Perimeter Intrusion Detection by Video Surveillance: A Survey

被引:9
作者
Lohani, Devashish [1 ,2 ]
Crispim-Junior, Carlos [1 ]
Barthelemy, Quentin [2 ]
Bertrand, Sarah [2 ]
Robinault, Lionel [1 ,2 ]
Tougne Rodet, Laure [1 ]
机构
[1] Univ Lyon, Univ Lyon 2, CNRS, INSA Lyon,UCBL,LIRIS,UMR5205, F-69676 Bron, France
[2] Foxstream, F-69120 Vaulx En Velin, France
关键词
perimeter intrusion detection; video surveillance; outdoor environment; real-time analysis; i-LIDS; DETECTION SYSTEM; TRACKING; MOTION; COMPUTATION; OBJECT;
D O I
10.3390/s22093601
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
In recent times, we have seen a massive rise in vision-based applications, such as video anomaly detection, motion detection, object tracking, people counting, etc. Most of these tasks are well defined, with a clear idea of the goal, along with proper datasets and evaluation procedures. However, perimeter intrusion detection (PID), which is one of the major tasks in visual surveillance, still needs to be formally defined. A perimeter intrusion detection system (PIDS) aims to detect the presence of an unauthorized object in a protected outdoor site during a certain time. Existing works vaguely define a PIDS, and this has a direct impact on the evaluation of methods. In this paper, we mathematically define it. We review the existing methods, datasets and evaluation protocols based on this definition. Furthermore, we provide a suitable evaluation protocol for real-life application. Finally, we evaluate the existing systems on available datasets using different evaluation schemes and metrics.
引用
收藏
页数:28
相关论文
共 75 条
[1]   Transform coefficient histogram-based image enhancement algorithms using contrast entropy [J].
Agaian, Sos S. ;
Silver, Blair ;
Panetta, Karen A. .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2007, 16 (03) :741-758
[2]  
Ali W.S.I., 2007, P ISSPA, P1
[3]  
[Anonymous], 2007, AVSS DATASET
[4]  
[Anonymous], 2000, EUROPEAN C COMPUTER
[5]  
[Anonymous], 2008, 2008 IEEE C COMPUTER
[6]  
[Anonymous], 2020, AXIS PER DEF US MAN
[7]   Physical Intrusion Detection System Using Stereo Video Analytics [J].
Aravamuthan, G. ;
Rajasekhar, P. ;
Verma, R. K. ;
Shrikhande, S., V ;
Kar, S. ;
Babu, Suresh .
PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON COMPUTER VISION AND IMAGE PROCESSING, CVIP 2018, VOL 2, 2020, 1024 :173-182
[8]  
Athanesious J.J., 2012, Int J Adv Res Comput Eng Technol, V1, P242
[9]  
Barnich O., 2009, P ICASSP TAIPEI, p945 948
[10]   The Riemannian Potato Field: A Tool for Online Signal Quality Index of EEG [J].
Barthelemy, Quentin ;
Mayaud, Louis ;
Ojeda, David ;
Congedo, Marco .
IEEE TRANSACTIONS ON NEURAL SYSTEMS AND REHABILITATION ENGINEERING, 2019, 27 (02) :244-255