Computer Science ›› 2019, Vol. 46 ›› Issue (2): 271-278.doi: 10.11896/j.issn.1002-137X.2019.02.042

• Graphics ,Image & Pattern Recognition • Previous Articles     Next Articles

Shot Boundary Detection Method Based on HEVC Compressed Domain

ZHU Wei1, SHANG Ming-jiang1, RONG Yi1, FENG Jie2   

  1. College of Information Engineering,Zhejiang University of Technology,Hangzhou 310023,China1
    School of Information Science and Technology,Zhejiang Sci-Tech University,Hangzhou 310018,China2
  • Received:2018-06-06 Online:2019-02-25 Published:2019-02-25

Abstract: Shot boundary detection is an important part of intelligent video retrieval.The existing detection methods are mainly processed in pixel domain,with low accuracy of cut and high computational complexity.To solve these problems,this paper used the encoding information obtained by parsing HEVC stream and proposesd a shot boundary detection method based on HEVC compressed domain.First,the number of PUs with different prediction modes is counted for each frame,and the motion vectors are filtered according to CU depth.Then,the two-stage candidate frame of cut is selected by using the PU prediction modes,the motion vectors and the number of frame bits.And then,the cut shot detection of adaptive threshold is performed.After that,the video is segmented according to the cut frame.In addition,the smooth filtering is carried out for the frame bits in the time domain.Finally,the PU prediction modes and the number of smoothed frame bits are used to detect the gradual shot detection.The experimental results show that the proposed method has a good effect on shot boundary detection with lower computational complexity.

Key words: Shot boundary detection, HEVC, Compressed domain, Prediction mode

CLC Number: 

  • TP391
[1]DAI K X,LI Q,LI G H.Prospects and current studies on video mining[J].Computer Science,2010,37(10):11-15.(in Chinese)
[2]SHEN R K,LIN Y N,JUANG T T,et al.Automatic detection of video shot boundary in social media using a hybrid approach of HLFPN and keypoint matching[J].IEEE Transactions on Computational Social Systems,2018,5(1):210-219.
[3]ALI M,ADNAN A.Short boundary detection using spatial-temporal features[J].Advances in Intelligent Systems and Computing,2016,448:971-981.
[4]SANTOS A C S,PEDRINI H.Shot boundary detection for video temporal segmentation based on the weber local descriptor[C]∥IEEE International Conference on Systems,Man,and Cyberne-tics.IEEE,2017:1310-1315.
[5]LI J Q,PAN Q K,LIANG Y C.Shot change detection on news videos using color histogram and edge based approaches[C]∥ IEEE International Conference on Advances in Computer Applications.IEEE,2016:50-54.
[6]PENG T L,ZHANG W J,WANG Y B,et al.Video shot boun- dary detection algorithm based on multi-features[J].Chinese Journal of Scientific Instrument,2015,36(9):2013-2020.(in Chinese)
[7]QU Z,GAO T F,ZHANG Q Q.Study on an improved algorithm of video keyframe extraction[J].Computer Science,2012,39(8):300-303.(in Chinese)
[8]ZHONG X,YANG G,LU Y S.Method of key frames extraction based on double-threshold values sliding window sub-shot segmentation and fully connected graph[J].Computer Science,2016,43(6):289-293.(in Chinese)
[9]LU Z M,SHI Y.Fast video shot boundary detection based on SVD and pattern matching[J].IEEE Transactions on Image Processing,2013,22(12):5136-5145.
[10]LAKSHMI P G G,DOMNIC S.Walsh-hadamard transform kernel-based feature vector for shot boundary detection[J].IEEE Transactions on Image Processing,2014,23(12):5187-5197.
[11]TIPPAYA S,SITJONGSATAPORN S,TAN T,et al.Multi- Modal Visual Features-Based Video Shot Boundary Detection[J].IEEE Access,2017,5:12563-12575.
[12]MONDAL J,KUNDU M K,DAS S,et al.Video shot boundary detection using multiscale geometric analysis of nsct and least squares support vector machine[J].Multimedia Tools and Applications,2018,77(7):8139-8161.
[13]JIAN M,YIN Y,DONG J.Relative Flow Estimates for Shot Boundary Detection[J].Pattern Recognition and Image Analysis,2018,28(1):53-58.
[14]YANG Z,LI C.Gradual shot detection employing automatic white balance method[C]∥ ACM International Conference on Multimedia Systems and Signal Processing.ACM,2018:71-74.
[15]SULLIVAN G J,OHM J,HAN W J,et al.Overview of the high efficiency video coding (HEVC) standard[J].IEEE Transactions on Circuits & Systems for Video Technology,2012,22(12):1649-1668.
[16]GONG S R,FAN Y J,ZHOU X.A novel scene change detection algorithm on H.264/AVC[J].Journal of Chinese Computer Systems,2007,28(4):688-691.(in Chinese)
[17]XIA D Y,XIE H L.Shot boundary detection based on H.264/ AVC compressed domain[J].Journal of Image and Graphics,2009,14(12):2595-2598.(in Chinese)
[18]LIU Y,WANG W,GAO W,et al.A novel compressed domain shot segmentation algorithm on H.264/AVC[C]∥ IEEE International Conference on Image Processing.IEEE,2004:2235-2238.
[19]ZHANG W,WANG Y,JIANG X.A shot segmentation algo- rithm for H.264 compressed videos[C]∥ IEEE International Congress on Image and Signal Processing.IEEE,2013:81-85.
[20]ZHANG W,WANG Y,JIANG X.A compressed-domain method of shot segmentation for X264 videos[C]∥ IEEE International Conference on Natural Computation.IEEE,2014:868-872.
[21]YOU Y X,ZHANG E D,GOU Z J.Shot boundary detection using Biased-SVM in H.264 compressed domain[J].Computer Engineering and Applications,2013,49(24):138-143.(in Chinese)
[22]ZHANG Q M.Video shot boundary detection based on MB co- ding mode and SIFT features on H.264/AVC[C]∥ IEEE International Conference on Progress in Informatics and Computing.IEEE,2014:299-302.
[1] WU Fa-you, WANG Lin-feng, WENG Qi-neng. Application of Grey Prediction Model in Prediction of Stability of Wedge-shaped Body of Tunnel [J]. Computer Science, 2019, 46(5): 327-330.
[2] XU Jing-yao, WANG Zu-lin, XU Mai. Deep Learning Based Fast VideoTranscoding Algorithm [J]. Computer Science, 2019, 46(3): 113-118.
[3] GUO Hong-wei, LUO Hong-jun, LIU Shuai, NIU Lin, YANG Bo. Improved R-λ Model Based Rate Control Algorithm [J]. Computer Science, 2019, 46(3): 142-147.
[4] XU Fang, DENG Min, XIONG Zeng-gang, YE Cong-huan, XU Ning. Data Forwarding Algorithm Based on Multidimensional Context Matching in Mobile Social Networks [J]. Computer Science, 2019, 46(2): 81-87.
[5] ZHU Wei, YI Yao, WANG Tu-qiang, ZHENG Ya-yu. Fast Coding Unit Partition Algorithm for Depth Maps [J]. Computer Science, 2019, 46(10): 286-294.
[6] SHI Xiao-wan, MA Yu-tao. Software Bug Triaging Method Based on Text Classification and Developer Rating [J]. Computer Science, 2018, 45(11): 193-198,219.
[7] SHAN Na-na, ZHOU Wei and DUAN Zhe-min. Improved Entropy Coding Algorithm for Transform Coefficients in HEVC [J]. Computer Science, 2017, 44(6): 290-293, 321.
[8] WEN Run and TAN Li. Short-term Power Forecasting for Photovoltaic Generation Based on HS-ESN [J]. Computer Science, 2017, 44(6): 226-231, 265.
[9] YANG Dong-ju and DENG Chong-bin. Dynamic Scheduling Method of Virtual Resources Based on ARIMA Model [J]. Computer Science, 2017, 44(10): 14-18, 44.
[10] MENG Zhi-qing, MA Ke and ZHENG Ying. Forecasting Method for Fashion Clothing Demand Based on Kernel Functions Technology [J]. Computer Science, 2016, 43(Z11): 455-460, 465.
[11] LI Kun, CHAI Yu-mei, ZHAO Hong-ling, ZHAO Yue-shu and NAN Xiao-fei. Estimation of Fetal Weight Based on Deep Neural Network [J]. Computer Science, 2016, 43(Z11): 73-76, 82.
[12] ZHOU Wen-jie, YANG Lu and YAN Jian-feng. Big Data-driven Complaint Prediction Model [J]. Computer Science, 2016, 43(7): 217-223.
[13] ZHAO Lei and HUANG Hua. Compressed Domain Synopsis Research in AVS Surveillance Profile [J]. Computer Science, 2016, 43(7): 46-50.
[14] CEN Yue-feng, WANG Wan-liang, YAO Xin-wei, WANG Chao-chao and PAN Tie-qiang. Decision Tree Based Coding Unit Splitting Algorithm for HEVC [J]. Computer Science, 2016, 43(4): 308-312.
[15] LIANG Hong-tao, XU Jian-liang and XU Ke. Software Reliability Prediction Model Based on Hybrid Kernels RVM [J]. Computer Science, 2016, 43(11): 257-259.
Full text



[1] . [J]. Computer Science, 2018, 1(1): 1 .
[2] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[3] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[4] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[5] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[6] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[7] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[8] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[9] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[10] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .