90,911 research outputs found

    Video Object Segmentation and Tracking Using GMM and GMM-RBF Method for Surveillance System

    Get PDF
    Now a day’s computer vision has been applied to every organisation. Such that the all in security systems, computers are widely used regarding to this the security purpose every organisation are used different monitoring system i.e. surveillance system, suspicious monitoring system etc. Object tracking and explanation is the definitive purpose of many video processing systems. The two critical, low-level computer vision tasks that have been undertaken in this work are: Foreground-Background Segmentation and Object Tracking. In surveillance system cameras capture the footage for tracking suspicious movement in organisation, in this condition the videos prepare with the help of surveillance cameras the most difficult task is to tracking the object from the video and make the another image so that image should be vague to identification. Generally the surveillance system work We use a stochastic model of the background and also adapt the model through time. This adaptive nature is essential for long-term surveillance applications, particularly when the background composition or intensity distribution changes with time. In such cases, concept of a static reference background would no longer make sense. DOI: 10.17762/ijritcc2321-8169.15062

    AN IP-BASED LIVE DATABASE APPROACH TO SURVEILLANCE APPLICATION DEVELOPMENT

    Get PDF
    With the proliferation of inexpensive cameras, video surveillance applications are becoming ubiquitous in many domains such as public safety and security, manufacturing, intelligent transportation systems, and healthcare. IP-based video surveillance technologies, in particular, are able to bring traditional video surveillance centers to virtually any computer at any location with an Internet connection. Today’s IP-based video surveillance systems, however, are designed for specific classes of applications. For instance, one cannot use a system designed for incident detection on highways to monitor patients in a healthcare facility. To support rapid development of video surveillance applications, we designed and implemented a new class of general purpose database management system, the live video database management system (LVDBMS). We view networked IP cameras as a special class of storage devices, and allow the user to formulate ad hoc queries expressed over live video feeds. These continuous queries are processed in real time using novel distributed computing techniques. With this environment, the users are able to develop various specific web-based video surveillance systems for a variety of applications. These systems can coexist in a unified LVDBMS framework to share the expensive deployment and operating costs of the camera networks. Our contribution is the introduction of a live database approach to video surveillance software development. In this paper, we describe our prototype and present the live video data model, the query language, and the query processing technique. 1

    INTELLIGENT VIDEO SURVEILLANCE OF HUMAN MOTION: ANOMALY DETECTION

    Get PDF
    Intelligent video surveillance is a system that can highlight extraction and video summarization that require recognition of the activities occurring in the video without any human supervision. Surveillance systems are extremely helpful to guard or protect you from any dangerous condition. In this project, we propose a system that can track and detect abnormal behavior in indoor environment. By concentrating on inside house enviromnent, we want to detect any abnormal behavior between adult and toddler to avoid abusing to happen. In general, the frameworks of a video surveillance system include the following stages: background estimator, segmentation, detection, tracking, behavior understanding and description. We use training behavior profile to collect the description and generate statistically behavior to perform anomaly detection later. We begin with modeling the simplest actions like: stomping, slapping, kicking, pointed sharp or blunt object that do not require sophisticated modeling. A method to model actions with more complex dynamic are then discussed. The results of the system manage to track adult figure, toddler figure and harm object as third subject. With this system, it can bring attention of human personnel security. For future work, we recommend to continue design methods for higher level representation of complex activities to do the matching anomaly detection with real-time video surveillance. We also propose the system to embed with hardware solution for triggered the matching detection as output

    Metadata extraction and organization for intelligent video surveillance system

    Get PDF
    Proceedings of the IEEE International Conference on Mechatronics and Automation (ICMA), 2010, p. 489-494The research for metadata extraction originates from the intelligent video surveillance system, which is widely used in outdoor and indoor environment for the aims of traffic monitor, security guard, and intelligent robot. Various features are extracted from the surveillance image sequences such as target detection, target tracking, object's shape and activities. However, the trend of more and more features being used and shared in video surveillance system calls for more attention to bridge the gap between specific analysis algorithms and enduser's expectation. This paper proposes a three-layer object oriented model to extract the surveillance metadata including shape, motion speed, and trajectory of the object emerging in image sequence. Meanwhile, the high-level semantic metadata including entry/exit point, object duration time is organized and stored which are provided for the further end-user queries. The paper also presents the experiment results in different indoor and outdoor surveillance scenarios. At last, a comparative analysis with another traditional method is presented. © 2010 IEEE.published_or_final_versio

    Performance analysis and application development of hybrid WiMAX-WiFi IP video surveillance systems

    Get PDF
    Traditional Closed Circuit Television (CCTV) analogue cameras installed in buildings and other areas of security interest necessitates the use of cable lines. However, analogue systems are limited by distance; and storing analogue data requires huge space or bandwidth. Wired systems are also prone to vandalism, they cannot be installed in a hostile terrain and in heritage sites, where cabling would distort original design. Currently, there is a paradigm shift towards wireless solutions (WiMAX, Wi-Fi, 3G, 4G) to complement and in some cases replace the wired system. A wireless solution of the Fourth-Generation Surveillance System (4GSS) has been proposed in this thesis. It is a hybrid WiMAX-WiFi video surveillance system. The performance analysis of the hybrid WiMAX-WiFi is compared with the conventional WiMAX surveillance models. The video surveillance models and the algorithm that exploit the advantages of both WiMAX and Wi-Fi for scenarios of fixed and mobile wireless cameras have been proposed, simulated and compared with the mathematical/analytical models. The hybrid WiMAX-WiFi video surveillance model has been extended to include a Wireless Mesh configuration on the Wi-Fi part, to improve the scalability and reliability. A performance analysis for hybrid WiMAX-WiFi system with an appropriate Mobility model has been considered for the case of mobile cameras. A security software application for mobile smartphones that sends surveillance images to either local or remote servers has been developed. The developed software has been tested, evaluated and deployed in low bandwidth Wi-Fi wireless network environments. WiMAX is a wireless metropolitan access network technology that provides broadband services to the connected customers. Major modules and units of WiMAX include the Customer Provided Equipment (CPE), the Access Service Network (ASN) which consist one or more Base Stations (BS) and the Connectivity Service Network (CSN). Various interfaces exist between each unit and module. WiMAX is based on the IEEE 802.16 family of standards. Wi-Fi, on the other hand, is a wireless access network operating in the local area network; and it is based on the IEEE 802.11 standards

    Harnessing AI for Speech Reconstruction using Multi-view Silent Video Feed

    Full text link
    Speechreading or lipreading is the technique of understanding and getting phonetic features from a speaker's visual features such as movement of lips, face, teeth and tongue. It has a wide range of multimedia applications such as in surveillance, Internet telephony, and as an aid to a person with hearing impairments. However, most of the work in speechreading has been limited to text generation from silent videos. Recently, research has started venturing into generating (audio) speech from silent video sequences but there have been no developments thus far in dealing with divergent views and poses of a speaker. Thus although, we have multiple camera feeds for the speech of a user, but we have failed in using these multiple video feeds for dealing with the different poses. To this end, this paper presents the world's first ever multi-view speech reading and reconstruction system. This work encompasses the boundaries of multimedia research by putting forth a model which leverages silent video feeds from multiple cameras recording the same subject to generate intelligent speech for a speaker. Initial results confirm the usefulness of exploiting multiple camera views in building an efficient speech reading and reconstruction system. It further shows the optimal placement of cameras which would lead to the maximum intelligibility of speech. Next, it lays out various innovative applications for the proposed system focusing on its potential prodigious impact in not just security arena but in many other multimedia analytics problems.Comment: 2018 ACM Multimedia Conference (MM '18), October 22--26, 2018, Seoul, Republic of Kore

    Detection and Simulation of Dangerous Human Crowd Behavior

    Get PDF
    Tragically, gatherings of large human crowds quite often end in crowd disasters such as the recent catastrophe at the Loveparade 2010. In the past, research on pedestrian and crowd dynamics focused on simulation of pedestrian motion. As of yet, however, there does not exist any automatic system which can detect hazardous situations in crowds, thus helping to prevent these tragic incidents. In the thesis at hand, we analyze pedestrian behavior in large crowds and observe characteristic motion patterns. Based on our findings, we present a computer vision system that detects unusual events and critical situations from video streams and thus alarms security personnel in order to take necessary actions. We evaluate the system’s performance on synthetic, experimental as well as on real-world data. In particular, we show its effectiveness on the surveillance videos recorded at the Loveparade crowd stampede. Since our method is based on optical flow computations, it meets two crucial prerequisites in video surveillance: Firstly, it works in real-time and, secondly, the privacy of the people being monitored is preserved. In addition to that, we integrate the observed motion patterns into models for simulating pedestrian motion and show that the proposed simulation model produces realistic trajectories. We employ this model to simulate large human crowds and use techniques from computer graphics to render synthetic videos for further evaluation of our automatic video surveillance system
    • 

    corecore