• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Nie Xiushan, Chai Yan’e, Teng Cong. Keyframe Extraction Method Based on Dominating Set[J]. Journal of Computer Research and Development, 2015, 52(12): 2879-2887. DOI: 10.7544/issn1000-1239.2015.20140701
Citation: Nie Xiushan, Chai Yan’e, Teng Cong. Keyframe Extraction Method Based on Dominating Set[J]. Journal of Computer Research and Development, 2015, 52(12): 2879-2887. DOI: 10.7544/issn1000-1239.2015.20140701

Keyframe Extraction Method Based on Dominating Set

More Information
  • Published Date: November 30, 2015
  • Keyframe extraction is one of the important steps in video processing, and it is popularly used in video content analysis. A keyframe extraction method is proposed in this paper for the content-based video summarization. In order to well depict the structure and relation among the frames of a video, we firstly model the video as an undirected weighted graph, where the frames of the video are taken as vertices, and the lines among vertices are taken as edges. The weights of edges are computed using the Hausdorff distances between pairs of speed-up features frame-by-frame which are local and robust features of frames. Subsequently, based on the representation of the keyframe, the process of keyframe extraction is equivalent to the selection of minimum dominating set in a graph, and integral linear programming is used to select the minimum dominating set in the graph. Finally, the keyframes are extracted according to the vertices in the obtained dominating set. We execute the proposed method on different types of videos, and evaluate the performance of the fidelity and compression ratios. Compared with the traditional methods, the proposed method is depended on video content rather than time and video shots. The experimental results show that the keyframes extracted by the proposed method have good representation and discrimination, and they also have high fidelity and compression ratios.
  • Related Articles

    [1]Hu Yunshu, Zhou Jun, Cao Zhenfu, Dong Xiaolei. Lightweight Multi-User Verifiable Privacy-Preserving Gene Sequence Analysis Scheme[J]. Journal of Computer Research and Development, 2024, 61(10): 2448-2466. DOI: 10.7544/issn1000-1239.202440453
    [2]Chen Weili, Zheng Zibin. Blockchain Data Analysis: A Review of Status, Trends and Challenges[J]. Journal of Computer Research and Development, 2018, 55(9): 1853-1870. DOI: 10.7544/issn1000-1239.2018.20180127
    [3]Yu Hui, Zhang Zongyang, Liu Jianwei. Research on Scaling Technology of Bitcoin Blockchain[J]. Journal of Computer Research and Development, 2017, 54(10): 2390-2403. DOI: 10.7544/issn1000-1239.2017.20170416
    [4]Zhao Xingwang, Liang Jiye. An Attribute Weighted Clustering Algorithm for Mixed Data Based on Information Entropy[J]. Journal of Computer Research and Development, 2016, 53(5): 1018-1028. DOI: 10.7544/issn1000-1239.2016.20150131
    [5]Yue Guangxue, Li Renfa, Chen Zhi, Zhou Xu. Analysis of Free-riding Behaviors and Modeling Restrain Mechanisms for Peer-to-Peer Networks[J]. Journal of Computer Research and Development, 2011, 48(3): 382-397.
    [6]Feng Chaosheng, Qin Zhiguang, Laurence Cuthbert, Laurissa Tokarchuk. Reactive Worms Propagation Modeling and Analysis in Peer-to-Peer Networks[J]. Journal of Computer Research and Development, 2010, 47(3): 500-507.
    [7]Tian Zhihong, Zhang Yongzheng, Zhang Weizhe, Li Yang, Ye Jianwei. An Adaptive Alert Correlation Method Based on Pattern Mining and Clustering Analysis[J]. Journal of Computer Research and Development, 2009, 46(8): 1304-1315.
    [8]Li Bohan, Hao Zhongxiao. A Decision Algorithm on Judging the Overlap of Nodes for R*Tree Based on Clustering Analysis[J]. Journal of Computer Research and Development, 2008, 45(12): 2154-2161.
    [9]Zhou Xiaoyun, Sun Zhihui, Zhang Baili, and Yang Yidong. Research on Clustering and Evolution Analysis of High Dimensional Data Stream[J]. Journal of Computer Research and Development, 2006, 43(11): 2005-2011.
    [10]Song Yuqing, Xie Conghua, Zhu Yuquan, Li Cunhua, Chen Jianmei, Wang Lijun. Research on Medical Image Clustering Based on Approximate Density Function[J]. Journal of Computer Research and Development, 2006, 43(11): 1947-1952.
  • Cited by

    Periodical cited type(33)

    1. 林雪燕. 云计算环境下的网络虚拟化与性能优化. 信息与电脑(理论版). 2024(05): 153-155 .
    2. 王雅倩,陈心怡,曲睿,周振宇. 基于SDN/NFV的电力物联网时延敏感业务编排方法. 华北电力大学学报(自然科学版). 2023(01): 84-91 .
    3. 施苏峰. 基于eBPF的虚拟化网络与云原生网络应用. 网络安全与数据治理. 2023(02): 9-18 .
    4. 鲜娅静. 基于NGN和5G的档案管理系统研究与仿真. 微型电脑应用. 2023(02): 161-163+168 .
    5. 阳勇,孟相如,康巧燕,陈港. 基于资源需求预测的动态服务功能链迁移方法. 计算机研究与发展. 2023(05): 1151-1163 . 本站查看
    6. 张子尧,吴黎兵,夏振厂,张壮壮. 一种SDN环境的SNMP Trap报文聚合方法. 小型微型计算机系统. 2023(09): 2059-2067 .
    7. 陶志勇,张锦,阳王东,唐铁斌. 面向虚拟私有网的网络设备虚拟化技术. 计算机系统应用. 2022(02): 137-142 .
    8. 祖家琛,胡谷雨,严佳洁,李实吉. 网络功能虚拟化下服务功能链的资源管理研究综述. 计算机研究与发展. 2021(01): 137-152 . 本站查看
    9. 郭胜,史久根,孙立,谢熠君. 基于VNF间性能干扰的服务请求调度策略. 计算机技术与发展. 2021(01): 142-148 .
    10. 王大鹏,宋文贵,吴波,刘希念,田际,周钰涛,赵晋松,杜保华,吴智群,褚贵宏. 基于私有云的发电企业一体化平台构建方案. 热力发电. 2021(05): 67-74 .
    11. 陈杨,刘作,黎聪,龙俊霖,赵群帅. 基于SDN与NFV的云通信软交换能力切片化部署稳定性研究. 通信技术. 2021(09): 2163-2168 .
    12. 马丁,费选,慕小武. 一种基于业务感知和可调节跳数的虚拟化层构建算法. 郑州大学学报(工学版). 2021(05): 50-55 .
    13. 高吉星,虞志刚,冯旭,陆洲. 面向空间网络的虚拟路由器实现方法. 中国电子科学研究院学报. 2021(09): 869-876 .
    14. 陶志勇,张锦,阳王东,陈为满. 基于双层虚拟思想的边缘设备性能优化研究. 计算机科学. 2021(11): 372-377 .
    15. 曹含笑,陈海浩,梁梅群,谢恩慧,韦晓慧. 轻量级容器化技术驱动的虚拟网络部署研究. 电子测试. 2020(06): 80-81+100 .
    16. 陈天殷,耿殿丽. 5G推进ADAS和自动驾驶发展进程. 客车技术与研究. 2020(02): 1-4 .
    17. 马卫国,郎为民,张寅,张汉. 虚拟化网络功能测量问题研究. 电信快报. 2020(03): 1-5 .
    18. 陈天殷,耿殿丽. 5G保证ADAS、自动驾驶系统安全可靠地运行. 汽车电器. 2020(07): 1-4 .
    19. 刘海鹏,周淑秋. 网络切片技术在矿山通信网络中的应用研究. 工矿自动化. 2020(08): 28-31+57 .
    20. 刘敏. 业务流的VNF动态资源分配研究与设计. 玉林师范学院学报. 2020(03): 108-114 .
    21. 贾海宇,陈佳,王铭鑫. 无线接入网络中网络功能虚拟化研究综述. 电信科学. 2019(01): 97-112 .
    22. 马润年,陈彤睿,王刚,伍维甲. 面向隔离区异构平台的动态防御主动迁移策略. 火力与指挥控制. 2019(03): 1-8+22 .
    23. 邓理,吴伟楠,朱正一,陈鸣. DiffSec:一种差别性的智能网络安全服务模型. 计算机研究与发展. 2019(05): 955-966 . 本站查看
    24. 付乔,张昊. 持续集成持续交付的NFV/SDN网络新型集成体系. 移动通信. 2019(07): 22-27 .
    25. 郎为民,张汉,赵毅丰,姚晋芳. 网络功能虚拟化技术研究. 电信快报. 2019(07): 1-5 .
    26. 黄远宏. 探讨网络虚拟化及网络功能虚拟化技术. 通讯世界. 2019(08): 120-121 .
    27. 李芬,熊雄. 数据中心网络虚拟化技术应用探析. 中国新通信. 2019(15): 85-86 .
    28. 郎为民,张汉,吴帆,姚晋芳. 网络功能虚拟化弹性和可扩展性研究. 电信快报. 2019(08): 1-5 .
    29. 郎为民,张汉,吴帆,姚晋芳. 虚拟化网络功能分解问题研究. 电信快报. 2019(09): 1-5+11 .
    30. 郎为民,张汉,吴帆,姚晋芳. 网络功能虚拟化基础设施研究. 电信快报. 2019(10): 1-6+23 .
    31. 伊鹏,谢记超,张震,谷允捷,赵丹. 抗侧信道攻击的服务功能链部署方法. 电子与信息学报. 2019(11): 2699-2707 .
    32. 夏洋,黄治华. 基于NFV和SDN的通信资源虚拟化及调度研究. 信息与电脑(理论版). 2018(17): 141-142 .
    33. 徐晓莉,张常亮,杨雪. 气象广域网双链路流量调度方法研究及实现. 电子测量技术. 2018(18): 36-41 .

    Other cited types(58)

Catalog

    Article views (1240) PDF downloads (673) Cited by(91)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return