Skip to main content
Top
Published in: Pattern Recognition and Image Analysis 4/2021

01-10-2021 | APPLICATION PROBLEMS

Automatic Video Based Perception of Legitimate Persons Using Computer Vision Techniques

Authors: Ankit Kumar Sah, Nickolas Savarimuthu

Published in: Pattern Recognition and Image Analysis | Issue 4/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The purpose of any surveillance investigation is to look for recurrent theft, vandalism, missing person searches, fraud, crime, etc. It is a general practice of observing a subject for documenting the whereabouts or interactions of the same. Physical observation though reasonable is hectic, exorbitant, and time consuming. The system must be able to distinguish between legitimates and strangers. Towards the same, an automatic detection system is developed to detect only the registered persons of the media lab. Two variants of YOLO viz., YOLOv3-Tiny, and YOLOv2 were utilized for fast identification, classification, and detection of registered persons on live stream video outputted by the network camera installed at the place. YOLOv2 achieved 96.25% mean average precision whereas YOLOv3-Tiny registered 95.05% with average detection times of 0.06 and 0.04 s per frame respectively. The models outperformed Faster R-CNN detection methodology with regards to mean average precision and detection time utilized for the same task. The achieved results were satisfactory and promising with reference to fast recognition, speed, and correctness.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference V. A. Akpan, “Configuration, interfacing and networking of wireless IP-based camera for real-time security surveillance systems design,” Pac. J. Sci. Technol. 8 (2), 107–114 (2015). V. A. Akpan, “Configuration, interfacing and networking of wireless IP-based camera for real-time security surveillance systems design,” Pac. J. Sci. Technol. 8 (2), 107–114 (2015).
2.
go back to reference J. Besada, J. Portillo, J. Garcia, J. M. Molina, A. Varona, and G. González, “Image-based automatic surveillance for airport surface,” in 4th Int. Conf. on Information Fusion, Montreal, Canada, 2001 (2001), pp. 11–18. J. Besada, J. Portillo, J. Garcia, J. M. Molina, A. Varona, and G. González, “Image-based automatic surveillance for airport surface,” in 4th Int. Conf. on Information Fusion, Montreal, Canada, 2001 (2001), pp. 11–18.
5.
go back to reference T. G. Emori, D. H. Culver, T. C. Horan, W. R. Jarvis, J. W. White, D. R. Olson, S. Banerjee, J. R. Edwards, W. J. Martone, R. P. Gaynes, and J. M. Hughes, “NatZorral nosocomial infections surveillance system (NNIS): Description of surveillance methods,” Am. J. Infection Control 19, 19–35 (1970). https://doi.org/10.1016/0196-6553(91)90157-8CrossRef T. G. Emori, D. H. Culver, T. C. Horan, W. R. Jarvis, J. W. White, D. R. Olson, S. Banerjee, J. R. Edwards, W. J. Martone, R. P. Gaynes, and J. M. Hughes, “NatZorral nosocomial infections surveillance system (NNIS): Description of surveillance methods,” Am. J. Infection Control 19, 19–35 (1970). https://​doi.​org/​10.​1016/​0196-6553(91)90157-8CrossRef
7.
go back to reference H. L. Eng, K. A. Toh, A. H. Kam, J. Wang, and W. Y. Yau, “An automatic drowning detection surveillance system for challenging outdoor pool environments,” in Proc. Ninth IEEE Int. Conf. on Computer Vision, Nice, France, 2003 (IEEE, 2003), pp. 532–539. https://doi.org/10.1109/iccv.2003.1238393 H. L. Eng, K. A. Toh, A. H. Kam, J. Wang, and W. Y. Yau, “An automatic drowning detection surveillance system for challenging outdoor pool environments,” in Proc. Ninth IEEE Int. Conf. on Computer Vision, Nice, France, 2003 (IEEE, 2003), pp. 532–539. https://​doi.​org/​10.​1109/​iccv.​2003.​1238393
12.
go back to reference R. Girshick, J. Donahue, T. Darrell, and J. Malik, “Rich feature hierarchies for accurate object detection and semantic segmentation,” in IEEE Conf. on Computer Vision and Pattern Recognition, Columbus, Ohio, 2014 (IEEE, 2014), pp. 580–587. https://doi.org/10.1109/CVPR.2014.81 R. Girshick, J. Donahue, T. Darrell, and J. Malik, “Rich feature hierarchies for accurate object detection and semantic segmentation,” in IEEE Conf. on Computer Vision and Pattern Recognition, Columbus, Ohio, 2014 (IEEE, 2014), pp. 580–587. https://​doi.​org/​10.​1109/​CVPR.​2014.​81
17.
go back to reference T. Y. Lin, M. Maire, S. Belongie, J. Hays, P. Perona, D. Ramanan, P. Dollár, and C. L. Zitnick, “Microsoft COCO: Common objects in context,” in Computer Vision – ECCV 2014, Ed. by D. Fleet, T. Pajdla, B. Schiele, and T. Tuytelaars, Lecture Notes in Computer Science, vol. 8693 (Springer, Cham, 2014), pp. 740–755. https://doi.org/10.1007/978-3-319-10602-1_48CrossRef T. Y. Lin, M. Maire, S. Belongie, J. Hays, P. Perona, D. Ramanan, P. Dollár, and C. L. Zitnick, “Microsoft COCO: Common objects in context,” in Computer Vision – ECCV 2014, Ed. by D. Fleet, T. Pajdla, B. Schiele, and T. Tuytelaars, Lecture Notes in Computer Science, vol. 8693 (Springer, Cham, 2014), pp. 740–755. https://​doi.​org/​10.​1007/​978-3-319-10602-1_​48CrossRef
23.
go back to reference J. Redmon and A. Farhadi, “YOLOv3: An incremental improvement.” arXiv:1804.02767 [cs.CV] J. Redmon and A. Farhadi, “YOLOv3: An incremental improvement.” arXiv:1804.02767 [cs.CV]
27.
go back to reference K. Simonyan and A. Zisserman, “Very deep convolutional networks for large-scale image recognition,” in 3rd Int. Conf. Learning Representations, San Diego, Calif., 2015 (2015), pp. 1–14. arXiv:1409.1556 [cs.CV] K. Simonyan and A. Zisserman, “Very deep convolutional networks for large-scale image recognition,” in 3rd Int. Conf. Learning Representations, San Diego, Calif., 2015 (2015), pp. 1–14. arXiv:1409.1556 [cs.CV]
34.
go back to reference W. Zhang, C. Witharana, A. K. Liljedahl, and M. Kanevskiy, “Deep convolutional neural networks for automated characterization of arctic ice-wedge polygons in very high spatial resolution aerial imagery,” Remote Sens. 10, 1487 (2018). https://doi.org/10.3390/rs10091487CrossRef W. Zhang, C. Witharana, A. K. Liljedahl, and M. Kanevskiy, “Deep convolutional neural networks for automated characterization of arctic ice-wedge polygons in very high spatial resolution aerial imagery,” Remote Sens. 10, 1487 (2018). https://​doi.​org/​10.​3390/​rs10091487CrossRef
Metadata
Title
Automatic Video Based Perception of Legitimate Persons Using Computer Vision Techniques
Authors
Ankit Kumar Sah
Nickolas Savarimuthu
Publication date
01-10-2021
Publisher
Pleiades Publishing
Published in
Pattern Recognition and Image Analysis / Issue 4/2021
Print ISSN: 1054-6618
Electronic ISSN: 1555-6212
DOI
https://doi.org/10.1134/S1054661821040192

Other articles of this Issue 4/2021

Pattern Recognition and Image Analysis 4/2021 Go to the issue

MATHEMATICAL THEORY OF IMAGES AND SIGNALS REPRESENTING, PROCESSING, ANALYSIS, RECOGNITION, AND UNDERSTANDING

An Improved Non-Rigid Point Set Registration Algorithm by Preserving Local Topology

MATHEMATICAL THEORY OF IMAGES AND SIGNALS REPRESENTING, PROCESSING, ANALYSIS, RECOGNITION, AND UNDERSTANDING

Multi-Scale Feature Fusion Network with Attention for Single Image Dehazing

MATHEMATICAL THEORY OF IMAGES AND SIGNALS REPRESENTING, PROCESSING, ANALYSIS, RECOGNITION, AND UNDERSTANDING

Bayesian Cellular Automata Fusion Model Based on Dual-Stream Strategy for Video Anomaly Action Detection

MATHEMATICAL THEORY OF IMAGES AND SIGNALS REPRESENTING, PROCESSING, ANALYSIS, RECOGNITION, AND UNDERSTANDING

A Probabilistic Clustering Approach for Detecting Linear Structures in Two-Dimensional Spaces

Premium Partner