SlideShare a Scribd company logo
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 01 | Jan-2013, Available @ http://www.ijret.org 25
AN ADAPTIVE GMM APPROACH TO BACKGROUND SUBTRACTION
FOR APPLICATION IN REAL TIME SURVEILLANCE
Subra Mukherjee1
, Karen Das2
Department of Electronics and telecommunication Assam Don Bosco University, Guwahati, India
subra_mukherjee@yahoo.in, karenkdas@gmail.com
Abstract
Efficient security management has become an important parameter in today’s world. As the problem is growing, there is an urgent
need for the introduction of advanced technology and equipment to improve the state-of art of surveillance. In this paper we propose a
model for real time background subtraction using AGMM. The proposed model is robust and adaptable to dynamic background, fast
illumination changes, repetitive motion. Also we have incorporated a method for detecting shadows using the Horpresert color model.
The proposed model can be employed for monitoring areas where movement or entry is highly restricted. So on detection of any
unexpected events in the scene an alarm can be triggered and hence we can achieve real time surveillance even in the absence of
constant human monitoring.
Keywords-Background subtraction, Adaptive Gaussian Mixture model (AGMM), surveillance, Horpresert color model.
---------------------------------------------------------------------------------------------------------------------------------------------------
1. INTRODUCTION
The present day video surveillance system has two main
drawbacks: firstly they are not adaptable to different operative
scenarios (they only work for a well known structured model).
Secondly they need a human assistance to identify and label a
specific event [2].Moreover dependency on human beings for a
threat alert cannot be fully trusted. The general surveillance
cameras are like machines that can only see, but cannot decide
or identify things or events by itself. So, keeping in mind the
present day scenario, it is important that we make our
surveillance system intelligent and smart. For any real time
surveillance the first step would be to efficiently detect motion
and then extract the region of interest (ROI). For this, three
main processes used are: optical flow, frame differencing and
background subtraction [3].Optical flow can be used for
detection even without any prior knowledge of the background
and works well even when the camera is moving. However it is
very sensitive to noise and requires special hardware. Frame
differencing can detect target in dynamically changing
background, but the segmentation of target is not integrated.
And background subtraction is one of the most widely used
methods for segmentation of dynamic scene from a video. A
large number of methods and techniques have been cited in
literature for background subtraction, each of them differing by
the model or type of parameters used. However most of the
models have a difficulty when dealing with bimodal
background, sudden changes in illumination, frequent repetitive
motions. In this paper, we model the background using the
GMM approach proposed by Stauffer and Grimson [1]. The
proposed model can be used to detect any moving object in the
scene. Moreover it does not need any predefined background
model in the beginning. It adaptively reads the video and any
scene that is constant or static beyond a certain time is again
considered as background. Moreover it responds well to
dynamically changing background and even when the camera is
moving. Shadows often encroach upon the foreground during
segmentation and often causes problem in correct detection of
object. For application in surveillance it is very important to
correctly detect shadows from the extracted foreground.
Therefore we have presented a shadow detection technique
using the horpresert color model for moving object detection.
2. RELATED WORK
Background modeling is generally done by analyzing some of
the regular statistical characteristics and then object is detected
by comparing the current frame with the modeled background.
However, though it sounds simple, but this technique seems to
be inadequate when dealing with complex environment. Most
of the available non-adaptive methods of background
subtraction cannot be used in surveillance because it requires
manual initialization. And in surveillance, it is not possible to
have a pre-defined set of background model before-hand. So, it
is very important that the background model is adaptive and
robust. Many background subtraction methods have been
proposed in the past decades including Running Gaussian
Average, Temporal Median Filter, Mixture of Gaussians,
Kalman Filter and Co-occurrence of Image Variations.
However the mixture model is widely used by researchers for
application in surveillance.
A variety of methods have been proposed for modeling the
background. Initially a single Gaussian was used to find the
variances of the pixel intensity levels in the image sequences
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 01 | Jan-2013, Available @ http://www.ijret.org 26
[4]. However generally multiple surfaces appear in a pixel and
so each pixel should be represented by a mixture of Gaussians.
The GMM method was firstly used to model the pixel
process[5] by N.Friedman et al. Stauffer & Grimson [1]
modeled the values of a particular pixel as a mixture of
Gaussians and based on the persistence and variance of each
pixel of the Gaussians of the mixture, they determined which
pixels corresponds to background colors. They also used an
online approximation to update the model. Another similar
work was done in [6]. They proposed an algorithm for
modeling background which could increase or decrease the
number of Gaussian components based on the complexity of
the pattern of the pixel. Recently in 2008, Maddalena and
Petrosino [7] proposed an interesting biologically inspired self
organizing approach using artificial neural network for
background modeling. A model of the background was made
by learning the motion of variations of the background and
based on this learnt background model, the algorithm could
extract the region of interest.
The original GMM cited in many literatures assumed that the
variances of the red, green and blue were same and independent
of each other. Tang and Miao proposed an algorithm to
improve the preciseness of the method by considering that each
channel has its own variances [8].
In [9] they have proposed an approach for removing false
motion detection to a great extent by combining the
conventional adaptive GMM with neighborhood based
differences and overlapping based classification.
The rest of the paper is organized as follows: In section 3 the
Stauffer and Grimson method [1] for GMM shall be explained.
In section 4, the method for shadow removal is discussed
followed by the proposed approach in section 5.In Section 6 we
have the results and discussion and finally the applicability of
our work is discussed in section 7.
3. GAUSSIAN MIXTURE MODEL
A Gaussian Mixture Model (GMM) is a parametric probability
density function represented as a weighted sum of Gaussian
component densities. GMMs are commonly used as a
parametric model of the probability distribution of continuous
measurements or features in a biometric system, such as vocal-
tract related spectral features in a speaker recognition system.
GMM parameters are estimated from training data using the
iterative Expectation Maximization (EM) algorithm or
Maximum A Posteriori (MAP) estimation from a well-trained
prior model.
A Gaussian mixture model is a weighted sum of M component
Gaussian densities as given by the equation,
where x is a D-dimensional continuous-valued data vector (i.e.
measurement or features), wi, i=1, . . . ,M, are the mixture
weights, and g(x|μi, ), i = 1, . . . ,M, are the component
Gaussian densities. Each component density is a D-variate
Gaussian function of the form,
with mean vector µi and covariance matrix Σi. The mixture
weights satisfy the constraint that 1.
A. Implementation
A mixture of K Gaussians is used to model the time series of
values observed at a particular pixel. The probability of
occurrence of the current pixel value is given by,
Where N is the Gaussian probability density function, whose
mean vector is µ and covariance is Σ.
And wi is the weight of the ith Gaussian such that wi = 1.
The covariance matrix is assumed to be of the form  = σ 2I for
computational reasons.
B. Parameter updates
The new pixel value Zt is checked against each Gaussian. A
Gaussian is labeled as matched if
Then its parameters may be updated as follows:
)
Where  is the learning rate for the weights.
If a Gaussian is labeled as unmatched only its weight is
decreased as
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 01 | Jan-2013, Available @ http://www.ijret.org 27
If none of the Gaussians match, the one with the lowest weight
is replaced with Zt as mean and a high initial standard
deviation.
The rank of a Gaussian is defined as w/σ. This value gets
higher if the distribution has low standard deviation and it has
matched many times. When the Gaussians are sorted in a list by
decreasing value of rank, the first is more likely to be
background. The first B Gaussians that satisfy (1) are thought
to represent the background.
The Gaussian mixture model (GMM) is adaptive; it can
incorporate slow illumination changes and the removal and
addition of objects into the background. Further it can handle
repetitive background changes like swaying branches, a
flickering computer monitor etc. The higher the value of T in
(1), the higher is the probability of a multi-modal background.
C. Shadow Removal
Shadows detected as foreground can cause several problems
when extracting and labeling objects, two examples are object
shape distortion and several objects merging together. It is
especially crucial and these problems should be avoided.
Generally the image is first transformed to a color space that
segregates the chromaticity information from the intensity. In
the HSV color space, the hypothesis is that a shadowed pixel
value’s value and saturation will decrease while the hue
remains relatively constant. In CIELAB, the luminance
component should decrease and the chromaticity coordinates
should remain relatively constant.
However, the color model of Horpresert et al [10] gave the best
results in the test conducted. It doesn’t require any complicated
conversion formulae like in the case of HSV and CIELAB.
Also the simple choice of parameters is a distinct advantage.
In this model each pixel value in the RGB color space is
assumed to lie on a chromaticity line, which connects the pixel
value and the origin. The authors specify a way to calculate the
deviation of a foreground pixel value from the background
value. The foreground value is compared with the means of
each of the B background Gaussians in equation (1).
The brightness distortion (BD) and chromaticity distortion
(CD) are defined as (see Fig.1):
Shadow points (sp) can now be ascertained as:
In Fig. 1, OB is the background RGB vector and OF is the
foreground RGB vector. FP is the perpendicular dropped from
F onto OB. The shaded cylinder is the locus of all shadow color
values.
Figure1: Brightness and chromaticity distortion in the RGB
color space [10].
4. PROPOSED APPROACH
We propose an approach to extract the region of interest by
using an adaptive GMM discussed above for background
subtraction. The shadows are then efficiently detected
employing the Horpresert color model as discussed in section 4.
After these, when the foreground pixels are identified they can
be segmented using the connected component analysis. This
would enable us to detect the moving object not only by their
positions but we can also get information regarding their size
and other shape information and hence this would enhance
tracking. We propose to use this for detection of abandoned
object in the scene. As our background subtraction algorithm is
adaptive, any foreground object that remains static beyond a
certain time, becomes a part of background. This can be used
for detecting an abandoned luggage. If any motion is detected
initially and thereafter the background becomes constant and
remains unmoved for next few minutes, it could be possible
that an object had been kept in the scene and has not been
moved for a long time. This could lead to some suspicious
situation and hence an alarm could be triggered.
5. RESULTS AND DISCUSSION
Fig.2 shows the result of background subtraction using
AGMM. Fig.3 shows the results of shadow detection. The
figure shows the actual scene accompanied by the result of the
segmentation. The foreground pixels are red, whereas the
shadow pixels are green. The results obtained using Horpresert
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 01 | Jan-2013, Available @ http://www.ijret.org 28
model is satisfactory. Also experimentation shows that the
discussed model does not require any trained background
model, it can adaptively operate under any given set of
environment, and is robust to illumination changes and fast
repetitive motion. The camera used in the tests is a lenevo
G460 easy camera configured with a resolution of 120 X 160
pixels running in a 32 bit operating system, 2.00 GHz
processor, and 2 GB RAM. The achieved frames per second of
the proposed model is 20 fps.
(a) (b)
(c) (d)
(e) (f)
Figure 2: (a), (c), (e) are the original frames and (b), (d) & (f)
are the segmented foreground using AGMM after background
subtraction.
(a) (b)
(c) (d)
(e) (f)
Figure 3: (a), (c), (e) are the original frames and (b), (d) & (f)
shows the result after background subtraction and shadow
detection
6. APPLICABILITY
The background subtraction method as discussed can be
employed for a good number of applications especially in
surveillance. It could be used to detect abandoned luggage in
airport and railway platforms and in any place where security is
of prime concern. Also it could be used in areas where entry of
human being is highly restricted. Instead of employing a
human-being to observe such areas, the proposed method could
be employed so that any movement in that area can be
immediately detected and an alarm can be triggered.
REFERENCES
[1] Chris Stauffer, W.E.l Grimson , “Adaptive background
mixture models for real-time tracking”, The Artificial
Intelligence Laboratory Massachusetts Institute of
Technology.
[2] W. K. Wong, Joanne T. Y. Liew, C. K. Loo, and Wei
Kin Wong, "Omnidirectional Surveillance System for
Digital Home Security", 2009 International Conference
on Signal Acquisition and Processing (ICSAP 2009) ,
Kuala Lumpur, Malaysia, 3-5,Apr 2009, p.p.8-1.
[3] HOU Z, HAN C, “A background reconstruction
algorithm based on pixel intensity classification in
remote video surveillance system”, In Proceedings of the
7th International Conference on Information Fusion,
Stockholm. [S. l.]: IEEE Press, 2004: 754-759.
[4] Wren, CR., Azarbayejani, A, Darrell, T, Pentland, A.,
1997.Pfinder, “Real-time tracking of the human body” -
IEEE Trans. Pattern Anal Mach. Intell. 1 9 (7), 780-785
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 01 | Jan-2013, Available @ http://www.ijret.org 29
[5] Friedman, N., Russell, S., 1 997. “Image segmentation in
video sequences a probabilistic approach”- In: Proc. 13th
Conference on Uncertainty in Artificial Intelligence.
[6] Hao Zhou Xuejie Zhang Yun Gao Pengfei Yu, “Video
Background Subtraction Using Improved Adaptive-K
Gaussian Mixture Model”- 2010 3rd International
Conference on Advanced Computer Theory and
Engineering(ICACTE).
[7] Lucia Maddalena and Alfredo Petrosino, Senior
Member, IEEE, “A Self-Organizing Approach to
Background Subtraction for Visual Surveillance
Applications”- IEEE TRANSACTIONS ON IMAGE
PROCESSING, VOL. 17, NO. 7, JULY 2008.
[8] Zhen Tang, Zhenjiang Miao,“Fast Background
Subtraction and Shadow Elimination Using Improved
Gaussian Mixture Model”
[9] Saeid Fazli, Hamed Moradi Pour, Hamed Bouzari
“Multiple Objects Tracking Using Improved GMM
Based Motion Segmentation”.
[10] Thanarat Horprasert, David Harwood, and Larry S.
Davis, “A Statistical Approach for Real-time Robust
Background Subtraction and Shadow Detection”.

More Related Content

What's hot

SEGMENTATION OF MAGNETIC RESONANCE BRAIN TUMOR USING INTEGRATED FUZZY K-MEANS...
SEGMENTATION OF MAGNETIC RESONANCE BRAIN TUMOR USING INTEGRATED FUZZY K-MEANS...SEGMENTATION OF MAGNETIC RESONANCE BRAIN TUMOR USING INTEGRATED FUZZY K-MEANS...
SEGMENTATION OF MAGNETIC RESONANCE BRAIN TUMOR USING INTEGRATED FUZZY K-MEANS...
ijcsit
 
A Review on Classification Based Approaches for STEGanalysis Detection
A Review on Classification Based Approaches for STEGanalysis DetectionA Review on Classification Based Approaches for STEGanalysis Detection
A Review on Classification Based Approaches for STEGanalysis Detection
Editor IJCATR
 
PERFORMANCE ANALYSIS USING SINGLE SEEDED REGION GROWING ALGORITHM
PERFORMANCE ANALYSIS USING SINGLE SEEDED REGION GROWING ALGORITHMPERFORMANCE ANALYSIS USING SINGLE SEEDED REGION GROWING ALGORITHM
PERFORMANCE ANALYSIS USING SINGLE SEEDED REGION GROWING ALGORITHM
AM Publications
 
Fuzzy clustering1
Fuzzy clustering1Fuzzy clustering1
Fuzzy clustering1
abc
 
IRJET-Multimodal Image Classification through Band and K-Means Clustering
IRJET-Multimodal Image Classification through Band and K-Means ClusteringIRJET-Multimodal Image Classification through Band and K-Means Clustering
IRJET-Multimodal Image Classification through Band and K-Means Clustering
IRJET Journal
 
MIP AND UNSUPERVISED CLUSTERING FOR THE DETECTION OF BRAIN TUMOUR CELLS
MIP AND UNSUPERVISED CLUSTERING FOR THE DETECTION OF BRAIN TUMOUR CELLSMIP AND UNSUPERVISED CLUSTERING FOR THE DETECTION OF BRAIN TUMOUR CELLS
MIP AND UNSUPERVISED CLUSTERING FOR THE DETECTION OF BRAIN TUMOUR CELLS
AM Publications
 
Brain tumor segmentation using asymmetry based histogram thresholding and k m...
Brain tumor segmentation using asymmetry based histogram thresholding and k m...Brain tumor segmentation using asymmetry based histogram thresholding and k m...
Brain tumor segmentation using asymmetry based histogram thresholding and k m...
eSAT Publishing House
 
Development and Comparison of Image Fusion Techniques for CT&MRI Images
Development and Comparison of Image Fusion Techniques for CT&MRI ImagesDevelopment and Comparison of Image Fusion Techniques for CT&MRI Images
Development and Comparison of Image Fusion Techniques for CT&MRI Images
IJERA Editor
 
Brain Tumor Detection using Clustering Algorithms in MRI Images
Brain Tumor Detection using Clustering Algorithms in MRI ImagesBrain Tumor Detection using Clustering Algorithms in MRI Images
Brain Tumor Detection using Clustering Algorithms in MRI Images
IRJET Journal
 
B0343011014
B0343011014B0343011014
B0343011014
ijceronline
 
X36141145
X36141145X36141145
X36141145
IJERA Editor
 
Colour Image Segmentation Using Soft Rough Fuzzy-C-Means and Multi Class SVM
Colour Image Segmentation Using Soft Rough Fuzzy-C-Means and Multi Class SVM Colour Image Segmentation Using Soft Rough Fuzzy-C-Means and Multi Class SVM
Colour Image Segmentation Using Soft Rough Fuzzy-C-Means and Multi Class SVM
ijcisjournal
 
Tracking of Fluorescent Cells Based on the Wavelet Otsu Model
Tracking of Fluorescent Cells Based on the Wavelet Otsu ModelTracking of Fluorescent Cells Based on the Wavelet Otsu Model
Tracking of Fluorescent Cells Based on the Wavelet Otsu Model
rahulmonikasharma
 
選修物理1 ch1-緒論-學生版-正式版
選修物理1 ch1-緒論-學生版-正式版選修物理1 ch1-緒論-學生版-正式版
選修物理1 ch1-緒論-學生版-正式版
阿Samn的物理課本
 
Development of algorithm for identification of maligant growth in cancer usin...
Development of algorithm for identification of maligant growth in cancer usin...Development of algorithm for identification of maligant growth in cancer usin...
Development of algorithm for identification of maligant growth in cancer usin...
IJECEIAES
 
Steganography Using Reversible Texture Synthesis
Steganography Using Reversible Texture SynthesisSteganography Using Reversible Texture Synthesis
Steganography Using Reversible Texture Synthesis
1crore projects
 

What's hot (17)

SEGMENTATION OF MAGNETIC RESONANCE BRAIN TUMOR USING INTEGRATED FUZZY K-MEANS...
SEGMENTATION OF MAGNETIC RESONANCE BRAIN TUMOR USING INTEGRATED FUZZY K-MEANS...SEGMENTATION OF MAGNETIC RESONANCE BRAIN TUMOR USING INTEGRATED FUZZY K-MEANS...
SEGMENTATION OF MAGNETIC RESONANCE BRAIN TUMOR USING INTEGRATED FUZZY K-MEANS...
 
40120130406009
4012013040600940120130406009
40120130406009
 
A Review on Classification Based Approaches for STEGanalysis Detection
A Review on Classification Based Approaches for STEGanalysis DetectionA Review on Classification Based Approaches for STEGanalysis Detection
A Review on Classification Based Approaches for STEGanalysis Detection
 
PERFORMANCE ANALYSIS USING SINGLE SEEDED REGION GROWING ALGORITHM
PERFORMANCE ANALYSIS USING SINGLE SEEDED REGION GROWING ALGORITHMPERFORMANCE ANALYSIS USING SINGLE SEEDED REGION GROWING ALGORITHM
PERFORMANCE ANALYSIS USING SINGLE SEEDED REGION GROWING ALGORITHM
 
Fuzzy clustering1
Fuzzy clustering1Fuzzy clustering1
Fuzzy clustering1
 
IRJET-Multimodal Image Classification through Band and K-Means Clustering
IRJET-Multimodal Image Classification through Band and K-Means ClusteringIRJET-Multimodal Image Classification through Band and K-Means Clustering
IRJET-Multimodal Image Classification through Band and K-Means Clustering
 
MIP AND UNSUPERVISED CLUSTERING FOR THE DETECTION OF BRAIN TUMOUR CELLS
MIP AND UNSUPERVISED CLUSTERING FOR THE DETECTION OF BRAIN TUMOUR CELLSMIP AND UNSUPERVISED CLUSTERING FOR THE DETECTION OF BRAIN TUMOUR CELLS
MIP AND UNSUPERVISED CLUSTERING FOR THE DETECTION OF BRAIN TUMOUR CELLS
 
Brain tumor segmentation using asymmetry based histogram thresholding and k m...
Brain tumor segmentation using asymmetry based histogram thresholding and k m...Brain tumor segmentation using asymmetry based histogram thresholding and k m...
Brain tumor segmentation using asymmetry based histogram thresholding and k m...
 
Development and Comparison of Image Fusion Techniques for CT&MRI Images
Development and Comparison of Image Fusion Techniques for CT&MRI ImagesDevelopment and Comparison of Image Fusion Techniques for CT&MRI Images
Development and Comparison of Image Fusion Techniques for CT&MRI Images
 
Brain Tumor Detection using Clustering Algorithms in MRI Images
Brain Tumor Detection using Clustering Algorithms in MRI ImagesBrain Tumor Detection using Clustering Algorithms in MRI Images
Brain Tumor Detection using Clustering Algorithms in MRI Images
 
B0343011014
B0343011014B0343011014
B0343011014
 
X36141145
X36141145X36141145
X36141145
 
Colour Image Segmentation Using Soft Rough Fuzzy-C-Means and Multi Class SVM
Colour Image Segmentation Using Soft Rough Fuzzy-C-Means and Multi Class SVM Colour Image Segmentation Using Soft Rough Fuzzy-C-Means and Multi Class SVM
Colour Image Segmentation Using Soft Rough Fuzzy-C-Means and Multi Class SVM
 
Tracking of Fluorescent Cells Based on the Wavelet Otsu Model
Tracking of Fluorescent Cells Based on the Wavelet Otsu ModelTracking of Fluorescent Cells Based on the Wavelet Otsu Model
Tracking of Fluorescent Cells Based on the Wavelet Otsu Model
 
選修物理1 ch1-緒論-學生版-正式版
選修物理1 ch1-緒論-學生版-正式版選修物理1 ch1-緒論-學生版-正式版
選修物理1 ch1-緒論-學生版-正式版
 
Development of algorithm for identification of maligant growth in cancer usin...
Development of algorithm for identification of maligant growth in cancer usin...Development of algorithm for identification of maligant growth in cancer usin...
Development of algorithm for identification of maligant growth in cancer usin...
 
Steganography Using Reversible Texture Synthesis
Steganography Using Reversible Texture SynthesisSteganography Using Reversible Texture Synthesis
Steganography Using Reversible Texture Synthesis
 

Viewers also liked

Two Dimensional Shape and Texture Quantification - Medical Image Processing
Two Dimensional Shape and Texture Quantification - Medical Image ProcessingTwo Dimensional Shape and Texture Quantification - Medical Image Processing
Two Dimensional Shape and Texture Quantification - Medical Image Processing
Chamod Mune
 
đề Cương xử lý âm thanh hình ảnh
đề Cương xử lý âm thanh hình ảnhđề Cương xử lý âm thanh hình ảnh
đề Cương xử lý âm thanh hình ảnhHải Dương
 
A great land mark to achieve 4 g mobile communications
A great land mark to achieve 4 g mobile communicationsA great land mark to achieve 4 g mobile communications
A great land mark to achieve 4 g mobile communications
eSAT Publishing House
 
Joined wing uav maneuverability
Joined wing uav maneuverabilityJoined wing uav maneuverability
Joined wing uav maneuverability
eSAT Publishing House
 
Detect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructureDetect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructure
eSAT Publishing House
 
Reliability assessment for a four cylinder diesel engine
Reliability assessment for a four cylinder diesel engineReliability assessment for a four cylinder diesel engine
Reliability assessment for a four cylinder diesel engine
eSAT Publishing House
 
An algorithm for design of brick lining for irrigation channels
An algorithm for design of brick lining for irrigation channelsAn algorithm for design of brick lining for irrigation channels
An algorithm for design of brick lining for irrigation channels
eSAT Publishing House
 
Desinging dsp (0, 1) acceptance sampling plans based on
Desinging dsp (0, 1) acceptance sampling plans based onDesinging dsp (0, 1) acceptance sampling plans based on
Desinging dsp (0, 1) acceptance sampling plans based on
eSAT Publishing House
 
Enhancing proxy based web caching system using clustering based pre fetching ...
Enhancing proxy based web caching system using clustering based pre fetching ...Enhancing proxy based web caching system using clustering based pre fetching ...
Enhancing proxy based web caching system using clustering based pre fetching ...
eSAT Publishing House
 
Security in multi cloud data storage with sic
Security in multi cloud data storage with sicSecurity in multi cloud data storage with sic
Security in multi cloud data storage with sic
eSAT Publishing House
 
A framework assuring decentralized accountability
A framework assuring decentralized accountabilityA framework assuring decentralized accountability
A framework assuring decentralized accountability
eSAT Publishing House
 
Design of green data center
Design of green data centerDesign of green data center
Design of green data center
eSAT Publishing House
 
Localization based range map stitching in wireless sensor network under non l...
Localization based range map stitching in wireless sensor network under non l...Localization based range map stitching in wireless sensor network under non l...
Localization based range map stitching in wireless sensor network under non l...
eSAT Publishing House
 
Fuzzified pso for multiobjective economic load
Fuzzified pso for multiobjective economic loadFuzzified pso for multiobjective economic load
Fuzzified pso for multiobjective economic load
eSAT Publishing House
 
Solar system as a radio telescope by the formation of virtual lenses above an...
Solar system as a radio telescope by the formation of virtual lenses above an...Solar system as a radio telescope by the formation of virtual lenses above an...
Solar system as a radio telescope by the formation of virtual lenses above an...
eSAT Publishing House
 
Enhancing the capability of supply chain by
Enhancing the capability of supply chain byEnhancing the capability of supply chain by
Enhancing the capability of supply chain by
eSAT Publishing House
 
Satellite image resolution enhancement using multi
Satellite image resolution enhancement using multiSatellite image resolution enhancement using multi
Satellite image resolution enhancement using multi
eSAT Publishing House
 
Ultrasonic investigation of bio liquid mixtures of methanol with cinnamaldehy...
Ultrasonic investigation of bio liquid mixtures of methanol with cinnamaldehy...Ultrasonic investigation of bio liquid mixtures of methanol with cinnamaldehy...
Ultrasonic investigation of bio liquid mixtures of methanol with cinnamaldehy...
eSAT Publishing House
 
Reconfigurable and versatile bil rc architecture
Reconfigurable and versatile bil rc architectureReconfigurable and versatile bil rc architecture
Reconfigurable and versatile bil rc architecture
eSAT Publishing House
 

Viewers also liked (20)

Two Dimensional Shape and Texture Quantification - Medical Image Processing
Two Dimensional Shape and Texture Quantification - Medical Image ProcessingTwo Dimensional Shape and Texture Quantification - Medical Image Processing
Two Dimensional Shape and Texture Quantification - Medical Image Processing
 
đề Cương xử lý âm thanh hình ảnh
đề Cương xử lý âm thanh hình ảnhđề Cương xử lý âm thanh hình ảnh
đề Cương xử lý âm thanh hình ảnh
 
Background subtraction
Background subtractionBackground subtraction
Background subtraction
 
A great land mark to achieve 4 g mobile communications
A great land mark to achieve 4 g mobile communicationsA great land mark to achieve 4 g mobile communications
A great land mark to achieve 4 g mobile communications
 
Joined wing uav maneuverability
Joined wing uav maneuverabilityJoined wing uav maneuverability
Joined wing uav maneuverability
 
Detect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructureDetect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructure
 
Reliability assessment for a four cylinder diesel engine
Reliability assessment for a four cylinder diesel engineReliability assessment for a four cylinder diesel engine
Reliability assessment for a four cylinder diesel engine
 
An algorithm for design of brick lining for irrigation channels
An algorithm for design of brick lining for irrigation channelsAn algorithm for design of brick lining for irrigation channels
An algorithm for design of brick lining for irrigation channels
 
Desinging dsp (0, 1) acceptance sampling plans based on
Desinging dsp (0, 1) acceptance sampling plans based onDesinging dsp (0, 1) acceptance sampling plans based on
Desinging dsp (0, 1) acceptance sampling plans based on
 
Enhancing proxy based web caching system using clustering based pre fetching ...
Enhancing proxy based web caching system using clustering based pre fetching ...Enhancing proxy based web caching system using clustering based pre fetching ...
Enhancing proxy based web caching system using clustering based pre fetching ...
 
Security in multi cloud data storage with sic
Security in multi cloud data storage with sicSecurity in multi cloud data storage with sic
Security in multi cloud data storage with sic
 
A framework assuring decentralized accountability
A framework assuring decentralized accountabilityA framework assuring decentralized accountability
A framework assuring decentralized accountability
 
Design of green data center
Design of green data centerDesign of green data center
Design of green data center
 
Localization based range map stitching in wireless sensor network under non l...
Localization based range map stitching in wireless sensor network under non l...Localization based range map stitching in wireless sensor network under non l...
Localization based range map stitching in wireless sensor network under non l...
 
Fuzzified pso for multiobjective economic load
Fuzzified pso for multiobjective economic loadFuzzified pso for multiobjective economic load
Fuzzified pso for multiobjective economic load
 
Solar system as a radio telescope by the formation of virtual lenses above an...
Solar system as a radio telescope by the formation of virtual lenses above an...Solar system as a radio telescope by the formation of virtual lenses above an...
Solar system as a radio telescope by the formation of virtual lenses above an...
 
Enhancing the capability of supply chain by
Enhancing the capability of supply chain byEnhancing the capability of supply chain by
Enhancing the capability of supply chain by
 
Satellite image resolution enhancement using multi
Satellite image resolution enhancement using multiSatellite image resolution enhancement using multi
Satellite image resolution enhancement using multi
 
Ultrasonic investigation of bio liquid mixtures of methanol with cinnamaldehy...
Ultrasonic investigation of bio liquid mixtures of methanol with cinnamaldehy...Ultrasonic investigation of bio liquid mixtures of methanol with cinnamaldehy...
Ultrasonic investigation of bio liquid mixtures of methanol with cinnamaldehy...
 
Reconfigurable and versatile bil rc architecture
Reconfigurable and versatile bil rc architectureReconfigurable and versatile bil rc architecture
Reconfigurable and versatile bil rc architecture
 

Similar to An adaptive gmm approach to background subtraction for application in real time surveillance

Multiple Person Tracking with Shadow Removal Using Adaptive Gaussian Mixture ...
Multiple Person Tracking with Shadow Removal Using Adaptive Gaussian Mixture ...Multiple Person Tracking with Shadow Removal Using Adaptive Gaussian Mixture ...
Multiple Person Tracking with Shadow Removal Using Adaptive Gaussian Mixture ...
IJSRD
 
D018112429
D018112429D018112429
D018112429
IOSR Journals
 
Activity Recognition From IR Images Using Fuzzy Clustering Techniques
Activity Recognition From IR Images Using Fuzzy Clustering TechniquesActivity Recognition From IR Images Using Fuzzy Clustering Techniques
Activity Recognition From IR Images Using Fuzzy Clustering Techniques
IJTET Journal
 
[IJET V2I5P5] Authors: CHETANA M, SHIVA MURTHY. G
[IJET V2I5P5] Authors: CHETANA M, SHIVA MURTHY. G [IJET V2I5P5] Authors: CHETANA M, SHIVA MURTHY. G
[IJET V2I5P5] Authors: CHETANA M, SHIVA MURTHY. G
IJET - International Journal of Engineering and Techniques
 
Schematic model for analyzing mobility and detection of multiple
Schematic model for analyzing mobility and detection of multipleSchematic model for analyzing mobility and detection of multiple
Schematic model for analyzing mobility and detection of multipleIAEME Publication
 
D05222528
D05222528D05222528
D05222528
IOSR-JEN
 
Robust foreground modelling to segment and detect multiple moving objects in ...
Robust foreground modelling to segment and detect multiple moving objects in ...Robust foreground modelling to segment and detect multiple moving objects in ...
Robust foreground modelling to segment and detect multiple moving objects in ...
IJECEIAES
 
IRJET-Motion Segmentation
IRJET-Motion SegmentationIRJET-Motion Segmentation
IRJET-Motion Segmentation
IRJET Journal
 
B49010511
B49010511B49010511
B49010511
IJERA Editor
 
A Novel Feature Selection with Annealing For Computer Vision And Big Data Lea...
A Novel Feature Selection with Annealing For Computer Vision And Big Data Lea...A Novel Feature Selection with Annealing For Computer Vision And Big Data Lea...
A Novel Feature Selection with Annealing For Computer Vision And Big Data Lea...
theijes
 
Real time implementation of object tracking through
Real time implementation of object tracking throughReal time implementation of object tracking through
Real time implementation of object tracking througheSAT Publishing House
 
Tropical Cyclone Determination using Infrared Satellite Image
Tropical Cyclone Determination using Infrared Satellite ImageTropical Cyclone Determination using Infrared Satellite Image
Tropical Cyclone Determination using Infrared Satellite Image
ijtsrd
 
Effective Object Detection and Background Subtraction by using M.O.I
Effective Object Detection and Background Subtraction by using M.O.IEffective Object Detection and Background Subtraction by using M.O.I
Effective Object Detection and Background Subtraction by using M.O.I
IJMTST Journal
 
A Study of Motion Detection Method for Smart Home System
A Study of Motion Detection Method for Smart Home SystemA Study of Motion Detection Method for Smart Home System
A Study of Motion Detection Method for Smart Home System
AM Publications
 
IRJET - A Systematic Observation in Digital Image Forgery Detection using MATLAB
IRJET - A Systematic Observation in Digital Image Forgery Detection using MATLABIRJET - A Systematic Observation in Digital Image Forgery Detection using MATLAB
IRJET - A Systematic Observation in Digital Image Forgery Detection using MATLAB
IRJET Journal
 
CROWD ANALYSIS WITH FISH EYE CAMERA
CROWD ANALYSIS WITH FISH EYE CAMERA CROWD ANALYSIS WITH FISH EYE CAMERA
CROWD ANALYSIS WITH FISH EYE CAMERA
ijaceeejournal
 
CROWD ANALYSIS WITH FISH EYE CAMERA
CROWD ANALYSIS WITH FISH EYE CAMERACROWD ANALYSIS WITH FISH EYE CAMERA
CROWD ANALYSIS WITH FISH EYE CAMERA
ijaceeejournal
 
A ROBUST BACKGROUND REMOVAL ALGORTIHMS USING FUZZY C-MEANS CLUSTERING
A ROBUST BACKGROUND REMOVAL ALGORTIHMS USING FUZZY C-MEANS CLUSTERINGA ROBUST BACKGROUND REMOVAL ALGORTIHMS USING FUZZY C-MEANS CLUSTERING
A ROBUST BACKGROUND REMOVAL ALGORTIHMS USING FUZZY C-MEANS CLUSTERING
IJNSA Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Dj31514517
Dj31514517Dj31514517
Dj31514517IJMER
 

Similar to An adaptive gmm approach to background subtraction for application in real time surveillance (20)

Multiple Person Tracking with Shadow Removal Using Adaptive Gaussian Mixture ...
Multiple Person Tracking with Shadow Removal Using Adaptive Gaussian Mixture ...Multiple Person Tracking with Shadow Removal Using Adaptive Gaussian Mixture ...
Multiple Person Tracking with Shadow Removal Using Adaptive Gaussian Mixture ...
 
D018112429
D018112429D018112429
D018112429
 
Activity Recognition From IR Images Using Fuzzy Clustering Techniques
Activity Recognition From IR Images Using Fuzzy Clustering TechniquesActivity Recognition From IR Images Using Fuzzy Clustering Techniques
Activity Recognition From IR Images Using Fuzzy Clustering Techniques
 
[IJET V2I5P5] Authors: CHETANA M, SHIVA MURTHY. G
[IJET V2I5P5] Authors: CHETANA M, SHIVA MURTHY. G [IJET V2I5P5] Authors: CHETANA M, SHIVA MURTHY. G
[IJET V2I5P5] Authors: CHETANA M, SHIVA MURTHY. G
 
Schematic model for analyzing mobility and detection of multiple
Schematic model for analyzing mobility and detection of multipleSchematic model for analyzing mobility and detection of multiple
Schematic model for analyzing mobility and detection of multiple
 
D05222528
D05222528D05222528
D05222528
 
Robust foreground modelling to segment and detect multiple moving objects in ...
Robust foreground modelling to segment and detect multiple moving objects in ...Robust foreground modelling to segment and detect multiple moving objects in ...
Robust foreground modelling to segment and detect multiple moving objects in ...
 
IRJET-Motion Segmentation
IRJET-Motion SegmentationIRJET-Motion Segmentation
IRJET-Motion Segmentation
 
B49010511
B49010511B49010511
B49010511
 
A Novel Feature Selection with Annealing For Computer Vision And Big Data Lea...
A Novel Feature Selection with Annealing For Computer Vision And Big Data Lea...A Novel Feature Selection with Annealing For Computer Vision And Big Data Lea...
A Novel Feature Selection with Annealing For Computer Vision And Big Data Lea...
 
Real time implementation of object tracking through
Real time implementation of object tracking throughReal time implementation of object tracking through
Real time implementation of object tracking through
 
Tropical Cyclone Determination using Infrared Satellite Image
Tropical Cyclone Determination using Infrared Satellite ImageTropical Cyclone Determination using Infrared Satellite Image
Tropical Cyclone Determination using Infrared Satellite Image
 
Effective Object Detection and Background Subtraction by using M.O.I
Effective Object Detection and Background Subtraction by using M.O.IEffective Object Detection and Background Subtraction by using M.O.I
Effective Object Detection and Background Subtraction by using M.O.I
 
A Study of Motion Detection Method for Smart Home System
A Study of Motion Detection Method for Smart Home SystemA Study of Motion Detection Method for Smart Home System
A Study of Motion Detection Method for Smart Home System
 
IRJET - A Systematic Observation in Digital Image Forgery Detection using MATLAB
IRJET - A Systematic Observation in Digital Image Forgery Detection using MATLABIRJET - A Systematic Observation in Digital Image Forgery Detection using MATLAB
IRJET - A Systematic Observation in Digital Image Forgery Detection using MATLAB
 
CROWD ANALYSIS WITH FISH EYE CAMERA
CROWD ANALYSIS WITH FISH EYE CAMERA CROWD ANALYSIS WITH FISH EYE CAMERA
CROWD ANALYSIS WITH FISH EYE CAMERA
 
CROWD ANALYSIS WITH FISH EYE CAMERA
CROWD ANALYSIS WITH FISH EYE CAMERACROWD ANALYSIS WITH FISH EYE CAMERA
CROWD ANALYSIS WITH FISH EYE CAMERA
 
A ROBUST BACKGROUND REMOVAL ALGORTIHMS USING FUZZY C-MEANS CLUSTERING
A ROBUST BACKGROUND REMOVAL ALGORTIHMS USING FUZZY C-MEANS CLUSTERINGA ROBUST BACKGROUND REMOVAL ALGORTIHMS USING FUZZY C-MEANS CLUSTERING
A ROBUST BACKGROUND REMOVAL ALGORTIHMS USING FUZZY C-MEANS CLUSTERING
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Dj31514517
Dj31514517Dj31514517
Dj31514517
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
eSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
eSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
eSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
eSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
eSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
eSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
eSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
eSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
eSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
eSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
Kamal Acharya
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
ssuser9bd3ba
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
Kamal Acharya
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
DuvanRamosGarzon1
 

Recently uploaded (20)

Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
 

An adaptive gmm approach to background subtraction for application in real time surveillance

  • 1. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 02 Issue: 01 | Jan-2013, Available @ http://www.ijret.org 25 AN ADAPTIVE GMM APPROACH TO BACKGROUND SUBTRACTION FOR APPLICATION IN REAL TIME SURVEILLANCE Subra Mukherjee1 , Karen Das2 Department of Electronics and telecommunication Assam Don Bosco University, Guwahati, India subra_mukherjee@yahoo.in, karenkdas@gmail.com Abstract Efficient security management has become an important parameter in today’s world. As the problem is growing, there is an urgent need for the introduction of advanced technology and equipment to improve the state-of art of surveillance. In this paper we propose a model for real time background subtraction using AGMM. The proposed model is robust and adaptable to dynamic background, fast illumination changes, repetitive motion. Also we have incorporated a method for detecting shadows using the Horpresert color model. The proposed model can be employed for monitoring areas where movement or entry is highly restricted. So on detection of any unexpected events in the scene an alarm can be triggered and hence we can achieve real time surveillance even in the absence of constant human monitoring. Keywords-Background subtraction, Adaptive Gaussian Mixture model (AGMM), surveillance, Horpresert color model. --------------------------------------------------------------------------------------------------------------------------------------------------- 1. INTRODUCTION The present day video surveillance system has two main drawbacks: firstly they are not adaptable to different operative scenarios (they only work for a well known structured model). Secondly they need a human assistance to identify and label a specific event [2].Moreover dependency on human beings for a threat alert cannot be fully trusted. The general surveillance cameras are like machines that can only see, but cannot decide or identify things or events by itself. So, keeping in mind the present day scenario, it is important that we make our surveillance system intelligent and smart. For any real time surveillance the first step would be to efficiently detect motion and then extract the region of interest (ROI). For this, three main processes used are: optical flow, frame differencing and background subtraction [3].Optical flow can be used for detection even without any prior knowledge of the background and works well even when the camera is moving. However it is very sensitive to noise and requires special hardware. Frame differencing can detect target in dynamically changing background, but the segmentation of target is not integrated. And background subtraction is one of the most widely used methods for segmentation of dynamic scene from a video. A large number of methods and techniques have been cited in literature for background subtraction, each of them differing by the model or type of parameters used. However most of the models have a difficulty when dealing with bimodal background, sudden changes in illumination, frequent repetitive motions. In this paper, we model the background using the GMM approach proposed by Stauffer and Grimson [1]. The proposed model can be used to detect any moving object in the scene. Moreover it does not need any predefined background model in the beginning. It adaptively reads the video and any scene that is constant or static beyond a certain time is again considered as background. Moreover it responds well to dynamically changing background and even when the camera is moving. Shadows often encroach upon the foreground during segmentation and often causes problem in correct detection of object. For application in surveillance it is very important to correctly detect shadows from the extracted foreground. Therefore we have presented a shadow detection technique using the horpresert color model for moving object detection. 2. RELATED WORK Background modeling is generally done by analyzing some of the regular statistical characteristics and then object is detected by comparing the current frame with the modeled background. However, though it sounds simple, but this technique seems to be inadequate when dealing with complex environment. Most of the available non-adaptive methods of background subtraction cannot be used in surveillance because it requires manual initialization. And in surveillance, it is not possible to have a pre-defined set of background model before-hand. So, it is very important that the background model is adaptive and robust. Many background subtraction methods have been proposed in the past decades including Running Gaussian Average, Temporal Median Filter, Mixture of Gaussians, Kalman Filter and Co-occurrence of Image Variations. However the mixture model is widely used by researchers for application in surveillance. A variety of methods have been proposed for modeling the background. Initially a single Gaussian was used to find the variances of the pixel intensity levels in the image sequences
  • 2. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 02 Issue: 01 | Jan-2013, Available @ http://www.ijret.org 26 [4]. However generally multiple surfaces appear in a pixel and so each pixel should be represented by a mixture of Gaussians. The GMM method was firstly used to model the pixel process[5] by N.Friedman et al. Stauffer & Grimson [1] modeled the values of a particular pixel as a mixture of Gaussians and based on the persistence and variance of each pixel of the Gaussians of the mixture, they determined which pixels corresponds to background colors. They also used an online approximation to update the model. Another similar work was done in [6]. They proposed an algorithm for modeling background which could increase or decrease the number of Gaussian components based on the complexity of the pattern of the pixel. Recently in 2008, Maddalena and Petrosino [7] proposed an interesting biologically inspired self organizing approach using artificial neural network for background modeling. A model of the background was made by learning the motion of variations of the background and based on this learnt background model, the algorithm could extract the region of interest. The original GMM cited in many literatures assumed that the variances of the red, green and blue were same and independent of each other. Tang and Miao proposed an algorithm to improve the preciseness of the method by considering that each channel has its own variances [8]. In [9] they have proposed an approach for removing false motion detection to a great extent by combining the conventional adaptive GMM with neighborhood based differences and overlapping based classification. The rest of the paper is organized as follows: In section 3 the Stauffer and Grimson method [1] for GMM shall be explained. In section 4, the method for shadow removal is discussed followed by the proposed approach in section 5.In Section 6 we have the results and discussion and finally the applicability of our work is discussed in section 7. 3. GAUSSIAN MIXTURE MODEL A Gaussian Mixture Model (GMM) is a parametric probability density function represented as a weighted sum of Gaussian component densities. GMMs are commonly used as a parametric model of the probability distribution of continuous measurements or features in a biometric system, such as vocal- tract related spectral features in a speaker recognition system. GMM parameters are estimated from training data using the iterative Expectation Maximization (EM) algorithm or Maximum A Posteriori (MAP) estimation from a well-trained prior model. A Gaussian mixture model is a weighted sum of M component Gaussian densities as given by the equation, where x is a D-dimensional continuous-valued data vector (i.e. measurement or features), wi, i=1, . . . ,M, are the mixture weights, and g(x|μi, ), i = 1, . . . ,M, are the component Gaussian densities. Each component density is a D-variate Gaussian function of the form, with mean vector µi and covariance matrix Σi. The mixture weights satisfy the constraint that 1. A. Implementation A mixture of K Gaussians is used to model the time series of values observed at a particular pixel. The probability of occurrence of the current pixel value is given by, Where N is the Gaussian probability density function, whose mean vector is µ and covariance is Σ. And wi is the weight of the ith Gaussian such that wi = 1. The covariance matrix is assumed to be of the form  = σ 2I for computational reasons. B. Parameter updates The new pixel value Zt is checked against each Gaussian. A Gaussian is labeled as matched if Then its parameters may be updated as follows: ) Where  is the learning rate for the weights. If a Gaussian is labeled as unmatched only its weight is decreased as
  • 3. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 02 Issue: 01 | Jan-2013, Available @ http://www.ijret.org 27 If none of the Gaussians match, the one with the lowest weight is replaced with Zt as mean and a high initial standard deviation. The rank of a Gaussian is defined as w/σ. This value gets higher if the distribution has low standard deviation and it has matched many times. When the Gaussians are sorted in a list by decreasing value of rank, the first is more likely to be background. The first B Gaussians that satisfy (1) are thought to represent the background. The Gaussian mixture model (GMM) is adaptive; it can incorporate slow illumination changes and the removal and addition of objects into the background. Further it can handle repetitive background changes like swaying branches, a flickering computer monitor etc. The higher the value of T in (1), the higher is the probability of a multi-modal background. C. Shadow Removal Shadows detected as foreground can cause several problems when extracting and labeling objects, two examples are object shape distortion and several objects merging together. It is especially crucial and these problems should be avoided. Generally the image is first transformed to a color space that segregates the chromaticity information from the intensity. In the HSV color space, the hypothesis is that a shadowed pixel value’s value and saturation will decrease while the hue remains relatively constant. In CIELAB, the luminance component should decrease and the chromaticity coordinates should remain relatively constant. However, the color model of Horpresert et al [10] gave the best results in the test conducted. It doesn’t require any complicated conversion formulae like in the case of HSV and CIELAB. Also the simple choice of parameters is a distinct advantage. In this model each pixel value in the RGB color space is assumed to lie on a chromaticity line, which connects the pixel value and the origin. The authors specify a way to calculate the deviation of a foreground pixel value from the background value. The foreground value is compared with the means of each of the B background Gaussians in equation (1). The brightness distortion (BD) and chromaticity distortion (CD) are defined as (see Fig.1): Shadow points (sp) can now be ascertained as: In Fig. 1, OB is the background RGB vector and OF is the foreground RGB vector. FP is the perpendicular dropped from F onto OB. The shaded cylinder is the locus of all shadow color values. Figure1: Brightness and chromaticity distortion in the RGB color space [10]. 4. PROPOSED APPROACH We propose an approach to extract the region of interest by using an adaptive GMM discussed above for background subtraction. The shadows are then efficiently detected employing the Horpresert color model as discussed in section 4. After these, when the foreground pixels are identified they can be segmented using the connected component analysis. This would enable us to detect the moving object not only by their positions but we can also get information regarding their size and other shape information and hence this would enhance tracking. We propose to use this for detection of abandoned object in the scene. As our background subtraction algorithm is adaptive, any foreground object that remains static beyond a certain time, becomes a part of background. This can be used for detecting an abandoned luggage. If any motion is detected initially and thereafter the background becomes constant and remains unmoved for next few minutes, it could be possible that an object had been kept in the scene and has not been moved for a long time. This could lead to some suspicious situation and hence an alarm could be triggered. 5. RESULTS AND DISCUSSION Fig.2 shows the result of background subtraction using AGMM. Fig.3 shows the results of shadow detection. The figure shows the actual scene accompanied by the result of the segmentation. The foreground pixels are red, whereas the shadow pixels are green. The results obtained using Horpresert
  • 4. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 02 Issue: 01 | Jan-2013, Available @ http://www.ijret.org 28 model is satisfactory. Also experimentation shows that the discussed model does not require any trained background model, it can adaptively operate under any given set of environment, and is robust to illumination changes and fast repetitive motion. The camera used in the tests is a lenevo G460 easy camera configured with a resolution of 120 X 160 pixels running in a 32 bit operating system, 2.00 GHz processor, and 2 GB RAM. The achieved frames per second of the proposed model is 20 fps. (a) (b) (c) (d) (e) (f) Figure 2: (a), (c), (e) are the original frames and (b), (d) & (f) are the segmented foreground using AGMM after background subtraction. (a) (b) (c) (d) (e) (f) Figure 3: (a), (c), (e) are the original frames and (b), (d) & (f) shows the result after background subtraction and shadow detection 6. APPLICABILITY The background subtraction method as discussed can be employed for a good number of applications especially in surveillance. It could be used to detect abandoned luggage in airport and railway platforms and in any place where security is of prime concern. Also it could be used in areas where entry of human being is highly restricted. Instead of employing a human-being to observe such areas, the proposed method could be employed so that any movement in that area can be immediately detected and an alarm can be triggered. REFERENCES [1] Chris Stauffer, W.E.l Grimson , “Adaptive background mixture models for real-time tracking”, The Artificial Intelligence Laboratory Massachusetts Institute of Technology. [2] W. K. Wong, Joanne T. Y. Liew, C. K. Loo, and Wei Kin Wong, "Omnidirectional Surveillance System for Digital Home Security", 2009 International Conference on Signal Acquisition and Processing (ICSAP 2009) , Kuala Lumpur, Malaysia, 3-5,Apr 2009, p.p.8-1. [3] HOU Z, HAN C, “A background reconstruction algorithm based on pixel intensity classification in remote video surveillance system”, In Proceedings of the 7th International Conference on Information Fusion, Stockholm. [S. l.]: IEEE Press, 2004: 754-759. [4] Wren, CR., Azarbayejani, A, Darrell, T, Pentland, A., 1997.Pfinder, “Real-time tracking of the human body” - IEEE Trans. Pattern Anal Mach. Intell. 1 9 (7), 780-785
  • 5. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 02 Issue: 01 | Jan-2013, Available @ http://www.ijret.org 29 [5] Friedman, N., Russell, S., 1 997. “Image segmentation in video sequences a probabilistic approach”- In: Proc. 13th Conference on Uncertainty in Artificial Intelligence. [6] Hao Zhou Xuejie Zhang Yun Gao Pengfei Yu, “Video Background Subtraction Using Improved Adaptive-K Gaussian Mixture Model”- 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE). [7] Lucia Maddalena and Alfredo Petrosino, Senior Member, IEEE, “A Self-Organizing Approach to Background Subtraction for Visual Surveillance Applications”- IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 17, NO. 7, JULY 2008. [8] Zhen Tang, Zhenjiang Miao,“Fast Background Subtraction and Shadow Elimination Using Improved Gaussian Mixture Model” [9] Saeid Fazli, Hamed Moradi Pour, Hamed Bouzari “Multiple Objects Tracking Using Improved GMM Based Motion Segmentation”. [10] Thanarat Horprasert, David Harwood, and Larry S. Davis, “A Statistical Approach for Real-time Robust Background Subtraction and Shadow Detection”.