{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,17]],"date-time":"2026-05-17T02:07:16Z","timestamp":1778983636597,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,12,14]],"date-time":"2023-12-14T00:00:00Z","timestamp":1702512000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006374","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U21A20515, 62271074, 62171321, 62162044, 52175493, 62071157?32271983, and 61972459"],"award-info":[{"award-number":["U21A20515, 62271074, 62171321, 62162044, 52175493, 62071157?32271983, and 61972459"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"name":"State Key Laboratory of Virtual Reality Technology and Systems","award":["VRLAB2023B01"],"award-info":[{"award-number":["VRLAB2023B01"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,12,14]]},"DOI":"10.1145\/3638884.3638896","type":"proceedings-article","created":{"date-parts":[[2024,4,23]],"date-time":"2024-04-23T12:11:26Z","timestamp":1713874286000},"page":"76-84","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Joint Semantic Graph and Visual Image Retrieval Guided Video Copy Detection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0827-4797","authenticated-orcid":false,"given":"Zhaohui","family":"Zhang","sequence":"first","affiliation":[{"name":"The State Key Laboratory of Multimodal Artificial Intelligence Systems, Institute of Automation, Chinese Academy of Sciences,, China and \rSchool of Artificial Intelligence, University of Chinese Academy of Sciences, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-4823-5220","authenticated-orcid":false,"given":"Xin","family":"Mao","sequence":"additional","affiliation":[{"name":"Beijing Zitiao Network Technology Co., Ltd, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8212-1361","authenticated-orcid":false,"given":"Jiguang","family":"Zhang","sequence":"additional","affiliation":[{"name":"The State Key Laboratory of Multimodal Artificial Intelligence Systems, Institute of Automation, Chinese Academy of Sciences, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3527-8120","authenticated-orcid":false,"given":"Wenke","family":"Lian","sequence":"additional","affiliation":[{"name":"School of Artifical Intelligence, Beijing Unversity of Posts and Telecommunications, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4037-9900","authenticated-orcid":false,"given":"Shibiao","family":"Xu","sequence":"additional","affiliation":[{"name":"School of Artifical Intelligence, Beijing Unversity of Posts and Telecommunications, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0092-6474","authenticated-orcid":false,"given":"Xiaopeng","family":"Zhang","sequence":"additional","affiliation":[{"name":"The State Key Laboratory of Multimodal Artificial Intelligence Systems, Institute of Automation, Chinese Academy of Sciences, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2024,4,23]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"The MD5 message-digest algorithm. No. rfc1321","author":"Rivest Ronald","year":"1992","unstructured":"Rivest, Ronald. The MD5 message-digest algorithm. No. rfc1321. 1992."},{"issue":"2","key":"e_1_3_2_1_2_1","first-page":"363","volume":"95","author":"Preetha S.","year":"2023","unstructured":"Preetha, S., and V. R. Bindu. \"A Wavelet Optimized Video Copy Detection Using Content Fingerprinting.\" Journal of Signal Processing Systems 95, no. 2-3 (2023): 363-377.","journal-title":"\"A Wavelet Optimized Video Copy Detection Using Content Fingerprinting.\" Journal of Signal Processing Systems"},{"key":"e_1_3_2_1_3_1","unstructured":"Ming Z. \"Large scale learning and recognition of faces in web videos.\" IEEE International Conference on Automatic Face & Gesture Recognition IEEE 2008."},{"key":"e_1_3_2_1_4_1","unstructured":"Yin Y. and X. Wang . \"Video Retrieval Based on Video Fingerprint.\" Video Engineering (2014)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Sun F. M. Shi and W. Lin . \"Feature Label Extraction of Online Video.\" IEEE Computer Society(2012).","DOI":"10.1109\/ICCSEE.2012.234"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Franco A. and L. Oliveira . \"A coarse-to-fine deep learning for person re-identification.\" IEEE Winter Conference on Applications of Computer Vision IEEE 2016.","DOI":"10.1109\/WACV.2016.7477677"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Revaud J\u00e9r\u00f4me \"Event retrieval in large video collections with circulant temporal encoding.\" Proceedings of the IEEE conference on computer vision and pattern recognition. 2013.","DOI":"10.1109\/CVPR.2013.318"},{"key":"e_1_3_2_1_8_1","volume-title":"25323-25335","author":"Jia S.","year":"2018","unstructured":"Jia, S. , \"Coarse-to-fine Copy-move Forgery Detection for Video Forensics.\" IEEE Access (2018):25323-25335."},{"key":"e_1_3_2_1_9_1","volume-title":"Application to Similarity of Harmonic Signals.\" 2019 27th European Signal Processing Conference (EUSIPCO)","author":"Yela D. F. , S.","year":"2019","unstructured":"Yela, D. F. , S. Dan , and M. Sandler . \"Spectral Visibility Graphs: Application to Similarity of Harmonic Signals.\" 2019 27th European Signal Processing Conference (EUSIPCO) 2019."},{"key":"e_1_3_2_1_10_1","volume-title":"Cham","author":"Jiang Yu Gang","year":"2014","unstructured":"Jiang, Yu Gang , Y. Jiang , and J. Wang . \"VCDB: A Large-Scale Database for Partial Copy Detection in Videos.\" European Conference on Computer Vision Springer, Cham, 2014."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Wu X. A. G. Hauptmann and C. Ngo . \"Practical elimination of near-duplicates from web video search.\" International Conference on Multimedia 2007.","DOI":"10.1145\/1291233.1291280"},{"key":"e_1_3_2_1_12_1","volume-title":"Fine-Grained Incident Video Retrieval.\" Multimedia","author":"Kordopatis-Zilos G.","year":"2019","unstructured":"Kordopatis-Zilos, G. , \"FIVR: Fine-Grained Incident Video Retrieval.\" Multimedia, IEEE Transactions on (2019)."},{"key":"e_1_3_2_1_13_1","unstructured":"Zhang Z. \"Video copy detection based on Speeded Up Robust Features and Locality Sensitive Hashing.\" IEEE International Conference on Automation & Logistics 0."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Himeur Yassine and K. A. Sadi . \"Robust video copy detection based on ring decomposition based binarized statistical image features and invariant color descriptor (RBSIF-ICD).\" Multimedia Tools and Applications 77.13(2018):17309-17331.","DOI":"10.1007\/s11042-017-5307-4"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Neelima A and K. M. Singh . \"Collusion and rotation resilient video hashing based on scale invariant feature transform.\" Journal of Photographic Science 65.1(2017):62-74.","DOI":"10.1080\/13682199.2016.1260216"},{"key":"e_1_3_2_1_16_1","volume-title":"IEEE International Conference on Image Processing IEEE","author":"Massoudi A.","year":"2007","unstructured":"Massoudi, A. , \"A Video Fingerprint Based on Visual Digest and Local Fingerprints.\" IEEE International Conference on Image Processing IEEE, 2007."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Maani E. S. A. Tsaftaris and A. K. Katsaggelos . \"Local feature extraction for video copy detection in a database.\" 2008 15th IEEE International Conference on Image Processing IEEE 2008.","DOI":"10.1109\/ICIP.2008.4712105"},{"key":"e_1_3_2_1_18_1","volume-title":"1615-1630","author":"Mikolajczyk Krystian","year":"2005","unstructured":"Mikolajczyk, Krystian, and Cordelia Schmid. \"A performance evaluation of local descriptors.\"\u00a0IEEE transactions on pattern analysis and machine intelligence\u00a027.10 (2005): 1615-1630."},{"key":"e_1_3_2_1_19_1","volume-title":"IEEE","author":"Li Jingna","year":"2014","unstructured":"Li, Jingna, \"A robust and low-complexity video fingerprint for multimedia security.\" 2014 International Symposium on Wireless Personal Multimedia Communications (WPMC). IEEE, 2014."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Ozbulak G. F. Kahraman and S. Baykut . \"Robust video copy detection in large-scale TV streams using local features and CFAR based threshold.\" 2016 IEEE International Conference on Digital Signal Processing (DSP) IEEE 2016.","DOI":"10.1109\/ICDSP.2016.7868529"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Lee S C. D. Yoo and T. Kalker . \"Robust Video Fingerprinting Based on Symmetric Pairwise Boosting.\" IEEE Transactions on Circuits & Systems for Video Technology 19.9(2009):1379-1388.","DOI":"10.1109\/TCSVT.2009.2022801"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Bhat D. N. and S. K. Nayar . \"Ordinal measures for image correspondence.\" IEEE Transactions on Pattern Analysis & Machine Intelligence 20.4(1998):415-423.","DOI":"10.1109\/34.677275"},{"key":"e_1_3_2_1_23_1","volume-title":"IEEE","author":"Uchida Yusuke","year":"2010","unstructured":"Uchida, Yusuke, Masayuki Hashimoto, and Ryoichi Kawada. \"Fast and robust content-based copy detection based on quadrant of luminance centroid and adaptive feature comparison.\"\u00a02010 IEEE International Conference on Image Processing. IEEE, 2010."},{"key":"e_1_3_2_1_24_1","first-page":"495","volume":"2015","author":"Himeur Y.","unstructured":"Himeur, Y. , and K. A. Sadi . \"Joint color and texture descriptor using ring decomposition for robust video copy detection in large databases.\" IEEE International Symposium on Signal Processing & Information Technology IEEE Computer Society, 2015:495-500.","journal-title":"IEEE International Symposium on Signal Processing & Information Technology IEEE Computer Society"},{"key":"e_1_3_2_1_25_1","volume-title":"The Effect of Image Depth Size on Authentication Performance.\"\u00a0Journal of Advances in Information Technology\u00a014.3","author":"Saealal Muhammad Salihin","year":"2023","unstructured":"Saealal, Muhammad Salihin, \"Three-Dimensional Convolutional Approaches for the Verification of Deepfake Videos: The Effect of Image Depth Size on Authentication Performance.\"\u00a0Journal of Advances in Information Technology\u00a014.3 (2023)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","unstructured":"HU YAOCONG LU XIAOBO. Learning spatial-temporal features for video copy detection by the combination of CNN and RNN[J]. Journal of visual communication & image representation 2018 55(Aug.):21-29. DOI:10.1016\/j.jvcir.2018.05.013.","DOI":"10.1016\/j.jvcir.2018.05.013"},{"key":"e_1_3_2_1_27_1","volume-title":"Attention-enhanced video copy localization network with flexible supervision.\" Proceedings of the AAAI Conference on Artificial Intelligence","author":"He Sifeng","unstructured":"He, Sifeng, \"TransVCL: Attention-enhanced video copy localization network with flexible supervision.\" Proceedings of the AAAI Conference on Artificial Intelligence. Vol. 37. No. 1. 2023."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Pizzi Ed \"A self-supervised descriptor for image copy detection.\"\u00a0Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 2022.","DOI":"10.1109\/CVPR52688.2022.01413"},{"key":"e_1_3_2_1_29_1","volume-title":"tasks, data, evaluation mechanisms and metrics","author":"Over P.","year":"2008","unstructured":"Over, P. , \"TRECVID 2008 - goals, tasks, data, evaluation mechanisms and metrics.\" (2008)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Li T. \"Efficient video copy detection using multi-modality and dynamic path search.\" Multimedia Systems 22.1(2016):1-11.","DOI":"10.1007\/s00530-014-0387-8"},{"key":"e_1_3_2_1_31_1","volume-title":"A Large-Scale Short Video Dataset for Near-Duplicate Video Retrieval.\" 2019 IEEE\/CVF International Conference on Computer Vision","author":"Jiang Q. Y.","year":"2019","unstructured":"Jiang, Q. Y. , \"SVD: A Large-Scale Short Video Dataset for Near-Duplicate Video Retrieval.\" 2019 IEEE\/CVF International Conference on Computer Vision (ICCV) IEEE, 2019."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"He S. \"A Large-scale Comprehensive Dataset and Copy-overlap Aware Evaluation Protocol for Segment-level Video Copy Detection.\" (2022).","DOI":"10.1109\/CVPR52688.2022.02041"},{"key":"e_1_3_2_1_33_1","unstructured":"Chen Kai \"MMDetection: Open mmlab detection toolbox and benchmark.\"\u00a0arXiv preprint arXiv:1906.07155\u00a0(2019)."},{"key":"e_1_3_2_1_34_1","volume-title":"1389-1401","author":"Prim Robert Clay","year":"1957","unstructured":"Prim, Robert Clay. \"Shortest connection networks and some generalizations.\"\u00a0The Bell System Technical Journal\u00a036.6 (1957): 1389-1401."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Hu Y. and X. Lu . \"Learning Spatial-temporal Features for Video Copy Detection by the Combination of CNN and RNN.\" Journal of Visual Communication and Image Representation 55.AUG.(2018):21-29.","DOI":"10.1016\/j.jvcir.2018.05.013"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Hu Y. and X. Lu . \"Learning Spatial-temporal Features for Video Copy Detection by the Combination of CNN and RNN.\" Journal of Visual Communication and Image Representation 55.AUG.(2018):21-29.","DOI":"10.1016\/j.jvcir.2018.05.013"}],"event":{"name":"ICCIP 2023: 2023 the 9th International Conference on Communication and Information Processing","location":"Lingshui China","acronym":"ICCIP 2023"},"container-title":["Proceedings of the 2023 9th International Conference on Communication and Information Processing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3638884.3638896","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3638884.3638896","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,5,17]],"date-time":"2026-05-17T01:45:50Z","timestamp":1778982350000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3638884.3638896"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,14]]},"references-count":36,"alternative-id":["10.1145\/3638884.3638896","10.1145\/3638884"],"URL":"https:\/\/doi.org\/10.1145\/3638884.3638896","relation":{},"subject":[],"published":{"date-parts":[[2023,12,14]]},"assertion":[{"value":"2024-04-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}