Browse > Article

Robust Detection Technique for Abandoned Objects to Overcome Visual Occlusion  

Kim, Won (우송대학교 컴퓨터정보학과)
Publication Information
The Journal of the Institute of Internet, Broadcasting and Communication / v.10, no.6, 2010 , pp. 23-29 More about this Journal
Abstract
Nowadays it is required to design intelligent visual surveillance systems which automatically detect abandoned objects in public places to strengthen the social safety. Already recognized abandoned objects can be occluded partially or fully by surrounding people in public places after the first recognition. To improve an essential recognition performance index PAT, the system should overcome the occlusion problems. In this research, a design scheme is newly proposed to construct the robust detection system which is comprised of multiple stages considering the occlusion problem. To show the feasibilities of the proposed system, the evaluation was tried for the prepared image streams including 6 various situations and the experimental results show 96% and 75% in PAT performance for intrusion and abandoning events, respectively. Finally in spite of full occlusions by multiple persons, the proposed system shows the capability to continuously recognize the abandoned object after complex occlusions disappear.
Keywords
Visual surveillance; Occlusion; Abandoned object; Background extraction; PAT; PED;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 P. Viola, M. J. Jones, and D. Snow, "Detecting pedestrians using patterns of motion and appearance," The 9th ICCV, vol. 1, pp. 734-741, 2003.
2 K. Mikolajczyk, C. Schmid, and A. Zisserman, "Human detection based on a probabilistic assembly of robust part detectors," The 8th ECCV, vol. I, pp. 69-81, 2004.
3 N. Dalal and B. Triggs, "Histograms of oriented gradients for human detection," CVPR 2005, vol. 1, pp. 886-893, 2005.
4 N. Bird, S. Atev, N. Caramelli, R. Martin, O. Masoud, and N. Papanikolopulos, "Real Time, Online Detection of Abandoned Objects in Public Areas," Proceedings of the IEEE International Conference on Robotics and Automation, Orlando, Florida, May 2006.
5 F. Porikli, Y. Lvanov and T. Haga, "Robust Abandoned Object Detection Using Dual Foregrounds," EURASIP Journal on Advanced in Signal Processing, 2008.
6 I. Haritaoglu, D. Harwood, and L. S. Davis, "W4 : Real-Time Surveillance of People and Their Activities," IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 22, no. 8, August 2000.
7 W. Hu, T. Tan, L. Wang, and S. Maybank, "A Survey on Visual Surveillance of Object Motion and Behaviors," IEEE Trans. on Systems, Man, and Cybernetics-Part C, vol. 34, no. 3, August 2004.
8 W. Kim, "Automatic Detection System for Dangerous Abandoned Objects based on Vision Technology," Journal of The Institute of Webcasting, Internet and Telecommunication, August 2009.
9 W. Kim, "A Smart Visual Surveillance System with Human Recognition for Enhanced Detection of Abandoned Objects", Korean Institute of Information Technology, vol. 8, no. 10, pp. 209-214, October 2010.
10 J. Kong, Y. Zheng, Y. Lu, and B. Zhang, "A Novel Background Extraction and Updating Algorithm for Vehicle Detection and Tracking," Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007.
11 A. Mohan, C. Papageorgiou, and T. Poggio, "Example-based object detection in images by components," IEEE PAMI, pp. 349-361, April 2001.