You are on page 1of 33

Abstract

The process of repairing the damaged area or to remove the specic areas in a video is known as video inpainting. To deal with this kind of problems, not only a robust image inpainting algorithm is used, but also a technique of structure generation is used to ll-in the missing parts of a video sequence taken from a static camera. Most of the automatic techniques of video inpainting are computationally intensive and unable to repair large holes. To overcome this problem, inpainting method is extended by incorporating the sparsity of natural image patches in the spatio-temporal domain is proposed in this paper. First, the video is rst converted into individual image frames. Second, the edges of the object to be removed are identied by the SOBEL edge detection method. Third, the inpainting procedure is performed separately for each time frame of the images. Next, the inpainted image frames are displayed in a sequence, so that it appears as a video. For each image frame, the condence of a patch located at the image structure (e.g., the corner or edge) is measured by the sparseness of its nonzero similarities to the neighboring patches to calculate the patch structure sparsity. The patch with larger structure sparsity is assigned higher priority for further inpainting. The patch to be inpainted is represented by the sparse linear combination of candidate patches. Patch propagation is performed by the algorithm automatically by inwardly propagating the image patches from the source region into the interior of the target region by means of patch by patch. Compared to other methods of inpainting, a better discrimination of texture and structure is obtained by the structure sparsity and also sharp inpainted regions are obtained by the patch sparse representation. This work can be extended to wide areas of applications, including video special eects and restoration and enhancement of damaged videos.

Chapter 1 INRODUCTION
1.1 Need
In recent years, transforming cultural and historical artifacts such as photographs and vintage lms/videos into digital format has become an important trend. However, because of their age, the visual quality of such images and videos after digitization is usually very poor and often contain unstable luminance and damaged content. Video enhancement techniques widely used to restore the visual content of vintage lms include video denoising, video stabilization , and video inpainting. Video inpainting, one of the most challenging techniques, helps users remove undesirable objects and repair areas where content is missing or damaged. To deal with image inpainting problems, initially focus was on removing or repairing small regions of an image using interpolation or smoothing techniques. Subsequently,more powerful methods were developed to perform image inpainting on large continuous areas. Video inpainting is the method by which the noisy or damaged frames are extracted from the video and those frames are replaced by the new frames. Thus video inpainting removes the damaged frame from the video and nally gives the good quality video as output.

1.2 Need for the system development:


In today's world the video les are important part, since dierent elds uses this video for the storage and also to pass the data or information. There are dierent elds like education, movie, security, nance, astronomy and many more in which the information or details are stored in the form of the video. So these information is used in day to day life in the form of the video. So to store or to pass the information we should keep the video le safe. But as the information in the video is digitized, so after period passes this digitized information may get damaged. Since the digitized data is in the form of the frames, these frames may get damaged. So it will degrade the quality of the video. Thus we need `Video Inpainting' method to nd damaged frames in the video and nally add the missing parts in the form of scratches frames in the

video. So this increases the quality of the video. And we get the video having good quality.

1.3 Aim And objective:


Video Inpainting is used for lm restoration; to reverse the deterioration (e.g., cracks in video or scratches and dust spots in lm).It is also used for removing red-eye, the stamped date from videos and removing objects to creative eect. This technique can be used to replace the lost data in the coding and transmission of videos, for example, in a streaming video. It can also be used to remove logos in video . Inpainting is the process of reconstructing lost or deteriorated parts of images and videos. For instance, in the case of a valuable painting, this task would be carried out by a skilled image restoration artist. In the digital world, inpainting (also known as image interpolation or video interpolation) refers to the application of sophisticated algorithms to replace lost or corrupted parts of the image data (mainly small regions or to remove little defects). Modules :

Video Extraction. Video Reconstruction. VIDEO INPAINTING by using patch NNF Technique. Frame Completion.

Aim of our project is:

To restore the video quality. To remove the scratches from videos. To enhance & improve video quality.

1.4 Safety Requirements:


The data handled in the system is very vital. The server should always be conrmed to run properly and the data are saved to the database at consecutive intervals. Power is a signicant feature and the power supply should be always taken care of. An Uninterrupted Power Supply is always recommended.

1.5 Security Requirements:


The security system features from having a login for all the users to access the software. The login details are encrypted will be used in the system also. So the chances of the software getting intruded are very less.

1.6 Risk Management:


1.6.1 Risk Identication:
Our development team identied 20 potential risks to the project. These risks were analyzed and were classied into various categories depending upon the threat they posed to the project. Some of these risks were 'generic risks' while others were `product specic risks'. A considerable amount of time was spent in analyzing the product specic risks.

1.6.2 Risk Analysis:


We analyzed all the risks individually and we came up with a classication of risks on the basis of their impact on project schedule. These risks were rated as follows:

Catastrophic Critical Marginal Negligible

1.7 Applications:

In photography and cinema, is used for lm restoration; to reverse the deterioration (e.g., cracks in photographs or scratches and dust spots in lm; see infrared cleaning).

It is also used for removing red-eye, the stamped date from photographs and removing objects to creative eect. This technique can be used to replace the lost blocks in the coding and transmission of images, for example, in a streaming video. It can also be used to remove logos in videos.

Chapter 2 LITERATURE SURVEY


2.1 Basis Of Project Idea:
To deal with image inpainting problems, researchers initially focused on removing or repairing small regions of an image using interpolation or smoothing techniques. Subsequently, more powerful methods were developed to perform image inpainting on large continuous areas. For example we propose an exemplar-based approach for repairing large continuous areas and obtained a reasonably good quality image inpainting eect. The approach takes a block as the basic unit and utilizes the concepts of priority maps and condence levels to guide the inpainting process. A block with a higher condence value indicates a lower degree of damage, so the block has a higher priority in the inpainting process. Textural information is then propagated from the surrounding areas to repair damaged regions. In posited that most natural or articial objects can be described approximately by some representative curves. In other words, the salient regions of an image can be sketched before their textural characteristics are introduced. The algorithm produces excellent inpainting results by drawing a few simple representative curves. In recent years, researchers have extended these well-developed image inpainting techniques to the repair of videos. An intuitive approach involves applying image inpainting techniques to each video frame so that the completed frames are visually pleasing when viewed individually. However, this approach neglects the issue of continuity across consecutive frames, so the quality of the resulting video is usually unsatisfactory. To resolve the problem, both spatial (intra-frame) and temporal (inter-frame) continuity must be considered in a video inpainting process. Video inpainting has become more popular because of its potential applications in our daily life. We proposed an ecient video object inpainting algorithm to inpaint partially and completely occluded objects and their algorithm can maintain motion consistency by using sliding window registration and dynamic programming extended the image inpainting concept proposed in to deal with digital videos. This approach rst separates the background and foreground of a video and then generates the corresponding optical-ow mosaics. After inpainting the background of the video sequence, holes in the foreground are lled with patches extracted from adjacent frames directly by a texture syn-

thesis process. The method has limited applicability because it only works well under certain types of constrained camera motion used a graph cut algorithm to divide a video sequence into multiple layers based on the motion in each layer. Each layer is then inpainted by applying the proposed image inpainting algorithms. The drawback of this approach is that temporal consistency is not addressed. In Kokaram and Godisll employed a 3-D autoregressive model to detect and reconstruct missing video data. The method uses an interpolation technique instead of patch duplication. Only small missing regions can be repaired and the issue of maintaining temporal consistency is not addressed. proposed a two-phase sampling and alignment video inpainting approach that predicts motion in the foreground before repairing damaged foreground areas and adopted an image inpainting technique to repair damaged areas of separated background. Subsequently, they extended their algorithm to handle situations with varying illumination. The illumination mask used in regulates the intensity of inpainted frames until it is similar to the original video. However, intensity ickers are viewed as visual defects in vintage lms. Therefore, when we do inpainting on damaged vintage lms, we not only recover the missing content but also stabilize the intensity change across consecutive frames. The objective of the above-mentioned moves is to guarantee the recovery of visually pleasing results. videos. Most of the above-mentioned algorithms discussed the use of image inpainting techniques to repair damaged background areas in However, if the damaged areas are too large, visual defects are still evident in the resulting videos.

2.2 Proposed Optimizing:


To address this problem, proposed optimizing the patch search process at different resolution levels. of the same video. expensive. Holes in a frame are lled using dierent portions Although the inpainting process yields high-quality re-

sults in small-sized videos,the method is time consuming and computationally Moreover, information about the missing content in every video frame must be provided in advance. In proposed to construct motion manifolds of space-time volume and apply structure propagation methods to recover the missing portions of foreground object and background and maintain spatiotemporal continuity. Although the output is acceptable, the method does not work well when the missing portions of a space-time volume are large. proposed to complete a damaged video by transferring motion elds sampled from other portions of the video. The limitation of this method is that it works only on stationary video and may easily cause over-smoothing artifacts. In a previous work , we proposed a video inpainting algorithm that segments a video into an intrinsic motion layer (created by the video camera) and an extrinsic motion layer (created by the moving object) and then removes the selected areas from dierent layers. The limitation of this method is that it can only handle videos that have consistent luminance and are recorded under stable camera motions such as panning. Because restoration of digitized vintage lms is an important application area, researchers have also developed video

enhancement techniques especially for vintage lms. proposed a line scratch detection and removal algorithm. Although the line scratch method is very ecient, the authors only use an image interpolation method to repair damaged content. In used temporal coherence analysis to detect scratches in video images. Both methods can only deal with small regions around defects. proposed using spatiotemporal analysis techniques to repair single frame defects, but they neglected the issue of maintaining temporal continuity.

Chapter 3 PROJECT STATEMENT


3.1 Problem Denition:
Video has the data stored in the digitized form. As period passes on this digitized data may get damaged. So the quality of the video degrades. So to restore this video quality, there are many methods by which we can achieve the quality of the video. These methods are as video denoising video stabilization. Though these techniques achieve or restore the quality of the video, there are many problems and issues which need to be considered. All these methods have the average result for individual frame but as there are continuous frames then in that case the quality of these techniques giving the output video degrades.Also these techniques have to be considered the dierent issues. Since these techniques belongs to the video, so in this case its dicult to achieve the quality as the techniques deals with the video frames.

3.2 Solution:
As there are many problems with the existing system as mentioned above, So to remove all the drawbacks of the system, there is Video inpainting method in which the focus is done on the frames, instead of focusing on the whole video. In this technique, the frames are extracted from the video. From the video missing frames are analyzed and nally new frames are created and these new frames are added to the existing video.Thus the technique increases the quality of the video. There are powerful methods were developed to perform image inpainting on large continuous areas.

3.3 Advantages:

Reconstructing the Video better. Frame completion repairs damaged frame in the form of scratches to produce a visually pleasant video with good spatial continuity and stabilized luminance.

Improves Quality.

3.4 Disadvantages:

It only recovers video with small amount of damaged frames. Works only for Uncompressed AVI Video File.

Chapter 4 SYSTEM DEVELOPMENT


4.1 System Architecture:

Figure 4.1: Video Inpainting Architecture

In our experiments, we found that when using existing video inpainting techniques to repair old lms or remove undesirable objects, the unstable luminance and poor quality of the original lm frequently cause visible defects in the resulting video. As a result, we believe a new approach is needed to tackle the challenges presented by old lms as well as by modern digital videos. To this end, we propose a video inpainting algorithm that can address those challenges and produce visually pleasing results. When inpainting severely damaged videos, we begin by lling gaps in the temporal information to help the inpainting process obtain more reference data from the whole video sequence. Our proposed video inpainting algorithm involves two key steps: motion completion and frame completion. The rst step, motion completion, tries to replace missing motion information to help the inpainting process obtain reliable reference data. The second step, frame completion, maintains the spatial continuity of the referenced content before it is pasted onto the corresponding missing area. This step is especially important when the luminance in

old lms is unstable.

Fig.

1 shows some examples of using existing video In Fig. 1(a), the rst and last frames

inpainting methods applying image inpainting-related techniques to inpaint a severely damaged video sequence. contain undamaged reference information. However, without accurate motion information, the inpainting process can only use information derived from the current and/or neighboring frames to repair missing areas. The example shows how relying on spatial information from a single frame may result in poor inpainting results. Fig. 1(b) shows how, with complete motion information, the inpainting process can extract undamaged information from the entire video sequence and nd reliable reference data to repair missing areas. In addition, experiment results demonstrate motion completion also signicantly improves the temporal continuity of the nal result. Fig. 2 presents our proposed motion map construcframework, which is comprised of three procedures:

tion, motion completion, and frame completion. Motion map construction is a preprocessing procedure. We begin by manually labeling damaged areas in vintage lms to divide each succeeding video frame into a damaged layer and a background layer. The former shows the missing area and the latter shows the rest of the video content. Next, we estimate the motion information located in the background layer to construct a motion map for each frame. These maps form the basis of our video inpainting process and are used to replace the missing motion information in the motion completion procedure. Finally, the frame completion procedure uses a patch adjustment mechanism to paste data from neighboring or current frame onto the missing areas indicated in the damaged layer. The remainder of this paper is organized as follows. Section II describes the construction of the motion map. Section III presents the proposed video inpainting algorithm. Section IV details the experiment results and Section V contains concluding remarks.

4.2 Data Flow Diagram:


Data Flow Diagram is a graphical representation that depicts information ow and the transformation that are applied as data ow from input to output.

10

4.2.1 Level 0:

Figure 4.2: Data Flow Diagram-Level 0.

An information moves through the software, it is modied by a series of transformation. A data ow diagram is a graphical technique that depicts information ow and transform that are applied as data moves from input to output. Data ow diagram may be used to represent a system or software at any level of abstraction. DFD may be into levels that represent increasing informaThis is called as tional ow and functional details. Therefore DFD provides a mechanism for functional modeling as well as information ow modeling. a single bubble with input and output data. Fundamental/ context level DFD. It represents the entire software element as

11

4.2.2 Level 1:

Figure 4.3: Data Flow Diagram-Level 1.

In this level there is a detail description of the software where the entire software is represented by 2/3 or more bubbles.

4.3 Java:
An edition of the Java platform is the name for a bundle of related programs, or platform, from Sun which allow for developing and running programs written in the Java programming language. The platform is not specic to any one processor or operating system, but rather an execution engine (called a virtual machine) and a compiler with a set of standard libraries that are implemented for various hardware and operating systems so that Java programs can run identically on all of them. The heart of the Java Platform is the concept of a "virtual machine" that executes Java byte code programs. This byte code is

12

the same no matter what hardware or operating system the program is running under. There is a JIT compiler within the Java Virtual Machine, or JVM. The JIT compiler translates the Java byte code into native processor instructions at run-time and caches the native code in memory during execution. The use of byte code as an intermediate language permits Java programs to run on any platform that has a virtual machine available. The use of a JIT compiler means that Java applications, after a short delay during loading and once they have "warmed up" by being all or mostly JIT-compiled, tend to run about as fast as native programs. Since JRE version 1.2, Sun's JVM implementation has included a just-in-time compiler instead of an interpreter. Although Java programs are platform independent, the code of the Java Virtual Machine (JVM) that execute these programs is not; every supported operating platform has its own JVM.

4.4 Swing:
Swing is a widget toolkit for Java. It is part of Sun Microsystems' Java Foundation Classes (JFC)  an API for providing a graphical user interface (GUI) for Java programs. Swing was developed to provide a more sophisticated set of GUI components than the earlier Abstract Window Toolkit. Swing provides a native look and feel that emulates the look and feel of several platforms, and also supports a pluggable look and feel that allows applications to have a look and feel unrelated to the underlying platform.

13

Chapter 5 SYSTEM REQUIREMENTS AND SPECIFICATION


5.1 Software Requirement
Tools Design Tool Development Tool Development Platform Others Software Rational rose Netbeans Windows Latex Windows XP Word XP / 2007 Windows XP Word 2007 Minimum 2000e Recommended 2000e

Table 5.1: Software Requirement

5.2 Hardware Requirement


Requirements Processor RAM HDD Specication 4 or ICore Machine 2 GB 80 GB Table 5.2: Hardware Requirement

5.3 System Features:


Requirement ID Requirement Category Requirement Importance Requirement Description Priority Diculty Table 5.3: System Features. 1 To provide a system this will give access to User Login. Mandatory This is an actual task intended. Highest High

14

Requirement ID Requirement Category Requirement Importance Requirement Description Method of validation/verication Priority Diculty Table 5.4: System Features.

Video Extra

Mandato It is for user task. The user inputs an uncompressed AVI

Highest High

5.4 Software Quality Attributes:


5.4.1 Reliability:
The system will be designed with reliability as key feature.The system is guaranteed of providing the services to user according to his login information. This system is guaranteed to be reliable with maximum time.

5.4.2 Maintainability:
The system will be developed using the standard software development conventions to help in easy review and redesigning of the system. The system will be backed up by a full edge documentation of the product which is available online as well as free to download.

5.4.3 Availability:
The system is available on demand.

5.4.4 Supportability:
The current system is able to support only Uncompressed AVI Video Files.

5.5 Design and Implementation Constraints:


Time:The total time for overall project completion undergoing various phases of development is given as eight months (approx.). Early EVM research showed that the areas of planning and control are signicantly impacted by its use; and similarly, using the methodology improves both scope denition as well as the analysis of overall project performance. More recent research studies have shown that the principles of EVM are positive predictors of project success. Eorts:Since the characteristics of each project dictate the distribution of eorts, 35% of the eorts is spent on Analysis and Design, a similar amount on testing. Coding about 30% of the eorts. Cost: The cost of the project is calculated in terms of the eort applied and the resources used. The other parameters that account for cost estimation are -Man/Month -Technology used

15

-Benets -Machine cost A project is a temporary endeavor with a dened beginning and end (usually time-constrained, and often constrained by funding or deliverables), undertaken to meet unique goals and objectives,[2] typically to bring about benecial change or added value. repetitive, permanent. The temporary nature of projects stands in contrast with business as usual (or operations), which are

5.6 Performance Requirements:


Inpainting programs are supposed to serve multiple frames simultaneously. Loads vary and so do requests per User. Taking that into consideration, the performance parameters of the Software include the following: number and type of frames requests per second; latency time, measuring in milliseconds how long it takes to complete each new Inpainting process; or the amount of data transmitted processed in response to a request measured in bytes per second. This depends on, among other things, Video le size and available Performance is also determined by the scratch If a frame has high number of scratches then the Computer RAM also play a major role in System RAM performance. level in a given Frame.

system may take some more time. Video Size matters a lot as it may degrade the Video Extratction process. System performance. The system may nd out of memory in time if less RAM compared to Video Frames Numbers.

16

Chapter 6 Project System Diagram


6.1 Use Case Diagram:

Figure 6.1: Use Case Diagram

17

6.2 Class Model:

Figure 6.2: Class Diagram

18

6.3 Activity Diagram

Figure 6.3: Activity Diagram

19

6.4 Package Diagram:

Figure 6.4: Package Diagram

20

6.5 Component Model Diagram:

Figure 6.5: Component Model Diagram

21

6.6 State Diagram:

Figure 6.6: State Diagram

22

6.7 Communication Diagram:

Figure 6.7: Communication Diagram

23

Chapter 7 Planning And Scheduling


7.1 Technical:
Technical analysis begins with an assessment of the technical viability of the proposed system. In this study we made an analysis on what technologies can be used to accomplish system function and performance? And we found that java are most suitable for the project as java is open source software and moreover it is platform independent so the organization have got a choice if they want to shift from windows to any other operating system.

7.2 Financial:
The nancial investment is very less for creating this application. All the software's to be used such as Net Beans, Microsoft SQL server are available on the internet as an open source. So there is no problem regarding the nancial feasibility of the project.

7.3 Operational:
The project being developed is very useful in remote areas or at accidental places where we don't about that place but we can nd our friends or relatives, if software should be installed on their mobile and he/she should have knowledge about it.

24

7.4 Diagramatic View:

Figure 7.1: Diagramatic View

25

CONCLUSION
We have proposed a novel video inpainting algorithm for digitized aged lms. The algorithm consists frame completion. In addition, a preprocessing procedure constructs a motion map to record the motion information in undamaged source areas. The motion completion procedure restores the motion in each missing area based on the completion order determined by the priority computation step. The completed motion map is used to improve the temporal continuity and nd the best-matched result for inpainting damaged areas. The frame completion procedure seamlessly repairs all the damaged areas and reduces the intensity of video icker. During the frame completion phase, we use a panoramic mosaic to help stabilize the global and local luminance and thereby obtain better restored videos.

26

REFERENCES
[1] J. Bergen, P. Anandan, K. Hanna, and R. Hingorani,  Hierarchical modelbased motion estimation, in Proc. 2nd Eur. Conf. Computer Vision, 1992, pp. 237252. [2] A. M. Huang and T. Nguyen,  Correlation-based motion processing with adaptive interpolation scheme for motion-compensated frame interpolation, IEEE Trans. Image Process., vol. 18, no. 4, pp. 740752, Apr. 2009. [3] P. Angin, B. Bhargava, R. Ranchal, N. Singh, L. Ben Othmane, L. Lilien, and M. Linderman , A User-Centric Approach for Privacy and Identity Management in Cloud Computing, Proc. 29th IEEE Intl. Symp. on Reliable Distributed Systems (SRDS), New Delhi , India, Nov. 2010. [4] K. M. Gullu, O. Urhan, and S. Erturk,  Scratch detection via tempora coherency analysis, in Proc. 2006 IEEE Int. Symp. Circuits and Systems,2006.OpenID Foundation Website, accessed in Aug. 2010. [5]Y. Shen, F. Lu, X. -C. Cao, and H. Foroosh,  Video completion for perspective camera under constrained motion, in Proc. Int. Conf. Pattern Recognition, 2006, pp. 6366.

27

Contents
1 INRODUCTION
1.1 1.2 1.3 1.4 1.5 1.6 Need . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Need for the system development: . . . . . . . . . . . . . . . . . Aim And objective: . . . . . . . . . . . . . . . . . . . . . . . . . Safety Requirements: . . . . . . . . . . . . . . . . . . . . . . . . Security Requirements: . . . . . . . . . . . . . . . . . . . . . . . Risk Management: 1.6.1 1.6.2 1.7 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Risk Identication:

1
1 1 2 2 2 3 3 3 3

Risk Analysis: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Applications:

2 LITERATURE SURVEY
2.1 2.2 Basis Of Project Idea: . . . . . . . . . . . . . . . . . . . . . . . Proposed Optimizing: . . . . . . . . . . . . . . . . . . . . . . . .

4
4 5

3 PROJECT STATEMENT
3.1 3.2 3.3 3.4 Problem Denition: . . . . . . . . . . . . . . . . . . . . . . . . . Solution: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Advantages: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Disadvantages: . . . . . . . . . . . . . . . . . . . . . . . . . . .

7
7 7 7 8

4 SYSTEM DEVELOPMENT
4.1 4.2 System Architecture: . . . . . . . . . . . . . . . . . . . . . . . . Data Flow Diagram: 4.2.1 4.2.2 4.3 4.4 Level 0: Level 1: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

9
9 10 11 12 12 13

Java: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Swing: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

5 SYSTEM REQUIREMENTS AND SPECIFICATION


5.1 5.2 5.3 5.4 Software Requirement System Features: 5.4.1 5.4.2 5.4.3 . . . . . . . . . . . . . . . . . . . . . . . Hardware Requirement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Software Quality Attributes: . . . . . . . . . . . . . . . . . . . . Reliability: . . . . . . . . . . . . . . . . . . . . . . . . . . Maintainability: . . . . . . . . . . . . . . . . . . . . . . . Availability: . . . . . . . . . . . . . . . . . . . . . . . . .

14
14 14 14 15 15 15 15

28

5.4.4 5.5 5.6

Supportability:

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

15 15 16

Design and Implementation Constraints: Performance Requirements:

6 Project System Diagram


6.1 6.2 6.3 6.4 6.5 6.6 6.7 Use Case Diagram: . . . . . . . . . . . . . . . . . . . . . . . . . Class Model: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Activity Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . Package Diagram: . . . . . . . . . . . . . . . . . . . . . . . . . . Component Model Diagram: . . . . . . . . . . . . . . . . . . . . State Diagram: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Communication Diagram:

17
17 18 19 20 21 22 23

7 Planning And Scheduling


7.1 7.2 7.3 7.4 Technical: Financial: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Operational: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Diagramatic View:

24
24 24 24 25

29

List of Figures
4.1 4.2 4.3 6.1 6.2 6.3 6.4 6.5 6.6 6.7 7.1 Video Inpainting Architecture . . . . . . . . . . . . . . . . . . . Data Flow Diagram-Level 0. . . . . . . . . . . . . . . . . . . . . Data Flow Diagram-Level 1. . . . . . . . . . . . . . . . . . . . . Use Case Diagram . . . . . . . . . . . . . . . . . . . . . . . . . 9 11 12 17 18 19 20 21 22 23 25

Class Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . Activity Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . Package Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Component Model Diagram

State Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . Communication Diagram . . . . . . . . . . . . . . . . . . . . . . Diagramatic View . . . . . . . . . . . . . . . . . . . . . . . . . .

30

List of Tables
5.1 5.2 5.3 5.4 Software Requirement System Features. System Features. . . . . . . . . . . . . . . . . . . . . . . . 14 14 14 15 Hardware Requirement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

31

ACKNOWLEDGEMENT
We would like to thank you project co-ordinator Prof. Abhale B.A. and Project guide Prof.Thakur.P.S for his guidance in this project work, and his tireless support in ensuring its completion. We would also like to thank the HOD of the Information Technology Department Prof. Gaikwad K.P. for providing me all the facilities in the department and outside. We would like to thanks to all my friends and well-wishers who helped me directly and indirectly during completion of project. This project being conceptual one needed a lot of support from my guide so that we could achieve what we were set out to get. And we are glad to say that the success of the project is an acknowledgement in itself.

32

You might also like