{"id":"https://openalex.org/W4390188684","doi":"https://doi.org/10.1109/dasc/picom/cbdcom/cy59711.2023.10361324","title":"A Novel Fast Video Fragment Matching Algorithm for Copyright Protection","display_name":"A Novel Fast Video Fragment Matching Algorithm for Copyright Protection","publication_year":2023,"publication_date":"2023-11-14","ids":{"openalex":"https://openalex.org/W4390188684","doi":"https://doi.org/10.1109/dasc/picom/cbdcom/cy59711.2023.10361324"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/dasc/picom/cbdcom/cy59711.2023.10361324","pdf_url":null,"source":{"id":"https://openalex.org/S4363605881","display_name":"2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101435389","display_name":"Yan Chen","orcid":"https://orcid.org/0000-0002-5236-2148"},"institutions":[{"id":"https://openalex.org/I80947539","display_name":"Fuzhou University","ror":"https://ror.org/011xvna82","country_code":"CN","type":"education","lineage":["https://openalex.org/I80947539"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yan Chen","raw_affiliation_strings":["College of Computer and Data Science, Fuzhou University,Fuzhou,China,350108"],"affiliations":[{"raw_affiliation_string":"College of Computer and Data Science, Fuzhou University,Fuzhou,China,350108","institution_ids":["https://openalex.org/I80947539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008435796","display_name":"Zhongliao Yang","orcid":"https://orcid.org/0009-0004-9650-6037"},"institutions":[{"id":"https://openalex.org/I80947539","display_name":"Fuzhou University","ror":"https://ror.org/011xvna82","country_code":"CN","type":"education","lineage":["https://openalex.org/I80947539"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhongliao Yang","raw_affiliation_strings":["College of Computer and Data Science, Fuzhou University,Fuzhou,China,350108"],"affiliations":[{"raw_affiliation_string":"College of Computer and Data Science, Fuzhou University,Fuzhou,China,350108","institution_ids":["https://openalex.org/I80947539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063173925","display_name":"Chen Dong","orcid":"https://orcid.org/0000-0001-5826-1906"},"institutions":[{"id":"https://openalex.org/I80947539","display_name":"Fuzhou University","ror":"https://ror.org/011xvna82","country_code":"CN","type":"education","lineage":["https://openalex.org/I80947539"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chen Dong","raw_affiliation_strings":["College of Computer and Data Science, Fuzhou University,Fuzhou,China,350108"],"affiliations":[{"raw_affiliation_string":"College of Computer and Data Science, Fuzhou University,Fuzhou,China,350108","institution_ids":["https://openalex.org/I80947539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037848927","display_name":"Hui Lin","orcid":"https://orcid.org/0000-0003-1716-1399"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui Lin","raw_affiliation_strings":["College of Computer and Cyber Security, Fujian Normal University,Fuzhou,China,350007"],"affiliations":[{"raw_affiliation_string":"College of Computer and Cyber Security, Fujian Normal University,Fuzhou,China,350007","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5081579818","display_name":"Zhenyi Chen","orcid":"https://orcid.org/0000-0001-9498-4300"},"institutions":[{"id":"https://openalex.org/I2613432","display_name":"University of South Florida","ror":"https://ror.org/032db5x82","country_code":"US","type":"education","lineage":["https://openalex.org/I2613432"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zhenyi Chen","raw_affiliation_strings":["University of South Florida,Department of Computer Science and Engineering,Tampa,FL,USA,33620"],"affiliations":[{"raw_affiliation_string":"University of South Florida,Department of Computer Science and Engineering,Tampa,FL,USA,33620","institution_ids":["https://openalex.org/I2613432"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.325,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.588886,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":69,"max":80},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T14339","display_name":"Automated Reconstruction of Fragmented Objects","score":0.9741,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T14339","display_name":"Automated Reconstruction of Fragmented Objects","score":0.9741,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks in Image Processing","score":0.9423,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11439","display_name":"Automatic Video Summarization and Analysis","score":0.9372,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fragment","display_name":"Fragment (logic)","score":0.72895443},{"id":"https://openalex.org/keywords/digital-video","display_name":"Digital video","score":0.5930289},{"id":"https://openalex.org/keywords/key-frame-extraction","display_name":"Key Frame Extraction","score":0.53957},{"id":"https://openalex.org/keywords/image-matching","display_name":"Image Matching","score":0.535929},{"id":"https://openalex.org/keywords/video-summarization","display_name":"Video Summarization","score":0.509358}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7857388},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.7772191},{"id":"https://openalex.org/C2776235265","wikidata":"https://www.wikidata.org/wiki/Q18392052","display_name":"Fragment (logic)","level":2,"score":0.72895443},{"id":"https://openalex.org/C2988454689","wikidata":"https://www.wikidata.org/wiki/Q173131","display_name":"Digital video","level":3,"score":0.5930289},{"id":"https://openalex.org/C126042441","wikidata":"https://www.wikidata.org/wiki/Q1324888","display_name":"Frame (networking)","level":2,"score":0.56562936},{"id":"https://openalex.org/C167510206","wikidata":"https://www.wikidata.org/wiki/Q2835824","display_name":"Block-matching algorithm","level":4,"score":0.47651684},{"id":"https://openalex.org/C61455927","wikidata":"https://www.wikidata.org/wiki/Q1030529","display_name":"Blossom algorithm","level":3,"score":0.45570382},{"id":"https://openalex.org/C65483669","wikidata":"https://www.wikidata.org/wiki/Q3536669","display_name":"Video processing","level":2,"score":0.43244654},{"id":"https://openalex.org/C202474056","wikidata":"https://www.wikidata.org/wiki/Q1931635","display_name":"Video tracking","level":3,"score":0.37078995},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3427928},{"id":"https://openalex.org/C49774154","wikidata":"https://www.wikidata.org/wiki/Q131765","display_name":"Multimedia","level":1,"score":0.3356417},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.32962602},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.16674098},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/dasc/picom/cbdcom/cy59711.2023.10361324","pdf_url":null,"source":{"id":"https://openalex.org/S4363605881","display_name":"2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4389850132","https://openalex.org/W3119099368","https://openalex.org/W2377190948","https://openalex.org/W2125918940","https://openalex.org/W2096476311","https://openalex.org/W2073477885","https://openalex.org/W2032827369","https://openalex.org/W1965045080","https://openalex.org/W181787362","https://openalex.org/W1574724839"],"abstract_inverted_index":{"The":[0,107],"rise":[1],"of":[2,35,40,64,92,112,124,171],"the":[3,12,38,46,51,89,110,120,125,130,135,138,145,160,169],"short-form":[4],"video":[5,43,65,90,101,127,131,156,172],"industry":[6],"marks":[7],"a":[8,61,99,152],"revolutionary":[9],"change":[10],"in":[11,144],"digital":[13,53],"media":[14],"landscape.":[15],"This":[16,148],"has":[17,28],"opened":[18],"up":[19],"new":[20],"opportunities":[21],"for":[22,49,155],"content":[23],"distribution":[24],"and":[25,56,87,159],"creation":[26],"but":[27],"also":[29,150],"brought":[30],"about":[31],"several":[32],"challenges,":[33],"one":[34],"which":[36,116],"is":[37],"difficulty":[39],"effectively":[41,85,167],"protecting":[42],"copyrights.":[44],"In":[45],"industrial":[47,52],"sector,":[48],"example,":[50],"design,":[54],"manufacturing,":[55],"production":[57],"process":[58],"often":[59],"generate":[60],"large":[62],"amount":[63],"data.":[66],"If":[67],"these":[68],"videos":[69],"are":[70,142],"stolen,":[71],"copied,":[72],"or":[73,94],"tampered":[74],"with":[75],"by":[76],"unauthorized":[77],"third":[78],"parties,":[79],"infringement":[80],"issues":[81],"can":[82,166],"arise.":[83],"To":[84],"monitor":[86],"protect":[88],"copyrights":[91],"users":[93],"enterprises,":[95],"this":[96],"paper":[97,149],"proposes":[98],"lightweight":[100],"clip":[102],"fast":[103],"matching":[104,132],"(KMP-FVFM)":[105],"algorithm.":[106],"algorithm":[108],"utilizes":[109],"idea":[111],"Knuth-Morris-Pratt":[113],"(KMP)":[114],"algorithm,":[115],"takes":[117],"into":[118],"account":[119],"inter-frame":[121],"fragment":[122,157,173],"relationship":[123],"query":[126],"to":[128],"improve":[129,168],"speed.":[133],"At":[134],"same":[136],"time,":[137],"duplicate":[139],"segment":[140],"locations":[141],"pinpointed":[143],"original":[146],"video.":[147],"implements":[151],"plain":[153],"method":[154],"matching,":[158],"experimental":[161],"results":[162],"show":[163],"that":[164],"KMP-FVFM":[165],"efficiency":[170],"matching.":[174]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4390188684","counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2024-11-19T17:05:24.039264","created_date":"2023-12-26"}