SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
10
International Journal of Research and Innovation on Science, Engineering and Technology (IJRISET)
ADAPTIVE TEMPORAL AVERAGING AND FRAME PREDICTION BASED SURVEIL-
LANCE VIDEO CODING
S.pushpa1
, S. Rehana Banu2
.
1 Research Scholar, Department of Electronics AndCommunication Engineering, Chiranjeevi Reddy Institute of Engineering and Technology
Anantapur, A. P, India.
2 Assistant Professor, Department of Electronics AndCommunication Engineering, Chiranjeevi Reddy Institute of Engineering and Technology
Anantapur, A. P, India.
*Corresponding Author:
S.pushpa
Research Scholar,Department of Electronics AndCom-
munication Engineering, Chiranjeevi Reddy Institute of
Engineering and Technology,Anantapur, A. P, India.
Email: pushpa.sarode7@gmail.com.
Year of publication: 2016
Review Type: peer reviewed
Volume: I, Issue : I
Citation:S.pushpa, Research Scholar"Adaptive Temporal
Averaging And Frame Prediction Based Surveillance Vid-
eo Coding" International Journal of Research and Innova-
tion on Science, Engineering and Technology (IJRISET)
(2016) 10-14
INTRODUCTION
The research presented in this thesis focused on diverse
coding techniques specific to surveillance videos. The
foremost aim of this work is to propose techniques to im-
prove the storage capacity and bandwidth utilization with
less computational complexity. The proposed coding tech-
niques to improve compression and processing efficiency
have been described to achieve better performance com-
pared to the conventional techniques.
One of the major building blocks of the modern digital
video surveillance architecture is digital video coding. Its
main role is to decrease the quantity of information es-
sential to represent the original image sequence. Video
coding techniques offer a compressed bit-stream repre-
senting the identical perceptual information with much
less data for any given input video with a particular image
frame rate and resolution. Superior compression perfor-
mance can be accomplished with sophisticated video cod-
ing methods and/or bringing in visual artifact’s.
Once compression is executed, the consequent bit-stream
can be resourcefully propelled through a digital network
or stored on a device. When a client needs to exhibit it
or explore its contents, a decoding procedure requires to
be applied on the compressed bit-stream. The decoding
course of action recreates the original input video at its
original resolution and frame rate.
Scalable video coding
Scalable Video Coding (SVC) offers the equivalent com-
pression functionality expressed above and is shown in
Figure 1. Further more, the bit-stream is arranged with
a hierarchical structure that facilitates a user to effort-
lessly pull out only a subpart of the data enclosed in the
bit-stream while still being able to decode the original in-
put video but at a lower frame rate and/or spatial resolu-
tion. The recursive application of this approach on a new
bit-stream removed out of the original bitstream can be
utilised to carry out the process of successive extractions
consequent to always lower resolutions.
Surveillance application of SVC
Abstract
Global interconnect planning becomes a challenge as semiconductor technology continuously scales. Because of the
increasing wire resistance and higher capacitive coupling in smaller features, the delay of global interconnects becomes
large compared with the delay of a logic gate, introducing a huge performance gap that needs to be resolved A novel
equalized global link architecture and driver– receiver co design flow are proposed for high-speed and low-energy on-chip
communication by utilizing a continuous-time linear equalizer (CTLE). The proposed global link is analyzed using a lin-
ear system method, and the formula of CTLE eye opening is derived to provide high-level design guidelines and insights.
Compared with the separate driver–receiver design flow, over 50% energy reduction is observed.
International Journal of Research and Innovation in
Electronics and Communication Engineering (IJRIECE)
11
International Journal of Research and Innovation on Science, Engineering and Technology (IJRISET)
There are numerous kinds of scalability and each of them
can be available with different granularity. The most fre-
quent type of scalability is the temporal scalability.
For example, if the original image sequence consisted of
30 frames per second, temporal scalability would facili-
tate a user to decode a subpart of the bit-stream recon-
structing a sequence with 15 frames per second or a lower
number of frames per second. Spatial scalability is related
to the opportunity to generate a bit-stream corresponding
to the smaller spatial resolutions, for example, by decod-
ing images with a resolution of CIF (common intermedi-
ate format: 352×288) out of an image sequence initially
encoded at 4CIF (704×576). Quality scalability represents
the possibility to decode the bit-stream at a lower quality.
LITERATURE
In this chapter, an overview of basics related to Rate Dis-
tortion (RD) optimization and its application in video cod-
ing is presented. The fundamental measures related to
RD optimisation are discussed. Some of the basic distor-
tion measuring parameters are explained in the context of
their use in video coding. The Lagrangion method for RD
optimisation is presented because of its established use-
ful application in video coding.
Finally, some state-of-the-art techniques related to sur-
veillance centric coding are discussed briefly.
Rate-Distortion Theory
Shannon with his rate-distortion theory addressed the
elementary problem of RD optimization, maximizing re-
constructed quality at the minimum cost (bit consump-
tion). RD theory basically provides a way of minimising
the number of bits representing the source element to a
given reconstruction quality or distortion, which helps to
develop a trade-off between rate and distortion.
As a branch of information theory, RD theory consists
of fundamental concepts of information and entropy in
information theory. A methodical explanation of all sub-
sequent terminologies in information theory is beyond
the scope of the work presented in this thesis; however a
straightforward review of important concepts is presented
in this preliminary section for the study of RD theory.
BLOCK-BASED VIDEO CODING
Advance Video Coding (AVC) also known as H.264/
MPEG-4 Part 10 is currently the most powerful and state-
of-the-art video coding standard. It has been developed by
a Joint Video Team (JVT) consisting of experts from the
ISO/IEC Moving Picture Experts Group (MPEG) and the
ITU-T Video Coding Experts Group
AVC Encoder (High Level View)
AVC Decoder (High Level View)
Object-Based Video Coding
Replacing the conventional rectangular block based video
coding with the object-based coding is the main concept
defined by the MPEG-4 standard. Object-based video cod-
ing gives direct access to the scene contents; thus helps
manipulation of each object independently. According to
MPEG-4 requirements, object-based video coding shall
provide the following features:
Object-based representation
Object quality and fidelity
Object-based bit-stream manipulation and editing
Object-based coding flexibility
Object-based random access
Each object described in the video is characterized by
spatial and temporal information in the form of shape,
motion and texture [57]. Following are the basic defini-
tions for the hierarchical structure of MPEG-4 object
based coding:
i Visual Object Sequence (VS): The complete MPEG-4
scene which maycontain any natural or synthetic objects
and their enhancement layers [57].
i Video Object (VO): An area of video sequence (VS) that
may have arbitraryshape in the 2D domain and may exist
for an arbitrary length of time.
i Video Object Plane (VOP): A video object (VO) in a par-
ticular instant oftime is termed as video object plane.
i Group of Video Object Planes (GOV): GOV provides ran-
dom access pointsinto the compressed bit-stream. At
these access points, VOPs are encoded
independent of each other.
Surveillance Centric Coding
In this chapter, we introduce the coding paradigm of Sur-
veillance Centric Coding (SCC), in which coding for spe-
cific surveillance applications is targeted. The SCC aims
at exploiting specific properties of surveillance video in
a comprehensive application framework including coding
adaptation to surveillance, rate distortion optimisation
according to the VCA (video content analysis), and other
related concepts.
The basic approach towards Surveillance Centric Cod-
ing (SCC) has been introduced. The Scalable video cod-
ing (SVC) has attraction for surveillance applications be-
cause of its spatial, temporal and quality adaptability. In
this chapter a scalable video codec, aceSVC (discussed
12
International Journal of Research and Innovation on Science, Engineering and Technology (IJRISET)
in chapter 3), has been modified to support event-based
video coding of the surveillance videos. The architectural
modifications for GOP level switching of the scalability
features have been presented and implemented. This ap-
proach enables the saving of bit-rate and storage space.
The following sections give a description of the modified
system.
Architectural Modifications
The required information in the surveillance video is the
presence of some motion activity or any other event of
interest. Therefore, the portion of the video which has an
event of interest should have a good RD performance. On
the other hand, the portion of the video which does not
have any special information may be set to a lower RD
performance. This adaptive RD performance saves a large
number of bits. On the other hand, the bit-stream gener-
ated by the scalable video codec does not support GOP
level switching of the scalability features. Thus to support
event based scalability features at GOP level for the cod-
ing of surveillance videos, the architecture of aceSVC has
been modified. The adaptive RD performance is achieved
at the GOP level through the modified architecture. Some
new blocks have been introduced to implement this ap-
proach. These blocks are:
1. GOP Selector
2. GOP Collector
3. GOP Analysis
EXPERIMENTAL RESULTS
The following images show the output of the proposed al-
gorithm in MATLAB subplots. The first subplot represents
the original input image. The second subplot is the inten-
sity component of the image. The third is the chroma blue
component and fourth is the chroma red component.
In the second row, the foreground results for the frames
are shown. In subplot 1, the intensity foreground is
shown, in the second subplot blue difference and in the
third red difference foreground is shown. The final output
of foreground is shown in the final subplot.
Output of frame 1
Output of frame 5
Output of frame 10
Output of frame 20
Output of frame 30
Output of frame 40
Output of frame 50
13
International Journal of Research and Innovation on Science, Engineering and Technology (IJRISET)
Output of frame 60
Output of frame 70
Output of frame 80
Output of frame 90
In each frame the background is updated according to the
time adaptively and the precise foreground is produced at
the output, which is then sent to coding module.
CONCLUSION & FUTURE SCOPE
A technique to improve on the compression efficiency for
surveillance videos has been presented. The architecture
of the scalable video coding has been modified to become
surveillance centric coding. The modified architecture
offers a better byte saving performance. This approach
shows that the application of scalable video coding with
an event driven approach improves the transmission and
storage efficiency. The foreground pixels are selected by
using the bounding boxes of the VCA modules. This ap-
proach has the benefit of being free from shape coding and
background coding as compared to MPEG-4 object based
coding. Different experimental results showed that the
motion compensated temporal filter (MCTF) with higher
levels of filtering helps to remove the temporal redundan-
cies present in the surveillance videos. This approach has
better RDperformance than the block-based coding ap-
proaches. A search technique with higher processing ef-
ficiency with a visual quality equivalent to the full search
approach and selective search strategy specific to surveil-
lance videos is presented. Two approaches to perform se-
lective motion estimation, GOP based and Frame based,
are described where Frame based approach performed
better. The visual quality for both the approaches is the
same as that of the full search.
To improve the selective motion estimation further, a se-
lective block search technique has been proposed. The
selection of the block is based on the novel approach
where a motion detection module is used to provide the
location of candidate blocks. Although, this approach
performs a fewer number of block matching steps yet
the overall processing efficiency of the system is close to
a Frame based selective search. This is because of the
overhead complexity added by the bounding box match-
ing algorithm to locate the candidate block in the SCC.
After introducing selective motion estimation approaches,
another novel approach, tracker-based motion estimation
has been proposed where surveillance video object motion
tracker information is used to calculate the motion vec-
tors. A unique motion track is calculated for each object
of the surveillance video. The distance representing the
displacement of the object between the current and the
reference frame is taken as a value to calculate motion
vectors after identifying and matching the track in the
two frames. This approach performs a faster calculation
of the motion vectors but it degrades the visual quality
of the video depending on the nature of the movement
represented by the foreground object. Finally, under the
same motivation of achieving processing efficiency with-
out loss in visual quality, fast full search approaches are
explored. A fast search approach for multiple reference
frames specific to surveillance videos has been proposed.
This approach is based on considering different points
between the two consecutive reference frames and then
using these different points to avoid unnecessary block
matching steps. This search approach is specific to sur-
veillance videos with motion estimation based on multiple
reference frames.
REFERENCES
[1] J. Gantz and D. Reinsel. (2012, Dec.). The IDC Digi-
tal Universe in 2020: Big Data, Bigger Digital Shadows,
and Biggest Growth in the Far East [Online]. Available:
http://www.emc.com/leadership/digitaluniverse/ index.
htm
[2] I. E. G. Richardson, H.264 and MPEG-4 Video Com-
pression: Video Coding for Next Generation Multimedia.
Chichester, U.K.: Wiley, 2003, pp. 136–138.
[3] K. Ugur, K. Andersson, A. Fuldseth, G. Bjontegaard,
L. P. Endresen, J. Lainema, et al., “High performance, low
complexity video coding and the emerging HEVC stand-
ard,” IEEE Trans. Circuits Syst. Video Technol., vol. 20,
no. 12, pp. 1688–1697, Dec. 2010.
14
International Journal of Research and Innovation on Science, Engineering and Technology (IJRISET)
[4] X. G. Zhang, L. H. Liang, Q. Huang, and W. Gao, “An
efficient coding scheme for surveillance videos captured
by stationary cameras,” Proc. SPIE Visual Commun. Im-
age Process., vol. 7744, pp. 77442A-1–77442A-10, Jul.
2010.
[5] M. Piccardi, “Background subtraction techniques: A
review,” in Proc. IEEE Int. Conf. Syst., Man Cybern., vol.
4. Oct. 2004, pp. 3099–3104.
[6] R. Forchheimer and O. Fahlander, “Low bit-rate coding
through animation,” in Proc.
Int. Picture Coding Symp., 1983, pp. 113–114.
[7] R. Forchheimer, O. Fahlander, and T. Kronander, “A
semantic approach to the transmission of face images,” in
Proc. Int. Picture Coding Symp., no. 10.5, Cesson-Sevi-
gne, France, 1984.
AUTHOR
S.pushpa,
Research Scholar,
Department of Electronics AndCommunication Engineering,
Chiranjeevi Reddy Institute of Engineering and Technology,
Anantapur, A. P, India.
S. Rehana Banu,
Assistant Professor,
Department of Electronics AndCommunication Engineering,
Chiranjeevi Reddy Institute of Engineering and Technology,
Anantapur, A. P, India.

Mais conteúdo relacionado

Mais procurados

An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...idescitation
 
Reversible Image Data Hiding with Contrast Enhancement
Reversible Image Data Hiding with Contrast EnhancementReversible Image Data Hiding with Contrast Enhancement
Reversible Image Data Hiding with Contrast EnhancementIRJET Journal
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...eSAT Journals
 
Transmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual cryptographyTransmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual cryptographyeSAT Journals
 
Transmission of cryptic text using rotational visual
Transmission of cryptic text using rotational visualTransmission of cryptic text using rotational visual
Transmission of cryptic text using rotational visualeSAT Publishing House
 
High performance intrusion detection using modified k mean & naïve bayes
High performance intrusion detection using modified k mean & naïve bayesHigh performance intrusion detection using modified k mean & naïve bayes
High performance intrusion detection using modified k mean & naïve bayeseSAT Journals
 
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLIMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLhiij
 
Improved Secure Cloud Transmission Protocol
Improved Secure Cloud Transmission ProtocolImproved Secure Cloud Transmission Protocol
Improved Secure Cloud Transmission Protocolneirew J
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryptionvaishali kataria
 
IRJET - Detecting and Securing of IP Spoofing Attack by using SDN
IRJET - Detecting and Securing of IP Spoofing Attack by using SDNIRJET - Detecting and Securing of IP Spoofing Attack by using SDN
IRJET - Detecting and Securing of IP Spoofing Attack by using SDNIRJET Journal
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemEswar Publications
 
IRJET- A Novel High Capacity Reversible Data Hiding in Encrypted Domain u...
IRJET-  	  A Novel High Capacity Reversible Data Hiding in Encrypted Domain u...IRJET-  	  A Novel High Capacity Reversible Data Hiding in Encrypted Domain u...
IRJET- A Novel High Capacity Reversible Data Hiding in Encrypted Domain u...IRJET Journal
 
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...IRJET Journal
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganographysipij
 
Access Control and Revocation for Digital Assets on Cloud with Consideration ...
Access Control and Revocation for Digital Assets on Cloud with Consideration ...Access Control and Revocation for Digital Assets on Cloud with Consideration ...
Access Control and Revocation for Digital Assets on Cloud with Consideration ...IJERA Editor
 
Reactive Data Centric Architectures with Vortex, Spark and ReactiveX
Reactive Data Centric Architectures with Vortex, Spark and ReactiveXReactive Data Centric Architectures with Vortex, Spark and ReactiveX
Reactive Data Centric Architectures with Vortex, Spark and ReactiveXAngelo Corsaro
 
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWTSteganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWTCSCJournals
 

Mais procurados (19)

An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
 
Reversible Image Data Hiding with Contrast Enhancement
Reversible Image Data Hiding with Contrast EnhancementReversible Image Data Hiding with Contrast Enhancement
Reversible Image Data Hiding with Contrast Enhancement
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
 
Transmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual cryptographyTransmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual cryptography
 
Transmission of cryptic text using rotational visual
Transmission of cryptic text using rotational visualTransmission of cryptic text using rotational visual
Transmission of cryptic text using rotational visual
 
High performance intrusion detection using modified k mean & naïve bayes
High performance intrusion detection using modified k mean & naïve bayesHigh performance intrusion detection using modified k mean & naïve bayes
High performance intrusion detection using modified k mean & naïve bayes
 
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLIMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
 
Improved Secure Cloud Transmission Protocol
Improved Secure Cloud Transmission ProtocolImproved Secure Cloud Transmission Protocol
Improved Secure Cloud Transmission Protocol
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryption
 
IRJET - Detecting and Securing of IP Spoofing Attack by using SDN
IRJET - Detecting and Securing of IP Spoofing Attack by using SDNIRJET - Detecting and Securing of IP Spoofing Attack by using SDN
IRJET - Detecting and Securing of IP Spoofing Attack by using SDN
 
[IJET-V2I2P9] Authors:Reshma A. Hegde1, Madhura Prakash
[IJET-V2I2P9] Authors:Reshma A. Hegde1, Madhura Prakash[IJET-V2I2P9] Authors:Reshma A. Hegde1, Madhura Prakash
[IJET-V2I2P9] Authors:Reshma A. Hegde1, Madhura Prakash
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
 
IRJET- A Novel High Capacity Reversible Data Hiding in Encrypted Domain u...
IRJET-  	  A Novel High Capacity Reversible Data Hiding in Encrypted Domain u...IRJET-  	  A Novel High Capacity Reversible Data Hiding in Encrypted Domain u...
IRJET- A Novel High Capacity Reversible Data Hiding in Encrypted Domain u...
 
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganography
 
G017444651
G017444651G017444651
G017444651
 
Access Control and Revocation for Digital Assets on Cloud with Consideration ...
Access Control and Revocation for Digital Assets on Cloud with Consideration ...Access Control and Revocation for Digital Assets on Cloud with Consideration ...
Access Control and Revocation for Digital Assets on Cloud with Consideration ...
 
Reactive Data Centric Architectures with Vortex, Spark and ReactiveX
Reactive Data Centric Architectures with Vortex, Spark and ReactiveXReactive Data Centric Architectures with Vortex, Spark and ReactiveX
Reactive Data Centric Architectures with Vortex, Spark and ReactiveX
 
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWTSteganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
 

Destaque

Elit 17 class 14n film o look for film in my office
Elit 17 class 14n film o look for film in my officeElit 17 class 14n film o look for film in my office
Elit 17 class 14n film o look for film in my officejordanlachance
 
คำอธิบายรายวิชา
คำอธิบายรายวิชาคำอธิบายรายวิชา
คำอธิบายรายวิชาAon Narinchoti
 
ใบงานที่4 บริการบนระบบอินเตอร์เน็ต
ใบงานที่4 บริการบนระบบอินเตอร์เน็ตใบงานที่4 บริการบนระบบอินเตอร์เน็ต
ใบงานที่4 บริการบนระบบอินเตอร์เน็ตPhutawan Murcielago
 
Six minutes walk test for individuals with schizophrenia : a systematic review
Six minutes walk test for individuals with schizophrenia : a systematic reviewSix minutes walk test for individuals with schizophrenia : a systematic review
Six minutes walk test for individuals with schizophrenia : a systematic reviewBERNARD Paquito
 
Elit 17 class 5 n twelfth night qhq
Elit 17 class 5 n twelfth night qhqElit 17 class 5 n twelfth night qhq
Elit 17 class 5 n twelfth night qhqjordanlachance
 
Wohlfahrt 40 estudos op.54 (www.sheetmusic-violin.blogspot.com)
Wohlfahrt   40 estudos  op.54 (www.sheetmusic-violin.blogspot.com)Wohlfahrt   40 estudos  op.54 (www.sheetmusic-violin.blogspot.com)
Wohlfahrt 40 estudos op.54 (www.sheetmusic-violin.blogspot.com)William Soph
 
Martina brtnicka case_study_tesco
Martina brtnicka case_study_tescoMartina brtnicka case_study_tesco
Martina brtnicka case_study_tescoMartina Brtnická
 
Toiminnan johtaminen ja kehittäminen asiakkaan näkökulmasta
Toiminnan johtaminen ja kehittäminen asiakkaan näkökulmastaToiminnan johtaminen ja kehittäminen asiakkaan näkökulmasta
Toiminnan johtaminen ja kehittäminen asiakkaan näkökulmastaPaivi Sutinen
 
Riga Power BI Meetup #14 - Datu analīze ar R
Riga Power BI Meetup #14 - Datu analīze ar RRiga Power BI Meetup #14 - Datu analīze ar R
Riga Power BI Meetup #14 - Datu analīze ar RAldis Ērglis
 
Sucuri Webinar: How to account for security with customer projects
Sucuri Webinar: How to account for security with customer projects Sucuri Webinar: How to account for security with customer projects
Sucuri Webinar: How to account for security with customer projects Sucuri
 
Create a Data Science Lab with Microsoft and Open Source tools
Create a Data Science Lab with Microsoft and Open Source toolsCreate a Data Science Lab with Microsoft and Open Source tools
Create a Data Science Lab with Microsoft and Open Source toolsMarcel Franke
 
ระบบสารสนเทศเพื่อการตัดสินใจ (Decision Support System)
ระบบสารสนเทศเพื่อการตัดสินใจ (Decision Support System)ระบบสารสนเทศเพื่อการตัดสินใจ (Decision Support System)
ระบบสารสนเทศเพื่อการตัดสินใจ (Decision Support System)anda simil
 
How did you use media technologies in the construction and research, planning...
How did you use media technologies in the construction and research, planning...How did you use media technologies in the construction and research, planning...
How did you use media technologies in the construction and research, planning...Connor Ellis
 
Statistical Methods for Removing Selection Bias In Observational Studies
Statistical Methods for Removing Selection Bias In Observational StudiesStatistical Methods for Removing Selection Bias In Observational Studies
Statistical Methods for Removing Selection Bias In Observational StudiesNathan Taback
 
The CMO Survey Highlights and Insights August 2015
The CMO Survey Highlights and Insights August 2015The CMO Survey Highlights and Insights August 2015
The CMO Survey Highlights and Insights August 2015christinemoorman
 
Uber and its expansion strategy in China
Uber and its expansion strategy in ChinaUber and its expansion strategy in China
Uber and its expansion strategy in ChinaChristian Inda
 
Social: An essential component of pervasive B2B marketing
Social: An essential component of pervasive B2B marketingSocial: An essential component of pervasive B2B marketing
Social: An essential component of pervasive B2B marketingMcKinsey on Marketing & Sales
 

Destaque (20)

Elit 17 class 14n film o look for film in my office
Elit 17 class 14n film o look for film in my officeElit 17 class 14n film o look for film in my office
Elit 17 class 14n film o look for film in my office
 
คำอธิบายรายวิชา
คำอธิบายรายวิชาคำอธิบายรายวิชา
คำอธิบายรายวิชา
 
Elit 17 class 15n
Elit 17 class 15nElit 17 class 15n
Elit 17 class 15n
 
Basic Service Set
Basic Service SetBasic Service Set
Basic Service Set
 
ใบงานที่4 บริการบนระบบอินเตอร์เน็ต
ใบงานที่4 บริการบนระบบอินเตอร์เน็ตใบงานที่4 บริการบนระบบอินเตอร์เน็ต
ใบงานที่4 บริการบนระบบอินเตอร์เน็ต
 
สาร
สารสาร
สาร
 
Six minutes walk test for individuals with schizophrenia : a systematic review
Six minutes walk test for individuals with schizophrenia : a systematic reviewSix minutes walk test for individuals with schizophrenia : a systematic review
Six minutes walk test for individuals with schizophrenia : a systematic review
 
Elit 17 class 5 n twelfth night qhq
Elit 17 class 5 n twelfth night qhqElit 17 class 5 n twelfth night qhq
Elit 17 class 5 n twelfth night qhq
 
Wohlfahrt 40 estudos op.54 (www.sheetmusic-violin.blogspot.com)
Wohlfahrt   40 estudos  op.54 (www.sheetmusic-violin.blogspot.com)Wohlfahrt   40 estudos  op.54 (www.sheetmusic-violin.blogspot.com)
Wohlfahrt 40 estudos op.54 (www.sheetmusic-violin.blogspot.com)
 
Martina brtnicka case_study_tesco
Martina brtnicka case_study_tescoMartina brtnicka case_study_tesco
Martina brtnicka case_study_tesco
 
Toiminnan johtaminen ja kehittäminen asiakkaan näkökulmasta
Toiminnan johtaminen ja kehittäminen asiakkaan näkökulmastaToiminnan johtaminen ja kehittäminen asiakkaan näkökulmasta
Toiminnan johtaminen ja kehittäminen asiakkaan näkökulmasta
 
Riga Power BI Meetup #14 - Datu analīze ar R
Riga Power BI Meetup #14 - Datu analīze ar RRiga Power BI Meetup #14 - Datu analīze ar R
Riga Power BI Meetup #14 - Datu analīze ar R
 
Sucuri Webinar: How to account for security with customer projects
Sucuri Webinar: How to account for security with customer projects Sucuri Webinar: How to account for security with customer projects
Sucuri Webinar: How to account for security with customer projects
 
Create a Data Science Lab with Microsoft and Open Source tools
Create a Data Science Lab with Microsoft and Open Source toolsCreate a Data Science Lab with Microsoft and Open Source tools
Create a Data Science Lab with Microsoft and Open Source tools
 
ระบบสารสนเทศเพื่อการตัดสินใจ (Decision Support System)
ระบบสารสนเทศเพื่อการตัดสินใจ (Decision Support System)ระบบสารสนเทศเพื่อการตัดสินใจ (Decision Support System)
ระบบสารสนเทศเพื่อการตัดสินใจ (Decision Support System)
 
How did you use media technologies in the construction and research, planning...
How did you use media technologies in the construction and research, planning...How did you use media technologies in the construction and research, planning...
How did you use media technologies in the construction and research, planning...
 
Statistical Methods for Removing Selection Bias In Observational Studies
Statistical Methods for Removing Selection Bias In Observational StudiesStatistical Methods for Removing Selection Bias In Observational Studies
Statistical Methods for Removing Selection Bias In Observational Studies
 
The CMO Survey Highlights and Insights August 2015
The CMO Survey Highlights and Insights August 2015The CMO Survey Highlights and Insights August 2015
The CMO Survey Highlights and Insights August 2015
 
Uber and its expansion strategy in China
Uber and its expansion strategy in ChinaUber and its expansion strategy in China
Uber and its expansion strategy in China
 
Social: An essential component of pervasive B2B marketing
Social: An essential component of pervasive B2B marketingSocial: An essential component of pervasive B2B marketing
Social: An essential component of pervasive B2B marketing
 

Semelhante a Jiri ece-01-03 adaptive temporal averaging and frame prediction based surveillance video coding

Jiri ece-01-03 adaptive temporal averaging and frame prediction based surveil...
Jiri ece-01-03 adaptive temporal averaging and frame prediction based surveil...Jiri ece-01-03 adaptive temporal averaging and frame prediction based surveil...
Jiri ece-01-03 adaptive temporal averaging and frame prediction based surveil...Ijripublishers Ijri
 
1 state of-the-art and trends in scalable video
1 state of-the-art and trends in scalable video1 state of-the-art and trends in scalable video
1 state of-the-art and trends in scalable videoYogananda Patnaik
 
Video Compression Using Block By Block Basis Salience Detection
Video Compression Using Block By Block Basis Salience DetectionVideo Compression Using Block By Block Basis Salience Detection
Video Compression Using Block By Block Basis Salience DetectionIRJET Journal
 
Deep learning-based switchable network for in-loop filtering in high efficie...
Deep learning-based switchable network for in-loop filtering in  high efficie...Deep learning-based switchable network for in-loop filtering in  high efficie...
Deep learning-based switchable network for in-loop filtering in high efficie...IJECEIAES
 
Paper id 2120148
Paper id 2120148Paper id 2120148
Paper id 2120148IJRAT
 
Multi-View Video Coding Algorithms/Techniques: A Comprehensive Study
Multi-View Video Coding Algorithms/Techniques: A Comprehensive StudyMulti-View Video Coding Algorithms/Techniques: A Comprehensive Study
Multi-View Video Coding Algorithms/Techniques: A Comprehensive StudyIJERA Editor
 
Design and Analysis of Quantization Based Low Bit Rate Encoding System
Design and Analysis of Quantization Based Low Bit Rate Encoding SystemDesign and Analysis of Quantization Based Low Bit Rate Encoding System
Design and Analysis of Quantization Based Low Bit Rate Encoding Systemijtsrd
 
Video copy detection using segmentation method and
Video copy detection using segmentation method andVideo copy detection using segmentation method and
Video copy detection using segmentation method andeSAT Publishing House
 
Content_adaptive_video_coding_for_HTTP_Adaptive_Streaming.pdf
Content_adaptive_video_coding_for_HTTP_Adaptive_Streaming.pdfContent_adaptive_video_coding_for_HTTP_Adaptive_Streaming.pdf
Content_adaptive_video_coding_for_HTTP_Adaptive_Streaming.pdfVignesh V Menon
 
Content-adaptive Video Coding for HTTP Adaptive Streaming
Content-adaptive Video Coding for HTTP Adaptive StreamingContent-adaptive Video Coding for HTTP Adaptive Streaming
Content-adaptive Video Coding for HTTP Adaptive StreamingAlpen-Adria-Universität
 
Online Bitrate ladder prediction for Adaptive VVC Streaming
Online Bitrate ladder prediction for Adaptive VVC StreamingOnline Bitrate ladder prediction for Adaptive VVC Streaming
Online Bitrate ladder prediction for Adaptive VVC StreamingVignesh V Menon
 
Video Coding Enhancements for HTTP Adaptive Streaming
Video Coding Enhancements for HTTP Adaptive StreamingVideo Coding Enhancements for HTTP Adaptive Streaming
Video Coding Enhancements for HTTP Adaptive StreamingAlpen-Adria-Universität
 
Research@Lunch_Presentation.pdf
Research@Lunch_Presentation.pdfResearch@Lunch_Presentation.pdf
Research@Lunch_Presentation.pdfVignesh V Menon
 
Review On Different Feature Extraction Algorithms
Review On Different Feature Extraction AlgorithmsReview On Different Feature Extraction Algorithms
Review On Different Feature Extraction AlgorithmsIRJET Journal
 
Parking Surveillance Footage Summarization
Parking Surveillance Footage SummarizationParking Surveillance Footage Summarization
Parking Surveillance Footage SummarizationIRJET Journal
 

Semelhante a Jiri ece-01-03 adaptive temporal averaging and frame prediction based surveillance video coding (20)

Jiri ece-01-03 adaptive temporal averaging and frame prediction based surveil...
Jiri ece-01-03 adaptive temporal averaging and frame prediction based surveil...Jiri ece-01-03 adaptive temporal averaging and frame prediction based surveil...
Jiri ece-01-03 adaptive temporal averaging and frame prediction based surveil...
 
A04840107
A04840107A04840107
A04840107
 
1 state of-the-art and trends in scalable video
1 state of-the-art and trends in scalable video1 state of-the-art and trends in scalable video
1 state of-the-art and trends in scalable video
 
Video Compression Using Block By Block Basis Salience Detection
Video Compression Using Block By Block Basis Salience DetectionVideo Compression Using Block By Block Basis Salience Detection
Video Compression Using Block By Block Basis Salience Detection
 
C0161018
C0161018C0161018
C0161018
 
C0161018
C0161018C0161018
C0161018
 
H43044145
H43044145H43044145
H43044145
 
Deep learning-based switchable network for in-loop filtering in high efficie...
Deep learning-based switchable network for in-loop filtering in  high efficie...Deep learning-based switchable network for in-loop filtering in  high efficie...
Deep learning-based switchable network for in-loop filtering in high efficie...
 
Paper id 2120148
Paper id 2120148Paper id 2120148
Paper id 2120148
 
Multi-View Video Coding Algorithms/Techniques: A Comprehensive Study
Multi-View Video Coding Algorithms/Techniques: A Comprehensive StudyMulti-View Video Coding Algorithms/Techniques: A Comprehensive Study
Multi-View Video Coding Algorithms/Techniques: A Comprehensive Study
 
Design and Analysis of Quantization Based Low Bit Rate Encoding System
Design and Analysis of Quantization Based Low Bit Rate Encoding SystemDesign and Analysis of Quantization Based Low Bit Rate Encoding System
Design and Analysis of Quantization Based Low Bit Rate Encoding System
 
Video copy detection using segmentation method and
Video copy detection using segmentation method andVideo copy detection using segmentation method and
Video copy detection using segmentation method and
 
Content_adaptive_video_coding_for_HTTP_Adaptive_Streaming.pdf
Content_adaptive_video_coding_for_HTTP_Adaptive_Streaming.pdfContent_adaptive_video_coding_for_HTTP_Adaptive_Streaming.pdf
Content_adaptive_video_coding_for_HTTP_Adaptive_Streaming.pdf
 
Content-adaptive Video Coding for HTTP Adaptive Streaming
Content-adaptive Video Coding for HTTP Adaptive StreamingContent-adaptive Video Coding for HTTP Adaptive Streaming
Content-adaptive Video Coding for HTTP Adaptive Streaming
 
40120140504006
4012014050400640120140504006
40120140504006
 
Online Bitrate ladder prediction for Adaptive VVC Streaming
Online Bitrate ladder prediction for Adaptive VVC StreamingOnline Bitrate ladder prediction for Adaptive VVC Streaming
Online Bitrate ladder prediction for Adaptive VVC Streaming
 
Video Coding Enhancements for HTTP Adaptive Streaming
Video Coding Enhancements for HTTP Adaptive StreamingVideo Coding Enhancements for HTTP Adaptive Streaming
Video Coding Enhancements for HTTP Adaptive Streaming
 
Research@Lunch_Presentation.pdf
Research@Lunch_Presentation.pdfResearch@Lunch_Presentation.pdf
Research@Lunch_Presentation.pdf
 
Review On Different Feature Extraction Algorithms
Review On Different Feature Extraction AlgorithmsReview On Different Feature Extraction Algorithms
Review On Different Feature Extraction Algorithms
 
Parking Surveillance Footage Summarization
Parking Surveillance Footage SummarizationParking Surveillance Footage Summarization
Parking Surveillance Footage Summarization
 

Mais de Ijripublishers Ijri

structural and modal analysis of an engine block by varying materials
 structural and modal analysis of an engine block by varying materials structural and modal analysis of an engine block by varying materials
structural and modal analysis of an engine block by varying materialsIjripublishers Ijri
 
life prediction analysis of tweel for the replacement of traditional wheels
 life prediction analysis of tweel for the replacement of traditional wheels life prediction analysis of tweel for the replacement of traditional wheels
life prediction analysis of tweel for the replacement of traditional wheelsIjripublishers Ijri
 
simulation and analysis of 4 stroke single cylinder direct injection diesel e...
simulation and analysis of 4 stroke single cylinder direct injection diesel e...simulation and analysis of 4 stroke single cylinder direct injection diesel e...
simulation and analysis of 4 stroke single cylinder direct injection diesel e...Ijripublishers Ijri
 
investigation on thermal properties of epoxy composites filled with pine app...
 investigation on thermal properties of epoxy composites filled with pine app... investigation on thermal properties of epoxy composites filled with pine app...
investigation on thermal properties of epoxy composites filled with pine app...Ijripublishers Ijri
 
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...Ijripublishers Ijri
 
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...Ijripublishers Ijri
 
Ijri te-03-011 performance testing of vortex tubes with variable parameters
Ijri te-03-011 performance testing of vortex tubes with variable parametersIjri te-03-011 performance testing of vortex tubes with variable parameters
Ijri te-03-011 performance testing of vortex tubes with variable parametersIjripublishers Ijri
 
a prediction of thermal properties of epoxy composites filled with pine appl...
 a prediction of thermal properties of epoxy composites filled with pine appl... a prediction of thermal properties of epoxy composites filled with pine appl...
a prediction of thermal properties of epoxy composites filled with pine appl...Ijripublishers Ijri
 
Ijri te-03-013 modeling and thermal analysis of air-conditioner evaporator
Ijri te-03-013 modeling and thermal analysis of air-conditioner evaporatorIjri te-03-013 modeling and thermal analysis of air-conditioner evaporator
Ijri te-03-013 modeling and thermal analysis of air-conditioner evaporatorIjripublishers Ijri
 
Ijri te-03-012 design and optimization of water cool condenser for central ai...
Ijri te-03-012 design and optimization of water cool condenser for central ai...Ijri te-03-012 design and optimization of water cool condenser for central ai...
Ijri te-03-012 design and optimization of water cool condenser for central ai...Ijripublishers Ijri
 
Ijri cce-01-028 an experimental analysis on properties of recycled aggregate ...
Ijri cce-01-028 an experimental analysis on properties of recycled aggregate ...Ijri cce-01-028 an experimental analysis on properties of recycled aggregate ...
Ijri cce-01-028 an experimental analysis on properties of recycled aggregate ...Ijripublishers Ijri
 
Ijri me-02-031 predictive analysis of gate and runner system for plastic inje...
Ijri me-02-031 predictive analysis of gate and runner system for plastic inje...Ijri me-02-031 predictive analysis of gate and runner system for plastic inje...
Ijri me-02-031 predictive analysis of gate and runner system for plastic inje...Ijripublishers Ijri
 
Ijricit 01-005 pscsv - patient self-driven multi-stage confidentiality safegu...
Ijricit 01-005 pscsv - patient self-driven multi-stage confidentiality safegu...Ijricit 01-005 pscsv - patient self-driven multi-stage confidentiality safegu...
Ijricit 01-005 pscsv - patient self-driven multi-stage confidentiality safegu...Ijripublishers Ijri
 
Ijricit 01-004 progressive and translucent user individuality
Ijricit 01-004 progressive and translucent user individualityIjricit 01-004 progressive and translucent user individuality
Ijricit 01-004 progressive and translucent user individualityIjripublishers Ijri
 
Ijricit 01-002 enhanced replica detection in short time for large data sets
Ijricit 01-002 enhanced replica detection in  short time for large data setsIjricit 01-002 enhanced replica detection in  short time for large data sets
Ijricit 01-002 enhanced replica detection in short time for large data setsIjripublishers Ijri
 
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...Ijripublishers Ijri
 
cfd analysis on ejector cooling system with variable throat geometry
 cfd analysis on ejector cooling system with variable throat geometry cfd analysis on ejector cooling system with variable throat geometry
cfd analysis on ejector cooling system with variable throat geometryIjripublishers Ijri
 
Ijri te-03-009 thermal investigation (pressure distribution) on box type cyli...
Ijri te-03-009 thermal investigation (pressure distribution) on box type cyli...Ijri te-03-009 thermal investigation (pressure distribution) on box type cyli...
Ijri te-03-009 thermal investigation (pressure distribution) on box type cyli...Ijripublishers Ijri
 
fatigue failure analysis of steam turbine shaft using fem technique
 fatigue failure analysis of steam turbine shaft using fem technique fatigue failure analysis of steam turbine shaft using fem technique
fatigue failure analysis of steam turbine shaft using fem techniqueIjripublishers Ijri
 
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...Ijripublishers Ijri
 

Mais de Ijripublishers Ijri (20)

structural and modal analysis of an engine block by varying materials
 structural and modal analysis of an engine block by varying materials structural and modal analysis of an engine block by varying materials
structural and modal analysis of an engine block by varying materials
 
life prediction analysis of tweel for the replacement of traditional wheels
 life prediction analysis of tweel for the replacement of traditional wheels life prediction analysis of tweel for the replacement of traditional wheels
life prediction analysis of tweel for the replacement of traditional wheels
 
simulation and analysis of 4 stroke single cylinder direct injection diesel e...
simulation and analysis of 4 stroke single cylinder direct injection diesel e...simulation and analysis of 4 stroke single cylinder direct injection diesel e...
simulation and analysis of 4 stroke single cylinder direct injection diesel e...
 
investigation on thermal properties of epoxy composites filled with pine app...
 investigation on thermal properties of epoxy composites filled with pine app... investigation on thermal properties of epoxy composites filled with pine app...
investigation on thermal properties of epoxy composites filled with pine app...
 
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
 
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...
 
Ijri te-03-011 performance testing of vortex tubes with variable parameters
Ijri te-03-011 performance testing of vortex tubes with variable parametersIjri te-03-011 performance testing of vortex tubes with variable parameters
Ijri te-03-011 performance testing of vortex tubes with variable parameters
 
a prediction of thermal properties of epoxy composites filled with pine appl...
 a prediction of thermal properties of epoxy composites filled with pine appl... a prediction of thermal properties of epoxy composites filled with pine appl...
a prediction of thermal properties of epoxy composites filled with pine appl...
 
Ijri te-03-013 modeling and thermal analysis of air-conditioner evaporator
Ijri te-03-013 modeling and thermal analysis of air-conditioner evaporatorIjri te-03-013 modeling and thermal analysis of air-conditioner evaporator
Ijri te-03-013 modeling and thermal analysis of air-conditioner evaporator
 
Ijri te-03-012 design and optimization of water cool condenser for central ai...
Ijri te-03-012 design and optimization of water cool condenser for central ai...Ijri te-03-012 design and optimization of water cool condenser for central ai...
Ijri te-03-012 design and optimization of water cool condenser for central ai...
 
Ijri cce-01-028 an experimental analysis on properties of recycled aggregate ...
Ijri cce-01-028 an experimental analysis on properties of recycled aggregate ...Ijri cce-01-028 an experimental analysis on properties of recycled aggregate ...
Ijri cce-01-028 an experimental analysis on properties of recycled aggregate ...
 
Ijri me-02-031 predictive analysis of gate and runner system for plastic inje...
Ijri me-02-031 predictive analysis of gate and runner system for plastic inje...Ijri me-02-031 predictive analysis of gate and runner system for plastic inje...
Ijri me-02-031 predictive analysis of gate and runner system for plastic inje...
 
Ijricit 01-005 pscsv - patient self-driven multi-stage confidentiality safegu...
Ijricit 01-005 pscsv - patient self-driven multi-stage confidentiality safegu...Ijricit 01-005 pscsv - patient self-driven multi-stage confidentiality safegu...
Ijricit 01-005 pscsv - patient self-driven multi-stage confidentiality safegu...
 
Ijricit 01-004 progressive and translucent user individuality
Ijricit 01-004 progressive and translucent user individualityIjricit 01-004 progressive and translucent user individuality
Ijricit 01-004 progressive and translucent user individuality
 
Ijricit 01-002 enhanced replica detection in short time for large data sets
Ijricit 01-002 enhanced replica detection in  short time for large data setsIjricit 01-002 enhanced replica detection in  short time for large data sets
Ijricit 01-002 enhanced replica detection in short time for large data sets
 
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...
 
cfd analysis on ejector cooling system with variable throat geometry
 cfd analysis on ejector cooling system with variable throat geometry cfd analysis on ejector cooling system with variable throat geometry
cfd analysis on ejector cooling system with variable throat geometry
 
Ijri te-03-009 thermal investigation (pressure distribution) on box type cyli...
Ijri te-03-009 thermal investigation (pressure distribution) on box type cyli...Ijri te-03-009 thermal investigation (pressure distribution) on box type cyli...
Ijri te-03-009 thermal investigation (pressure distribution) on box type cyli...
 
fatigue failure analysis of steam turbine shaft using fem technique
 fatigue failure analysis of steam turbine shaft using fem technique fatigue failure analysis of steam turbine shaft using fem technique
fatigue failure analysis of steam turbine shaft using fem technique
 
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...
 

Último

4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 

Último (20)

4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 

Jiri ece-01-03 adaptive temporal averaging and frame prediction based surveillance video coding

  • 1. 10 International Journal of Research and Innovation on Science, Engineering and Technology (IJRISET) ADAPTIVE TEMPORAL AVERAGING AND FRAME PREDICTION BASED SURVEIL- LANCE VIDEO CODING S.pushpa1 , S. Rehana Banu2 . 1 Research Scholar, Department of Electronics AndCommunication Engineering, Chiranjeevi Reddy Institute of Engineering and Technology Anantapur, A. P, India. 2 Assistant Professor, Department of Electronics AndCommunication Engineering, Chiranjeevi Reddy Institute of Engineering and Technology Anantapur, A. P, India. *Corresponding Author: S.pushpa Research Scholar,Department of Electronics AndCom- munication Engineering, Chiranjeevi Reddy Institute of Engineering and Technology,Anantapur, A. P, India. Email: pushpa.sarode7@gmail.com. Year of publication: 2016 Review Type: peer reviewed Volume: I, Issue : I Citation:S.pushpa, Research Scholar"Adaptive Temporal Averaging And Frame Prediction Based Surveillance Vid- eo Coding" International Journal of Research and Innova- tion on Science, Engineering and Technology (IJRISET) (2016) 10-14 INTRODUCTION The research presented in this thesis focused on diverse coding techniques specific to surveillance videos. The foremost aim of this work is to propose techniques to im- prove the storage capacity and bandwidth utilization with less computational complexity. The proposed coding tech- niques to improve compression and processing efficiency have been described to achieve better performance com- pared to the conventional techniques. One of the major building blocks of the modern digital video surveillance architecture is digital video coding. Its main role is to decrease the quantity of information es- sential to represent the original image sequence. Video coding techniques offer a compressed bit-stream repre- senting the identical perceptual information with much less data for any given input video with a particular image frame rate and resolution. Superior compression perfor- mance can be accomplished with sophisticated video cod- ing methods and/or bringing in visual artifact’s. Once compression is executed, the consequent bit-stream can be resourcefully propelled through a digital network or stored on a device. When a client needs to exhibit it or explore its contents, a decoding procedure requires to be applied on the compressed bit-stream. The decoding course of action recreates the original input video at its original resolution and frame rate. Scalable video coding Scalable Video Coding (SVC) offers the equivalent com- pression functionality expressed above and is shown in Figure 1. Further more, the bit-stream is arranged with a hierarchical structure that facilitates a user to effort- lessly pull out only a subpart of the data enclosed in the bit-stream while still being able to decode the original in- put video but at a lower frame rate and/or spatial resolu- tion. The recursive application of this approach on a new bit-stream removed out of the original bitstream can be utilised to carry out the process of successive extractions consequent to always lower resolutions. Surveillance application of SVC Abstract Global interconnect planning becomes a challenge as semiconductor technology continuously scales. Because of the increasing wire resistance and higher capacitive coupling in smaller features, the delay of global interconnects becomes large compared with the delay of a logic gate, introducing a huge performance gap that needs to be resolved A novel equalized global link architecture and driver– receiver co design flow are proposed for high-speed and low-energy on-chip communication by utilizing a continuous-time linear equalizer (CTLE). The proposed global link is analyzed using a lin- ear system method, and the formula of CTLE eye opening is derived to provide high-level design guidelines and insights. Compared with the separate driver–receiver design flow, over 50% energy reduction is observed. International Journal of Research and Innovation in Electronics and Communication Engineering (IJRIECE)
  • 2. 11 International Journal of Research and Innovation on Science, Engineering and Technology (IJRISET) There are numerous kinds of scalability and each of them can be available with different granularity. The most fre- quent type of scalability is the temporal scalability. For example, if the original image sequence consisted of 30 frames per second, temporal scalability would facili- tate a user to decode a subpart of the bit-stream recon- structing a sequence with 15 frames per second or a lower number of frames per second. Spatial scalability is related to the opportunity to generate a bit-stream corresponding to the smaller spatial resolutions, for example, by decod- ing images with a resolution of CIF (common intermedi- ate format: 352×288) out of an image sequence initially encoded at 4CIF (704×576). Quality scalability represents the possibility to decode the bit-stream at a lower quality. LITERATURE In this chapter, an overview of basics related to Rate Dis- tortion (RD) optimization and its application in video cod- ing is presented. The fundamental measures related to RD optimisation are discussed. Some of the basic distor- tion measuring parameters are explained in the context of their use in video coding. The Lagrangion method for RD optimisation is presented because of its established use- ful application in video coding. Finally, some state-of-the-art techniques related to sur- veillance centric coding are discussed briefly. Rate-Distortion Theory Shannon with his rate-distortion theory addressed the elementary problem of RD optimization, maximizing re- constructed quality at the minimum cost (bit consump- tion). RD theory basically provides a way of minimising the number of bits representing the source element to a given reconstruction quality or distortion, which helps to develop a trade-off between rate and distortion. As a branch of information theory, RD theory consists of fundamental concepts of information and entropy in information theory. A methodical explanation of all sub- sequent terminologies in information theory is beyond the scope of the work presented in this thesis; however a straightforward review of important concepts is presented in this preliminary section for the study of RD theory. BLOCK-BASED VIDEO CODING Advance Video Coding (AVC) also known as H.264/ MPEG-4 Part 10 is currently the most powerful and state- of-the-art video coding standard. It has been developed by a Joint Video Team (JVT) consisting of experts from the ISO/IEC Moving Picture Experts Group (MPEG) and the ITU-T Video Coding Experts Group AVC Encoder (High Level View) AVC Decoder (High Level View) Object-Based Video Coding Replacing the conventional rectangular block based video coding with the object-based coding is the main concept defined by the MPEG-4 standard. Object-based video cod- ing gives direct access to the scene contents; thus helps manipulation of each object independently. According to MPEG-4 requirements, object-based video coding shall provide the following features: Object-based representation Object quality and fidelity Object-based bit-stream manipulation and editing Object-based coding flexibility Object-based random access Each object described in the video is characterized by spatial and temporal information in the form of shape, motion and texture [57]. Following are the basic defini- tions for the hierarchical structure of MPEG-4 object based coding: i Visual Object Sequence (VS): The complete MPEG-4 scene which maycontain any natural or synthetic objects and their enhancement layers [57]. i Video Object (VO): An area of video sequence (VS) that may have arbitraryshape in the 2D domain and may exist for an arbitrary length of time. i Video Object Plane (VOP): A video object (VO) in a par- ticular instant oftime is termed as video object plane. i Group of Video Object Planes (GOV): GOV provides ran- dom access pointsinto the compressed bit-stream. At these access points, VOPs are encoded independent of each other. Surveillance Centric Coding In this chapter, we introduce the coding paradigm of Sur- veillance Centric Coding (SCC), in which coding for spe- cific surveillance applications is targeted. The SCC aims at exploiting specific properties of surveillance video in a comprehensive application framework including coding adaptation to surveillance, rate distortion optimisation according to the VCA (video content analysis), and other related concepts. The basic approach towards Surveillance Centric Cod- ing (SCC) has been introduced. The Scalable video cod- ing (SVC) has attraction for surveillance applications be- cause of its spatial, temporal and quality adaptability. In this chapter a scalable video codec, aceSVC (discussed
  • 3. 12 International Journal of Research and Innovation on Science, Engineering and Technology (IJRISET) in chapter 3), has been modified to support event-based video coding of the surveillance videos. The architectural modifications for GOP level switching of the scalability features have been presented and implemented. This ap- proach enables the saving of bit-rate and storage space. The following sections give a description of the modified system. Architectural Modifications The required information in the surveillance video is the presence of some motion activity or any other event of interest. Therefore, the portion of the video which has an event of interest should have a good RD performance. On the other hand, the portion of the video which does not have any special information may be set to a lower RD performance. This adaptive RD performance saves a large number of bits. On the other hand, the bit-stream gener- ated by the scalable video codec does not support GOP level switching of the scalability features. Thus to support event based scalability features at GOP level for the cod- ing of surveillance videos, the architecture of aceSVC has been modified. The adaptive RD performance is achieved at the GOP level through the modified architecture. Some new blocks have been introduced to implement this ap- proach. These blocks are: 1. GOP Selector 2. GOP Collector 3. GOP Analysis EXPERIMENTAL RESULTS The following images show the output of the proposed al- gorithm in MATLAB subplots. The first subplot represents the original input image. The second subplot is the inten- sity component of the image. The third is the chroma blue component and fourth is the chroma red component. In the second row, the foreground results for the frames are shown. In subplot 1, the intensity foreground is shown, in the second subplot blue difference and in the third red difference foreground is shown. The final output of foreground is shown in the final subplot. Output of frame 1 Output of frame 5 Output of frame 10 Output of frame 20 Output of frame 30 Output of frame 40 Output of frame 50
  • 4. 13 International Journal of Research and Innovation on Science, Engineering and Technology (IJRISET) Output of frame 60 Output of frame 70 Output of frame 80 Output of frame 90 In each frame the background is updated according to the time adaptively and the precise foreground is produced at the output, which is then sent to coding module. CONCLUSION & FUTURE SCOPE A technique to improve on the compression efficiency for surveillance videos has been presented. The architecture of the scalable video coding has been modified to become surveillance centric coding. The modified architecture offers a better byte saving performance. This approach shows that the application of scalable video coding with an event driven approach improves the transmission and storage efficiency. The foreground pixels are selected by using the bounding boxes of the VCA modules. This ap- proach has the benefit of being free from shape coding and background coding as compared to MPEG-4 object based coding. Different experimental results showed that the motion compensated temporal filter (MCTF) with higher levels of filtering helps to remove the temporal redundan- cies present in the surveillance videos. This approach has better RDperformance than the block-based coding ap- proaches. A search technique with higher processing ef- ficiency with a visual quality equivalent to the full search approach and selective search strategy specific to surveil- lance videos is presented. Two approaches to perform se- lective motion estimation, GOP based and Frame based, are described where Frame based approach performed better. The visual quality for both the approaches is the same as that of the full search. To improve the selective motion estimation further, a se- lective block search technique has been proposed. The selection of the block is based on the novel approach where a motion detection module is used to provide the location of candidate blocks. Although, this approach performs a fewer number of block matching steps yet the overall processing efficiency of the system is close to a Frame based selective search. This is because of the overhead complexity added by the bounding box match- ing algorithm to locate the candidate block in the SCC. After introducing selective motion estimation approaches, another novel approach, tracker-based motion estimation has been proposed where surveillance video object motion tracker information is used to calculate the motion vec- tors. A unique motion track is calculated for each object of the surveillance video. The distance representing the displacement of the object between the current and the reference frame is taken as a value to calculate motion vectors after identifying and matching the track in the two frames. This approach performs a faster calculation of the motion vectors but it degrades the visual quality of the video depending on the nature of the movement represented by the foreground object. Finally, under the same motivation of achieving processing efficiency with- out loss in visual quality, fast full search approaches are explored. A fast search approach for multiple reference frames specific to surveillance videos has been proposed. This approach is based on considering different points between the two consecutive reference frames and then using these different points to avoid unnecessary block matching steps. This search approach is specific to sur- veillance videos with motion estimation based on multiple reference frames. REFERENCES [1] J. Gantz and D. Reinsel. (2012, Dec.). The IDC Digi- tal Universe in 2020: Big Data, Bigger Digital Shadows, and Biggest Growth in the Far East [Online]. Available: http://www.emc.com/leadership/digitaluniverse/ index. htm [2] I. E. G. Richardson, H.264 and MPEG-4 Video Com- pression: Video Coding for Next Generation Multimedia. Chichester, U.K.: Wiley, 2003, pp. 136–138. [3] K. Ugur, K. Andersson, A. Fuldseth, G. Bjontegaard, L. P. Endresen, J. Lainema, et al., “High performance, low complexity video coding and the emerging HEVC stand- ard,” IEEE Trans. Circuits Syst. Video Technol., vol. 20, no. 12, pp. 1688–1697, Dec. 2010.
  • 5. 14 International Journal of Research and Innovation on Science, Engineering and Technology (IJRISET) [4] X. G. Zhang, L. H. Liang, Q. Huang, and W. Gao, “An efficient coding scheme for surveillance videos captured by stationary cameras,” Proc. SPIE Visual Commun. Im- age Process., vol. 7744, pp. 77442A-1–77442A-10, Jul. 2010. [5] M. Piccardi, “Background subtraction techniques: A review,” in Proc. IEEE Int. Conf. Syst., Man Cybern., vol. 4. Oct. 2004, pp. 3099–3104. [6] R. Forchheimer and O. Fahlander, “Low bit-rate coding through animation,” in Proc. Int. Picture Coding Symp., 1983, pp. 113–114. [7] R. Forchheimer, O. Fahlander, and T. Kronander, “A semantic approach to the transmission of face images,” in Proc. Int. Picture Coding Symp., no. 10.5, Cesson-Sevi- gne, France, 1984. AUTHOR S.pushpa, Research Scholar, Department of Electronics AndCommunication Engineering, Chiranjeevi Reddy Institute of Engineering and Technology, Anantapur, A. P, India. S. Rehana Banu, Assistant Professor, Department of Electronics AndCommunication Engineering, Chiranjeevi Reddy Institute of Engineering and Technology, Anantapur, A. P, India.