted and compared with the classifiers learned from different training data groups. Ultimately, if the image matches all of the images in the classifier then the program determinesthat the picture is a spoof or fake image. Zhili Zhou et al [5] presented an effective and efficient global context verification scheme for image copy detection. The framework consists of three main components, namely Scale Invariant Feature Transform (SIFT) feature matching, OR-GCD extraction, and verification of SIFT matches. To obtain initial SIFT matches, the first one matches the SIFT features between images based on the Bag of Words (BOW) quantization. The global context of every matched SIFT function is defined in the OR-GCD extraction. Then, by comparing their corresponding OR-GCDs, the matched SIFT features are checked by extracting and concatenating two kinds of binary vectors — one based on intensities and the other based on gradients, and then the verification resultcan be further used to calculate image similarities for copy detection. The approach suggested is expanded to cover the function of partial-duplicate image detection. Potential duplicated region location is a crucial stage for partial- duplicate image detection. SGV strategy is suggested that takes into account not only the relative positions of local features but also their characteristic relationships to filter geometrically inconsistent matches for potential duplicated region location. Z Zhou et al [6] designed to eliminate the near-duplicate image quickly andaccuratelyforvisualsensornetworks.This is because visual sensor nodes, that is the camera nodes, produces a lot of visual data, such as digital images and videos, that gets transmitted on visual sensor networks. Among those, there are many near-duplicate images, which cause a serious wastage in storage. Here the images are split into a 3*3 matrix andconvertedtohashcode. Near-duplicate clustering is the first and crucial step towards the removal of near duplicates. Next, they suggest a novel seed image selection method based on the PageRank algorithm, which can pick the most appropriate images accurately as seed images and delete the other redundant images to complete the near-duplicate elimination. Locality Sensitive Hashing (LSH) is a famous inverted index file building technique for matching high-dimensional features. The hash values of a given query function are looked up from inverted index file entries, and then an additional comparison is applied between the original features to further validate whether or not two features are a match. Etienne Gadeski et al [7] suggested a solution to the issue of indexing and finding duplicates of images while streaming visual data in asocialmediaintelligencescenario.Rescalingis done in the proposed method to transform the image into a grayscale and to reduce its size to pixels. Based on
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1643 comparisons of the pixel value, hash is determined, and each hash value is encoded to construct the descriptor. The hamming distance is then used to calculate the distance. Therefore the Hamming distance counts the number of bits that vary between two values. That can recognize duplicates that have been flipped. Due to the efficient use of the Hamming distance we can calculate a descriptor for one image andscan a large set of images for duplicatesonasingle core processor in less than a second. This has resulted in an effective and robust description of the image that is well suited for indexing and searching large visual data streams. NP Ramaiah et al[8] developed a similarity-based image deduplication with photographs of family cards from various districts. The authors invented a Content-Based Image Retrieval (CBIR) model in this process. This model consists of three steps: feature extraction, clustering and deduplication. In feature extraction, the color content and texture content are extracted with the help of histogram refinement technique. The extracted features are divided into 23 clusters for each district. The clusters are further clustered based on similarities using the k-means clustering algorithm into separate groups. Inthededuplicationprocess, the histogram of the image is determined andcomparedwith the other images.Theimageswhicharelessidenticalthanthe empirical threshold are viewed and manually checked to avoid false positive images. The new approachremovesupto 0.35 million redundant images. Javed Akhtar Khan [9] suggested a method for the identification of duplicate frames in Closed Circuit Television(CCTV) DVR by correlation coefficient factor. Unused frame identification is filtered by correlation coefficient and finds similar frame images which helptosave storage space. Q Chen et al [3] proposed a novel face deduplication system in Video Surveillance. This system consists mainly of two parts: face detection and face quality evaluation.Thekey method is to locate all facial images through facial detection, obtain multiple faces belonging to the same person as a face subset, and then pick a limited number of high-quality faces using image deduplication. For face recognition,Normalized Pixel Difference (NPD)featuresareextractedfromeachofthe frame image in the video sequences from the surveillance videos. Some of the most discriminative featuresareselected from all the features using gentle AdaBoost algorithm to create classifiers. Now, using soft-cascade structure, strong classifier is created. It will give the face confidence as the output. (The greater confidence means greater possibility of being a human face will be greater). Assessment parameters such as facial confidence, image sharpnessandresolutionare used forcalculating thefacialqualityscoresinthefacequality assessment. The higher the score, the betteristhequalityofa face. The aim of deduplication is to ignore the low-quality faces that have been identified and to retain the high-quality faces for face recognition to be more accurate. Jayashree Kharat et al [10] developed a novel passive blind forgery detection to identifyframeduplicationattackin Moving PictureExperts Group-4(MPEG-4)codedvideos.The frame duplication attack is nothing but one or more frames are copied and the same gets pasted in the same video at different location to hide particular operation. The method proposed is composed of two phases. Firstly, the suspicious frames (most likely faked frames) are marked by measuring the motion vector from the test video for all frames. Then, Scale Invariant Feature Transform (SIFT) is a computer vision algorithm used to detect and extract descriptors of local featuresas the forger mayadjusttheilluminationoradd noise to the framebefore pasting it at anotherlocation.When the frames are a duplicate of each other, then both frames will have the samesift key-points. The SIFT featuresareused to compare suspicious frames, and Random sample consensus (RANSAC) is eventually used to identify and find duplicate frames for identification of forgeries. Donghyeok Lee et al[11] developed a secureand efficient model based on blockchain and deduplicationtechnologyfor Intelligent CCTV surveillance. The proposed approach ensures data integrity of CCTV video data based on edge blockchain region and by deduplication, it increases the efficiency of video data transmission. Here a method of building the blockchain separately is proposed in the trusted edge blockchain area. With this, the object's privacy can be securedagainst CCTV image data, and the image information can be safelysubmitted to the cloud server. Also, throughthe event-based deduplication technology,the event analysis is actually carried out to compare the image blocks in the file byte unit, even if they have several different contents in the file data, the comparison value for the outcome of the event analysis is regarded as the same image and can be defined as duplicates. This helps the bandwidth to be reduced at the time of transmission and a safe and effective video surveillance environment can be constructed. Hongyang yan et al [12] build a centralized privacy- preserving duplicate removal video storage system in IoT. Because of the data redundancy, the large volume of data generated by IoT devices results in theuseofcommunication bandwidth and storage space. All the operations and computations must be carried out in encrypted form to protect data privacy. In video files there is a high level of redundancy due to the adjacent video frames which are strongly correlated with each other. In the proposed block- level deduplication method, deduplication is not only performed on the blocks of a single image to perform deduplication on video data; but also to increase the performance on the blocks ofdifferentimages.Itisfoundthat the duplicated privacy-preserving removal system will be helpful withenhanceddeduplicationcapabilityandincreased protection for IoT's centralized storage environment. Heng Tao Shen et al [13] developed a prototype framework for online near-duplicate video clip (NDVC) detection,calledUQLIPS.It'saparticularcontent-basedvideo retrieval (CBVR) issue that looks for the near-duplicates of a query clip. UQLIPS core consistsoftwonovelcomplementary schemes forthe identificationofNDVCs.BoundedCoordinate System (BCS), a compact representation model that ignores temporal information aimed at capturing the video's dominant content and evolving content trends, summarizes each video globally to a single vector that captures the dominant content and evolving content trends in each clip.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1644 The other idea, called FRAme Symbolisation (FRAS), maps each clip to a sequence ofsymbols,andtakesvideosequences in temporary order. Next, FRAS generates a symbol dictionary by conducting hierarchical clustering (for ex, k- means) through the entire datasetofframes.Thisdescription is more compact, since every frame is represented by a cluster id. The similarity between video clips can be calculated by Probability-based Edit Distance (PED), which extends string edit distance and thus the whole systemleads to more actuate NDVC search action. Table -1: Comparison of different applications in image and video Deduplication Type of deduplic ation Application Technique used Analysi s based on Perform ance analysed Image Dedupli cation Fast and accurate near- duplicate image elimination for visual sensor network [6] Improvised k-means clustering, simple random sampling and systematic sampling Dedupl ication Rate Dedupli cation rate of 89.94% has been achieved Image Dedupli cation De- duplication of photograph images using histogram refinement [8] k-means clustering Accura cy 90% accuracy has been achieved Image Dedupli cation A passive blind forgery detection technique to identify frame duplication attack [10] Scale Invariant Feature Transform (SIFT) algorithm Simulat ion time 33 seconds Video Dedupli cation Face deduplicatio n in video surveillance [3] Ada Boost Algorithm Accura cy Accurac y increase s when N ≤ 16 (N = No. of faces) Video Dedupli cation Centralized Duplicate Removal Video Storage System with Privacy Preservation in IoT [12] Encrypted deduplicate d data (Block-level deduplicati on) Dedupl ication rate 84.04% of deduplic ation rate has been achieved 3. CONCLUSION This article deals with the various applications that can be used for the multimedia data deduplication in real time. We have explained, analyzed and compared the several applications suggested by different authors in order to improve the efficiency, rate of deduplication and accuracy. Measures could be taken to improve the performance of these applications without disturbing the other features. REFERENCES [1] Chen, M., Wang, S., & Tian, L. (2013). A High-precision Duplicate Image Deduplication Approach. JCP, 8(11), 2768-2775. [2] Layek, A. K., Gupta, A., Ghosh, S., & Mandal, S. (2016, December). Fast near-duplicate detection from image streams on online social media during disaster events. In 2016 IEEE Annual India Conference (INDICON) (pp.1- 6). IEEE. [3] Chen, Q., Yang, L., Zhang, D., Shen, Y., & Huang, S. (2018). Face deduplication in video surveillance. International Journal of Pattern Recognition and Artificial Intelligence, 32(03), 1856001. [4] Wen, D., Han, H., & Jain, A. K. (2015). Face spoof detection with image distortion analysis. IEEE Transactions on Information Forensics and Security, 10(4), 746-761. [5] Zhou, Z., Wang, Y., Wu, Q. J., Yang, C. N., & Sun, X. (2016). Effective and efficient global context verification for image copy detection. IEEE Transactions on Information Forensics and Security, 12(1), 48-63. [6] Zhou, Z., Wu, Q. J., Huang, F., & Sun, X. (2017). Fast and accurate near-duplicate image elimination for visual sensor networks. International Journal of Distributed Sensor Networks, 13(2), 1550147717694172. [7] Gadeski, E., Le Borgne, H., & Popescu, A. (2015, June). Duplicate image detection in a stream of web visual data. In 2015 13th International Workshop on Content- Based Multimedia Indexing (CBMI) (pp. 1-6). IEEE. [8] Ramaiah, N. P., & Mohan, C. K. (2011, September). De- duplication of photograph images using histogram refinement. In 2011 IEEE Recent AdvancesinIntelligent Computational Systems (pp. 391-395). IEEE. [9] Khan, J. (2018, February). Identification of Duplicate Frame In CCTV DVR by Correlation CoefficientFactor.In 2018 Second International Conference on Computing Methodologies and Communication (ICCMC) (pp. 235- 239). IEEE. [10] Kharat, J., & Chougule, S. (2020). A passive blind forgery detection technique to identifyframeduplicationattack. Multimedia Tools and Applications, 1-17. [11] Lee, D., & Park, N. (2019). CCTV Video Data Deduplication Method using Blockchain and Big Data Analysis. International Journal of Advanced Science and Technology, 28(3), 267 - 275. Retrieved from http://sersc.org/journals/index.php/IJAST/article/view /328 [12] Yan, H., Li, X., Wang, Y., & Jia, C. (2018). Centralized duplicate removal video storage system with privacy preservation in IoT. Sensors, 18(6), 1814.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1645 [13] Shen, H. T., Zhou, X., Huang, Z., Shao, J., & Zhou, X. (2007, September). UQLIPS: a real-time near-duplicate video clip detection system. In Proceedings of the 33rd international conference on Very large data bases (pp. 1374-1377).