2021
DOI: 10.1109/jsen.2021.3081351
|View full text |Cite
|
Sign up to set email alerts
|

An Adaptive Video Acquisition Scheme for Object Tracking and Its Performance Optimization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 67 publications
0
3
0
Order By: Relevance
“…Various methodologies are being introduced, considering different forms of use cases. The work carried out by Banerjee et al [56] has developed a hardware design of architecture for the acquisition of Video. The study model uses dynamic programming towards the reduction of normalized area for the allocation of resources.…”
Section: Miscellaneous Approachesmentioning
confidence: 99%
See 1 more Smart Citation
“…Various methodologies are being introduced, considering different forms of use cases. The work carried out by Banerjee et al [56] has developed a hardware design of architecture for the acquisition of Video. The study model uses dynamic programming towards the reduction of normalized area for the allocation of resources.…”
Section: Miscellaneous Approachesmentioning
confidence: 99%
“…Some of the significant approaches noted for this approach are adaptive frame-based tracking [110][111], construction of forward and backward trackers [112], adoption of refinement network for integrated Detection and tracking [113], and convolution network-based tracking [114]. Apart from the above-mentioned evolving trends of approaches, there are also miscellaneous methods [56]- [66]. The analysis of this approach is further carried out from the perspective of timebased evolution.…”
Section: Research Trend Analysismentioning
confidence: 99%
“…Current digital multimedia forensic techniques can be divided into two main categories: active forensics and passive forensics. Active forensics refers to the use of information hiding technology, which embeds imperceptible verification information, such as digital watermark, digital signature, and perceptual hashing, in the process of image or video generation in advance [15]. The party receiving the image or video determines the reliability of the received data by analyzing whether this embedded information has been corrupted.…”
Section: Big Data Processing Analysis Of Athletics' Video Imagesmentioning
confidence: 99%