Browse > Article
http://dx.doi.org/10.5916/jkosme.2012.36.5.645

Invader Detection System Using the Morphological Filtering and Difference Images Based on the Max-Valued Edge Detection Algorithm  

Lee, Jae-Hyun (Korea Maritime University)
Kim, Sung-Shin (School of Electrical and Computer Engineering, Pusan National University)
Kim, Jung-Min (School of Electrical and Computer Engineering, Pusan National University)
Abstract
Recently, pirates are infesting on the sea and they have been hijacking the several vessels for example Samho Dream and Samho Jewelry of Korea. One of the items to reduce the risk is to adopt the invader detection system. If the pirates break in to the ship, the detection system can monitor the pirates and then call the security alarm. The crew can gain time to hide to the safe room and the report can be automatically sent to the control room to cope with the situation. For the invader detection, an unmanned observation system was proposed using the image detection algorithm that extracts the invader image from the recording image. To detect the motion area, the difference value was calculated between the current image and the prior image of the invader, and the 'AND' operator was used in calculated image and edge line. The image noise was reduced based on the morphology operation and then the image was transformed into morphological information. Finally, a neural network model was applied to recognize the invader. In the experimental results, it was confirmed that the proposed approach can improve the performance of the recognition in the invader monitoring system.
Keywords
Image detection; Morphology; Invader detection and recognition;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 S. J. Yeom, Implementation of WebCam Image Surveillance System Using Motion Detection Algorithm, M.S. Thesis, Hannam University, 2001.
2 W. C. Kim, A Study on a Moving Object and Edge Detection Algorithm Using CCD, M.S. Thesis, Hongik University, 1997.
3 Y. H. Kim, An Image Processing System for Unmanned Surveillance, Ph.D. Thesis, Yonsei University, 1996.
4 Y. S. Yang, A Study on a Motion Detection Algorithm and Implementation for a Digital Surveillance System, M.S. Thesis, Hanyang University,1999.
5 G. L. Foresti, Real-Time Detection of Multiple Moving Objects in Complex Image Sequences, John Wiley & Sons, Inc. 1999.
6 D. Murray and A. Basu, "Motion tracking with an active camera", IEEE Transactions on Pattern Analysis and Machine Intelligence. vol. 16, no. 5, 1995.
7 A. K. Jain, Fundamentals of Digital Image Processing, Prentice Hall, 1989.
8 S. Y. Kim, T. K. Kweon, and M. H. Kim, "Extraction of simplified boundaries using tracing", Proceedings of Korea Multimedia Society Spring Conference. vol. 2, no. 1, pp. 356-361, 1999.
9 J. Park, J. S. Choi, J. Kim, S. H. Ji and B. H. Lee, "Long-term stealth navigation in a security zone where the movement of the invader is monitored", International Journal of control Automation and Systems vol. 8, no. 3, pp. 604-614, 2010.   과학기술학회마을   DOI   ScienceOn
10 A.T. Ali and E. L. Dagless, "Computer vision for security suveillance and movement control", IEEE Colloquium on Electronic Image Processing in Security and Forensic Science, pp. 6/1-6/7, 1990.
11 T. Takano and K. Ushita, "Intruder detection system by image processing", Proceeding of the International Carnahan Conference on Security Technology. pp. 194-196, 1994.
12 K. H. Stage and K. M. Wickhman, "Estimating performance limits for an intelligent scene monitoring system (ISM) as a perimeter intrusion detection System (PIDS)", Proceeding of the International Carnahan Conference on Security Technology. pp. 98-103, 1994.
13 H. D. Arlowe and D. E. Coleman, "The mobile intrusion detection and assessment system(MIDAS)", IEEE 1990 International Carnahan Conference on Security Technology, pp. 54-61, Oct. 10-12, 1990.
14 T. J. Ellis, P. L. Rosin, and P. Golton, "Model-based vision for automatic alarm interpretation", IEEE, International Carnahan Conference on Security Technology. pp. 62-67, 1990.
15 Y. Kuno and T. Watanabe, "Automated detection of human for viual surveillance System", IEEE, Information Center for Physics Research. pp. 865-869, 1996.
16 H. Murase, "Recognizing Individuals from the silhouettes of their walk", The Institute of Electronics, Information and Communication Engineers, 6, pp.1096-1098, 1992.
17 D. A. Pritchard, "Status of the video imaging system for detection tracking and assessment (VISDTA) scanning sensor program", IEEE, International Carnahan Conference on Security Technology. pp. 194-196, 1990.
18 S. U. Lee, Moving Object Segmentation and Classification Using Multi-Layer Neural Network on the Difference Image, M.S. Thesis, Kyunghee University, 1997.
19 Song, and K. B. Kim, "A study on intruder surveillance system using fuzzy binarization", Proceedings of the Korean Institute of Information and Commucation Sciences Conference, vol. 14, no. 1, pp. 201-204, 2010.
20 J. S. Do, "A robust algorithm for moving object segmentation in illumination variation", Journal of Korea Information Assurance Society, vol. 7, no. 1, pp. 1-10, 2007.
21 J. H. Park, H. G. Yeom, B. G. Jung, I. H. Jang, and K. B. Sim, "Soundsource localization and tracking system of intruder for intelligent surveillance system", Journal of Korean Institute of Intelligent Systems, vol. 17, no. 6, pp. 786-791, 2007.   DOI
22 C. W. Kwon, "Development of a Monitoring System Based on the Cooperation of Image and Sensor Information", Thesis of M. S. Degree, Daegu University, 2010.