skip to main content
10.1145/1456659.1456678acmotherconferencesArticle/Chapter ViewAbstractPublication PageshtConference Proceedingsconference-collections
research-article

A model of an intelligent video-based security surveillance system for general indoor/outdoor environments

Published:06 October 2008Publication History

ABSTRACT

Over a decade ago, simply recording a few minutes of CCTV footage required special hardware. Today, with the emergence of new sensors and improved processing hardware, a relatively inexpensive personal computer can process and store video in real-time, which fundamentally enables our research. Automated visual surveillance is poised to be a key technology in the fight against crime, particularly in monitoring security sensitive areas. A significant advantage of this technology lies in its non-intrusive nature in multi-target tracking. In this paper, we present an automated attention mechanism that allows for the operation of vision-based surveillance systems in a wide variety of environments typical of general indoor/outdoor settings. Different applications of our system are demonstrated including real-time abandoned luggage detection and general outdoor person/vehicle classification.

References

  1. C. H. Anderson, P. J. Burt, and G. S. V. D. Wal. Change detection and tracking using pyramid transform techniques. in Proc. SPIE Int. Soc. Opt. Eng., 579:72--78, September 1985.Google ScholarGoogle ScholarCross RefCross Ref
  2. J. Barron, D. Fleet, and S. Beauchemin. Performance of optical flow techniques. International Journal of Computer Vision, 12(1):42--77, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. R. Cucchiara, C. Grana, M. Piccardi, and A. Prati. Detecting moving objects, ghosts, and shadows in video streams. IEEE Transactions on Pattern Analysis and Machine Intelligence, 25(10):1337--1342, February 2003.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. A. Elgammal, R. Duraiswami, D. Harwood, and L. S. Davis. Background and foreground modelling using nonparametric kernel density estimation for visual surveillance. Proceedings of IEEE, 90(7):1151--1163, July 2002.Google ScholarGoogle ScholarCross RefCross Ref
  5. A. Elgammal, D. Harwood, and L. Davis. Non-parametric model for background subtraction. in Proceedings 6th European Conference on Computer Vision, 2:751--767, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. H. Eng, J. Wang, A. Kam, and W. Yau. Novel region-based modeling for human detection within high dynamic aquatic enviroment. In Proceedings of the IEEE Conf. Computer Vision and Pattern Recognition, 2:390--397, 2004.Google ScholarGoogle Scholar
  7. N. Friedman and S. Russell. Image segmentation in video sequences: A probabilistic approach. Thirteenth Conference on Uncertainty in Artificial Intelligence, 1997.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. M. W. Green. The appropriate and effective use of security technologies in U.S. schools, a guide for schools and law enforcement agencies. Technical Report NCJ178265, Sandia National Laboratories, September 1999.Google ScholarGoogle Scholar
  9. I. Haritaoglu, D. Harwood, and L. S. Davis. W4: Real-time surveillance of people and their activities. IEEE Transactions on Pattern Analysis And Machine Intelligence, 22(8):809--930, August 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. M. Harville. A framework for high-level feedback to adaptive, per-pixel, mixture-of-gaussian background models. in European Conference on Computer Vision, pages 543--560, May 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. M. Harville, G. Gordon, and J. W. II. Foreground segmentation using adaptive mixture model in color and depth. In Proceedings of the IEEE Workshop Detection and Recognition of Events in Video, pages 3--11, 2001.Google ScholarGoogle ScholarCross RefCross Ref
  12. T. Horprasert, D. Harwood, and L. Davies. A statistical approach for real-time, robust background subtraction and shadow detection. In Proceedings of IEEE ICCV'99 Frame-Rate Workshop, 1999.Google ScholarGoogle Scholar
  13. W. Hu, T. Tan, L. Wang, and S. Maybank. A survey on visual surveillance of object motion and behaviours. IEEE Transactions of Systems, Man and Cybernetics, pages 334--352, August 2004.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. D.-S. Lee. Effective gaussian mixture learning for video background subtraction. IEEE Transactions on Pattern Analysis and Machine Intelligence, 27(5):827--832, May 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. L. Li, I. Y. H. Gu, M. K. H. Leung, and Q. Tian. Adpative background subtraction based on feedback from fuzzy classification. Optical Engineering, 43(10):2381--2394, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  16. S. J. Mckenna, S. Jabri, Z. Duric, H. Wechsler, and A. Rosenfeld. Tracking groups of people. Computer Vision and Image Understanding, 80(1):42--56, 2000.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. S. J. Nowlan. Soft competitive adaptation: neural network learning algorithms based on fitting statistical mixtures. PhD thesis, Carnegie Mellon University, 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. N. M. Oliver, B. Rosario, and A. P. Pentland. A bayesian computer vision system for modeling human interactions. IEEE Transactions on Pattern Analysis and Machine Intelligence, 22(8):831--843, August 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. J. Serra. Image Analysis and Mathematical Morphology. Acamdemic Press, 1982. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Y. Sheikh and M. Shah. Bayesian modelling of dynamic scenes for object detection. IEEE Transactions on Pattern Analysis and Machine Intelligence, 27:1778--1792, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. C. Stauffer and W. E. L. Grimson. Adaptive background mixture models for real-time tracking. Proc. Computer Vision and Pattern Recognition Conf., 1999.Google ScholarGoogle ScholarCross RefCross Ref
  22. C. Stauffer and W. E. L. Grimson. Learning patterns of activity using real-time tracking. IEEE Transactions on Pattern Analysis and Machine Intelligence, 22(8):747--757, August 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. K. Toyama, J. Krumm, B. Brumitt, and B. Meyers. Wallflower: Principles and practice of background maintenance. International Conference on Computer Vision, pages 255--261, 1999. Microsoft Research.Google ScholarGoogle ScholarCross RefCross Ref
  24. A. Verri, S. Uras, and E. DeMicheli. Motion segmentation from optical flow. Proceedings of the 5th Alvey Vision Conference, pages 209--214, 1989.Google ScholarGoogle ScholarCross RefCross Ref
  25. C. Wren, A. Azarbayejani, T. Darrell, and A. Pentland. Pfinder: Real-time tracking of the human body. IEEE Transactions on Pattern Analysis and Machine Intelligence, 19(7):780--785, July 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. X. Zhou, R. T. Collins, T. Kanade, and P. Metes. A master-slave system to acquire biometric imagery of humans at distance. ACM SIGMM International Workshop on Video Surveillance, pages 113--120, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A model of an intelligent video-based security surveillance system for general indoor/outdoor environments

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Other conferences
              SAICSIT '08: Proceedings of the 2008 annual research conference of the South African Institute of Computer Scientists and Information Technologists on IT research in developing countries: riding the wave of technology
              October 2008
              304 pages
              ISBN:9781605582863
              DOI:10.1145/1456659

              Copyright © 2008 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 6 October 2008

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article

              Acceptance Rates

              Overall Acceptance Rate187of439submissions,43%

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader