SlideShare a Scribd company logo
1 of 8
Download to read offline
Full Paper
ACEEE Int. J. on Information Technology , Vol. 3, No. 3, Sept 2013

Pedestrian-traffic Logging Unit with Tailgating
DetectionUsingRange Image Sensor
Yuki Uranishi1*, Yasufumi Moriie2, Yoshitsugu Manabe3, Osamu Oshiro1 and Kunihiro Chihara4
1*

Osaka University, 1-3 Machikaneyama, Toyonaka, Osaka, 560-8531 Japan
Email: {uranishi, oshiro}@bpe.es.osaka-u.ac.jp
2
Nara Institute of Science and Technology, 8916-5 Takayama, Ikoma, Nara, 630-0192 Japan
3
Chiba University, 1-33 Yayoi, Inage, Chiba-city, Chiba, 263-8522 Japan Email: manabe@faculty.chiba-u.jp
4
Osaka Electro-Communication University, 1130-70 Kiyotaki, Shijonawate, Osaka, 575-0063 Japan
Email: chihara@is.naist.jp
We propose a method for logging the passing of peopleat
a gateway even if a person passes through the gatewayby
tailgating. Besides, the method aims at logging thepeople
without cumbersome procedures when people passthrough
the gateway. We focus that all tailgating personspass through
the gateway with an identified person. We definethe identified
person as a potential inviter of the tailgatingperson. The
proposed method can improve an accuracyof the pedestriantraffic analysis with the person-unit log. Inaddition, the users
do not have any extra procedures forthe identification. In
this paper, we show a logging unit withtailgating detection
using cameras and a range image sensor.The proposed
method can log the passing in a person-unitby using the
cameras and the range image sensor in additionto card readers
for identification. Firstly, a number ofpeople in front of the
card reader is counted by the range imagesensor. Secondly,
the camera image taken at the sametime as the identification
is divided into individual regionsbased on the range image.
Lastly, the passing is logged ina person-unit. The identified
person is logged with his/herown ID. On the other hand, the
tailgating person is loggedas the tailgating people with the
ID of the person identifiedat the same time and the individual
camera image.
The proposed method has two major advantages over
other conventional methods as the following. Firstly, a
person-unit log is obtained by using the proposed method.
The conventional event detection methods have detected
and logged in an event-unit. The proposed method enables
to log the event in a person-unit, and it is useful to analyze
the pedestrian-traffic. Secondly,the proposed method is
robust over colors and lightings of a target scene to detect
the tailgating.A prototype has been implemented to show
the advantages above, and experimentalresults have
demonstrated that the prototype of theproposed method can
obtain the log of the passing includingthe tailgating people.

Abstract—This paper proposes a method for logging people
whichpass through a gateway in buildings or regions. The
proposed method detectsunexpected passing called tailgating.
The tailgating means that anon-identified person tries to enter
or leave a room by tagging after anotheridentified person.
The tailgating person does not appear on the log recordedby
conventional identification systems. The proposed method
logs the passingin a person-unit by using cameras and a range
image sensor. Firstly, thenumber of people in front of the card
reader is counted by the range imagesensor. Secondly, the
camera image taken at the same time as the identificationis
separated individually based on the projected range image.
Lastly,the passing is logged in a person-unit. The tailgating
person is logged withthe individual camera image and the ID
of the inviter. Experimental resultshave demonstrated that
the prototype of the proposed method can obtainthe log of the
passing including tailgating people.
Index Terms—logging pedestrian traffic, tailgating detection,
range imagesensor, sensor fusion

I. INTRODUCTION
People are often identified to open a door and to
passthrough a gateway with their identification card or their
ownbodily characteristics, and the events are logged atthe
same time [1][2]. The log is utilized for analyzing orcontrolling
traffic of pedestrian similar as car traffic analysis[3]. For
example, a displacement of the person is applicablefor
marketing at a store. In addition, a throughput ateach gateway
is useful information for controlling the number of
peoplebetween the gateways. It is desirable that a personunitlog is obtained instead of an event-unit log by the
existingidentification systems to utilize the log in above cases.
To log the people correctly, a problem called
tailgatingshould be considered. Tailgating means tagging
afteranother identified person to skip the identification. Fig.1
shows an example of the tailgating. Person of rightside passes
through the gateway by tagging after left personwho has
been identified. The person who passes throughby tailgating
does not appear on the log. It is desirable thatthe tailgating is
detected precisely in order to analyze thepedestrian-traffic
precisely. However, in case that the peopleare identified for
logging the events and analyzing thetraffic of people, the
conventional tailgating-detection systemsneed a
cumbersome procedure.
© 2013 ACEEE
DOI: 01.IJIT.3.3. 1

II. RELATED WORKS
The tailgating is serious problem in a field of car traffic
analysisfor both precise toll collection and traffic control
[4][5].Similarly, the tailgating should be considered for
precisepedestrian traffic analysis.
Basic idea for preventing the tailgating is forcing
usersalone when they are identified. A personal room which
14
Full Paper
ACEEE Int. J. on Information Technology , Vol. 3, No. 3, Sept 2013

Figure 1. An example of person entering a locked room by tailgating. The left person is identified by theentry control system to open the
door. On the other hand, the right person enters the room by followingthe identified person. The tailgating person is not logged in this case

includesan identification system and a gate [6] is effective
fortailgating prevention and utilized in fortified rooms or
buildings.Various technologies are also used for the
tailgatingdetection. A mass sensor which is set on a floor of
the identificationarea [7], and an infrared beam [8][9] are used
intopractical uses for counting the number of people in front
ofthe gate. And a thermal sensor are also used for the tailgating
detection [10][11]. The methods are intended to shutout the
tailgating person if the tailgating is detected for thesecurity.
However, in case that the people are identified forlogging the
events and analyzing the traffic of people, suchtailgating
detection may be regarded as a cumbersome procedurefor
the users.
Several camera-based methods for passive observingand
tracking the human flow have been proposed. Elguebalyet
al. has proposed the method for separating an image
intoindividual regions in variable environments [12]. The
camerasare also used for human gait extraction and
recognitionfor human motion analysis [13][14]. Similarly,
footsteps ofthe people are also visualized from top-view
cameras [15].The top-view camera is effective to avoid an
occlusion. Onthe other hand, the camera-based methods are
sensitive tochange of the lighting. The camera-based
methods is notsuitable when the gateway which is set at the
uncertain lightings.
We have proposed the method for logging and the
analyzingthe identified people using cameras in
combinationwith other sensors [16]. In this paper, we propose
a methodfor logging the people with tailgating detection by
introducinga range image sensor.

countingand identifying people from camera images have
been proposed[18][19][20]. However, it is difficult to detect
and count the people correctly using only cameras in the
tailgatingsituation, because the tailgating person is mostly
closeto another identified person to pass through the
gateway atthe same time as the identified person. So we
introduce arange image sensor in combination with the
cameras to detectand count the person correctly. The cameras
are set atfront and behind the gate to take the pictures head
on. Therange sensor is attached to the roof. A range image is
captureddownward to avoid occluding. To detect and
analyzeonly human-height objects, the range image is
thresholdedby as following:
(1)
where
and
is depth value of the source
andthe thresholded range image, respectively.
B. Calibration between Sensors
Fig. 3 shows a relationship between coordinate
systemsused in the proposed method. A given
point
on arange image is projected onto a
point
on a cameraimage coordinate system as
following:
(2)
where Pcam is a 3*4 transformation matrix from world
coordinatesystem to camera image coordinate system, and
Pr+ is a 4*3 transformation matrix from range image
coordinatesystem to world coordinate system. Note that Pr+
is apseudo-inverse matrix of Pr ,which is a transformation
matrixfrom world coordinate system to range image
coordinatesystem.
A reference object is utilized for calibrating between the
range image sensor and the cameras. Figs. 4 (a) and(b) are a
side-view and a top-view of the object, respectively.The reference object defines the world coordinate system,and corner points on the reference object are used as a referencepoint.
At least 4 reference points should be visible fromthe range
image sensor, and at least 6 reference points alsoshould be
visible from the cameras to calibrate between therange image

III. PROPOSED METHOD
The proposed method is for logging people who
passthrough a gateway including the tailgating people.
Camerasand a range image sensor are used for the
proposedmethod in addition to an identification system. The
proposedmethod is to detect the tailgating persons whom
theconventional identification systems [17] cannot detect.
A. Configuration
Fig. 2 shows an overview of the proposed method.
Theproposed method consists of cameras to take pictures,
arange image sensor to count a number of people and
cardreaders to identify people. Several methods for
© 2013 ACEEE
DOI: 01.IJIT.3.3. 1

15
Full Paper
ACEEE Int. J. on Information Technology , Vol. 3, No. 3, Sept 2013
sensor and the cameras. Figs. 5 (a) and (b)are examples of
images taken by the camera and the rangeimage sensor, respectively. The reference points can be locatedin both images from their photometric or geometricfeatures of the reference object. And then, Pcam and Pr+ areestimated by calculating pseudo-inverse matrix [21].

Figure 3. Coordinate systems used in the proposed unit. Range image
coordinatesystem
is converted into world coordinate system
with a projection matrix
. On the other hand, the world
coordina tesystem is converted into camera coordinate system
with a projectionmatrix
. To calibrate between the
range image sensor and thecameras, Reference object is set and observed

Figure 4. A reference object for calibrating between the cameras and
therange image sensor. Corner points are used for the calibration, and
theposition of the corners in the world coordinate system are known.
At least4 points should be visible from the range image sensor, and at
least 6 pointsshould be visible from the cameras. The unit of the
length in the figures isa centimeter. (a) Side view of the box. (b) Top
view of the box.

Figure 2. An overview of proposed logging unit. The proposed unit
consistsof cameras and a range image sensor to detect tailgating in
addition to cardreaders. (a) Side view of the unit. The cameras are
set at the front of thedoor. (b) Top view of the unit. The range
image sensor is attached to theroof.

C. Dividing Range Image and Camera Image
The range image is divided into separated individual
regionsand projected onto the camera image to divide the
cameraimage into separated individual regions.
1) Dividing Range Image
Firstly, non-zero pixels in the range image are labeled.
Itshould be considered that labeled region consists of two
ormore persons when the persons are close to each other.
Thenumber of the people in the region is estimated from a
shapeof projection histogram. Fig. 6 (a) shows an input
rangeimage and obtained projection histogram. Principal
ComponentAnalysis (PCA) is employed to determine two
coordinateaxes and newly at each label. The axes are
parallel to the first principal component and the
secondprincipal component by the PCA, respectively. And
an originof the axes is identical with left lower point of the
rangeimage. The projection histogram
is obtained as:

Figure 5. Images captured by the camera and the range image sensor in
casethat the target is the reference object shown in Fig. 4. The corner
pointscan be located in both the camera image and the range image.
(a) Capturedimage taken by the camera. (b) Captured image taken by
the range imagesensor. Note that the image is described as the falsecolor image.

where (ci, s) is the value of the range image on the (c,s)
coordinate system in Fig. 6 (a), and
. Let lbp(c) be
theline from
to
, and lbp(c)
be the line from
where Cigin is the smallest

(3)
© 2013 ACEEE
DOI: 01.IJIT.3.3. 1

16
Full Paper
ACEEE Int. J. on Information Technology , Vol. 3, No. 3, Sept 2013
value of where
0, Cpeak is the value of when has
themaximum value and is the largest value of where. As shown
in Fig. 6 (c), it is assumed that theshape of the histogram is
similar to the lines andwhenthe region consists of single
person. On the other hand, theshape of the histogram is nt
similar to the lines andwhen the region consists of two or
more persons, as shownin Fig. 6 (d). The sum of the squared
difference betweenthe lines ,and the histogram is
calculatedas:

(4)
The region is divided at the line corresponding to the valley
of the histogram if
td, where td is constant.Theprocess
is repeated recursively until
for all regions.Fig. 6
(b) shows the divided range image.
2) DividingCamera Image
Camera image is also divided into separated individual
regionsaccording to the divided range image. Fig. 7 showsan
example of the process. Firstly, visible pixels are extractedfrom
the range image. The nearest foreground pixelon a line of
sight corresponding to each pixel of the cameraimage is
extracted from the range image. Secondly, anexistence region
of each person is estimated on the horizontalaxis of the range
image shown in Fig. 7 (a). Lastly, theestimated existence
regions are projected onto the cameraimage, and mask images
corresponding to each person aregenerated as shown in Fig.
7 (b).

Figure 6. Dividing a region into separated individual regions based on
PrincipalComponent Analysis (PCA). (a) Two axes c and s, which are
respectivelyparallel to the first principal component and the second
component,are determined at each labeled region. Then, projection
histogram
isobtained. (b) Divided regions by the proposed method.
(c) An example ofthe histogram in case that the region consists of
one person. (d) An exampleof the histogram in case that the region
consists of two persons.

The individual images arelogged. The proposed system
assumes that the closest personto the card reader is the identified person and others arethe tailgating person on the camera image.

D. Logging People Including Tailgating Person
Incase that persons pass through the gateway at the
sametime, there are always one inviter and n-1 tailgating
persons.The tailgating person is logged with the personal
IDnumber of the inviter, because the inviter may have a
responsiblefor the tailgating. In addition, the camera
imagecaptured at the same time as the identification is
dividedinto separated individual regions.

IV. Experimental Results
A prototype of the proposed method was implemented.
Experimentalsettings and results by the prototype are
writtenbelow.

Figure 7. Dividing camera image into individual images. (a) Extracted
visiblepixels on the range image. An existence region of each person
A and Bis estimated on the horizontal axis of the range image. (b)
Projected existenceregions onto the camera image. The individual
images are extractedusing the existence regions.

© 2013 ACEEE
DOI: 01.IJIT.3.3. 1

Figure 8. An overview of the experimental settings. It is assumed that
theidentified person is always leftmost person on the camera image,
becausethe card reader is set at the left side of the sight of the camera
correspondingto the card reader.

17
Full Paper
ACEEE Int. J. on Information Technology , Vol. 3, No. 3, Sept 2013
and other0 to 2 persons tried to pass through the gateway
by tailgating.

Figure 9. Positions of the range image sensor, the camera and the
cardreader. The camera was set at 0.60 meters high from the ground
level.The object appeared on the range image in case that the height
of the objectwas taller than 1.30 meters.

A. Settings
Fig. 8 shows an overview of the experimental settings.The
range image sensor was MesaImagingSwissRangerSR3000.
The width and the height of the captured rangeimage were
176 and 144 pixels, respectively. A frame rateof the range
sensor was 25 frames per second on average.The range image
sensor was set at 2.70 meters high from theground level. Two
Logitech Qcam were used in the experiment.Camera images
were captured at the same time as theidentification with the
card reader. The width and the heightof the camera image
were 320 and 240 pixels, respectively.In addition, two of SONY
PaSoRi RC-S320 were used as cardreaders for the
identification. The users were identified bytouching their own
identification card to the reader. In theexperiment, it was
assumed that the identified person wasalways leftmost person
on the camera image, because thecard reader was set at the
left side of the sight in the camerafacing to the users. And the
size of the identification areawas determined by the view
angle and the altitude of therange image sensor. In the
experiment, the width and theheight of the identification area
were 2.00 and 1.50 meters,respectively.

Figure 10. Divided individual images by the prototype in case that 2
personspa ssed through the gateway at a time. (a) Camera ima ge
captured by thefront camera. (b) Range image captured at the same
time as the cameraimage. (c) Divided individual image of the left
person. The person wasestimated to be identified. (d) Divided individual
image of the right person.The person wa s estimated to enter by
tailgating.

B. Experimental Results
Table I shows experimental results by the prototype.
Itshows that 82 persons tried to pass through the gatewayby
tailgating, and 62 persons were logged by the
proposedmethod.

TABLE I. EXPERIMENTAL RESULTS

Method
Proposed method
Han et al. 2004 [20]

Trial
1
2
1
2

Tailgaters
52
30
37
45

Detected tailgaters
38
24
35
42

Fig. 9 shows the positions of the camera and therange
image sensor in the experiment. The camera wasset at 0.60
meters high from the ground level and horizontalposture.
The threshold to extract human-height object th = 1.30. The
object appeared on the range image in casethat the height of
the object was taller than 1.30 meters. Inaddition, the threshold
for dividing the region on the rangeimage td = 1000 in the
experiment.
In the experiment, One to three persons formed
groupsrandomly at each passing. It indicates that one
personpassed through the gateway with the identification,
© 2013 ACEEE
DOI: 01.IJIT.3.3.1

Figure 11. Divided individual images by the prototype in case that 3
personspassed through the gateway at a time. (a) Source image captured
bythe front camera. (b) Divided individual image of the left person.
Theperson was estimated to be identified. (c) Divided individual image
of thecenter person. The person was estimated to enter by tailgating.
(d) Dividedindividual image of the right person. The person was also
estimated to enterby tailgating.

18
Full Paper
ACEEE Int. J. on Information Technology , Vol. 3, No. 3, Sept 2013
regions utilizingthe shape of the human. The number of the
people iscounted from the separated range image, and the
enteringand the leaving are logged in a person-unit with the
individual camera image.
The experimental results have demonstrated that
thetailgating people were newly logged by the prototype of
theproposed method even if people tried to pass through
thegateway by the tailgating. On the other hand, there
weresome failure cases. The region in the range image was
notdivided correctly due to the noise on the range image.

Fig. 10 shows an example of the divided individualimages.
Fig. 10 (a) is a source image captured by the frontcamera at
the same time as the identification. Fig. 10 (b) is arange image
at the same time as the identification. Figs. 10(c) and (d) are
divided individual images. In this case, rightperson tried to
enter by the tailgating. The prototype succeededin counting
the number of the person in front of thecard reader correctly,
and individual images were recordedby the proposed method.
Fig. 11 also shows an exampleof the dividing. Fig. 11 (a) is a
source image captured at thesame time as the identification.
Figs. 11 (b), (c) and (d) aredivided individual images. The left
person (b) was estimatedas the identified person and logged
with his own ID number.The person(d) were estimated as the
tailgating person and logged withthe ID number of the left
person.
C. Discussions
The failure cases in the experiment and the limitation of
theproposed method are discussed in this section. In the
caseshown in Fig. 12, the left person did not appear on therange
image. This is because the region was divided mistakenly by
the noise, and the smaller fragments of the humanregion were
removed by labeling as a circled region inFig. 12 (b). Fig. 13
shows another example of the failurecases. As shown in Fig.
13 (b), the region was correctly extractedin the case. However,
it was estimated wrongly thatthe region contained three persons due to the extra borderlineas shown in Fig. 13 (c). A
major cause of the errors wasa noise on the range image. The
range images have limitedresolutions and contain much random noises.The proposed method has been not yet suitable
for ahigh-security gate control, because the detection rate
ofthe proposed method is still lower than 80%. To increasethe
accuracy, it is discussed that the time-sequential rangeimages
are introduced. In addition, we are planning to introduceother
kinds of sensors in combination with the methodproposed in
this paper.The proposed method was also compared to the
conventionalimage-based method proposed by Han et al.
[20]in TableI. The detection rate of the proposed method
islower than the rate of the method [20]. However, the
proposedmethod has succeeded in dividing contiguous
groupinto individual images, and the number of the people in
thegroup was counted. It is difficult for the conventional image-basedmethods. In addition, the proposed method is
robustover colors and lightings of the scene, because the
methodemploys an infrared range image sensor. It means that
theproposed method would be used in dark scenes, such as
agate at night or a darkroom. We are also planning to test
theproposed method in such situations.

Figure 12. An example of the failure case. (a) Camera image captured
bythe camera. (b) Range image. The fragment is missing in circled
area. (c)Projection histogram corresponding to the range image (b).
It was assumedthat the region contained one person due to the missing
fragment.

The proposed method can improve the accuracy of
thepedestrian-traffic analysis based on a person-unit
loggingwith the tailgating detection. It indicates that more
efficientmarketing in the store will be realized in the system.
Besides,the proposed unit does not increase the complexity
forthe users compared to the conventional tailgating
preventionmethods. The proposed method would estimate
and recordother characteristics of the users, such as height,
weight andgender from the camera images and the range
images. Thecharacteristics would be effective for the
marketing analysis.

V. CONCLUSIONS
In this paper, the method for logging traffic of
pedestrianwith tailgating detection has been proposed. The
proposedmethod consists of cameras and a range image
sensor in additionto an identification system. The people are
capturedby the range image sensor and the cameras
simultaneously.The regions are separated into the individual
© 2013 ACEEE
DOI: 01.IJIT.3.3. 1

19
Full Paper
ACEEE Int. J. on Information Technology , Vol. 3, No. 3, Sept 2013

[2]

[3]

[4]

[5]

[6]
[7]
[8]
[9]
[10]

[11]
[12]

[13]
Figure 13. Another example of the failure case. (a) Camera image
capturedby the camera. (b) Range image. (c) Projection histogram
corresponding tothe range image (b). It was assumed that the region
contained three personsdue to the extra borderline. Two arrows indicate the border-lines.

[14]

Future works will aim at logging persons by multipleunits
set at several gateways and analyzing the pedestriantraffic.And we are planning to obtain further informationfrom
the camera images and range image, such as a result offace
recognition.

[15]

[16]

ACKNOWLEDGMENT
This work was supported in part by Japan Society for the
Promotion of Science (JSPS) KAKENHI Grant Number
24700092.

[17]

REFERENCES

[18]

[1] J.M. Gascuena, A. Fernandez-Caballero, E. Navarro, J. SerranoCuerda, and F.A. Cano, “Agent-based development of
multisensorymonitoring systems,” Proceedings of the 4th
International Conferenceon Interplay between Natural and

© 2013 ACEEE
DOI: 01.IJIT.3.3. 1

20

Artificial Computation – Volume Part I, pp.451–460, SpringerVerlag, May-June 2011.
E.B. Fernandez, J. Ballesteros, A.C. Desouza-Doucet, and
M.M.Larrondo-Petrie, “Security patterns for physical access
control systems,”Proceedings of the 21st Annual IFIPWG11.3
Working Conferenceon Data and Applications Security,
pp.259–274, Springer-Verlag, July 2007.
L. Neubert, L. Santen, A. Schadschneider, and M.
Schreckenberg,“Single-vehicle data of highway traffic: A
statistical analysis,” PhysicalReview E, vol.60, no.6, pp.6480–
6490, 1999.
B. Tseng, C.Y. Lin, and J. Smith, “Real-time video surveillance
fortraffic monitoring using virtual line analysis,”Proceedings
of the 2002 IEEE International Conferenceon Multimedia and
Expo, vol.2, pp.541–544, August 2002.
P.G. Michael, F.C. Leeming, and W.O. Dwyer, “Headway on
urbanstreets: observational data and an intervention to decrease
tailgating,”Transportation Research Part F: Traffic Psychology
and Behaviour,vol.3, no.2, pp.55–64, 2000.
Networks, “SBOX.”http://sbox.jp/
JNSS, “Security robogate.” http://www.jnss.co.jp/pdf/
SecurityRoboGate catalog.pdf.
TakachihoKoheki, “C-cure800.” http://www.takachihokk.co.jp/
Designed Security Inc., “Entry sentry es5200.” http://
www.dsigo.com/
A.N. Rimmer, “Access control violation prevention by low
cost infrareddetection,” Proceedings of the SPIE the
International Societyfor Optical Engineering, vol.5403, no.2,
pp.823–830, September2004.
Irisys, “Irisys access control tailgate detection.” http://
www.irisys.co.uk/
T. Elguebaly and N. Bouguila, “A nonparametric bayesian
approachfor enhanced pedestrian detection and foreground
segmentation,”Proceedings of the 2011 IEEE Computer Society
Conference on Computer Vision and Pattern Recognition
Workshops, pp.21–26, June 2011.
M. Goffredo, I. Bouchrika, J. Carter, and M. Nixon,
“Performanceanalysis for automated gait extraction and
recognition in multicamerasurveillance,” Multimedia Tools and
Applications, vol.50,pp.75–94, 2010.
D. Wagg and M. Nixon, “On automated model-based extraction
andanalysis of gait,” Proceedings of the Sixth IEEE
International Conference on Automatic Face and Gesture
Recognition,pp.11–16,May 2004.
O. Ozturk, T. Matsunami, Y. Suzuki, T. Yamasaki, and K.
Aizawa,“Real-time tracking of humans and visualization of
their future footstepsin public indoor environments,”
Multimedia Tools and Applications,pp.1–24, 2012.
Y. Uranishi, M. Sakata, I. Arai, Y. Manabe, H. Sunahara, and
K. Chihara,“Book management system using various sensor
network,”Proceedings of International Workshop on Advanced
Image Technology,pp.B6-4, January 2008.
C. Wren, A. Azarbayejani, T. Darrell, and A. Pentland, “Realtimetracking of the human body,” IEEE Transactions on Pattern
Analysisand Machine Intelligence, vol.19, no.7, pp.780–785,
1997.
S. Velipasalar, L.M. Brown, and A. Hampapur, “Specifying,
interpretingand detecting high-level, spatio-temporal
composite eventsin single and multi-camera systems,”
Proceedings of the 2006 IEEE Computer Society Conference
on Computer Vision and Pattern Recognition Workshops,
p.110, 2006.
Full Paper
ACEEE Int. J. on Information Technology , Vol. 3, No. 3, Sept 2013
[19] M. Enzweiler and D.M. Gavrila, “Monocular
pedestriandetection:Survey and experiments,” IEEE
Transactions on Pattern Analysisand Machine Intelligence,
vol.31, no.12,pp.2179–2195, 2009.
[20] M. Han, W. Xu, H. Tao, and Y. Gong, “An algorithm for
multipleobject trajectory tracking,” Proceedings of the 2004
IEEE ComputerSociety Conference on Computer Vision and

© 2013 ACEEE
DOI: 01.IJIT.3.3.1

Pattern Recognition,vol.1, pp.I-864–I-871,June-July 2004.
[21] G.T. Marzan and H.M. Karara, “A computer program for
direct linear transformation solution of the collinearity
condition, and someapplications of it,” Proceedings of the
Symposium on Close-Range PhotogrammetricSystems,
pp.420–476, 1975.

21

More Related Content

What's hot

Paper id 252014106
Paper id 252014106Paper id 252014106
Paper id 252014106IJRAT
 
Deep Learning Approach Model for Vehicle Classification using Artificial Neur...
Deep Learning Approach Model for Vehicle Classification using Artificial Neur...Deep Learning Approach Model for Vehicle Classification using Artificial Neur...
Deep Learning Approach Model for Vehicle Classification using Artificial Neur...IRJET Journal
 
Tracking and counting the
Tracking and counting theTracking and counting the
Tracking and counting theijistjournal
 
OpenCVand Matlab based Car Parking System Module for Smart City using Circle ...
OpenCVand Matlab based Car Parking System Module for Smart City using Circle ...OpenCVand Matlab based Car Parking System Module for Smart City using Circle ...
OpenCVand Matlab based Car Parking System Module for Smart City using Circle ...JANAK TRIVEDI
 
LICENSE NUMBER PLATE RECOGNITION SYSTEM USING ANDROID APP
LICENSE NUMBER PLATE RECOGNITION SYSTEM USING ANDROID APPLICENSE NUMBER PLATE RECOGNITION SYSTEM USING ANDROID APP
LICENSE NUMBER PLATE RECOGNITION SYSTEM USING ANDROID APPAditya Mishra
 
IMPLEMENTATION OF LANE TRACKING BY USING IMAGE PROCESSING TECHNIQUES IN DEVEL...
IMPLEMENTATION OF LANE TRACKING BY USING IMAGE PROCESSING TECHNIQUES IN DEVEL...IMPLEMENTATION OF LANE TRACKING BY USING IMAGE PROCESSING TECHNIQUES IN DEVEL...
IMPLEMENTATION OF LANE TRACKING BY USING IMAGE PROCESSING TECHNIQUES IN DEVEL...ijma
 
Projection Profile Based Number Plate Localization and Recognition
Projection Profile Based Number Plate Localization and Recognition Projection Profile Based Number Plate Localization and Recognition
Projection Profile Based Number Plate Localization and Recognition csandit
 
FRONT AND REAR VEHICLE DETECTION USING HYPOTHESIS GENERATION AND VERIFICATION
FRONT AND REAR VEHICLE DETECTION USING HYPOTHESIS GENERATION AND VERIFICATIONFRONT AND REAR VEHICLE DETECTION USING HYPOTHESIS GENERATION AND VERIFICATION
FRONT AND REAR VEHICLE DETECTION USING HYPOTHESIS GENERATION AND VERIFICATIONsipij
 
Traffic Light Detection for Red Light Violation System
Traffic Light Detection for Red Light Violation SystemTraffic Light Detection for Red Light Violation System
Traffic Light Detection for Red Light Violation Systemijtsrd
 
Automatic vision based inspection of railway track
Automatic vision based inspection of railway trackAutomatic vision based inspection of railway track
Automatic vision based inspection of railway trackeSAT Publishing House
 
Automatic vision based inspection of railway track
Automatic vision based inspection of railway trackAutomatic vision based inspection of railway track
Automatic vision based inspection of railway trackeSAT Journals
 
Content based indexing and retrieval from vehicle surveillance videos
Content based indexing and retrieval from vehicle surveillance videosContent based indexing and retrieval from vehicle surveillance videos
Content based indexing and retrieval from vehicle surveillance videosIAEME Publication
 
Reduced Dimension Lane Detection Method
Reduced Dimension Lane Detection MethodReduced Dimension Lane Detection Method
Reduced Dimension Lane Detection Methodijtsrd
 
MULTIPLE OBJECTS TRACKING IN SURVEILLANCE VIDEO USING COLOR AND HU MOMENTS
MULTIPLE OBJECTS TRACKING IN SURVEILLANCE VIDEO USING COLOR AND HU MOMENTSMULTIPLE OBJECTS TRACKING IN SURVEILLANCE VIDEO USING COLOR AND HU MOMENTS
MULTIPLE OBJECTS TRACKING IN SURVEILLANCE VIDEO USING COLOR AND HU MOMENTSsipij
 

What's hot (19)

Ijcatr04041021
Ijcatr04041021Ijcatr04041021
Ijcatr04041021
 
Paper id 252014106
Paper id 252014106Paper id 252014106
Paper id 252014106
 
proceedings of PSG NCIICT
proceedings of PSG NCIICTproceedings of PSG NCIICT
proceedings of PSG NCIICT
 
Deep Learning Approach Model for Vehicle Classification using Artificial Neur...
Deep Learning Approach Model for Vehicle Classification using Artificial Neur...Deep Learning Approach Model for Vehicle Classification using Artificial Neur...
Deep Learning Approach Model for Vehicle Classification using Artificial Neur...
 
Tracking and counting the
Tracking and counting theTracking and counting the
Tracking and counting the
 
OpenCVand Matlab based Car Parking System Module for Smart City using Circle ...
OpenCVand Matlab based Car Parking System Module for Smart City using Circle ...OpenCVand Matlab based Car Parking System Module for Smart City using Circle ...
OpenCVand Matlab based Car Parking System Module for Smart City using Circle ...
 
LICENSE NUMBER PLATE RECOGNITION SYSTEM USING ANDROID APP
LICENSE NUMBER PLATE RECOGNITION SYSTEM USING ANDROID APPLICENSE NUMBER PLATE RECOGNITION SYSTEM USING ANDROID APP
LICENSE NUMBER PLATE RECOGNITION SYSTEM USING ANDROID APP
 
IMPLEMENTATION OF LANE TRACKING BY USING IMAGE PROCESSING TECHNIQUES IN DEVEL...
IMPLEMENTATION OF LANE TRACKING BY USING IMAGE PROCESSING TECHNIQUES IN DEVEL...IMPLEMENTATION OF LANE TRACKING BY USING IMAGE PROCESSING TECHNIQUES IN DEVEL...
IMPLEMENTATION OF LANE TRACKING BY USING IMAGE PROCESSING TECHNIQUES IN DEVEL...
 
Projection Profile Based Number Plate Localization and Recognition
Projection Profile Based Number Plate Localization and Recognition Projection Profile Based Number Plate Localization and Recognition
Projection Profile Based Number Plate Localization and Recognition
 
FRONT AND REAR VEHICLE DETECTION USING HYPOTHESIS GENERATION AND VERIFICATION
FRONT AND REAR VEHICLE DETECTION USING HYPOTHESIS GENERATION AND VERIFICATIONFRONT AND REAR VEHICLE DETECTION USING HYPOTHESIS GENERATION AND VERIFICATION
FRONT AND REAR VEHICLE DETECTION USING HYPOTHESIS GENERATION AND VERIFICATION
 
Traffic Light Detection for Red Light Violation System
Traffic Light Detection for Red Light Violation SystemTraffic Light Detection for Red Light Violation System
Traffic Light Detection for Red Light Violation System
 
Fb4301931934
Fb4301931934Fb4301931934
Fb4301931934
 
Automatic vision based inspection of railway track
Automatic vision based inspection of railway trackAutomatic vision based inspection of railway track
Automatic vision based inspection of railway track
 
Automatic vision based inspection of railway track
Automatic vision based inspection of railway trackAutomatic vision based inspection of railway track
Automatic vision based inspection of railway track
 
Content based indexing and retrieval from vehicle surveillance videos
Content based indexing and retrieval from vehicle surveillance videosContent based indexing and retrieval from vehicle surveillance videos
Content based indexing and retrieval from vehicle surveillance videos
 
F124144
F124144F124144
F124144
 
Reduced Dimension Lane Detection Method
Reduced Dimension Lane Detection MethodReduced Dimension Lane Detection Method
Reduced Dimension Lane Detection Method
 
Matlab titles 2014_2015_For ME_M.Tech
Matlab  titles  2014_2015_For ME_M.TechMatlab  titles  2014_2015_For ME_M.Tech
Matlab titles 2014_2015_For ME_M.Tech
 
MULTIPLE OBJECTS TRACKING IN SURVEILLANCE VIDEO USING COLOR AND HU MOMENTS
MULTIPLE OBJECTS TRACKING IN SURVEILLANCE VIDEO USING COLOR AND HU MOMENTSMULTIPLE OBJECTS TRACKING IN SURVEILLANCE VIDEO USING COLOR AND HU MOMENTS
MULTIPLE OBJECTS TRACKING IN SURVEILLANCE VIDEO USING COLOR AND HU MOMENTS
 

Viewers also liked

Opportunities and Challenges of Software Customization
Opportunities and Challenges of Software CustomizationOpportunities and Challenges of Software Customization
Opportunities and Challenges of Software CustomizationIDES Editor
 
Implementing True Zero Cycle Branching in Scalar and Superscalar Pipelined Pr...
Implementing True Zero Cycle Branching in Scalar and Superscalar Pipelined Pr...Implementing True Zero Cycle Branching in Scalar and Superscalar Pipelined Pr...
Implementing True Zero Cycle Branching in Scalar and Superscalar Pipelined Pr...IDES Editor
 
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor NetworksMulti-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor NetworksIDES Editor
 
An Algorithm to Detect Point on Wave Initiation of Voltage Sag by Fundamental...
An Algorithm to Detect Point on Wave Initiation of Voltage Sag by Fundamental...An Algorithm to Detect Point on Wave Initiation of Voltage Sag by Fundamental...
An Algorithm to Detect Point on Wave Initiation of Voltage Sag by Fundamental...IDES Editor
 
Non-Causal Video Encoding Method of P-Frame
Non-Causal Video Encoding Method of P-FrameNon-Causal Video Encoding Method of P-Frame
Non-Causal Video Encoding Method of P-FrameIDES Editor
 
ONE BLUE BROCHURE
ONE BLUE BROCHUREONE BLUE BROCHURE
ONE BLUE BROCHUREMike St
 
Horario tienda
Horario tiendaHorario tienda
Horario tiendarubencin21
 
Realtyfloor.com corporate overview
Realtyfloor.com corporate overviewRealtyfloor.com corporate overview
Realtyfloor.com corporate overviewABHISHEK KORANTHOTA
 
Webinar: Neues zur Splunk App for Enterprise Security
Webinar: Neues zur Splunk App for Enterprise SecurityWebinar: Neues zur Splunk App for Enterprise Security
Webinar: Neues zur Splunk App for Enterprise SecurityGeorg Knon
 
BTO 2015 | JollyTicket.com
BTO 2015 | JollyTicket.comBTO 2015 | JollyTicket.com
BTO 2015 | JollyTicket.comBTO Educational
 
Presentacióninicial periódico
Presentacióninicial periódicoPresentacióninicial periódico
Presentacióninicial periódicoLaura Romero Oller
 
Temporal Knowledge, Temporal Ontologies, and Temporal Reasoning for Manageria...
Temporal Knowledge, Temporal Ontologies, and Temporal Reasoning for Manageria...Temporal Knowledge, Temporal Ontologies, and Temporal Reasoning for Manageria...
Temporal Knowledge, Temporal Ontologies, and Temporal Reasoning for Manageria...IDES Editor
 

Viewers also liked (20)

Opportunities and Challenges of Software Customization
Opportunities and Challenges of Software CustomizationOpportunities and Challenges of Software Customization
Opportunities and Challenges of Software Customization
 
Implementing True Zero Cycle Branching in Scalar and Superscalar Pipelined Pr...
Implementing True Zero Cycle Branching in Scalar and Superscalar Pipelined Pr...Implementing True Zero Cycle Branching in Scalar and Superscalar Pipelined Pr...
Implementing True Zero Cycle Branching in Scalar and Superscalar Pipelined Pr...
 
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor NetworksMulti-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
 
An Algorithm to Detect Point on Wave Initiation of Voltage Sag by Fundamental...
An Algorithm to Detect Point on Wave Initiation of Voltage Sag by Fundamental...An Algorithm to Detect Point on Wave Initiation of Voltage Sag by Fundamental...
An Algorithm to Detect Point on Wave Initiation of Voltage Sag by Fundamental...
 
Non-Causal Video Encoding Method of P-Frame
Non-Causal Video Encoding Method of P-FrameNon-Causal Video Encoding Method of P-Frame
Non-Causal Video Encoding Method of P-Frame
 
ONE BLUE BROCHURE
ONE BLUE BROCHUREONE BLUE BROCHURE
ONE BLUE BROCHURE
 
Comunicación
ComunicaciónComunicación
Comunicación
 
Apresentação Moto Help Entregas
Apresentação Moto Help EntregasApresentação Moto Help Entregas
Apresentação Moto Help Entregas
 
Relay notes
Relay notesRelay notes
Relay notes
 
Horario tienda
Horario tiendaHorario tienda
Horario tienda
 
TUTORIA
TUTORIATUTORIA
TUTORIA
 
Expedia Travel Ads
Expedia Travel AdsExpedia Travel Ads
Expedia Travel Ads
 
Percusión 14
Percusión 14Percusión 14
Percusión 14
 
5 min madness
5 min madness5 min madness
5 min madness
 
Presentacion escuela de padres
Presentacion escuela de padresPresentacion escuela de padres
Presentacion escuela de padres
 
Realtyfloor.com corporate overview
Realtyfloor.com corporate overviewRealtyfloor.com corporate overview
Realtyfloor.com corporate overview
 
Webinar: Neues zur Splunk App for Enterprise Security
Webinar: Neues zur Splunk App for Enterprise SecurityWebinar: Neues zur Splunk App for Enterprise Security
Webinar: Neues zur Splunk App for Enterprise Security
 
BTO 2015 | JollyTicket.com
BTO 2015 | JollyTicket.comBTO 2015 | JollyTicket.com
BTO 2015 | JollyTicket.com
 
Presentacióninicial periódico
Presentacióninicial periódicoPresentacióninicial periódico
Presentacióninicial periódico
 
Temporal Knowledge, Temporal Ontologies, and Temporal Reasoning for Manageria...
Temporal Knowledge, Temporal Ontologies, and Temporal Reasoning for Manageria...Temporal Knowledge, Temporal Ontologies, and Temporal Reasoning for Manageria...
Temporal Knowledge, Temporal Ontologies, and Temporal Reasoning for Manageria...
 

Similar to Pedestrian-traffic Logging Unit with Tailgating DetectionUsingRange Image Sensor

Cloud-based people counter
Cloud-based people counterCloud-based people counter
Cloud-based people counterjournalBEEI
 
Leave a Trace - A People Tracking System Meets Anomaly Detection
Leave a Trace - A People Tracking System Meets Anomaly DetectionLeave a Trace - A People Tracking System Meets Anomaly Detection
Leave a Trace - A People Tracking System Meets Anomaly Detectionijma
 
IRJET- Intelligent Queue Management System at Airports using Image Processing...
IRJET- Intelligent Queue Management System at Airports using Image Processing...IRJET- Intelligent Queue Management System at Airports using Image Processing...
IRJET- Intelligent Queue Management System at Airports using Image Processing...IRJET Journal
 
Autonomous Abnormal Behaviour Detection Using Trajectory Analysis
Autonomous Abnormal Behaviour Detection Using Trajectory AnalysisAutonomous Abnormal Behaviour Detection Using Trajectory Analysis
Autonomous Abnormal Behaviour Detection Using Trajectory AnalysisIJECEIAES
 
IRJET- Survey on Detection of Crime
IRJET-  	  Survey on Detection of CrimeIRJET-  	  Survey on Detection of Crime
IRJET- Survey on Detection of CrimeIRJET Journal
 
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...AM Publications
 
Intelligent Video Surveillance System using Deep Learning
Intelligent Video Surveillance System using Deep LearningIntelligent Video Surveillance System using Deep Learning
Intelligent Video Surveillance System using Deep LearningIRJET Journal
 
Feedback method based on image processing for detecting human body via flying...
Feedback method based on image processing for detecting human body via flying...Feedback method based on image processing for detecting human body via flying...
Feedback method based on image processing for detecting human body via flying...ijaia
 
Pedestrian Counting in Video Sequences based on Optical Flow Clustering
Pedestrian Counting in Video Sequences based on Optical Flow ClusteringPedestrian Counting in Video Sequences based on Optical Flow Clustering
Pedestrian Counting in Video Sequences based on Optical Flow ClusteringCSCJournals
 
Fast Human Detection in Surveillance Video
Fast Human Detection in Surveillance VideoFast Human Detection in Surveillance Video
Fast Human Detection in Surveillance VideoIOSR Journals
 
DESIGN AND PROTOTYPE OF A WIRELESS TAILGATE DETECTION SYSTEM USING SUN SPOT P...
DESIGN AND PROTOTYPE OF A WIRELESS TAILGATE DETECTION SYSTEM USING SUN SPOT P...DESIGN AND PROTOTYPE OF A WIRELESS TAILGATE DETECTION SYSTEM USING SUN SPOT P...
DESIGN AND PROTOTYPE OF A WIRELESS TAILGATE DETECTION SYSTEM USING SUN SPOT P...ijesajournal
 
A Hybrid Architecture for Tracking People in Real-Time Using a Video Surveill...
A Hybrid Architecture for Tracking People in Real-Time Using a Video Surveill...A Hybrid Architecture for Tracking People in Real-Time Using a Video Surveill...
A Hybrid Architecture for Tracking People in Real-Time Using a Video Surveill...sipij
 
Objects detection and tracking using fast principle component purist and kalm...
Objects detection and tracking using fast principle component purist and kalm...Objects detection and tracking using fast principle component purist and kalm...
Objects detection and tracking using fast principle component purist and kalm...IJECEIAES
 
IRJET- i-Surveillance Crime Monitoring and Prevention using Neural Networks
IRJET- i-Surveillance Crime Monitoring and Prevention using Neural NetworksIRJET- i-Surveillance Crime Monitoring and Prevention using Neural Networks
IRJET- i-Surveillance Crime Monitoring and Prevention using Neural NetworksIRJET Journal
 
APPLICATION OF VARIOUS DEEP LEARNING MODELS FOR AUTOMATIC TRAFFIC VIOLATION D...
APPLICATION OF VARIOUS DEEP LEARNING MODELS FOR AUTOMATIC TRAFFIC VIOLATION D...APPLICATION OF VARIOUS DEEP LEARNING MODELS FOR AUTOMATIC TRAFFIC VIOLATION D...
APPLICATION OF VARIOUS DEEP LEARNING MODELS FOR AUTOMATIC TRAFFIC VIOLATION D...ijitcs
 
Feature Selection Method For Single Target Tracking Based On Object Interacti...
Feature Selection Method For Single Target Tracking Based On Object Interacti...Feature Selection Method For Single Target Tracking Based On Object Interacti...
Feature Selection Method For Single Target Tracking Based On Object Interacti...IJERA Editor
 
IRJET- Behavior Analysis from Videos using Motion based Feature Extraction
IRJET-  	  Behavior Analysis from Videos using Motion based Feature ExtractionIRJET-  	  Behavior Analysis from Videos using Motion based Feature Extraction
IRJET- Behavior Analysis from Videos using Motion based Feature ExtractionIRJET Journal
 

Similar to Pedestrian-traffic Logging Unit with Tailgating DetectionUsingRange Image Sensor (20)

Cloud-based people counter
Cloud-based people counterCloud-based people counter
Cloud-based people counter
 
Gj3511231126
Gj3511231126Gj3511231126
Gj3511231126
 
Leave a Trace - A People Tracking System Meets Anomaly Detection
Leave a Trace - A People Tracking System Meets Anomaly DetectionLeave a Trace - A People Tracking System Meets Anomaly Detection
Leave a Trace - A People Tracking System Meets Anomaly Detection
 
IRJET- Intelligent Queue Management System at Airports using Image Processing...
IRJET- Intelligent Queue Management System at Airports using Image Processing...IRJET- Intelligent Queue Management System at Airports using Image Processing...
IRJET- Intelligent Queue Management System at Airports using Image Processing...
 
Autonomous Abnormal Behaviour Detection Using Trajectory Analysis
Autonomous Abnormal Behaviour Detection Using Trajectory AnalysisAutonomous Abnormal Behaviour Detection Using Trajectory Analysis
Autonomous Abnormal Behaviour Detection Using Trajectory Analysis
 
IRJET- Survey on Detection of Crime
IRJET-  	  Survey on Detection of CrimeIRJET-  	  Survey on Detection of Crime
IRJET- Survey on Detection of Crime
 
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
 
Intelligent Video Surveillance System using Deep Learning
Intelligent Video Surveillance System using Deep LearningIntelligent Video Surveillance System using Deep Learning
Intelligent Video Surveillance System using Deep Learning
 
Feedback method based on image processing for detecting human body via flying...
Feedback method based on image processing for detecting human body via flying...Feedback method based on image processing for detecting human body via flying...
Feedback method based on image processing for detecting human body via flying...
 
Ts 2 b topic
Ts 2 b topicTs 2 b topic
Ts 2 b topic
 
Pedestrian Counting in Video Sequences based on Optical Flow Clustering
Pedestrian Counting in Video Sequences based on Optical Flow ClusteringPedestrian Counting in Video Sequences based on Optical Flow Clustering
Pedestrian Counting in Video Sequences based on Optical Flow Clustering
 
Fast Human Detection in Surveillance Video
Fast Human Detection in Surveillance VideoFast Human Detection in Surveillance Video
Fast Human Detection in Surveillance Video
 
DESIGN AND PROTOTYPE OF A WIRELESS TAILGATE DETECTION SYSTEM USING SUN SPOT P...
DESIGN AND PROTOTYPE OF A WIRELESS TAILGATE DETECTION SYSTEM USING SUN SPOT P...DESIGN AND PROTOTYPE OF A WIRELESS TAILGATE DETECTION SYSTEM USING SUN SPOT P...
DESIGN AND PROTOTYPE OF A WIRELESS TAILGATE DETECTION SYSTEM USING SUN SPOT P...
 
p-1.pdf
p-1.pdfp-1.pdf
p-1.pdf
 
A Hybrid Architecture for Tracking People in Real-Time Using a Video Surveill...
A Hybrid Architecture for Tracking People in Real-Time Using a Video Surveill...A Hybrid Architecture for Tracking People in Real-Time Using a Video Surveill...
A Hybrid Architecture for Tracking People in Real-Time Using a Video Surveill...
 
Objects detection and tracking using fast principle component purist and kalm...
Objects detection and tracking using fast principle component purist and kalm...Objects detection and tracking using fast principle component purist and kalm...
Objects detection and tracking using fast principle component purist and kalm...
 
IRJET- i-Surveillance Crime Monitoring and Prevention using Neural Networks
IRJET- i-Surveillance Crime Monitoring and Prevention using Neural NetworksIRJET- i-Surveillance Crime Monitoring and Prevention using Neural Networks
IRJET- i-Surveillance Crime Monitoring and Prevention using Neural Networks
 
APPLICATION OF VARIOUS DEEP LEARNING MODELS FOR AUTOMATIC TRAFFIC VIOLATION D...
APPLICATION OF VARIOUS DEEP LEARNING MODELS FOR AUTOMATIC TRAFFIC VIOLATION D...APPLICATION OF VARIOUS DEEP LEARNING MODELS FOR AUTOMATIC TRAFFIC VIOLATION D...
APPLICATION OF VARIOUS DEEP LEARNING MODELS FOR AUTOMATIC TRAFFIC VIOLATION D...
 
Feature Selection Method For Single Target Tracking Based On Object Interacti...
Feature Selection Method For Single Target Tracking Based On Object Interacti...Feature Selection Method For Single Target Tracking Based On Object Interacti...
Feature Selection Method For Single Target Tracking Based On Object Interacti...
 
IRJET- Behavior Analysis from Videos using Motion based Feature Extraction
IRJET-  	  Behavior Analysis from Videos using Motion based Feature ExtractionIRJET-  	  Behavior Analysis from Videos using Motion based Feature Extraction
IRJET- Behavior Analysis from Videos using Motion based Feature Extraction
 

More from IDES Editor

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A ReviewIDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’sIDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance AnalysisIDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
 

More from IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 

Recently uploaded

Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...KokoStevan
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 

Recently uploaded (20)

Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 

Pedestrian-traffic Logging Unit with Tailgating DetectionUsingRange Image Sensor

  • 1. Full Paper ACEEE Int. J. on Information Technology , Vol. 3, No. 3, Sept 2013 Pedestrian-traffic Logging Unit with Tailgating DetectionUsingRange Image Sensor Yuki Uranishi1*, Yasufumi Moriie2, Yoshitsugu Manabe3, Osamu Oshiro1 and Kunihiro Chihara4 1* Osaka University, 1-3 Machikaneyama, Toyonaka, Osaka, 560-8531 Japan Email: {uranishi, oshiro}@bpe.es.osaka-u.ac.jp 2 Nara Institute of Science and Technology, 8916-5 Takayama, Ikoma, Nara, 630-0192 Japan 3 Chiba University, 1-33 Yayoi, Inage, Chiba-city, Chiba, 263-8522 Japan Email: manabe@faculty.chiba-u.jp 4 Osaka Electro-Communication University, 1130-70 Kiyotaki, Shijonawate, Osaka, 575-0063 Japan Email: chihara@is.naist.jp We propose a method for logging the passing of peopleat a gateway even if a person passes through the gatewayby tailgating. Besides, the method aims at logging thepeople without cumbersome procedures when people passthrough the gateway. We focus that all tailgating personspass through the gateway with an identified person. We definethe identified person as a potential inviter of the tailgatingperson. The proposed method can improve an accuracyof the pedestriantraffic analysis with the person-unit log. Inaddition, the users do not have any extra procedures forthe identification. In this paper, we show a logging unit withtailgating detection using cameras and a range image sensor.The proposed method can log the passing in a person-unitby using the cameras and the range image sensor in additionto card readers for identification. Firstly, a number ofpeople in front of the card reader is counted by the range imagesensor. Secondly, the camera image taken at the sametime as the identification is divided into individual regionsbased on the range image. Lastly, the passing is logged ina person-unit. The identified person is logged with his/herown ID. On the other hand, the tailgating person is loggedas the tailgating people with the ID of the person identifiedat the same time and the individual camera image. The proposed method has two major advantages over other conventional methods as the following. Firstly, a person-unit log is obtained by using the proposed method. The conventional event detection methods have detected and logged in an event-unit. The proposed method enables to log the event in a person-unit, and it is useful to analyze the pedestrian-traffic. Secondly,the proposed method is robust over colors and lightings of a target scene to detect the tailgating.A prototype has been implemented to show the advantages above, and experimentalresults have demonstrated that the prototype of theproposed method can obtain the log of the passing includingthe tailgating people. Abstract—This paper proposes a method for logging people whichpass through a gateway in buildings or regions. The proposed method detectsunexpected passing called tailgating. The tailgating means that anon-identified person tries to enter or leave a room by tagging after anotheridentified person. The tailgating person does not appear on the log recordedby conventional identification systems. The proposed method logs the passingin a person-unit by using cameras and a range image sensor. Firstly, thenumber of people in front of the card reader is counted by the range imagesensor. Secondly, the camera image taken at the same time as the identificationis separated individually based on the projected range image. Lastly,the passing is logged in a person-unit. The tailgating person is logged withthe individual camera image and the ID of the inviter. Experimental resultshave demonstrated that the prototype of the proposed method can obtainthe log of the passing including tailgating people. Index Terms—logging pedestrian traffic, tailgating detection, range imagesensor, sensor fusion I. INTRODUCTION People are often identified to open a door and to passthrough a gateway with their identification card or their ownbodily characteristics, and the events are logged atthe same time [1][2]. The log is utilized for analyzing orcontrolling traffic of pedestrian similar as car traffic analysis[3]. For example, a displacement of the person is applicablefor marketing at a store. In addition, a throughput ateach gateway is useful information for controlling the number of peoplebetween the gateways. It is desirable that a personunitlog is obtained instead of an event-unit log by the existingidentification systems to utilize the log in above cases. To log the people correctly, a problem called tailgatingshould be considered. Tailgating means tagging afteranother identified person to skip the identification. Fig.1 shows an example of the tailgating. Person of rightside passes through the gateway by tagging after left personwho has been identified. The person who passes throughby tailgating does not appear on the log. It is desirable thatthe tailgating is detected precisely in order to analyze thepedestrian-traffic precisely. However, in case that the peopleare identified for logging the events and analyzing thetraffic of people, the conventional tailgating-detection systemsneed a cumbersome procedure. © 2013 ACEEE DOI: 01.IJIT.3.3. 1 II. RELATED WORKS The tailgating is serious problem in a field of car traffic analysisfor both precise toll collection and traffic control [4][5].Similarly, the tailgating should be considered for precisepedestrian traffic analysis. Basic idea for preventing the tailgating is forcing usersalone when they are identified. A personal room which 14
  • 2. Full Paper ACEEE Int. J. on Information Technology , Vol. 3, No. 3, Sept 2013 Figure 1. An example of person entering a locked room by tailgating. The left person is identified by theentry control system to open the door. On the other hand, the right person enters the room by followingthe identified person. The tailgating person is not logged in this case includesan identification system and a gate [6] is effective fortailgating prevention and utilized in fortified rooms or buildings.Various technologies are also used for the tailgatingdetection. A mass sensor which is set on a floor of the identificationarea [7], and an infrared beam [8][9] are used intopractical uses for counting the number of people in front ofthe gate. And a thermal sensor are also used for the tailgating detection [10][11]. The methods are intended to shutout the tailgating person if the tailgating is detected for thesecurity. However, in case that the people are identified forlogging the events and analyzing the traffic of people, suchtailgating detection may be regarded as a cumbersome procedurefor the users. Several camera-based methods for passive observingand tracking the human flow have been proposed. Elguebalyet al. has proposed the method for separating an image intoindividual regions in variable environments [12]. The camerasare also used for human gait extraction and recognitionfor human motion analysis [13][14]. Similarly, footsteps ofthe people are also visualized from top-view cameras [15].The top-view camera is effective to avoid an occlusion. Onthe other hand, the camera-based methods are sensitive tochange of the lighting. The camera-based methods is notsuitable when the gateway which is set at the uncertain lightings. We have proposed the method for logging and the analyzingthe identified people using cameras in combinationwith other sensors [16]. In this paper, we propose a methodfor logging the people with tailgating detection by introducinga range image sensor. countingand identifying people from camera images have been proposed[18][19][20]. However, it is difficult to detect and count the people correctly using only cameras in the tailgatingsituation, because the tailgating person is mostly closeto another identified person to pass through the gateway atthe same time as the identified person. So we introduce arange image sensor in combination with the cameras to detectand count the person correctly. The cameras are set atfront and behind the gate to take the pictures head on. Therange sensor is attached to the roof. A range image is captureddownward to avoid occluding. To detect and analyzeonly human-height objects, the range image is thresholdedby as following: (1) where and is depth value of the source andthe thresholded range image, respectively. B. Calibration between Sensors Fig. 3 shows a relationship between coordinate systemsused in the proposed method. A given point on arange image is projected onto a point on a cameraimage coordinate system as following: (2) where Pcam is a 3*4 transformation matrix from world coordinatesystem to camera image coordinate system, and Pr+ is a 4*3 transformation matrix from range image coordinatesystem to world coordinate system. Note that Pr+ is apseudo-inverse matrix of Pr ,which is a transformation matrixfrom world coordinate system to range image coordinatesystem. A reference object is utilized for calibrating between the range image sensor and the cameras. Figs. 4 (a) and(b) are a side-view and a top-view of the object, respectively.The reference object defines the world coordinate system,and corner points on the reference object are used as a referencepoint. At least 4 reference points should be visible fromthe range image sensor, and at least 6 reference points alsoshould be visible from the cameras to calibrate between therange image III. PROPOSED METHOD The proposed method is for logging people who passthrough a gateway including the tailgating people. Camerasand a range image sensor are used for the proposedmethod in addition to an identification system. The proposedmethod is to detect the tailgating persons whom theconventional identification systems [17] cannot detect. A. Configuration Fig. 2 shows an overview of the proposed method. Theproposed method consists of cameras to take pictures, arange image sensor to count a number of people and cardreaders to identify people. Several methods for © 2013 ACEEE DOI: 01.IJIT.3.3. 1 15
  • 3. Full Paper ACEEE Int. J. on Information Technology , Vol. 3, No. 3, Sept 2013 sensor and the cameras. Figs. 5 (a) and (b)are examples of images taken by the camera and the rangeimage sensor, respectively. The reference points can be locatedin both images from their photometric or geometricfeatures of the reference object. And then, Pcam and Pr+ areestimated by calculating pseudo-inverse matrix [21]. Figure 3. Coordinate systems used in the proposed unit. Range image coordinatesystem is converted into world coordinate system with a projection matrix . On the other hand, the world coordina tesystem is converted into camera coordinate system with a projectionmatrix . To calibrate between the range image sensor and thecameras, Reference object is set and observed Figure 4. A reference object for calibrating between the cameras and therange image sensor. Corner points are used for the calibration, and theposition of the corners in the world coordinate system are known. At least4 points should be visible from the range image sensor, and at least 6 pointsshould be visible from the cameras. The unit of the length in the figures isa centimeter. (a) Side view of the box. (b) Top view of the box. Figure 2. An overview of proposed logging unit. The proposed unit consistsof cameras and a range image sensor to detect tailgating in addition to cardreaders. (a) Side view of the unit. The cameras are set at the front of thedoor. (b) Top view of the unit. The range image sensor is attached to theroof. C. Dividing Range Image and Camera Image The range image is divided into separated individual regionsand projected onto the camera image to divide the cameraimage into separated individual regions. 1) Dividing Range Image Firstly, non-zero pixels in the range image are labeled. Itshould be considered that labeled region consists of two ormore persons when the persons are close to each other. Thenumber of the people in the region is estimated from a shapeof projection histogram. Fig. 6 (a) shows an input rangeimage and obtained projection histogram. Principal ComponentAnalysis (PCA) is employed to determine two coordinateaxes and newly at each label. The axes are parallel to the first principal component and the secondprincipal component by the PCA, respectively. And an originof the axes is identical with left lower point of the rangeimage. The projection histogram is obtained as: Figure 5. Images captured by the camera and the range image sensor in casethat the target is the reference object shown in Fig. 4. The corner pointscan be located in both the camera image and the range image. (a) Capturedimage taken by the camera. (b) Captured image taken by the range imagesensor. Note that the image is described as the falsecolor image. where (ci, s) is the value of the range image on the (c,s) coordinate system in Fig. 6 (a), and . Let lbp(c) be theline from to , and lbp(c) be the line from where Cigin is the smallest (3) © 2013 ACEEE DOI: 01.IJIT.3.3. 1 16
  • 4. Full Paper ACEEE Int. J. on Information Technology , Vol. 3, No. 3, Sept 2013 value of where 0, Cpeak is the value of when has themaximum value and is the largest value of where. As shown in Fig. 6 (c), it is assumed that theshape of the histogram is similar to the lines andwhenthe region consists of single person. On the other hand, theshape of the histogram is nt similar to the lines andwhen the region consists of two or more persons, as shownin Fig. 6 (d). The sum of the squared difference betweenthe lines ,and the histogram is calculatedas: (4) The region is divided at the line corresponding to the valley of the histogram if td, where td is constant.Theprocess is repeated recursively until for all regions.Fig. 6 (b) shows the divided range image. 2) DividingCamera Image Camera image is also divided into separated individual regionsaccording to the divided range image. Fig. 7 showsan example of the process. Firstly, visible pixels are extractedfrom the range image. The nearest foreground pixelon a line of sight corresponding to each pixel of the cameraimage is extracted from the range image. Secondly, anexistence region of each person is estimated on the horizontalaxis of the range image shown in Fig. 7 (a). Lastly, theestimated existence regions are projected onto the cameraimage, and mask images corresponding to each person aregenerated as shown in Fig. 7 (b). Figure 6. Dividing a region into separated individual regions based on PrincipalComponent Analysis (PCA). (a) Two axes c and s, which are respectivelyparallel to the first principal component and the second component,are determined at each labeled region. Then, projection histogram isobtained. (b) Divided regions by the proposed method. (c) An example ofthe histogram in case that the region consists of one person. (d) An exampleof the histogram in case that the region consists of two persons. The individual images arelogged. The proposed system assumes that the closest personto the card reader is the identified person and others arethe tailgating person on the camera image. D. Logging People Including Tailgating Person Incase that persons pass through the gateway at the sametime, there are always one inviter and n-1 tailgating persons.The tailgating person is logged with the personal IDnumber of the inviter, because the inviter may have a responsiblefor the tailgating. In addition, the camera imagecaptured at the same time as the identification is dividedinto separated individual regions. IV. Experimental Results A prototype of the proposed method was implemented. Experimentalsettings and results by the prototype are writtenbelow. Figure 7. Dividing camera image into individual images. (a) Extracted visiblepixels on the range image. An existence region of each person A and Bis estimated on the horizontal axis of the range image. (b) Projected existenceregions onto the camera image. The individual images are extractedusing the existence regions. © 2013 ACEEE DOI: 01.IJIT.3.3. 1 Figure 8. An overview of the experimental settings. It is assumed that theidentified person is always leftmost person on the camera image, becausethe card reader is set at the left side of the sight of the camera correspondingto the card reader. 17
  • 5. Full Paper ACEEE Int. J. on Information Technology , Vol. 3, No. 3, Sept 2013 and other0 to 2 persons tried to pass through the gateway by tailgating. Figure 9. Positions of the range image sensor, the camera and the cardreader. The camera was set at 0.60 meters high from the ground level.The object appeared on the range image in case that the height of the objectwas taller than 1.30 meters. A. Settings Fig. 8 shows an overview of the experimental settings.The range image sensor was MesaImagingSwissRangerSR3000. The width and the height of the captured rangeimage were 176 and 144 pixels, respectively. A frame rateof the range sensor was 25 frames per second on average.The range image sensor was set at 2.70 meters high from theground level. Two Logitech Qcam were used in the experiment.Camera images were captured at the same time as theidentification with the card reader. The width and the heightof the camera image were 320 and 240 pixels, respectively.In addition, two of SONY PaSoRi RC-S320 were used as cardreaders for the identification. The users were identified bytouching their own identification card to the reader. In theexperiment, it was assumed that the identified person wasalways leftmost person on the camera image, because thecard reader was set at the left side of the sight in the camerafacing to the users. And the size of the identification areawas determined by the view angle and the altitude of therange image sensor. In the experiment, the width and theheight of the identification area were 2.00 and 1.50 meters,respectively. Figure 10. Divided individual images by the prototype in case that 2 personspa ssed through the gateway at a time. (a) Camera ima ge captured by thefront camera. (b) Range image captured at the same time as the cameraimage. (c) Divided individual image of the left person. The person wasestimated to be identified. (d) Divided individual image of the right person.The person wa s estimated to enter by tailgating. B. Experimental Results Table I shows experimental results by the prototype. Itshows that 82 persons tried to pass through the gatewayby tailgating, and 62 persons were logged by the proposedmethod. TABLE I. EXPERIMENTAL RESULTS Method Proposed method Han et al. 2004 [20] Trial 1 2 1 2 Tailgaters 52 30 37 45 Detected tailgaters 38 24 35 42 Fig. 9 shows the positions of the camera and therange image sensor in the experiment. The camera wasset at 0.60 meters high from the ground level and horizontalposture. The threshold to extract human-height object th = 1.30. The object appeared on the range image in casethat the height of the object was taller than 1.30 meters. Inaddition, the threshold for dividing the region on the rangeimage td = 1000 in the experiment. In the experiment, One to three persons formed groupsrandomly at each passing. It indicates that one personpassed through the gateway with the identification, © 2013 ACEEE DOI: 01.IJIT.3.3.1 Figure 11. Divided individual images by the prototype in case that 3 personspassed through the gateway at a time. (a) Source image captured bythe front camera. (b) Divided individual image of the left person. Theperson was estimated to be identified. (c) Divided individual image of thecenter person. The person was estimated to enter by tailgating. (d) Dividedindividual image of the right person. The person was also estimated to enterby tailgating. 18
  • 6. Full Paper ACEEE Int. J. on Information Technology , Vol. 3, No. 3, Sept 2013 regions utilizingthe shape of the human. The number of the people iscounted from the separated range image, and the enteringand the leaving are logged in a person-unit with the individual camera image. The experimental results have demonstrated that thetailgating people were newly logged by the prototype of theproposed method even if people tried to pass through thegateway by the tailgating. On the other hand, there weresome failure cases. The region in the range image was notdivided correctly due to the noise on the range image. Fig. 10 shows an example of the divided individualimages. Fig. 10 (a) is a source image captured by the frontcamera at the same time as the identification. Fig. 10 (b) is arange image at the same time as the identification. Figs. 10(c) and (d) are divided individual images. In this case, rightperson tried to enter by the tailgating. The prototype succeededin counting the number of the person in front of thecard reader correctly, and individual images were recordedby the proposed method. Fig. 11 also shows an exampleof the dividing. Fig. 11 (a) is a source image captured at thesame time as the identification. Figs. 11 (b), (c) and (d) aredivided individual images. The left person (b) was estimatedas the identified person and logged with his own ID number.The person(d) were estimated as the tailgating person and logged withthe ID number of the left person. C. Discussions The failure cases in the experiment and the limitation of theproposed method are discussed in this section. In the caseshown in Fig. 12, the left person did not appear on therange image. This is because the region was divided mistakenly by the noise, and the smaller fragments of the humanregion were removed by labeling as a circled region inFig. 12 (b). Fig. 13 shows another example of the failurecases. As shown in Fig. 13 (b), the region was correctly extractedin the case. However, it was estimated wrongly thatthe region contained three persons due to the extra borderlineas shown in Fig. 13 (c). A major cause of the errors wasa noise on the range image. The range images have limitedresolutions and contain much random noises.The proposed method has been not yet suitable for ahigh-security gate control, because the detection rate ofthe proposed method is still lower than 80%. To increasethe accuracy, it is discussed that the time-sequential rangeimages are introduced. In addition, we are planning to introduceother kinds of sensors in combination with the methodproposed in this paper.The proposed method was also compared to the conventionalimage-based method proposed by Han et al. [20]in TableI. The detection rate of the proposed method islower than the rate of the method [20]. However, the proposedmethod has succeeded in dividing contiguous groupinto individual images, and the number of the people in thegroup was counted. It is difficult for the conventional image-basedmethods. In addition, the proposed method is robustover colors and lightings of the scene, because the methodemploys an infrared range image sensor. It means that theproposed method would be used in dark scenes, such as agate at night or a darkroom. We are also planning to test theproposed method in such situations. Figure 12. An example of the failure case. (a) Camera image captured bythe camera. (b) Range image. The fragment is missing in circled area. (c)Projection histogram corresponding to the range image (b). It was assumedthat the region contained one person due to the missing fragment. The proposed method can improve the accuracy of thepedestrian-traffic analysis based on a person-unit loggingwith the tailgating detection. It indicates that more efficientmarketing in the store will be realized in the system. Besides,the proposed unit does not increase the complexity forthe users compared to the conventional tailgating preventionmethods. The proposed method would estimate and recordother characteristics of the users, such as height, weight andgender from the camera images and the range images. Thecharacteristics would be effective for the marketing analysis. V. CONCLUSIONS In this paper, the method for logging traffic of pedestrianwith tailgating detection has been proposed. The proposedmethod consists of cameras and a range image sensor in additionto an identification system. The people are capturedby the range image sensor and the cameras simultaneously.The regions are separated into the individual © 2013 ACEEE DOI: 01.IJIT.3.3. 1 19
  • 7. Full Paper ACEEE Int. J. on Information Technology , Vol. 3, No. 3, Sept 2013 [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] Figure 13. Another example of the failure case. (a) Camera image capturedby the camera. (b) Range image. (c) Projection histogram corresponding tothe range image (b). It was assumed that the region contained three personsdue to the extra borderline. Two arrows indicate the border-lines. [14] Future works will aim at logging persons by multipleunits set at several gateways and analyzing the pedestriantraffic.And we are planning to obtain further informationfrom the camera images and range image, such as a result offace recognition. [15] [16] ACKNOWLEDGMENT This work was supported in part by Japan Society for the Promotion of Science (JSPS) KAKENHI Grant Number 24700092. [17] REFERENCES [18] [1] J.M. Gascuena, A. Fernandez-Caballero, E. Navarro, J. SerranoCuerda, and F.A. Cano, “Agent-based development of multisensorymonitoring systems,” Proceedings of the 4th International Conferenceon Interplay between Natural and © 2013 ACEEE DOI: 01.IJIT.3.3. 1 20 Artificial Computation – Volume Part I, pp.451–460, SpringerVerlag, May-June 2011. E.B. Fernandez, J. Ballesteros, A.C. Desouza-Doucet, and M.M.Larrondo-Petrie, “Security patterns for physical access control systems,”Proceedings of the 21st Annual IFIPWG11.3 Working Conferenceon Data and Applications Security, pp.259–274, Springer-Verlag, July 2007. L. Neubert, L. Santen, A. Schadschneider, and M. Schreckenberg,“Single-vehicle data of highway traffic: A statistical analysis,” PhysicalReview E, vol.60, no.6, pp.6480– 6490, 1999. B. Tseng, C.Y. Lin, and J. Smith, “Real-time video surveillance fortraffic monitoring using virtual line analysis,”Proceedings of the 2002 IEEE International Conferenceon Multimedia and Expo, vol.2, pp.541–544, August 2002. P.G. Michael, F.C. Leeming, and W.O. Dwyer, “Headway on urbanstreets: observational data and an intervention to decrease tailgating,”Transportation Research Part F: Traffic Psychology and Behaviour,vol.3, no.2, pp.55–64, 2000. Networks, “SBOX.”http://sbox.jp/ JNSS, “Security robogate.” http://www.jnss.co.jp/pdf/ SecurityRoboGate catalog.pdf. TakachihoKoheki, “C-cure800.” http://www.takachihokk.co.jp/ Designed Security Inc., “Entry sentry es5200.” http:// www.dsigo.com/ A.N. Rimmer, “Access control violation prevention by low cost infrareddetection,” Proceedings of the SPIE the International Societyfor Optical Engineering, vol.5403, no.2, pp.823–830, September2004. Irisys, “Irisys access control tailgate detection.” http:// www.irisys.co.uk/ T. Elguebaly and N. Bouguila, “A nonparametric bayesian approachfor enhanced pedestrian detection and foreground segmentation,”Proceedings of the 2011 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, pp.21–26, June 2011. M. Goffredo, I. Bouchrika, J. Carter, and M. Nixon, “Performanceanalysis for automated gait extraction and recognition in multicamerasurveillance,” Multimedia Tools and Applications, vol.50,pp.75–94, 2010. D. Wagg and M. Nixon, “On automated model-based extraction andanalysis of gait,” Proceedings of the Sixth IEEE International Conference on Automatic Face and Gesture Recognition,pp.11–16,May 2004. O. Ozturk, T. Matsunami, Y. Suzuki, T. Yamasaki, and K. Aizawa,“Real-time tracking of humans and visualization of their future footstepsin public indoor environments,” Multimedia Tools and Applications,pp.1–24, 2012. Y. Uranishi, M. Sakata, I. Arai, Y. Manabe, H. Sunahara, and K. Chihara,“Book management system using various sensor network,”Proceedings of International Workshop on Advanced Image Technology,pp.B6-4, January 2008. C. Wren, A. Azarbayejani, T. Darrell, and A. Pentland, “Realtimetracking of the human body,” IEEE Transactions on Pattern Analysisand Machine Intelligence, vol.19, no.7, pp.780–785, 1997. S. Velipasalar, L.M. Brown, and A. Hampapur, “Specifying, interpretingand detecting high-level, spatio-temporal composite eventsin single and multi-camera systems,” Proceedings of the 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, p.110, 2006.
  • 8. Full Paper ACEEE Int. J. on Information Technology , Vol. 3, No. 3, Sept 2013 [19] M. Enzweiler and D.M. Gavrila, “Monocular pedestriandetection:Survey and experiments,” IEEE Transactions on Pattern Analysisand Machine Intelligence, vol.31, no.12,pp.2179–2195, 2009. [20] M. Han, W. Xu, H. Tao, and Y. Gong, “An algorithm for multipleobject trajectory tracking,” Proceedings of the 2004 IEEE ComputerSociety Conference on Computer Vision and © 2013 ACEEE DOI: 01.IJIT.3.3.1 Pattern Recognition,vol.1, pp.I-864–I-871,June-July 2004. [21] G.T. Marzan and H.M. Karara, “A computer program for direct linear transformation solution of the collinearity condition, and someapplications of it,” Proceedings of the Symposium on Close-Range PhotogrammetricSystems, pp.420–476, 1975. 21