Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Object tracking based on foreground discrimination and circle search
LIN Lingpeng, HUANG Tianqiang, LIN Jing
Journal of Computer Applications    2017, 37 (11): 3128-3133.   DOI: 10.11772/j.issn.1001-9081.2017.11.3128
Abstract557)      PDF (1049KB)(529)       Save
Aiming at the problems of low accuracy and even object lost in moving object tracking under occlusion, deformation, rotation, and illumination changes and poor real-time performance of the traditional tracking algorithm, a target tracking algorithm based on foreground discrimination and Circle Search (CS) was proposed. The image perceptual hashing technique was used to describe and match tracked object, and the tracking process was based on the combination of the above was tracking strategies, which could effectively solve the above problems. Firstly, because the direction of motion uncertain and the inter-frame motion was slow, CS algorithm was used to search the local best matching position (around the tracked object) in the current frame. Then, the foreground discrimination PBAS (Pixel-Based Adaptive Segmenter) algorithm was adopted to search for the global optimal object foreground in the current frame. Finally, the one with higher similarity with the object template was selected as the tracking result, and whether to update the target template was determined according to the matching threshold. The experimental results show that the proposed algorithm is better than the MeanShift algorithm in precision, accuracy, and has a better tracking advantage when the target is not moving fast.
Reference | Related Articles | Metrics
Detection of continuously and repeated copy-move forgery to single frame in videos by quantized DCT coefficients
LIN Jing, HUANG Tianqiang, LAI Yueicong, LU Henan
Journal of Computer Applications    2016, 36 (5): 1356-1361.   DOI: 10.11772/j.issn.1001-9081.2016.05.1356
Abstract495)      PDF (962KB)(389)       Save
Most existing detection algorithms of video frame copy-move forgery in time domain were designed for the copy-move forgery of video sequence containing 20 frames at least, and are difficult to detect single frame forgery. While according to the characteristics of human visual perception, 15 frames at least were needed to modify the video meaning. So when goal in vision was made by the tampering, continuous operation and many times were needed. In order to detect the tampering, a detection algorithm based on quantized Discrete Cosine Transform (DCT) coefficients for continuous and repeated single frame copy-move forgery in videos was proposed. Firstly, the video was converted into images, and quantized DCT coefficients were taken as the feature vector of a frame image. Then, the similarity between frames was measured by calculating Bhattacharyya coefficient, and threshold was set to judge the abnormal similarity between two adjacent frames. Finally, whether the video was tampered and the tampered positions were determined by the continuity of frames with abnormal similarity and the number of continuous frames. The experimental results show that the proposed algorithm can detect the video with different scenarios, it possesses fast detection speed, and is not affected by further compression factors, but also is of high accuracy and low omission ratio.
Reference | Related Articles | Metrics
Fast detection and recovery method for copy-move forgery in time domain of homologous videos based on geometric mean decomposition and structural similarity
LIAO Shengyang, HUANG Tianqiang
Journal of Computer Applications    2015, 35 (3): 821-825.   DOI: 10.11772/j.issn.1001-9081.2015.03.821
Abstract609)      PDF (1016KB)(504)       Save

Aiming at the problem of low efficiency of tampering detection and accuracy of location, a homologous video copy-move tampering detection and recovering method based on Geometric Mean Decomposition (GMD) and Structural SIMilarity (SSIM) was proposed. Firstly, the videos were translated into grayscale image sequences. Then, the geometric mean decomposition was adopted as a feature and a block-based search strategy was put forward to locate the starting frame of the duplicated sequences. In addition, SSIM was first extended to measure the similarity between two frames of a video. The starting frame of duplicated sequences was rechecked by using the structural similarity. Since the value of similarity between duplicated frames is higher than that between the normal inter-frames, a coarse-to-fine method based on SSIM was put forward to locate the tail frame. Finally, the video was recovered. In comparison with other classical algorithms, the experimental results show that the proposed method can not only achieve detection of copy-move forgery but also accurately detect and localize duplicated clips in different kinds of videos. Besides, the method has a great improvement in terms of precision, recall and computation time.

Reference | Related Articles | Metrics
Gender identification of microblog users based on rough set
HUANG Faliang XIONG Jinbo HUANG Tianqiang LIU Ximeng
Journal of Computer Applications    2014, 34 (8): 2209-2211.   DOI: 10.11772/j.issn.1001-9081.2014.08.2209
Abstract226)      PDF (487KB)(539)       Save

Concerning gender tendency hidden in microblog messages posted by microblog users, a novel approach based on rough set theory was proposed to identify microblog user gender. In the proposed approach, a new Representation Model based on Tolerance Rough Set (TRSRM) was devised, which can effectively represent gender characteristics of microblog messages. The experimental results show that the accuracy rate of the proposed approach is 7% higher than frequency model approach by testing messages of 1000 real microblog users, and so the TRSRM achieves better recognition performance.

Reference | Related Articles | Metrics