{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:35:23Z","timestamp":1742913323450,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030578831"},{"type":"electronic","value":"9783030578848"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-57884-8_6","type":"book-chapter","created":{"date-parts":[[2020,8,31]],"date-time":"2020-08-31T13:44:40Z","timestamp":1598881480000},"page":"62-73","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Deep Learning Video Action Recognition Method Based on Key Frame Algorithm"],"prefix":"10.1007","author":[{"given":"Li","family":"Tan","sequence":"first","affiliation":[]},{"given":"Yanyan","family":"Song","sequence":"additional","affiliation":[]},{"given":"Zihao","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Xinyue","family":"Lv","sequence":"additional","affiliation":[]},{"given":"Xu","family":"Dong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,1]]},"reference":[{"issue":"8","key":"6_CR1","first-page":"1650","volume":"14","author":"P Jiang","year":"2009","unstructured":"Jiang, P., Qin, X.L.: Adaptive video key frame extraction based on visual attention model. J. Image Graph. 14(8), 1650\u20131655 (2009)","journal-title":"J. Image Graph."},{"issue":"10","key":"6_CR2","doi-asserted-by":"publisher","first-page":"1006","DOI":"10.1109\/TCSVT.2003.816521","volume":"13","author":"T Liu","year":"2003","unstructured":"Liu, T., Zhang, H.J., Qi, F.: A novel video key-frame-extraction algorithm based on perceived motion energymodel. IEEE Trans. Circuits Syst. Video Technol. 13(10), 1006\u20131013 (2003)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"4","key":"6_CR3","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1016\/S0031-3203(96)00109-4","volume":"30","author":"HJ Zhang","year":"1997","unstructured":"Zhang, H.J., Wu, J., Zhong, D., et al.: An integrated system for content-based video retrieval and browsing. Pattern Recogn. 30(4), 643\u2013658 (1997)","journal-title":"Pattern Recogn."},{"issue":"1","key":"6_CR4","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1016\/j.jvcir.2011.08.005","volume":"23","author":"JL Lai","year":"2012","unstructured":"Lai, J.L., Yi, Y.: Key frame extraction based on visual attention model. J. Vis. Commun. Image Represent. 23(1), 114\u2013125 (2012)","journal-title":"J. Vis. Commun. Image Represent."},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Liu, H., Hao, H.: Key frame extraction based on improved hierarchical clustering algorithm. In: 11th International Conference on IEEE Fuzzy Systems and Knowledge Discovery (FSKD), pp. 793\u2013797 (2014)","DOI":"10.1109\/FSKD.2014.6980938"},{"issue":"1","key":"6_CR6","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/s11042-009-0307-7","volume":"46","author":"M Furini","year":"2010","unstructured":"Furini, M., Geraci, F., Montangero, M., et al.: STIMO: still and moving video storyboard for the web scenario. Multimedia Tools Appl. 46(1), 47 (2010)","journal-title":"Multimedia Tools Appl."},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Zhuang, Y., Rui, Y., Huang, T.S., et al.: Adaptive key frame extraction using unsupervised clustering. In: 1998 International Conference on Image Processing, ICIP 98. Proceedings, vol. 1, pp. 866\u2013870. IEEE (1998)","DOI":"10.1109\/ICIP.1998.723655"},{"issue":"7","key":"6_CR8","doi-asserted-by":"publisher","first-page":"9625","DOI":"10.1007\/s11042-016-3569-x","volume":"76","author":"J Wu","year":"2017","unstructured":"Wu, J., Zhong, S., Jiang, J., et al.: A novel clustering method for static video summarization. Multimedia Tools Appl. 76(7), 9625\u20139641 (2017)","journal-title":"Multimedia Tools Appl."},{"issue":"2","key":"6_CR9","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/s13735-016-0095-6","volume":"5","author":"R Hannane","year":"2016","unstructured":"Hannane, R., Elboushaki, A., Afdel, K., et al.: An efficient method for video shot boundary detection and keyframe extraction using SIFT-point distribution histogram. Int. J. Multimedia Inf. Retrieval 5(2), 89\u2013104 (2016)","journal-title":"Int. J. Multimedia Inf. Retrieval"},{"issue":"6","key":"6_CR10","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/s11128-019-2295-5","volume":"18","author":"S Heidari","year":"2019","unstructured":"Heidari, S., Abutalib, M.M., Alkhambashi, M., Farouk, A., Naseri, M.: A new general model for quantum image histogram (QIH). Quantum Inf. Process. 18(6), 175 (2019)","journal-title":"Quantum Inf. Process."},{"issue":"07","key":"6_CR11","first-page":"134","volume":"40","author":"HQ Hao","year":"2016","unstructured":"Hao, H.Q., Wang, Y.L.: Moving Target Detection Based on Interframe Difference and Pyramid Optical Flow Method[J]. Video Engineering 40(07), 134\u2013138 (2016)","journal-title":"Video Engineering"},{"issue":"10","key":"6_CR12","first-page":"1006","volume":"13","author":"T Liu","year":"2006","unstructured":"Liu, T., Zhang, H.J., Qi, F.: A novel video key-frame-extraction algorithm based on perceived motion energy model. IEEE Trans. Circuits Syst. Video Technol. 13(10), 1006\u20131013 (2006)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"3","key":"6_CR13","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1134\/S1054661817030221","volume":"27","author":"OV Nedzvedz","year":"2017","unstructured":"Nedzvedz, O.V., Ablameyko, S.V., Gurevich, I.B., Yashina, V.V.: A new method for automating the investigation of stem cell populations based on the analysis of the integral optical flow of a video sequence. Pattern Recogn. Image Anal. 27(3), 599\u2013609 (2017). https:\/\/doi.org\/10.1134\/S1054661817030221","journal-title":"Pattern Recogn. Image Anal."},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Verma, N.K., Singh, S.: Generation of future image frames using optical flow (2013)","DOI":"10.1109\/AIPR.2013.6749339"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Chakraborty, S., Tickoo, O., Iyer, R.: Adaptive keyframe selection for video summarization. In: 2015 IEEE Winter Conference on Applications of Computer Vision (WACV), pp. 702\u2013709. IEEE (2015)","DOI":"10.1109\/WACV.2015.99"},{"key":"6_CR16","unstructured":"Li, C., Wu, Y., Yu, S.S., et al.: Motion-focusing key frame extraction and video summarization for lane surveillance system. In: Proceedings of IEEE International Conference on Image Processing, pp. 4329\u20134332 (2010)"},{"issue":"03","key":"6_CR17","first-page":"463","volume":"39","author":"H Zhao","year":"2018","unstructured":"Zhao, H., Xuan, S.B.: Key frame optimization and behavior recognition of human motion video. J. Graph. 39(03), 463\u2013469 (2018)","journal-title":"J. Graph."},{"key":"6_CR18","unstructured":"Simonyan, K., Zisserman, A.: Two-stream convolutional networks for action recognition in videos (2014)"},{"key":"6_CR19","first-page":"1","volume":"99","author":"A Ullah","year":"2017","unstructured":"Ullah, A., Ahmad, J., Muhammad, K., et al.: Action recognition in video sequences using deep bi-directional LSTM with CNN features. IEEE Access 99, 1 (2017)","journal-title":"IEEE Access"},{"issue":"3","key":"6_CR20","doi-asserted-by":"publisher","first-page":"1207","DOI":"10.32604\/cmc.2019.05835","volume":"60","author":"W Shengting","year":"2019","unstructured":"Shengting, W., Liu, Y., Wang, J., Li, Q.: Sentiment analysis method based on kmeans and online transfer learning. Comput. Mater. Continua 60(3), 1207\u20131222 (2019)","journal-title":"Comput. Mater. Continua"},{"issue":"1","key":"6_CR21","doi-asserted-by":"publisher","first-page":"275","DOI":"10.32604\/cmc.2019.03735","volume":"61","author":"T Ling","year":"2019","unstructured":"Ling, T., Chong, L., Jingming, X., Jun, C.: Application of self-organizing feature map neural network based on k-means clustering in network intrusion detection. Comput. Mater. Continua 61(1), 275\u2013288 (2019)","journal-title":"Comput. Mater. Continua"},{"issue":"1","key":"6_CR22","doi-asserted-by":"publisher","first-page":"289","DOI":"10.32604\/cmc.2019.05990","volume":"61","author":"W Xianyu","year":"2019","unstructured":"Xianyu, W., Luo, C., Zhang, Q., Zhou, J., Yang, H., Li, Y.: Text detection and recognition for natural scene images using deep convolutional neural networks. Comput. Mater. Continua 61(1), 289\u2013300 (2019)","journal-title":"Comput. Mater. Continua"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-57884-8_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,12]],"date-time":"2024-08-12T22:06:40Z","timestamp":1723500400000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-57884-8_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030578831","9783030578848"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-57884-8_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"1 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hohhot","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}