Person Detection in Video Surveillance

被引:0
作者
Sumalan, Andrada Livia [1 ]
Ichim, Loretta [1 ]
Popescu, Dan [1 ]
机构
[1] Univ Politehn Bucuresti, Fac Automat Control & Comp, Bucharest, Romania
来源
PROCEEDINGS OF THE 2018 10TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTERS AND ARTIFICIAL INTELLIGENCE (ECAI) | 2018年
关键词
person detection; motion detection; video surveillance; perimeter complexity;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents a method for motion detection and person recognition from a video stream generated by a surveillance system. The goal of this work is to implement an algorithm that differentiates a person form other types of forms. Motion detection is realized based on the comparison of two frames extracted at a specific time interval from the real-time video stream. Based on the resulted comparison, a binarization algorithm and a region growing algorithm are used to extract all independent moving objects in the motion case. For each extracted region, a series of geometric features are computed to differentiate the form of a person from other detected forms.
引用
收藏
页数:6
相关论文
共 13 条
[1]   Pedestrian detection for UAVs using cascade classifiers with Meanshift [J].
Aguilar, Wilbert G. ;
Luna, Marco A. ;
Moya, Julio F. ;
Abad, Vanessa ;
Parra, Humberto ;
Ruiz, Hugo .
2017 11TH IEEE INTERNATIONAL CONFERENCE ON SEMANTIC COMPUTING (ICSC), 2017, :509-514
[2]  
Ahmed Imran, 2017, IEEE INTERNET THINGS, VPP
[3]  
Carletti Vincenzo, 2017, ADV VID SIGN BAS SUR, P1
[4]  
He Q, 2017, CHIN AUTOM CONGR, P1063, DOI 10.1109/CAC.2017.8242923
[5]  
Ikonomakis N, 1997, DSP 97: 1997 13TH INTERNATIONAL CONFERENCE ON DIGITAL SIGNAL PROCESSING PROCEEDINGS, VOLS 1 AND 2, P299, DOI 10.1109/ICDSP.1997.628077
[6]   THRESHOLD SELECTION METHOD FROM GRAY-LEVEL HISTOGRAMS [J].
OTSU, N .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS, 1979, 9 (01) :62-66
[7]  
PRATT W.K., 1991, DIGITAL IMAGE PROCES, V2
[8]  
Singh M, 2018, LECT NOTES NETWORKS, V10
[9]  
Watson A., 2012, Mathematica J., V14, P1, DOI [DOI 10.3888/TMJ.14-5, 10.3888/tmj.14-5]
[10]  
Weihong Cui, 2008, 2008 International Conference on Computer Science and Software Engineering (CSSE 2008), P93, DOI 10.1109/CSSE.2008.891