Browse > Article
http://dx.doi.org/10.15207/JKCS.2020.11.8.039

Dangerous Abandoned Object Extraction Model Using Area Variation Characteristics  

Kim, Won (Division of IT Convergence, Woosong University)
Publication Information
Journal of the Korea Convergence Society / v.11, no.8, 2020 , pp. 39-45 More about this Journal
Abstract
Recently the terrors have been attempted in the public places of the nations such as United states, England and Japan by explosive things, toxic materials and so on. It is understood that the method in which dangerous objects are put in public places is one of the difficult types in detection. While there are the cameras recording videos for many spots in public places, it is very hard for the security personnel to monitor every videos. Nowadays the smart softwares which can analyzing videos automatically are utilized to detect abandoned objects. The method by Lin et al. shows comparatively high detection rates for abandoned objects but it is not easy to obtain the shape information because there is a tendency that the number of the pixels decreases abruptly along the time goes due to the characteristics of short-term background images. In this research a novel method is proposed to successfully extract the shape of the abandoned object by analysing the characteristics of area variation. The experiment results show that the proposed method has better performance in extracting shape information in comparison with the precedent approach.
Keywords
Convergence; Visual Tracking; Dangerous Abandoned Object; Background Image; Mixture of Gaussian;
Citations & Related Records
Times Cited By KSCI : 7  (Citation Analysis)
연도 인용수 순위
1 B. Kang & K. Lee. (2016). Fire Alarm Solutions Through the Convergence of Image Processing Technology and M2M, Journal of Korea Convergence Society, 7(1), 37-42. DOI : 10.15207/JKCS.2016.7.1.037   DOI
2 K. Kim, G. Geum & C. Jang, (2017). Research on the Convergence of CCTV Video Information with Disaster Recognition and Real-time Crisis Response System, Journal of Korea Convergence Society, 8(3), 15-22. DOI : 10.15207/JKCS.2017.8.3.015   DOI
3 H. Kim, Y. Park, K. Kim & S. Lee. (2019). Modified HOG Feature Extraction for Pedestrian Tracking, Journal of Korea Convergence Society, 10(3), 39-47. DOI : 10.15207/JKCS.2019.10.3.039   DOI
4 N. Bird, S. Atev, N. Caramelli, R. Martin, O. Masoud & N. Papanikolopulos. (2006). Real Time, Online Detection of Abandoned Objects in Public Areas. Proceedings of the IEEE International Conference on Robotics and Automation, Orlando, Florida. DOI: 10.1109/ROBOT.2006.1642279
5 F. Porikli, Y. Lvanov & T. Haga. (2008). Robust Abandoned Object Detection Using Dual Foregrounds. EURASIP Journal on Advanced in Signal Processing. DOI : 10.1155/2008/197875
6 W. Kim. (2013). Design of Mobile Security Robot for Detection of Abandoned Dangerous Object. Journal of Korean Institute of Information Technology, 11(9), 181-187.
7 F. Lv, X. Song, B. Wu, V. K. Singh & R. Nevatia. (2006). Left-luggage detection using Bayesian inference. Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, 83-90.
8 Y. Tian, R. S. Feris, H. Liu, A. Hampapur & M. T. Sun. (2011). Robust detection of abandoned and removed objects in complex surveillance videos. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 41(5), 565-576. DOI : 10.1109/TSMCC.2010.2065803   DOI
9 Q. Fan & S. Pankanti. (2011). Modeling of temporarily static objects for robust abandoned object detection in urban surveillance. Proceedings of IEEE International Conference on Advanced Video and Signal-Based Surveillance (AVSS), 36-41. DOI : 10.1109/AVSS.2011.6027290
10 H. H. Liao, J. Y. Chang & L. G. Chen. (2008). A localized approach to abandoned luggage detection with foreground-mask sampling. Proceedings of IEEE Fifth International Conference on Advanced Video and Signal Based Surveillance, 132-139. DOI : 10.1109/AVSS.2008.9
11 E. Auvinet, E. Grossmann, C. Rougier, M. Dahmane & Meunier. (2006). Left-luggage detection using homographies and simple heuristics. Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, 51-58.
12 N. Dalal & B. Triggs. (2005). Histograms of oriented gradients for human detection. Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 886-893. DOI : 10.1109/CVPR.2005.177
13 J. Lee, J. Lee & K. Lee. (2016). A Scheme of Security Drone Convergence Service using Cam-Shift Algorithm, Journal of Korea Convergence Society, 7(5), 29-34. DOI : 10.15207/JKCS.2016.7.5.029   DOI
14 K. Lin, S. C. Chen, C. S. Chen, D. Lin & Y. Hung. (2015). Abandoned Object Detection via Temporal Consistency Modeling and Back-Tracing Verification for Visual Surveillance. IEEE Transactions on Information Forensics and Security, 10(7), 1359-1370. DOI : 10.1109/TIFS.2015.2408263   DOI
15 V. Kadam, N. Shinde, S. Pol & S. Godse. (2016). Abandoned Object Detection. Imperial Journal of Interdisciplinary Research (IJIR, An On-line Journal), 2(6).