Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 219732, 12 pages
http://dx.doi.org/10.1155/2014/219732
Research Article

Secure Access Control and Large Scale Robust Representation for Online Multimedia Event Detection

1School of Computer Science and Engineering, South China University of Technology, Guangzhou 510006, China
2School of Computer Science, Carnegie Mellon University, Pittsburgh, PA 15213, USA
3School of Computer Science, Wuyi University, Jiangmen 529020, China
4State Key Laboratory of Pulp and Paper Engineering, South China University of Technology, Guangzhou 510640, China

Received 2 April 2014; Accepted 30 June 2014; Published 22 July 2014

Academic Editor: Vincenzo Eramo

Copyright © 2014 Changyu Liu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. P. Over, J. Fiscus, G. Sanders et al., “TRECVID 2012—an overview of the goals, tasks, data, evaluation mechanisms, and metrics,” in Proceedings of the TRECVID Workshop, 2012.
  2. C. Xu, Y. Zhang, G. Zhu, Y. Rui, H. Lu, and Q. Huang, “Using webcast text for semantic event detection in broadcast sports video,” IEEE Transactions on Multimedia, vol. 10, no. 7, pp. 1342–1355, 2008. View at Publisher · View at Google Scholar · View at Scopus
  3. F. Wang, Y. Jiang, and C. Ngo, “Video event detection using motion relativity and visual relatedness,” in Proceedings of the 16th ACM International Conference on Multimedia (MM '08), pp. 239–248, October 2008. View at Publisher · View at Google Scholar · View at Scopus
  4. S. Oh, A. Hoogs, A. Perera et al., “A large-scale benchmark dataset for event recognition in surveillance video,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR '11), pp. 3153–3160, June 2011. View at Publisher · View at Google Scholar · View at Scopus
  5. R. S. Sandhu, E. J. Coynek, H. L. Feinsteink, and C. E. Youmank, “Role-based access control models,” IEEE Computer, vol. 29, no. 2, pp. 38–47, 1996. View at Google Scholar
  6. R. N. Calheiros, R. Ranjan, A. Beloglazov, C. A. F. de Rose, and R. Buyya, “CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms,” Software—Practice and Experience, vol. 41, no. 1, pp. 23–50, 2011. View at Publisher · View at Google Scholar · View at Scopus
  7. J. Deng, W. Dong, R. Socher, L. J. Li, K. Li, and L. Fei-Fei, “Imagenet: a large-scale hierarchical image database,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR '09), pp. 248–255, 2009.
  8. L. J. Li, H. Su, E. P. Xing, and F. F. Li, “Object bank: a high-level image representation for scene classification semantic feature sparsification,” NIPS Proceedings, vol. 2, no. 3, p. 5, 2010. View at Google Scholar
  9. L. J. Li, H. Su, Y. Lim, and L. Fei-Fei, “Objects as attributes for scene classification,” in Trends and Topics in Computer Vision, pp. 57–69, Springer, Berlin, Geramny, 2012. View at Google Scholar
  10. P. F. Felzenszwalb, R. B. Girshick, D. McAllester, and D. Ramanan, “Object detection with discriminatively trained part-based models,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 32, no. 9, pp. 1627–1645, 2010. View at Publisher · View at Google Scholar · View at Scopus
  11. P. Felzenszwalb, D. McAllester, and D. Ramanan, “A discriminatively trained, multiscale, deformable part model,” in Proceedings of the 26th IEEE Conference on Computer Vision and Pattern Recognition (CVPR '08), pp. 1–8, June 2008. View at Publisher · View at Google Scholar · View at Scopus
  12. L. Zhu, M. Zhou, T. Liu, and H. Mei, “Permission management model in service-oriented architecture,” Chinese Journal of Computers, vol. 28, no. 4, pp. 678–685, 2005. View at Google Scholar · View at Scopus
  13. F. Xu, H. G. Lai, H. Huang, and L. Xie, “Service-oriented role-based access control,” Chinese Journal of Computers, vol. 28, no. 4, pp. 686–693, 2005. View at Google Scholar · View at Scopus
  14. L. Pearlman, C. Kesselman, V. Welch et al., “The community authorization service: status and future,” in Proceedings of the Computing in High Energy Physics Conference (CHEP '03), pp. 1–9, 2003.
  15. H. X. Cai, T. Yu, and M. L. Fang, “Access control of manufacturing grid,” Computer Integrated Manufacturing Systems, vol. 13, no. 4, pp. 716–720, 2007. View at Google Scholar · View at Scopus
  16. L. Fei-Fei, R. Fergus, and P. Perona, “Learning generative visual models from few training examples: an incremental Bayesian approach tested on 101 object categories,” Computer Vision and Image Understanding, vol. 106, no. 1, pp. 59–70, 2007. View at Publisher · View at Google Scholar · View at Scopus
  17. G. Griffin, A. Holub, and P. Perona, “Caltech-256 object category dataset,” Tech. Rep. 7694, California Institute of Technology, 2007. View at Google Scholar
  18. A. Quattoni and A. Torralba, “Recognizing indoor scenes,” in Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops (CVPR Workshops '09), pp. 413–420, June 2009. View at Publisher · View at Google Scholar · View at Scopus
  19. B. C. Russell, A. Torralba, K. P. Murphy, and W. T. Freeman, “LabelMe: a database and web-based tool for image annotation,” International Journal of Computer Vision, vol. 77, no. 1–3, pp. 157–173, 2008. View at Publisher · View at Google Scholar · View at Scopus
  20. M. Everingham, L. van Gool, C. K. I. Williams, J. Winn, and A. Zisserman, “The pascal visual object classes (VOC) challenge,” International Journal of Computer Vision, vol. 88, no. 2, pp. 303–338, 2010. View at Publisher · View at Google Scholar · View at Scopus
  21. H. Kuehne, H. Jhuang, E. Garrote, T. Poggio, and T. Serre, “HMDB: a large video database for human motion recognition,” in Proceedings of the IEEE International Conference on Computer Vision (ICCV '11), pp. 2556–2563, November 2011. View at Publisher · View at Google Scholar · View at Scopus
  22. C. Schüldt, I. Laptev, and B. Caputo, “Recognizing human actions: a local SVM approach,” in Proceedings of the 17th International Conference on Pattern Recognition (ICPR '04), pp. 32–36, August 2004. View at Publisher · View at Google Scholar · View at Scopus
  23. K. K. Reddy and M. Shah, “Recognizing 50 human action categories of web videos,” Machine Vision and Applications, vol. 24, no. 5, pp. 971–981, 2013. View at Publisher · View at Google Scholar · View at Scopus
  24. K. Soomro, A. R. Zamir, and M. Shah, “UCF101: a dataset of 101 human action classes from videos in the wild,” CRCV-TR-12-01, 2012.
  25. M. D. Rodriguez, J. Ahmed, and M. Shah, “Action MACH: a spatio-temporal maximum average correlation height filter for action recognition,” in Proceedings of the 26th IEEE Conference on Computer Vision and Pattern Recognition (CVPR '08), pp. 1–8, Anchorage, Alaska, USA, June 2008. View at Publisher · View at Google Scholar · View at Scopus
  26. I. Laptev, M. Marszałek, C. Schmid, and B. Rozenfeld, “Learning realistic human actions from movies,” in Proceedings of the 26th IEEE Conference on Computer Vision and Pattern Recognition (CVPR '08), June 2008. View at Publisher · View at Google Scholar · View at Scopus
  27. L. J. Li and L. Fei-Fei, “What, where and who? Classifying events by scene and object recognition,” in Proceedings of the IEEE 11th International Conference on Computer Vision (ICCV '07), pp. 1–8, Rio de Janeiro, Brazil, October 2007. View at Publisher · View at Google Scholar · View at Scopus
  28. D. G. Lowe, “Distinctive image features from scale-invariant keypoints,” International Journal of Computer Vision, vol. 60, no. 2, pp. 91–110, 2004. View at Publisher · View at Google Scholar · View at Scopus
  29. K. Van De Sande, T. Gevers, and C. Snoek, “Evaluating color descriptors for object and scene recognition,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 32, no. 9, pp. 1582–1596, 2010. View at Publisher · View at Google Scholar · View at Scopus
  30. G. J. Burghouts and J. Geusebroek, “Performance evaluation of local colour invariants,” Computer Vision and Image Understanding, vol. 113, no. 1, pp. 48–62, 2009. View at Publisher · View at Google Scholar · View at Scopus
  31. M. Y. Chen and A. Hauptmann, “MoSIFT: recognizing human actions in surveillance videos,” CMU CS-09-161, Carnegie Mellon University, 2009. View at Google Scholar
  32. I. Laptev, “On space-time interest points,” International Journal of Computer Vision, vol. 64, no. 2-3, pp. 107–123, 2005. View at Publisher · View at Google Scholar · View at Scopus
  33. H. Wang, A. Kläser, C. Schmid, and C. L. Liu, “Dense trajectories and motion boundary descriptors for action recognition,” International Journal of Computer Vision, vol. 103, no. 1, pp. 60–79, 2013. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  34. S. Sadanand and J. J. Corso, “Action bank: a high-level representation of activity in video,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR '12), pp. 1234–1241, June 2012. View at Publisher · View at Google Scholar · View at Scopus
  35. J. Yang, K. Yu, Y. Gong, and T. Huang, “Linear spatial pyramid matching using sparse coding for image classification,” in Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR '09), pp. 1794–1801, June 2009. View at Publisher · View at Google Scholar · View at Scopus
  36. F. Perronnin, J. Sánchez, and T. Mensink, “Improving the fisher kernel for large-scale image classification,” in Proceedings of the 11th European Conference on Computer Vision (ECCV '10), vol. 6314 of Lecture Notes in Computer Science, pp. 143–156, Crete, Greece, 2010. View at Publisher · View at Google Scholar
  37. S. Lazebnik, C. Schmid, and J. Ponce, “Beyond bags of features: spatial pyramid matching for recognizing natural scene categories,” in Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR '06), pp. 2169–2178, June 2006. View at Publisher · View at Google Scholar · View at Scopus
  38. C. C. Chang and C. J. Lin, “LIBSVM: a library for support vector machines,” ACM Transactions on Intelligent Systems and Technology, vol. 2, no. 3, article 27, 2011. View at Publisher · View at Google Scholar · View at Scopus
  39. S. An, W. Liu, and S. Venkatesh, “Fast cross-validation algorithms for least squares support vector machine and kernel ridge regression,” Pattern Recognition, vol. 40, no. 8, pp. 2154–2162, 2007. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  40. B. Krishnapuram, L. Carin, M. A. T. Figueiredo, and A. J. Hartemink, “Sparse multinomial logistic regression: fast algorithms and generalization bounds,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 27, no. 6, pp. 957–968, 2005. View at Publisher · View at Google Scholar · View at Scopus
  41. G. Rätsch, T. Onoda, and K. R. Müller, “Soft margins for AdaBoost,” Machine Learning, vol. 42, no. 3, pp. 287–320, 2001. View at Publisher · View at Google Scholar · View at Scopus
  42. D. A. Sadlier and N. E. O'Connor, “Event detection in field sports video using audio-visual features and a support vector machine,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 15, no. 10, pp. 1225–1233, 2005. View at Publisher · View at Google Scholar · View at Scopus
  43. D. Zhang and S. Chang, “Event detection in baseball video using superimposed caption recognition,” in Proceedings of the 10th International Conference of Multimedia, pp. 315–318, December 2002. View at Scopus
  44. C. Xu, J. Wang, K. Wan, Y. Li, and L. Duan, “Live sports event detection based on broadcast video and web-casting text,” in Proceedings of the 14th Annual ACM International Conference on Multimedia (MM '06), pp. 221–230, October 2006. View at Publisher · View at Google Scholar · View at Scopus
  45. Z. Li, “A probabilistic model for retrospective news event detection,” in Proceedings of the 28th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR '05), 2005.
  46. B. D. Lucas and T. Kanade, “An iterative image registration technique with an application to stereo vision,” in Proceedings of the International Joint Conferences on Artificial Intelligence, 1981.
  47. R. Messing, C. Pal, and H. Kautz, “Activity recognition using the velocity histories of tracked keypoints,” in Proceedings of the 12th International Conference on Computer Vision (ICCV '09), pp. 104–111, October 2009. View at Publisher · View at Google Scholar · View at Scopus
  48. L. Bao, L. Zhang, S. I. Yu et al., “Informedia@TRECVID2011,” in Proceedings of the NIST TRECVID Workshop, 2011.
  49. L. Cao, S. F. Chang, N. Codella et al., “IBM Research and Columbia University TRECVID—2011 multimedia event detection (MED) system,” in Proceedings of the NIST TRECVID Workshop, 2011.
  50. J. Zhang, M. Marszałek, S. Lazebnik, and C. Schmid, “Local features and kernels for classification of texture and object categories: a comprehensive study,” International Journal of Computer Vision, vol. 73, no. 2, pp. 213–238, 2007. View at Publisher · View at Google Scholar · View at Scopus
  51. F. Li, G. Lebanon, and C. Sminchisescu, “Chebyshev approximations to the histogram χ2 kernel,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR '12), pp. 2424–2431, June 2012. View at Publisher · View at Google Scholar · View at Scopus
  52. “Trecvid Multimedia Event Detection Evaluation Plan,” http://www.nist.gov/itl/iad/mig/upload/MED11-EvalPlan-V03-20110801a.pdf.
  53. “Trecvid Multimedia Event Detection Evaluation Plan,” http://www.nist.gov/itl/iad/mig/upload/MED13_Evaluation_Plan_v2.pdf.
  54. C. Y. Liu, H. J. Wang, J. X. Chen, and X. J. Zou, “Research on service-oriented and HLA-based simulation model of juice production line,” in Proceedings of the International Conference on Measuring Technology and Mechatronics Automation (ICMTMA '10), vol. 3, pp. 167–170, Changsha, China, March 2010. View at Publisher · View at Google Scholar · View at Scopus
  55. C. H. Hu, X. H. Chen, M. Wu et al., “A service trust negotiation and access control strategy based on SLA in cloud computing,” Science China Information Sciences, vol. 42, no. 3, pp. 314–332, 2012. View at Google Scholar
  56. C. Y. Liu, S. B. Dong, H. L. Li, B. Lu, and A. Hauptmann, “A TPSAC model and its application to mechanical cloud simulation,” International Journal of Security and Its Applications, vol. 8, no. 1, pp. 45–56, 2014. View at Google Scholar
  57. http://vision.stanford.edu/projects/objectbank/.
  58. D. Hoiem, A. A. Efros, and M. Hebert, “Automatic photo pop-up,” ACM Transactions on Graphics, vol. 24, no. 3, pp. 577–584, 2005. View at Publisher · View at Google Scholar