The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The objective of this study is to establish a rear-end collision warning system for an advance safety vehicle (ASV) by using a mounted rear-end monitoring camera. The paper attempted to analyze the driving environmental data and built up the rear-end collision warning logic on account of image processing. The main idea of the warning system is to prevent accidents caused by inattentive drivers. In...
A computer vision based algorithm for wildfire detection is developed. The main detection algorithm is composed of four sub-algorithms detecting (i) slow moving objects, (ii) gray regions, (iii) rising regions, and (iv) shadows. Each algorithm yields its own decision as a real number in the range [-1,1] at every image frame of a video sequence. Decisions from subalgorithms are fused using an adaptive...
For the growing number of accidents caused by poor visibility, visibility measurement which can alert drivers and inform traffic division managements when poor visibility occurs is a key parameter in driving assistance system. This paper is to implement a visibility measurement system that based on traffic video-surveillance system can both detect fog and estimate visibility distance. We propose a...
Natural disasters such as earthquake, tsunami, typhoon and hurricane in addition to annual disaster have frequently happened at many places around the world. Once disaster happened, communication network and information system are seriously damaged and communication means for residents cannot be used in the disaster area. Therefore, it is required to prepare emergency network system which can be quickly...
In this paper, we present a texture-based multitarget tracking algorithm. Moving objects are described by local binary patterns (LBP), which is a kind of discriminative texture descriptor. The Kalman filter is introduced into the algorithm to predict the blob's new position and size. Blobs are searched in the neighborhood of the Kalman predictions. If more than one are found, the LBP distance, which...
A robust approach to detection and tracking of multiple moving targets from a moving camera is presented. The main novelty of this approach is that objects are represented using efficient compact form of the colour correlogram. Like previous correlograms, this encodes both spatial pattern and appearance information about the target. However it is less complex to compute, making it applicable to real...
Due to the increased need for security and surveillance, PTZ cameras are now being widely used in many domains. Therefore, it is very important for the applications like video mosaic generation or automatic surveillance that these camera be accurately calibrated. In this paper, we address the problem of parameter refinement for such pan-tilt-zoom (PTZ) cameras. Use of bundle-adjustment for parameter...
We propose an automatic method to geo-register maritime video feeds to satellite images. The method first detects horizon during the day time and apex during the night time for similarity rectification. It then finds water pixels on both satellite images and camera views. Finally, geo-registration is obtained by searching the best orientation where the water masks are matched. The current state-art-of-state...
In this paper a novel way to control the amount of generated video surveillance data by controlling the spatial and temporal samplings of video is proposed. The samplings are controlled adaptively using the speed, distance and dimension of the object extracted dynamically from the surveillance video. We also present a method of estimating the actual 2D dimension, location and speed of moving objects...
We present a simple multiple view 3D model for object tracking and identification in camera networks. Our model is composed of 8 distinct views in the interval [0, 7pi/4]. Each of the 8 parts describes the person's appearance from that particular viewpoint. The model contains both color and structure information about each view which are assembled into a single entity and is meant as a simple, lightweight...
Face recognition from video typically involves two steps: face detection and face recognition. One of the problems associated with poor face recognition results is poor face detection. In this work, we devise a three-step strategy to prune a set of frames in a probe video to that subset in which the face is actually found and in which the matching scores are more reliable. We also exploit temporal...
We consider cameras whose outputs do not reflect true scenes as faulty cameras. To build a fault detection video surveillance system without using additional hardware devices, we use the video outputs from cameras to do self-checking. We study two categories of faults: spatial faults and temporal faults, and reduce the two sub-problems into graph theoretical problems on two graphs (surveillance sharing...
The human iris is hypothesized to be the best biometric characteristic in terms of uniqueness and robustness. Iris recognition algorithms developed over the last decade have matured significantly to address population-level cross comparisons. Yet iris acquisition systems remain borderline intrusive and less-friendly for subjects and operators. This paper addresses the issue of strictly-constrained...
The iris is a highly accurate biometric identifier. However widespread adoption is hindered by the difficulty of capturing high-quality iris images with minimal user co-operation. This paper describes a first-generation prototype iris identification system designed for stand-off cooperative access control. This system identifies individuals who stand in front of and face the system after 3.2 seconds...
Detecting abnormal behaviors is a critical task today. We need to monitor large areas, manage camera sensor data, and use this data for detecting behaviors, detecting the abnormal behaviors and classifying the normal behaviors. In order to monitor large areas, we need multiple cameras across a large-scale network. We use an architecture for a network of clustered cameras to minimize and efficiently...
While wide-area video surveillance is an important application, it is often not practical, from a technical and social perspective, to have video cameras that completely cover the entire region of interest. For obtaining good surveillance results in a sparse camera networks requires that they be complemented by additional sensors with different modalities, their intelligent assignment in a dynamic...
This paper presents a method of pedestrian counting using an IR line laser. In the proposed method, only reflection of IR line laser onto pedestrians is obtained using an IR filter. Hence acquisition of moving object images is extremely simple and reliable compared to other vision-based method. The number of pedestrians is counted using simple blob analysis and their moving directions are obtained...
In video surveillance systems, more intelligent functions are being embedded into cameras. In this paper, we propose a novel approach for detecting moving objects with fewer false alarms and low computational complexity. Contrary to traditional temporal differencing, we suggest a new feature based on signed difference, which represents the pattern of motion in a given region. The pattern is measured...
In this paper, we propose novel methods for background modeling, occlusion handling and event recognition by using multi-camera configurations. Homography-related positions are utilized to construct a mixture of multivariate Gaussians to generate a background model for each pixel of the reference camera. Occlusion handling is achieved by generation of the top-view via trifocal tensors, as a result...
In large scale surveillance systems, a number of CCTV cameras are installed in distributed premises and are connected to a central control station, where human operators observe the different camera views for identifying a probable security breach. In such situations, it is particularly difficult for the operator to pay attention to all camera views. Studies have shown that a human operator can effectively...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.