A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Context-based object-of-interest detection for a generic traffic surveillance analysis system
2014
2014 11th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS)
We present a new traffic surveillance video analysis system, focusing on building a framework with robust and generic techniques, based on both scene understanding and moving object-of-interest detection ...
Our proposed framework is validated on real-life road surveillance videos, in which objects-of-interest are moving vehicles. ...
Introduction Video-based traffic surveillance systems play a crucial role in traffic monitoring and management. ...
doi:10.1109/avss.2014.6918657
dblp:conf/avss/BaoJZWW14
fatcat:mbgfgh54n5ep5kjxe6ksqvfl5u
A Secure and Robust Object-Based Video Authentication System
2004
EURASIP Journal on Advances in Signal Processing
The experimental results demonstrate that our system is robust to MPEG4 compression, object segmentation errors, and some common object-based video processing such as object translation, rotation, and ...
In this system, a set of angular radial transformation (ART) coefficients is selected as the feature to represent the video object and the background, respectively. ...
It comprises two parts: signing and verification. The procedure for signing is on the left side, and the procedure for verification is on the right side. ...
doi:10.1155/s1110865704312217
fatcat:aowg5mwovbflnfiwpaw6y4s2uu
SECURITY EVENT RECOGNITION FOR VISUAL SURVEILLANCE
2017
ISPRS Annals of the Photogrammetry, Remote Sensing and Spatial Information Sciences
First, convolutional neural network (CNN) framework is used to detect objects of interest in the given videos. Second, the owners of the objects are recognized and monitored in real-time as well. ...
This paper proposes a novel effective framework for security event analysis in surveillance videos. ...
ISPRS Annals of the Photogrammetry, Remote Sensing and Spatial Information Sciences, Volume IV-1/W1, 2017 ISPRS Hannover Workshop: HRIGI 17 -CMRT 17 -ISA 17 -EuroCOW 17, 6-9 June 2017, Hannover, Germany ...
doi:10.5194/isprs-annals-iv-1-w1-19-2017
fatcat:eo2akg7ri5e5jlmzcxeuhsuiba
Robust Detection of Abandoned and Removed Objects in Complex Surveillance Videos
2011
IEEE Transactions on Systems Man and Cybernetics Part C (Applications and Reviews)
Tracking-based approaches for abandoned object detection often become unreliable in complex surveillance videos due to occlusions, lighting changes, and other factors. ...
The robustness and efficiency of the proposed method is tested on IBM Smart Surveillance Solutions for public safety applications in big cities and evaluated by several public databases such as i-Lids ...
ACKNOWLEDGMENTS The authors thank the anonymous reviewers for their constructive comments and suggestions that help to improve the quality of this manuscript. ...
doi:10.1109/tsmcc.2010.2065803
fatcat:46hqfkwy7fg45htchyciqhfjl4
Robust Recognition of Specific Human Behaviors in Crowded Surveillance Video Sequences
2010
EURASIP Journal on Advances in Signal Processing
We describe a method that can detect specific human behaviors even in crowded surveillance video scenes. ...
Verification techniques such as backward tracking and calculating optical flows contributed to robust recognition. ...
In addition, the noise objects interrupt robust detection of human regions. ...
doi:10.1155/2010/801252
fatcat:x2v7xyot7vc4zhkhu2s3gt2vfm
Evaluation of Collaborative Video Surveillance Platform
2016
Proceedings of the 10th International Conference on Distributed Smart Camera - ICDSC '16
This paper evaluates a new video surveillance platform presented in a previous study, through an abandoned object detection task. ...
In this paper, the experiment is conducted for abandoned object detection, as one of the most common surveillance tasks. ...
In automated detection and alerting, on the other hand, guaranteed accuracy and robustness in real surveillance situation is es-sential for image analyzers. ...
doi:10.1145/2967413.2967416
dblp:conf/icdsc/SaitoNAK16
fatcat:ahnlybbcr5gtrpwa7nfdfttnfq
Understanding Transit Scenes: A Survey on Human Behavior-Recognition Algorithms
2010
IEEE transactions on intelligent transportation systems (Print)
., fighting and personal attacks), personvehicle interactions (e.g., vehicle vandalism), and person-facility/ location interactions (e.g., object left behind and trespassing). ...
This paper also provides a summary of literature surveys and developments of the core technologies (i.e., low-level processing techniques) used in visual surveillance systems, including motion detection ...
Kelsey (Hart) and S. Godavarthy and W. Cheng (University of South Florida) for their involvement and support in the completion of this paper. ...
doi:10.1109/tits.2009.2030963
fatcat:tiajxro6sbc23p2rdaam2pwyna
Abandoned Object Detection via Temporal Consistency Modeling and Back-Tracing Verification for Visual Surveillance
2018
IARJSET
Abandoned object detection is an essential requirement in many video surveillance contexts. ...
We introduce an abandoned object detection tool based on a set of possible events and on a set of rules to act upon those events. ...
In the visual surveillance research, detecting abandoned luggage is referred to as the problem of abandoned-object or left-luggage detection. ...
doi:10.17148/iarjset.2018.592
fatcat:lu4zh42tyna6noeudwtem7ld54
Security and Surveillance
[chapter]
2011
Visual Analysis of Humans
A significant application of video analysis and understanding is intelligent surveillance, which aims to interpret automatically human activity and detect unusual events that could pose a threat to public ...
Substantial efforts have been made towards understanding static images of individual objects and the corresponding processes in the human visual system. ...
This technique is particularly useful in coping with low-quality public scene surveillance videos featuring severe inter-object occlusion therefore improving robustness and accuracy in multi-camera unusual ...
doi:10.1007/978-0-85729-997-0_23
fatcat:lodvka4hu5debd7wiovexhca3u
Real-Time Human Detection, Tracking, and Verification in Uncontrolled Camera Motion Environments
2006
Fourth IEEE International Conference on Computer Vision Systems (ICVS'06)
In this paper, we presents a real time system for human detection, tracking, and verification in such challenging environments. ...
In environments where a camera is installed on a freely moving platform, e.g. a vehicle or a robot, object detection and tracking becomes much more difficult. ...
Introduction The problem of object detection and tracking in video sequences becomes much harder when the camera is allowed to move uncontrollably. ...
doi:10.1109/icvs.2006.52
dblp:conf/icvs/HusseinARD06
fatcat:c2bkzf775bhzdbwesnqngzytny
Object detection in surveillance video from dense trajectories
2015
2015 14th IAPR International Conference on Machine Vision Applications (MVA)
We demonstrate an application of dense trajectories to object detection in surveillance video, showing that they can be used to both regress estimates of object locations and accurately classify objects ...
Detecting objects such as humans or vehicles is a central problem in surveillance video. Myriad standard approaches exist for this problem. ...
Acknowledgements First and foremost, I want to thank my supervisor Dr. Greg Mori. He is the best supervisor Acknowledgements iv ...
doi:10.1109/mva.2015.7153248
dblp:conf/mva/ZhaiCLKM15
fatcat:bs2ncmz66nbxfl5mbeffavwuiy
A multisensor surveillance system for Automated Border Control (eGate)
2013
2013 10th IEEE International Conference on Advanced Video and Signal Based Surveillance
In contrast to already existing ABC solutions, which mostly use electronic sensors, e.g. simple beam technology, for person separation and left item detection, we introduce vision based technologies to ...
The system consists of two parts: counting the number of persons inside the eGate (person separation), ensuring that no more than one passenger is present; left luggage detection, ensuring that the passenger ...
verification (1:1 face comparison in a live stream) for identity authentication; Video surveillance for reliably counting the number of persons present inside the eGate. ...
doi:10.1109/avss.2013.6636678
dblp:conf/avss/SchreiberKR13
fatcat:5ypmpq7xpjc5dhium3nt5rlnmy
An Authentication Mechanism Using Chinese Remainder Theorem for Efficient Surveillance Video Transmission
2010
2010 7th IEEE International Conference on Advanced Video and Signal Based Surveillance
In many surveillance applications, the background changes very slowly and the foreground objects occupy only a relatively small portion of a video frame. ...
However, protecting the authenticity of the video becomes more challenging in this case as a malicious entity can modify/replace/remove the individual foreground objects and background in the video. ...
INTRODUCTION Now-a-days, surveillance cameras have been widely used in public places, work places and homes in connection with detection and quick resolution of crimes, traffic accidents/violations and ...
doi:10.1109/avss.2010.13
dblp:conf/avss/ThomasEZK10
fatcat:2mmt57tkyzhdvddszx53wkteku
Multi-Person Tracking and Crowd Behavior Detection via Particles Gradient Motion Descriptor and Improved Entropy Classifier
2021
Entropy
Finally, we introduced a robust improved entropy classifier for decision making and automated crowd behavior detection in smart surveillance systems. ...
To prevent disasters and to control and supervise crowds, automated video surveillance has become indispensable. ...
into particles and a robust particles force model was introduced for human silhouette verification. ...
doi:10.3390/e23050628
pmid:34069994
fatcat:nutz3z7tqvffznautfk23iw3hu
BlendSPS: A BLockchain-ENabled Decentralized Smart Public Safety System
2020
Smart Cities
scalable and extensible services in a large-scale heterogeneous network environment. ...
While SPS facilitates convenient exchanges of surveillance data streams among device owners and third-party applications, the existing monolithic service-oriented architecture (SOA) is unable to provide ...
Then another tracking algorithm, optimized for accuracy and speed, is executed to track the aforementioned detected object in frames of video stream. ...
doi:10.3390/smartcities3030047
fatcat:yrzfdm2qlbcf5e5n63oioc2vma
« Previous
Showing results 1 — 15 out of 4,699 results