Filters








932 Hits in 5.2 sec

監視カメラ画像閲覧のための階層的画像集約手法
Hierarchical Image Gathering Technique for Browsing Surveillance Camera Images

Wataru AKUTSU, Tadasuke FURUYA, Hiroko MIYAMURA (NAKAMURA), Yoichi HAGIWARA, Takafumi SAITO
2007 The Journal of the Institute of Image Electronics Engineers of Japan  
キーワード:動物体抽出,集約時間,階層表示 〈Summary〉 We propose an image gathering and display method for efficient browsing of surveillance camera images.  ...  The gathered images are generated for several steps of time length, and hierarchically displayed. A user can easily browse the scene by looking at the images with moving parts.  ...  図 1 Fig. 3 1 1 監視カメラの撮影環境 Table 1 10 図 5 5 Fig. 7 1311110557 Gathering Technique for Browsing Surveillance Camera Images" by Wataru AKUTSU (Graduate School of Bio-Applications and Systems Engineering Tokyo  ... 
doi:10.11371/iieej.36.435 fatcat:raxopleb6bfbhm6lhon2to7coe

動画像情報提示のための静止画生成技術
Still Image Generation Techniques for Information Presentation of Video Contents

Takafumi SAITO
2016 NIHON GAZO GAKKAISHI (Journal of the Imaging Society of Japan)  
Following typical examples are described : hierarchical image gathering technique for browsing surveillance camera images, visualization and analysis of plants growth by using spatio-temporal projection  ...  For the purpose of obtaining useful information in huge video images, still image generation techniques by reconstructing the video information are described.  ...  Image Generation Techniques for Information Presentation of Video Contents Journal of the Imaging Society of Japan Vol. 55 No. 3 Fig. 14 A 14 Fig. 14 A parallax image.  ... 
doi:10.11370/isj.55.314 fatcat:lkwi6ljjwjfprbp2oaj3nji76e

Temporal Magic Lens: Combined Spatial and Temporal Query and Presentation [chapter]

Kathy Ryall, Qing Li, Alan Esenther
2005 Lecture Notes in Computer Science  
We introduce the concept of a temporal Magic Lens, a novel interaction technique that supports querying and browsing for video data.  ...  We introduce the concept of a Temporal Magic Lens, a novel interaction technique that supports querying and browsing for video data.  ...  Acknowledgements We thank Tom Lanning and Kent Wittengburg for their suggestions and discussion on this project, Fatih Porikli and Ajay Divakaran for their data and input, Bill Buxton for his comments  ... 
doi:10.1007/11555261_64 fatcat:jf22vev4pnhfpnizpsjuu4hq7e

Survey on Video Big Data: Analysis Methods and Applications

P. Ushapreethi, G.G. Lakshmipriya
2017 International Journal of Applied Engineering Research  
Over past years, various ideas and techniques have been proposed towards the effective storage and retrieval of video contents.  ...  The underlying components for each approach are identified and the details on how they are addressed in specific works were discussed.  ...  Variety: The variety in big video surveillance data is ensured since different capturing devices such as organizational cameras and wild cameras are used for collecting the real world videos.  ... 
doi:10.37622/ijaer/12.10.2017.2221-2231 fatcat:ghhxte6fkfdipesh4osdlmj224

Character index

2011 2011 IEEE International Conference on Multimedia and Expo  
LIFETIME MAXIMIZATION OF VIDEO BLACKBOX SURVEILLANCE CAMERA AN ENERGY-AWARE HIERARCHICAL EVENT DETECTION IN BATTERY-OPERATED WIRELESS VIDEO SURVEILLANCE SYSTEMS INDEXING OF PLAYER EVENTS USING MULTIMODAL  ...  HIERARCHICAL EVENT DETECTION IN BATTERY-OPERATED WIRELESS VIDEO SURVEILLANCE SYSTEMS Fabrice Labeau AN ERROR RESILIENT TECHNIQUE FOR TEMPORAL AND SPATIAL Yu Fan Lai A NOVEL PERCEPTUAL VIDEO CODING ALGORITHM  ... 
doi:10.1109/icme.2011.6011827 fatcat:wjy7yvkmvbbf3hj4wbyjapx5gu

Access control, confidentiality and privacy for video surveillance databases

Bhavani Thuraisingham, Gal Lavee, Elisa Bertino, Jianping Fan, Latifur Khan
2006 Proceedings of the eleventh ACM symposium on Access control models and technologies - SACMAT '06  
In this paper we have addressed confidentiality and privacy for video surveillance databases. First we discussed our overall approach for suspicious event detection.  ...  Next we discussed an access control model and accedes control algorithms for confidentiality. Finally we discuss privacy preserving video surveillance.  ...  That is, we will develop techniques for ensuring the confidentiality of the privacy sensitive information contained in the surveillance data.  ... 
doi:10.1145/1133058.1133061 dblp:conf/sacmat/ThuraisinghamLBFK06 fatcat:jibx3krrgrgllmz6iv6g55ueme

A systematic Review on Fusion Techniques and Approaches Used in Applications

Shaidah Jusoh, Sufyan Almajali
2020 IEEE Access  
The finding of this review showed that the most published works for the use of intelligence fusion are mainly applications in the robotics domain, where mostly used techniques are Kalman Filter and its  ...  The results of this study are a list of classified applications within the domains and a number of relevant techniques or approaches used in each classified application.  ...  High quality infrared images requires high cost cameras which is one reason for the quality difference. Figure 5 shows an example on image fusing.  ... 
doi:10.1109/access.2020.2966400 fatcat:pygjwjugnfhc7d74inyfg4axze

Application for video analysis based on machine learning and computer vision algorithms

Vladimir Pavlov, Vladimir Khryashchev, Evgeny Pavlov, Lev Shmaglit
2013 14th Conference of Open Innovation Association FRUCT  
An application for video data analysis based on computer vision methods is presented.  ...  AdaBoost classifier is utilized for face detection. A modification of Lucas and Kanade algorithm is introduced on the stage of tracking.  ...  own image database, gathered from different sources (TableI, Fig. 7) .  ... 
doi:10.1109/fruct.2013.6737950 dblp:conf/fruct/PavlovKPS13 fatcat:t24mdd2bpffipg2qhwncnhoc34

Overview of Lifelogging: Current Challenges and Advances

Amel Ksibi, Ala Saleh Alluhaidan, Amina Salhi, Sahar A. El-Rahman
2021 IEEE Access  
The feature of free motion in cameras with changes in lighting conditions along with image content make computer images analysis techniques more challenging.  ...  A Sense-Cam, a wearable camera, is used for image capturing to reinstates thoughts, feelings, and sensory information.  ... 
doi:10.1109/access.2021.3073469 fatcat:qm32iyh77jc43dbux6ftauhtpu

The Future Of Video Analytics For Surveillance And Its Ethical Implications

A. A. Adams, J. M. Ferryman
2017 Zenodo  
against the surveilled.  ...  The current state of the art and direction of research in computer vision aimed at automating the analysis of CCTV images is presented.  ...  not practicable for imagery gathered from areas which change or from mobile cameras.  ... 
doi:10.5281/zenodo.812015 fatcat:3wg23o3u6vcpzlgjccls7o66cq

Understanding Transit Scenes: A Survey on Human Behavior-Recognition Algorithms

J. Candamo, M. Shreve, D.B. Goldgof, D.B. Sapper, R. Kasturi
2010 IEEE transactions on intelligent transportation systems (Print)  
This paper describes the current state-of-the-art image-processing methods for automatic-behavior-recognition techniques, with focus on the surveillance of human activities in the context of transit applications  ...  Visual surveillance is an active research topic in image processing.  ...  Cheng (University of South Florida) for their involvement and support in the completion of this paper.  ... 
doi:10.1109/tits.2009.2030963 fatcat:tiajxro6sbc23p2rdaam2pwyna

Aerial video surveillance and exploitation

R. Kumar, H. Sawhney, S. Samarasekera, S. Hsu, Hai Tao, Yanlin Guo, K. Hanna, A. Pope, R. Wildes, D. Hirvonen, M. Hansen, P. Burt
2001 Proceedings of the IEEE  
In order to delineate videos into these scene components, we have developed real time, image-processing techniques for 2-D/3-D frame-to-frame alignment, change detection, camera control, and tracking of  ...  There is growing interest in performing aerial surveillance using video cameras.  ...  for monitoring resources such as forests and crops. Similar imaging techniques are used in aerial news gathering and search and rescue.  ... 
doi:10.1109/5.959344 fatcat:zmkbari6ijgvredoomfqwq3wi4

Boosted human re-identification using Riemannian manifolds

Sławomir Bąk, Etienne Corvée, Francois Brémond, Monique Thonnat
2012 Image and Vision Computing  
These techniques can not be so accurate as iris recognition or face recognition, because the clothing is not enough distinctive. 2  ...  over a network of camera.  ...  Guillaume Charpiat for his comments and fruitful discussions. This work has been supported by Agence National de la Recherche (ANR), VIDEO-ID and VANAHEIM project.  ... 
doi:10.1016/j.imavis.2011.08.008 fatcat:nym5zmflljcoxdfv2gt7tkznt4

Visual traffic surveillance framework: classification to event detection

Amol Ambardekar, Mircea Nicolescu, George Bebis, Monica Nicolescu
2013 Journal of Electronic Imaging (JEI)  
Three of the techniques that performed well were incorporated into a unified traffic surveillance system for online classification of vehicles, which uses tracking results to improve the classification  ...  Visual traffic surveillance using computer vision techniques can be noninvasive, automated, and cost effective.  ...  Surveillance videos pose other problems, for example, surveillance image sizes are generally small and captured images can have varying lighting conditions.  ... 
doi:10.1117/1.jei.22.4.041112 fatcat:j5asczqs5remplnggsdtlveoaa

Content Based Video Retrieval Systems

B V Patel
2012 International Journal of UbiComp  
These features are intended for selecting, indexing and ranking according to their potential interest to the user.  ...  This survey reviews the interesting features that can be extracted from video data for indexing and retrieval along with similarity measurement methods.  ...  Pixel regions with consistent color and motion properties are extracted from these 3D volumes by a threshold-free hierarchical space time segmentation technique.  ... 
doi:10.5121/iju.2012.3202 fatcat:rrtofvbjfbakhacn565qre5enq
« Previous Showing results 1 — 15 out of 932 results