SlideShare a Scribd company logo
1 of 7
Download to read offline
International Journal of Applied Control, Electrical and Electronics Engineering (IJACEEE) Vol 6, No. 2/3, August 2018
DOI: 10.5121/ijaceee.2018.6301 1
CROWD ANALYSIS WITH FISH EYE CAMERA
Huseyin Oguzhan Tevetoglu1
and Nihan Kahraman2
1
Department of Electronic and Communication Engineering, Yıldız Technical University,
Istanbul, Turkey
1
Netaş Telekomünikasyon A.Ş., Istanbul, Turkey
2
Deparment of Electronic and Communication Engineering, Yıldız Technical University,
Istanbul, Turkey
ABSTRACT
Nowadays crowd analysis, essential factor about decision management of brand strategy, is not a
controllable field by individuals. Therefore a technology, software products is needed. In this paper we
focused on what we have done about crowd analysis and examination the problem of human detection with
fish-eye lenses cameras. In order to identify human density, one of the machine learning algorithm, which
is Haar Classification algorithm, is used to distinguish human body under different conditions. First,
motion analysis is used to search for meaningful data, and then the desired object is detected by the trained
classifier. Significant data has been sent to the end user via socket programming and human density
analysis is presented.
KEYWORDS
Fish-Eye, Human Detection, Haar Classification, Crowd Analysis, Machine Learning, Motion Analysis,
Density Analysis
1. INTRODUCTION
Trends in video processing and human tracking systems have become popular today. Particularly
for security purposes, analysis of data from IP cameras used in various locations has gained
importance. However, the camera array, which is designed to completely cover the scene, is
disadvantageous both in terms of the number of the images and the size of the data to be
processed.
The fish-eye cameras function as both a fixed camera and a moving camera. A fixed and
restricted area can be displayed with stationary cameras. Thanks to moving cameras which are
manually controllable cameras, areas outside the area where you want to view still images can
also be displayed. In this case, it is very likely that the movements in the region to be displayed
constantly or continuously are missed. Based on this information, we can say that fish-eye
cameras are very advantageous.
Fisheye lenses are created by the do not correction of normal lens defects. These lenses, which we
can obtain data in wide angle, provide the creation of hemispherical images. It can be said that
firstly it is used in the field of metrology and its usage also increases in security systems today.
Depending on the barrel bending error in the lens production, it is possible to obtain two types of
images, 360 and 180 degrees.
International Journal of Applied Control, Electrical and Electronics Engineering (IJACEEE) Vol 6, No. 2/3, August 2018
2
Resolution performance from a fish-eye camera is not equivalent to a fixed camera. This is why a
rectangular 360 degree image is obtained from a rectangular image sensor. It is necessary to make
a mathematical explanation; the resolution of 5 megapixels is 2592 x 1944 pixels. The rectangular
image that is tried to be obtained is cropped when the circle is fitted because of a diameter of
1944 pixels. The actual resolution from a 5 Megapixel camera is about 3 megapixels, which is the
number of pixels left in the field.
A more important disadvantage of fisheye cameras is that the edges of the images are distorted.
These distortions are particularly prominent in moving objects and human images.
2. REFERENCE STUDIES
In the literature, there are human detection studies with both fixed cameras and fish-eye cameras.
Below is a brief description of the methods used in these studies.
Pfinder [1] is a study on real-time human body tracking. As in almost all work, this work also has
background subtraction to get rid of constant background noises. YUV space conversion and
normalization operations were applied to avoid the distortions caused by light and similar
reasons. Pixels were updated using adaptive filtering at every image and neighbours relationships
with nearby pixels were evaluated. As a result, the most suitable pixel center is selected and the
similarity of the distribution of the human figure is reached. Pfinder is a work done using a fixed
camera.
Figure 1. Pfinder morphological growing process
In another study with a fish-eye camera [2], background extraction has been done using Gradient
based edge detection technique. In the remaining foreground regions, head and shoulder shapes
were searched and tried to match the templates that created earlier. Below is a diagram of
working.
Figure 2. Working diagram[2]
International Journal of Applied Control, Electrical and Electronics Engineering (IJACEEE) Vol 6, No. 2/3, August 2018
3
In another work done, it was aimed to prevent occupational accidents by performing human
detection with a fish-eye camera placed in front of heavy duty machines [3]. Object distortions
from fish-eye cameras used to obtain a wide angle were the biggest challenge they faced. They
created databases for object recognition and trained classifiers with high number of positive and
negative samples.
Figure 3. Picture of working[3]
In this study, the extraction of Haar attributes proposed by Viola and Jones and the object
classification with enhanced adaboost classifier has been used [4].
3. STEPS OF DESIGN
Object detection methods are used to determine moving objects in video sequences using various
methods and to extract motion direction. This process is regarded as the first part of image
monitoring systems and has a great impact on system performance.
Finding the moving object by taking the background difference is a method used when the camera
that receives the image is fixed and the target object is moving. The background image is
determined by the image areas that remain in motion after the system starts running or before the
system starts. And then the difference between two background frames is detected. The absolute
value of the difference obtained is compared with a predetermined threshold level value. If the
difference value is above this threshold value, it is decided that it is a change in the related
coordinates. When this method is applied to sequential image frames in video images, the
following formula applies.
(1)
As in other studies, Gaussian operation must be performed on image frames before background
subtraction. In this way, the change of light and various distortions of the obstacles are reduced.
Figure 4. Background subtraction [2]
International Journal of Applied Control, Electrical and Electronics Engineering (IJACEEE) Vol 6, No. 2/3, August 2018
4
After background subtraction is done, it should be determined whether moving objects are
searched data. Haar classifier will be used for this. Trained classifiers are created by giving the
marked samples to the algorithm for the determination of the objects, and by the learning process
in the result of this.
When training data set is being prepared; the data in which the specified object is found are
marked as positive, and the data not found are marked as negative. In Haar Classifier training, the
following frames and the like are used. Frames scan over positive data to detect dark / bright
differences and create target values where the differences between black and white regions are
obvious.
Figure 5. Haar weak classifier
During the detection of the object being searched, the small classifiers specified in the training are
scanned on the frame and fixed in the regions that match the target values. In an input frame,
many small frames may provide target values for different regions, but since the object size to be
searched is approximately known, an object is detected in the area where a range of frames are
densely mapped.
In educational classrooms, the data used in the training set must be consistent with each other.
Otherwise the faulty rate will be high. In the study performed, the human silhouette was seen in
different shapes in the different coordinate sections because of the fish eye camera. To avoid this,
the camera is positioned at a height of 5 meters. This time, as the pixel size of the human
silhouette decreased, the number of detected features decreased and the educational success was
adversely affected.
Figure 6. Dimension and shape differences in image
International Journal of Applied Control, Electrical and Electronics Engineering (IJACEEE) Vol 6, No. 2/3, August 2018
5
As a solution, training was generating with different data sets for different coordinate zones of the
same frame. Training was carried out using a total of 5000 positive, 3000 negative data sets.
Figure 7. Training regions
The coordinates of the detected people are sent to the client with the generated socket
programming code. The UDP protocol is used because high data transfer is a matter of concern.
The client presents the data it receives in a visual form that end user can understand. The
following illustration shows the example.
Figure 8. Crowded heat map
The pseudo code and flow diagram of the generated algorithm is presented below.
Table 1. Pseudo Code.
1 Start
2 Get Frame
3 Apply Gaussian Filter
4 Background Subtraction
5 Divide Frame to 3 Different Regions
6 Clear Remaining Remnants
7 Search For Moving Objects
8 Give Object to Classifier
9 Send Meaningful Data Via Socket
10 View Heat Map With Web Browser
International Journal of Applied Control, Electrical and Electronics Engineering (IJACEEE) Vol 6, No. 2/3, August 2018
6
Figure 9. Algorithm Flow Diagram
4. RESULT
Within the scope of the study, a solution is proposed for an affordable human detection and
intensity map of the area that does not contain blind spots and covers the entire area.
In the present case, classifying moving objects reduces the processing power. However, when the
detected object stops moving, the previous position continues to be marked as positive. If there is
no movement within 3 seconds, the region is given a reclassifier and it is confirmed that the
detected object is human. Algorithm and classifier optimization studies are continuing to reduce
the specified time threshold.
It was mentioned above that the training was done with different data sets according to the
separated regions in the image frames taken from the camera. However, it was observed that the
detection success rate decreased in the transition locations between the two different regions. The
work is ongoing to resolve this problem.
The height of the position of the camera is affected by the algorithm performance ratio. With the
created front ace, the user is able to enter the integrated height of the camera parametrically. It is
planned to increase the performance ratio by changing the algorithm and classifier values
according to the entered value.
International Journal of Applied Control, Electrical and Electronics Engineering (IJACEEE) Vol 6, No. 2/3, August 2018
7
REFERENCES
[1] Christopher Richard Wren, Ali Azarbayejani, Trevor Darrell and Alex Paul Pentland., “Pfinder: Real-
Time Tracking of the Human Body '', IEEE Trans.on Pattern Analysis and Machine Intelligence. Vol
19, No 7,July 1999.
[2] Mamoru Satio, Katsuhisa Kitaguchi and Gun Kimura, Masafumi Hashimoto, Human Detection from
Fish-eye Image by Bayesian Combination of Probabilistic Apperance Models, IEEE Systems Mand
and Cybernetics, Oct. 2010.
[3] Vincent Fremont, Manh Tuan Bui, Djamal Boukerroui and Pierrick Letort., “Vision-Based People
Detection System for Heavy Machine Applications” Jan. 2016
[4] P. Viola and M. Jones, “Rapid object detection using a boosted cascade of simple features,” presented
at IEEE Conference on Computer Vision and Pattern Recognition, 2001
AUTHORS
Nihan Kahraman is Assist. Prof. Dr. at Yıldız Technical University
Electronic and Communication Engineering Department. She has completed
many projects throughout her academic career. Her interests are listed
below.
- Analog and digital IC design
- Microelectronics
- Neural networks
- Electronic design automation
- Image processing
Oguzhan Tevetoglu is a software architecture designer at Netas and also graduate
student at YTU. He has taken many roles in embedded system projects. His interests
are listed below.
- Image processing
- Embedded Systems
- Neural networks
- Computer network

More Related Content

What's hot

Application of-image-segmentation-in-brain-tumor-detection
Application of-image-segmentation-in-brain-tumor-detectionApplication of-image-segmentation-in-brain-tumor-detection
Application of-image-segmentation-in-brain-tumor-detectionMyat Myint Zu Thin
 
Microarray Data Classification Using Support Vector Machine
Microarray Data Classification Using Support Vector MachineMicroarray Data Classification Using Support Vector Machine
Microarray Data Classification Using Support Vector MachineCSCJournals
 
Clustering of medline documents using semi supervised spectral clustering
Clustering of medline documents using semi supervised spectral clusteringClustering of medline documents using semi supervised spectral clustering
Clustering of medline documents using semi supervised spectral clusteringeSAT Journals
 
Brain Tumor Detection and Classification using Adaptive Boosting
Brain Tumor Detection and Classification using Adaptive BoostingBrain Tumor Detection and Classification using Adaptive Boosting
Brain Tumor Detection and Classification using Adaptive BoostingIRJET Journal
 
Comparative performance analysis of segmentation techniques
Comparative performance analysis of segmentation techniquesComparative performance analysis of segmentation techniques
Comparative performance analysis of segmentation techniquesIAEME Publication
 
Automated brain tumor detection and segmentation from mri images using adapti...
Automated brain tumor detection and segmentation from mri images using adapti...Automated brain tumor detection and segmentation from mri images using adapti...
Automated brain tumor detection and segmentation from mri images using adapti...Tamilarasan N
 
Automatic detection of optic disc and blood vessels from retinal images using...
Automatic detection of optic disc and blood vessels from retinal images using...Automatic detection of optic disc and blood vessels from retinal images using...
Automatic detection of optic disc and blood vessels from retinal images using...eSAT Journals
 
Efficient Small Template Iris Recognition System Using Wavelet Transform
Efficient Small Template Iris Recognition System Using Wavelet TransformEfficient Small Template Iris Recognition System Using Wavelet Transform
Efficient Small Template Iris Recognition System Using Wavelet TransformCSCJournals
 
An Automatic ROI of The Fundus Photography
An Automatic ROI of The Fundus Photography An Automatic ROI of The Fundus Photography
An Automatic ROI of The Fundus Photography IJECEIAES
 
Detection of medical instruments project- PART 2
Detection of medical instruments project- PART 2Detection of medical instruments project- PART 2
Detection of medical instruments project- PART 2Sairam Adithya
 
Identifying brain tumour from mri image using modified fcm and support
Identifying brain tumour from mri image using modified fcm and supportIdentifying brain tumour from mri image using modified fcm and support
Identifying brain tumour from mri image using modified fcm and supportIAEME Publication
 
IRJET- Proposed System for Animal Recognition using Image Processing
IRJET-  	  Proposed System for Animal Recognition using Image ProcessingIRJET-  	  Proposed System for Animal Recognition using Image Processing
IRJET- Proposed System for Animal Recognition using Image ProcessingIRJET Journal
 
Literature Survey on Detection of Brain Tumor from MRI Images
Literature Survey on Detection of Brain Tumor from MRI Images Literature Survey on Detection of Brain Tumor from MRI Images
Literature Survey on Detection of Brain Tumor from MRI Images IOSR Journals
 
An overview of automatic brain tumor detection frommagnetic resonance images
An overview of automatic brain tumor detection frommagnetic resonance imagesAn overview of automatic brain tumor detection frommagnetic resonance images
An overview of automatic brain tumor detection frommagnetic resonance imagesMangesh Lingampalle
 
Brain Tumor Detection Using Artificial Neural Network Fuzzy Inference System ...
Brain Tumor Detection Using Artificial Neural Network Fuzzy Inference System ...Brain Tumor Detection Using Artificial Neural Network Fuzzy Inference System ...
Brain Tumor Detection Using Artificial Neural Network Fuzzy Inference System ...Editor IJCATR
 
Brain tumor detection by scanning MRI images (using filtering techniques)
Brain tumor detection by scanning MRI images (using filtering techniques)Brain tumor detection by scanning MRI images (using filtering techniques)
Brain tumor detection by scanning MRI images (using filtering techniques)Vivek reddy
 
Brain Tumor Detection using CNN
Brain Tumor Detection using CNNBrain Tumor Detection using CNN
Brain Tumor Detection using CNNMohammadRakib8
 

What's hot (19)

G011134454
G011134454G011134454
G011134454
 
K011138084
K011138084K011138084
K011138084
 
Application of-image-segmentation-in-brain-tumor-detection
Application of-image-segmentation-in-brain-tumor-detectionApplication of-image-segmentation-in-brain-tumor-detection
Application of-image-segmentation-in-brain-tumor-detection
 
Microarray Data Classification Using Support Vector Machine
Microarray Data Classification Using Support Vector MachineMicroarray Data Classification Using Support Vector Machine
Microarray Data Classification Using Support Vector Machine
 
Clustering of medline documents using semi supervised spectral clustering
Clustering of medline documents using semi supervised spectral clusteringClustering of medline documents using semi supervised spectral clustering
Clustering of medline documents using semi supervised spectral clustering
 
Brain Tumor Detection and Classification using Adaptive Boosting
Brain Tumor Detection and Classification using Adaptive BoostingBrain Tumor Detection and Classification using Adaptive Boosting
Brain Tumor Detection and Classification using Adaptive Boosting
 
Comparative performance analysis of segmentation techniques
Comparative performance analysis of segmentation techniquesComparative performance analysis of segmentation techniques
Comparative performance analysis of segmentation techniques
 
Automated brain tumor detection and segmentation from mri images using adapti...
Automated brain tumor detection and segmentation from mri images using adapti...Automated brain tumor detection and segmentation from mri images using adapti...
Automated brain tumor detection and segmentation from mri images using adapti...
 
Automatic detection of optic disc and blood vessels from retinal images using...
Automatic detection of optic disc and blood vessels from retinal images using...Automatic detection of optic disc and blood vessels from retinal images using...
Automatic detection of optic disc and blood vessels from retinal images using...
 
Efficient Small Template Iris Recognition System Using Wavelet Transform
Efficient Small Template Iris Recognition System Using Wavelet TransformEfficient Small Template Iris Recognition System Using Wavelet Transform
Efficient Small Template Iris Recognition System Using Wavelet Transform
 
An Automatic ROI of The Fundus Photography
An Automatic ROI of The Fundus Photography An Automatic ROI of The Fundus Photography
An Automatic ROI of The Fundus Photography
 
Detection of medical instruments project- PART 2
Detection of medical instruments project- PART 2Detection of medical instruments project- PART 2
Detection of medical instruments project- PART 2
 
Identifying brain tumour from mri image using modified fcm and support
Identifying brain tumour from mri image using modified fcm and supportIdentifying brain tumour from mri image using modified fcm and support
Identifying brain tumour from mri image using modified fcm and support
 
IRJET- Proposed System for Animal Recognition using Image Processing
IRJET-  	  Proposed System for Animal Recognition using Image ProcessingIRJET-  	  Proposed System for Animal Recognition using Image Processing
IRJET- Proposed System for Animal Recognition using Image Processing
 
Literature Survey on Detection of Brain Tumor from MRI Images
Literature Survey on Detection of Brain Tumor from MRI Images Literature Survey on Detection of Brain Tumor from MRI Images
Literature Survey on Detection of Brain Tumor from MRI Images
 
An overview of automatic brain tumor detection frommagnetic resonance images
An overview of automatic brain tumor detection frommagnetic resonance imagesAn overview of automatic brain tumor detection frommagnetic resonance images
An overview of automatic brain tumor detection frommagnetic resonance images
 
Brain Tumor Detection Using Artificial Neural Network Fuzzy Inference System ...
Brain Tumor Detection Using Artificial Neural Network Fuzzy Inference System ...Brain Tumor Detection Using Artificial Neural Network Fuzzy Inference System ...
Brain Tumor Detection Using Artificial Neural Network Fuzzy Inference System ...
 
Brain tumor detection by scanning MRI images (using filtering techniques)
Brain tumor detection by scanning MRI images (using filtering techniques)Brain tumor detection by scanning MRI images (using filtering techniques)
Brain tumor detection by scanning MRI images (using filtering techniques)
 
Brain Tumor Detection using CNN
Brain Tumor Detection using CNNBrain Tumor Detection using CNN
Brain Tumor Detection using CNN
 

Similar to CROWD ANALYSIS WITH FISH EYE CAMERA

Implementation of features dynamic tracking filter to tracing pupils
Implementation of features dynamic tracking filter to tracing pupilsImplementation of features dynamic tracking filter to tracing pupils
Implementation of features dynamic tracking filter to tracing pupilssipij
 
Visual Saliency Model Using Sift and Comparison of Learning Approaches
Visual Saliency Model Using Sift and Comparison of Learning ApproachesVisual Saliency Model Using Sift and Comparison of Learning Approaches
Visual Saliency Model Using Sift and Comparison of Learning Approachescsandit
 
Iris recognition for personal identification using lamstar neural network
Iris recognition for personal identification using lamstar neural networkIris recognition for personal identification using lamstar neural network
Iris recognition for personal identification using lamstar neural networkijcsit
 
IRJET - Human Eye Pupil Detection Technique using Center of Gravity Method
IRJET - Human Eye Pupil Detection Technique using Center of Gravity MethodIRJET - Human Eye Pupil Detection Technique using Center of Gravity Method
IRJET - Human Eye Pupil Detection Technique using Center of Gravity MethodIRJET Journal
 
IRJET- Survey on Face Recognition using Biometrics
IRJET-  	  Survey on Face Recognition using BiometricsIRJET-  	  Survey on Face Recognition using Biometrics
IRJET- Survey on Face Recognition using BiometricsIRJET Journal
 
Schematic model for analyzing mobility and detection of multiple
Schematic model for analyzing mobility and detection of multipleSchematic model for analyzing mobility and detection of multiple
Schematic model for analyzing mobility and detection of multipleIAEME Publication
 
An improved particle filter tracking
An improved particle filter trackingAn improved particle filter tracking
An improved particle filter trackingijcsit
 
IRJET - Facial Recognition based Attendance System with LBPH
IRJET -  	  Facial Recognition based Attendance System with LBPHIRJET -  	  Facial Recognition based Attendance System with LBPH
IRJET - Facial Recognition based Attendance System with LBPHIRJET Journal
 
An Object Detection, Tracking And Parametric Classification– A Review
An Object Detection, Tracking And Parametric Classification– A ReviewAn Object Detection, Tracking And Parametric Classification– A Review
An Object Detection, Tracking And Parametric Classification– A ReviewIRJET Journal
 
OBJECT DETECTION, EXTRACTION AND CLASSIFICATION USING IMAGE PROCESSING TECHNIQUE
OBJECT DETECTION, EXTRACTION AND CLASSIFICATION USING IMAGE PROCESSING TECHNIQUEOBJECT DETECTION, EXTRACTION AND CLASSIFICATION USING IMAGE PROCESSING TECHNIQUE
OBJECT DETECTION, EXTRACTION AND CLASSIFICATION USING IMAGE PROCESSING TECHNIQUEJournal For Research
 
K-Means Clustering in Moving Objects Extraction with Selective Background
K-Means Clustering in Moving Objects Extraction with Selective BackgroundK-Means Clustering in Moving Objects Extraction with Selective Background
K-Means Clustering in Moving Objects Extraction with Selective BackgroundIJCSIS Research Publications
 
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET TransformRotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET TransformIRJET Journal
 
IRJET- Biometric Eye Recognition using Alex-Net
IRJET-  	  Biometric Eye Recognition using Alex-NetIRJET-  	  Biometric Eye Recognition using Alex-Net
IRJET- Biometric Eye Recognition using Alex-NetIRJET Journal
 
76201950
7620195076201950
76201950IJRAT
 
Depth Estimation from Defocused Images: a Survey
Depth Estimation from Defocused Images: a SurveyDepth Estimation from Defocused Images: a Survey
Depth Estimation from Defocused Images: a SurveyIJAAS Team
 
Robust Tracking Via Feature Mapping Method and Support Vector Machine
Robust Tracking Via Feature Mapping Method and Support Vector MachineRobust Tracking Via Feature Mapping Method and Support Vector Machine
Robust Tracking Via Feature Mapping Method and Support Vector MachineIRJET Journal
 

Similar to CROWD ANALYSIS WITH FISH EYE CAMERA (20)

Implementation of features dynamic tracking filter to tracing pupils
Implementation of features dynamic tracking filter to tracing pupilsImplementation of features dynamic tracking filter to tracing pupils
Implementation of features dynamic tracking filter to tracing pupils
 
Visual Saliency Model Using Sift and Comparison of Learning Approaches
Visual Saliency Model Using Sift and Comparison of Learning ApproachesVisual Saliency Model Using Sift and Comparison of Learning Approaches
Visual Saliency Model Using Sift and Comparison of Learning Approaches
 
Iris recognition for personal identification using lamstar neural network
Iris recognition for personal identification using lamstar neural networkIris recognition for personal identification using lamstar neural network
Iris recognition for personal identification using lamstar neural network
 
IRJET - Human Eye Pupil Detection Technique using Center of Gravity Method
IRJET - Human Eye Pupil Detection Technique using Center of Gravity MethodIRJET - Human Eye Pupil Detection Technique using Center of Gravity Method
IRJET - Human Eye Pupil Detection Technique using Center of Gravity Method
 
IRJET- Survey on Face Recognition using Biometrics
IRJET-  	  Survey on Face Recognition using BiometricsIRJET-  	  Survey on Face Recognition using Biometrics
IRJET- Survey on Face Recognition using Biometrics
 
Schematic model for analyzing mobility and detection of multiple
Schematic model for analyzing mobility and detection of multipleSchematic model for analyzing mobility and detection of multiple
Schematic model for analyzing mobility and detection of multiple
 
An improved particle filter tracking
An improved particle filter trackingAn improved particle filter tracking
An improved particle filter tracking
 
IRJET - Facial Recognition based Attendance System with LBPH
IRJET -  	  Facial Recognition based Attendance System with LBPHIRJET -  	  Facial Recognition based Attendance System with LBPH
IRJET - Facial Recognition based Attendance System with LBPH
 
D45012128
D45012128D45012128
D45012128
 
D018112429
D018112429D018112429
D018112429
 
An Object Detection, Tracking And Parametric Classification– A Review
An Object Detection, Tracking And Parametric Classification– A ReviewAn Object Detection, Tracking And Parametric Classification– A Review
An Object Detection, Tracking And Parametric Classification– A Review
 
OBJECT DETECTION, EXTRACTION AND CLASSIFICATION USING IMAGE PROCESSING TECHNIQUE
OBJECT DETECTION, EXTRACTION AND CLASSIFICATION USING IMAGE PROCESSING TECHNIQUEOBJECT DETECTION, EXTRACTION AND CLASSIFICATION USING IMAGE PROCESSING TECHNIQUE
OBJECT DETECTION, EXTRACTION AND CLASSIFICATION USING IMAGE PROCESSING TECHNIQUE
 
R-PI BASED DETECTION OF LUNG CANCER USING MRI IMAGE
R-PI BASED DETECTION OF LUNG CANCER USING MRI IMAGER-PI BASED DETECTION OF LUNG CANCER USING MRI IMAGE
R-PI BASED DETECTION OF LUNG CANCER USING MRI IMAGE
 
K-Means Clustering in Moving Objects Extraction with Selective Background
K-Means Clustering in Moving Objects Extraction with Selective BackgroundK-Means Clustering in Moving Objects Extraction with Selective Background
K-Means Clustering in Moving Objects Extraction with Selective Background
 
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET TransformRotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
 
IRJET- Biometric Eye Recognition using Alex-Net
IRJET-  	  Biometric Eye Recognition using Alex-NetIRJET-  	  Biometric Eye Recognition using Alex-Net
IRJET- Biometric Eye Recognition using Alex-Net
 
IRJET- Digiyathra
IRJET-  	  DigiyathraIRJET-  	  Digiyathra
IRJET- Digiyathra
 
76201950
7620195076201950
76201950
 
Depth Estimation from Defocused Images: a Survey
Depth Estimation from Defocused Images: a SurveyDepth Estimation from Defocused Images: a Survey
Depth Estimation from Defocused Images: a Survey
 
Robust Tracking Via Feature Mapping Method and Support Vector Machine
Robust Tracking Via Feature Mapping Method and Support Vector MachineRobust Tracking Via Feature Mapping Method and Support Vector Machine
Robust Tracking Via Feature Mapping Method and Support Vector Machine
 

Recently uploaded

Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Recently uploaded (20)

Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 

CROWD ANALYSIS WITH FISH EYE CAMERA

  • 1. International Journal of Applied Control, Electrical and Electronics Engineering (IJACEEE) Vol 6, No. 2/3, August 2018 DOI: 10.5121/ijaceee.2018.6301 1 CROWD ANALYSIS WITH FISH EYE CAMERA Huseyin Oguzhan Tevetoglu1 and Nihan Kahraman2 1 Department of Electronic and Communication Engineering, Yıldız Technical University, Istanbul, Turkey 1 Netaş Telekomünikasyon A.Ş., Istanbul, Turkey 2 Deparment of Electronic and Communication Engineering, Yıldız Technical University, Istanbul, Turkey ABSTRACT Nowadays crowd analysis, essential factor about decision management of brand strategy, is not a controllable field by individuals. Therefore a technology, software products is needed. In this paper we focused on what we have done about crowd analysis and examination the problem of human detection with fish-eye lenses cameras. In order to identify human density, one of the machine learning algorithm, which is Haar Classification algorithm, is used to distinguish human body under different conditions. First, motion analysis is used to search for meaningful data, and then the desired object is detected by the trained classifier. Significant data has been sent to the end user via socket programming and human density analysis is presented. KEYWORDS Fish-Eye, Human Detection, Haar Classification, Crowd Analysis, Machine Learning, Motion Analysis, Density Analysis 1. INTRODUCTION Trends in video processing and human tracking systems have become popular today. Particularly for security purposes, analysis of data from IP cameras used in various locations has gained importance. However, the camera array, which is designed to completely cover the scene, is disadvantageous both in terms of the number of the images and the size of the data to be processed. The fish-eye cameras function as both a fixed camera and a moving camera. A fixed and restricted area can be displayed with stationary cameras. Thanks to moving cameras which are manually controllable cameras, areas outside the area where you want to view still images can also be displayed. In this case, it is very likely that the movements in the region to be displayed constantly or continuously are missed. Based on this information, we can say that fish-eye cameras are very advantageous. Fisheye lenses are created by the do not correction of normal lens defects. These lenses, which we can obtain data in wide angle, provide the creation of hemispherical images. It can be said that firstly it is used in the field of metrology and its usage also increases in security systems today. Depending on the barrel bending error in the lens production, it is possible to obtain two types of images, 360 and 180 degrees.
  • 2. International Journal of Applied Control, Electrical and Electronics Engineering (IJACEEE) Vol 6, No. 2/3, August 2018 2 Resolution performance from a fish-eye camera is not equivalent to a fixed camera. This is why a rectangular 360 degree image is obtained from a rectangular image sensor. It is necessary to make a mathematical explanation; the resolution of 5 megapixels is 2592 x 1944 pixels. The rectangular image that is tried to be obtained is cropped when the circle is fitted because of a diameter of 1944 pixels. The actual resolution from a 5 Megapixel camera is about 3 megapixels, which is the number of pixels left in the field. A more important disadvantage of fisheye cameras is that the edges of the images are distorted. These distortions are particularly prominent in moving objects and human images. 2. REFERENCE STUDIES In the literature, there are human detection studies with both fixed cameras and fish-eye cameras. Below is a brief description of the methods used in these studies. Pfinder [1] is a study on real-time human body tracking. As in almost all work, this work also has background subtraction to get rid of constant background noises. YUV space conversion and normalization operations were applied to avoid the distortions caused by light and similar reasons. Pixels were updated using adaptive filtering at every image and neighbours relationships with nearby pixels were evaluated. As a result, the most suitable pixel center is selected and the similarity of the distribution of the human figure is reached. Pfinder is a work done using a fixed camera. Figure 1. Pfinder morphological growing process In another study with a fish-eye camera [2], background extraction has been done using Gradient based edge detection technique. In the remaining foreground regions, head and shoulder shapes were searched and tried to match the templates that created earlier. Below is a diagram of working. Figure 2. Working diagram[2]
  • 3. International Journal of Applied Control, Electrical and Electronics Engineering (IJACEEE) Vol 6, No. 2/3, August 2018 3 In another work done, it was aimed to prevent occupational accidents by performing human detection with a fish-eye camera placed in front of heavy duty machines [3]. Object distortions from fish-eye cameras used to obtain a wide angle were the biggest challenge they faced. They created databases for object recognition and trained classifiers with high number of positive and negative samples. Figure 3. Picture of working[3] In this study, the extraction of Haar attributes proposed by Viola and Jones and the object classification with enhanced adaboost classifier has been used [4]. 3. STEPS OF DESIGN Object detection methods are used to determine moving objects in video sequences using various methods and to extract motion direction. This process is regarded as the first part of image monitoring systems and has a great impact on system performance. Finding the moving object by taking the background difference is a method used when the camera that receives the image is fixed and the target object is moving. The background image is determined by the image areas that remain in motion after the system starts running or before the system starts. And then the difference between two background frames is detected. The absolute value of the difference obtained is compared with a predetermined threshold level value. If the difference value is above this threshold value, it is decided that it is a change in the related coordinates. When this method is applied to sequential image frames in video images, the following formula applies. (1) As in other studies, Gaussian operation must be performed on image frames before background subtraction. In this way, the change of light and various distortions of the obstacles are reduced. Figure 4. Background subtraction [2]
  • 4. International Journal of Applied Control, Electrical and Electronics Engineering (IJACEEE) Vol 6, No. 2/3, August 2018 4 After background subtraction is done, it should be determined whether moving objects are searched data. Haar classifier will be used for this. Trained classifiers are created by giving the marked samples to the algorithm for the determination of the objects, and by the learning process in the result of this. When training data set is being prepared; the data in which the specified object is found are marked as positive, and the data not found are marked as negative. In Haar Classifier training, the following frames and the like are used. Frames scan over positive data to detect dark / bright differences and create target values where the differences between black and white regions are obvious. Figure 5. Haar weak classifier During the detection of the object being searched, the small classifiers specified in the training are scanned on the frame and fixed in the regions that match the target values. In an input frame, many small frames may provide target values for different regions, but since the object size to be searched is approximately known, an object is detected in the area where a range of frames are densely mapped. In educational classrooms, the data used in the training set must be consistent with each other. Otherwise the faulty rate will be high. In the study performed, the human silhouette was seen in different shapes in the different coordinate sections because of the fish eye camera. To avoid this, the camera is positioned at a height of 5 meters. This time, as the pixel size of the human silhouette decreased, the number of detected features decreased and the educational success was adversely affected. Figure 6. Dimension and shape differences in image
  • 5. International Journal of Applied Control, Electrical and Electronics Engineering (IJACEEE) Vol 6, No. 2/3, August 2018 5 As a solution, training was generating with different data sets for different coordinate zones of the same frame. Training was carried out using a total of 5000 positive, 3000 negative data sets. Figure 7. Training regions The coordinates of the detected people are sent to the client with the generated socket programming code. The UDP protocol is used because high data transfer is a matter of concern. The client presents the data it receives in a visual form that end user can understand. The following illustration shows the example. Figure 8. Crowded heat map The pseudo code and flow diagram of the generated algorithm is presented below. Table 1. Pseudo Code. 1 Start 2 Get Frame 3 Apply Gaussian Filter 4 Background Subtraction 5 Divide Frame to 3 Different Regions 6 Clear Remaining Remnants 7 Search For Moving Objects 8 Give Object to Classifier 9 Send Meaningful Data Via Socket 10 View Heat Map With Web Browser
  • 6. International Journal of Applied Control, Electrical and Electronics Engineering (IJACEEE) Vol 6, No. 2/3, August 2018 6 Figure 9. Algorithm Flow Diagram 4. RESULT Within the scope of the study, a solution is proposed for an affordable human detection and intensity map of the area that does not contain blind spots and covers the entire area. In the present case, classifying moving objects reduces the processing power. However, when the detected object stops moving, the previous position continues to be marked as positive. If there is no movement within 3 seconds, the region is given a reclassifier and it is confirmed that the detected object is human. Algorithm and classifier optimization studies are continuing to reduce the specified time threshold. It was mentioned above that the training was done with different data sets according to the separated regions in the image frames taken from the camera. However, it was observed that the detection success rate decreased in the transition locations between the two different regions. The work is ongoing to resolve this problem. The height of the position of the camera is affected by the algorithm performance ratio. With the created front ace, the user is able to enter the integrated height of the camera parametrically. It is planned to increase the performance ratio by changing the algorithm and classifier values according to the entered value.
  • 7. International Journal of Applied Control, Electrical and Electronics Engineering (IJACEEE) Vol 6, No. 2/3, August 2018 7 REFERENCES [1] Christopher Richard Wren, Ali Azarbayejani, Trevor Darrell and Alex Paul Pentland., “Pfinder: Real- Time Tracking of the Human Body '', IEEE Trans.on Pattern Analysis and Machine Intelligence. Vol 19, No 7,July 1999. [2] Mamoru Satio, Katsuhisa Kitaguchi and Gun Kimura, Masafumi Hashimoto, Human Detection from Fish-eye Image by Bayesian Combination of Probabilistic Apperance Models, IEEE Systems Mand and Cybernetics, Oct. 2010. [3] Vincent Fremont, Manh Tuan Bui, Djamal Boukerroui and Pierrick Letort., “Vision-Based People Detection System for Heavy Machine Applications” Jan. 2016 [4] P. Viola and M. Jones, “Rapid object detection using a boosted cascade of simple features,” presented at IEEE Conference on Computer Vision and Pattern Recognition, 2001 AUTHORS Nihan Kahraman is Assist. Prof. Dr. at Yıldız Technical University Electronic and Communication Engineering Department. She has completed many projects throughout her academic career. Her interests are listed below. - Analog and digital IC design - Microelectronics - Neural networks - Electronic design automation - Image processing Oguzhan Tevetoglu is a software architecture designer at Netas and also graduate student at YTU. He has taken many roles in embedded system projects. His interests are listed below. - Image processing - Embedded Systems - Neural networks - Computer network