Special Issue: Computer Graphics and Multimedia

• Articles • Previous Articles    

Video Key Frame Extraction by Unsupervised Clustering and Feedback Adjustment

ZHUANG Yueting; RUI Yong; Thomas S.Huang;   

  1. Department of Computer Science; Zhejiang University; Hangzhou 310027; P.R. China; Beckman Institute; University of Illinois at Urbana-Champaign; Urbana; IL 61801; USA;
  • Online:1999-05-10 Published:1999-05-10

In video information retrieval, key frame extraction has been rec ognized as one of the important research issues. Although much progress has been made, the existing approaches are either computationally expensive or ineffective in capturing salient visual content. In this paper, we first discuss the importance of key frame extraction and then briefly review and evaluate the existing approaches. To overcome the shortcomings of the existing approaches, we introduce a new algorithm for key frame extraction ba…

Key words: crosstalk; inductive coupling; middle shield insertion;



[1] Aigrain P, Zhang H, Petkovic D. Content-based representation and retrieval of visual media: A state-of-the-art review. Multimedia Tools and Applications, Nov. 1996, 3.

[2] Voreczky J S, Rowe L A. Comparison of video shot boundary detection techniques. In Proc.SPIE Conf.Vis. Commun.and Image Processing 1996.

[3] Zhang H J, Wang J Y A, Altunbasak Y. Content-based video retrieval and compression: A unified solution. In Proc. IEEE Int. Conf. Image Processing 1997. ………..
[1] Ying Zhang, Hua-Wei Li, Member, CCF, Senior Member, IEEE, and Xiao-Wei Li, Member, CCF, Senior Member, IEEE. Selected Crosstalk Avoidance Code for Reliable Network-on-Chip [J]. , 2009, 24(6): 1074-1085.
[2] Yi-Ci Cai, Bin Liu, Yan Xiong, Qiang Zhou and Xian-Long Hong. Priority-Based Routing Resource Assignment Considering Crosstalk [J]. , 2006, 21(6): 913-921 .
[3] Yi-Ci Cai, Xin Zhao, Qiang Zhou, and Xian-Long Hong. Shielding Area Optimization Under the Solution of Interconnect Crosstalk [J]. , 2005, 20(6): 901-906 .
[4] Hai-Long Yao , Yi-Ci Cai, Qiang Zhou, and Xian-Long Hong. Crosstalk-Aware Routing Resource Assignment [J]. , 2005, 20(2): 0-0.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] Liu Mingye; Hong Enyu;. Some Covering Problems and Their Solutions in Automatic Logic Synthesis Systems[J]. , 1986, 1(2): 83 -92 .
[2] Chen Shihua;. On the Structure of (Weak) Inverses of an (Weakly) Invertible Finite Automaton[J]. , 1986, 1(3): 92 -100 .
[3] Gao Qingshi; Zhang Xiang; Yang Shufan; Chen Shuqing;. Vector Computer 757[J]. , 1986, 1(3): 1 -14 .
[4] Chen Zhaoxiong; Gao Qingshi;. A Substitution Based Model for the Implementation of PROLOG——The Design and Implementation of LPROLOG[J]. , 1986, 1(4): 17 -26 .
[5] Huang Heyan;. A Parallel Implementation Model of HPARLOG[J]. , 1986, 1(4): 27 -38 .
[6] Min Yinghua; Han Zhide;. A Built-in Test Pattern Generator[J]. , 1986, 1(4): 62 -74 .
[7] Tang Tonggao; Zhao Zhaokeng;. Stack Method in Program Semantics[J]. , 1987, 2(1): 51 -63 .
[8] Min Yinghua;. Easy Test Generation PLAs[J]. , 1987, 2(1): 72 -80 .
[9] Zhu Hong;. Some Mathematical Properties of the Functional Programming Language FP[J]. , 1987, 2(3): 202 -216 .
[10] Li Minghui;. CAD System of Microprogrammed Digital Systems[J]. , 1987, 2(3): 226 -235 .

ISSN 1000-9000(Print)

         1860-4749(Online)
CN 11-2296/TP

Home
Editorial Board
Author Guidelines
Subscription
Journal of Computer Science and Technology
Institute of Computing Technology, Chinese Academy of Sciences
P.O. Box 2704, Beijing 100190 P.R. China
Tel.:86-10-62610746
E-mail: jcst@ict.ac.cn
 
  Copyright ©2015 JCST, All Rights Reserved