The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Person re-identification is an important task in video surveillance systems. It can be formally defined as establishing the correspondence between images of a person taken from different cameras at different times. In this paper, we present a two stream convolutional neural network where each stream is a Siamese network. This architecture can learn spatial and temporal information separately. We also...
Person re-identification is the process of recognizing a person across a network of cameras with non-overlapping fields of view. In this paper we present an unsupervised multi-shot approach based on a patch-based dynamic appearance model. We use deformable graph matching for person re-identification using histograms of color and texture as features of nodes. Each graph model spans multiple images...
In this paper, we propose a novel method for generating visually appealing two-dimensional (2D) barcodes that resemble meaningful images to human observers. The technology of 2D barcodes, currently dominated by quick response codes, is widely adopted in many applications, including product tracking, document management, and general marketing. Such barcodes typically lack user friendly appearance and...
Video surveillance systems generate enormous amounts of data which makes the continuous monitoring of video a very difficult task. Re-identification of subjects in video surveillance systems plays a significant role in public safety. Recent work has focused on appearance modeling and dis- tance learning to establish correspondence between images. However, real-life scenarios suggest that the majority...
In the field of content based video retrieval, recent work has focused on creation and matching of signatures as an effective method for video search, copy or “near-duplicate” detection. In this paper, we address the question of how much content is enough to initiate a content based video retrieval query from a mobile device. We extract and utilize the motion vectors from an HEVC-encoded bitstream...
Entropy coding is an integral part of most data compression systems. Huffman coding (HC) and arithmetic coding (AC) are two of the most widely used coding methods. HC can process a large symbol alphabet at each step allowing for fast encoding and decoding. However, HC typically provides suboptimal data rates due to its inherent approximation of symbol probabilities to powers of 1 over 2. In contrast,...
Many two-dimensional (2D) barcodes, such as quick response (QR) codes, lack user-friendly appearance. Our goal in this paper is to generate 2D barcodes that “look” like recognizable images or logos. Standard steganographic methods hide a message (payload) in an image usually by modifying bits in a specific way using predetermined pixels of the image. This approach cannot be directly used for very...
Video surveillance systems that contain a large number of cameras makes the continuous monitoring of the video feeds nearly an impossible task. If the information from these many cameras is to be exploited automatic video analytic techniques must be developed. In this paper, we present improvements to a previously developed crowd flow estimation method. We use crowdsourcing techniques to enhance the...
Video surveillance systems that contain a large number of cameras makes the continuous monitoring of the video feeds nearly an impossible task. A transit or transportation authority usually deploys a video surveillance system to monitor and identify events in the system such as crowd behavior and crime. In this paper we present a method for automatically detecting people jumping or falling off a train...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.