SlideShare a Scribd company logo
IT in Industry, vol. 3, no. 2, 2015 Published online 14-Sep-2015
ISSN (Print): 2204-0595
Copyright © Authors 33 ISSN (Online): 2203-1731
Contour-based Pedestrian Detection with
Foreground Distribution Trend
Filtering and Tracking
Kiat Siong Ng, Min-Chun Hu, Yu-Jung Hsiao, Kuang-Yu Nien, and Pei-Yin Chen
Department of Computer Science and Information Engineering
National Cheng Kung University
Tainan City, Taiwan (R. O. C)
jason.ng@mail.csie.ncku.edu.tw, anita_hu@mail.ncku.edu.tw, yami.hsiao@gmail.com,
kevin11030@gmail.com, pychen@mail.ncku.edu.tw
Abstract— In this work, we propose a real-time pedestrian
detection method for crowded environments based on contour and
motion information. Sparse contour templates of human shapes
are first generated on the basis of a point distribution model
(PDM), then a template matching step is applied to detect humans.
To reduce the detecting time complexity and improve the detection
accuracy, we propose to take the ratio and distribution trend of
foreground pixels inside each detecting window into consideration.
A tracking method is further applied to deal with the short-term
occlusions and false alarms. The experimental results show that
our method can efficiently detect pedestrians in videos of crowded
scenes.
Keywords—pedestrian detection; sparse contour; foreground
distribution trend; crowded scene
I. INTRODUCTION
Pedestrian detection is essential for intelligent surveillance
systems. Knowing the number of pedestrians in a scene can
benefit demographic statistics and have many applications. For
example, a retail store manager may assign more staff to serve
customers if the surveillance system detects more people in a
certain area. Moreover, by analyzing the clothing appearance of
a detected person enabling us to search the same person among
an enormous collection of surveillance videos. There have been
many types of research on pedestrian detection with different
focuses: 1) How to detect pedestrians of various sizes and poses,
2) how to make the detection system robust under different
lighting conditions, and 3) how to solve the shadow and
occlusion problems especially in crowded scenes [1, 2]. For
example, based on a Multi-Task model to jointly consider the
commonness and differences, Yan [3] conducted resolution
aware transformations to map local features from different
resolutions to a common subspace. Huang [4] proposed the
image-range fusion system (IRFS) in which a dynamically
illuminated object (DIO) detector is designed to overcome the
problem caused by uncertain partial lighting condition. Liao [5]
utilized the spatiotemporal background extractor to detect
moving objects and applied Random Forest to learn the shad
model with shadow features. The trained Random Forest
shadow detector is further used to remove the shadow from the
result of the spatiotemporal background extractor. Tang [6]
analyzed typical failures of human trackers and trained a
detector explicitly using these cases to detect human with partial
occlusion. Utilizing both motion and shape clues, Hu [7]
targeted real-time pedestrian detection in crowded environments
and showed that their method is efficient. Using the foreground
filtering step proposed by Hu, the detection accuracy would be
low if the background subtraction result is too noisy. In this
work, the shadow detection method [8], which pre-selects
shadow pixels based on chromaticity and then calculates the
correlation of the gradient direction between the given frame and
the background, was utilized to decrease false alarms caused by
shadows. Furthermore, we modified the filtering step and
smoothed out the detected results by using a short-term tracking
procedure, which can more accurately detect pedestrians without
significant processing overhead.
II. PROPOSED METHOD
The proposed system framework is shown in Fig. 1. Since
pedestrians have similar shapes, we first trained the sparse
contour templates of pedestrians based on the point distribution
model (PDM) [9]. Then the contour templates were used to
detect pedestrians in a template matching step. However,
applying template matching to all scanning windows results in
heavy computation time. To reduce the number of template
matching procedures, the background subtraction technique
was first applied to extract moving foreground pixels, and a
candidate filtering step was used for reducing the number of
detecting windows, where the template matching should have
been performed. The candidate filtering step was designed
according to the ratio/distribution of foreground pixels inside
each detecting window. Moreover, a tracking method was
applied to deal with short-term occlusions and noises.
A. Templates Generation and Matching
Sparse contour representation and PDM are applied to
generate representative templates of human shapes. Fig. 2
shows 30 generated human templates, and each template
consists of 13 line segments. This human template generation
method has been proven to be effective for tolerating shape
variations by Beleznai [9].
IT in Industry, vol. 3, no. 2, 2015 Published online 14-Sep-2015
ISSN (Print): 2204-0595
Copyright © Authors 34 ISSN (Online): 2203-1731
Fig. 1. Overview of the proposed system.
Images were scanned with a sliding detecting window, and a
template matching procedure was used to determine whether the
content inside the current window was similar to any of the
generated templates. The size of the detecting window was
adaptively determined by the regression method proposed by Hu
[7], and the templates were normalized to the same size as the
detecting window before matching. The input image was
denoted as 𝐼, the content in the current detecting window as 𝐼𝑥,𝑦,
and the compared template as 𝑇. The matching score between
𝐼𝑥,𝑦 and 𝑇 was determined according to the consistency of edge
points in 𝐼𝑥,𝑦 and contour points in 𝑇. Given 𝐼, we first generated
eight corresponding edge maps by applying Gabor filters, and
each map 𝐸𝑀(𝜃) recorded edge points in one specific
orientation defined in Θ = {0°, 26.57°, 45°, 63.43°, 90°,
116.57°, 135°, 153.43°}. Given a template T, each line segment
Li was adjusted to the nearest orientation 𝜃 among Θ, and the
new line segment was denoted as 𝐿̂𝑖 The matching score
between 𝐼𝑥,𝑦 and 𝑇 was defined as
(1)
where 𝐸𝐼(𝐸𝑀(𝜃), 𝐿̂ 𝑖) was the edge integral value [10], along
the line segment 𝐿̂𝑖 on the edge map 𝐸𝑀(𝜃). Note that a small
value 𝜖 will be assigned to 𝐸𝐼(𝐸𝑀(𝜃), 𝐿̂ 𝑖) if it is zero, and
therefore this formula can deal with partial occlusions. A non-
maximum suppression step was applied to more accurately
locate the positions of pedestrians in each frame.
B. Candidate Filtering
Exhaustively matching all sliding windows with the 30
templates is inefficient. Since pedestrian regions should contain
enough foreground pixels, Hu [7], proposed to utilize the
foreground ratio inside the detecting window to reduce the
Fig. 2. The generated human sparse contour templates.
Fig. 3. Examples of different center-body regions: (a) Center-body used in [7].
(b-e) use 2/3, 1/2, 1/3, and 1/4 of the detecting window to define the center-
body region, respectively.
matching number. This method also diminishes false alarms
occurring when more than two subjects are gathered in a window
and resulting a human-like shape between the two pedestrians.
However, this filtering method is too naïve and does not work
well when the background subtraction result is not robust. In this
work, we modified the filtering step in order to find more
reliable pedestrian candidates for further template matching by
considering both the ratio and the distribution trend of
foreground pixels inside the detecting window. In the method
proposed in [7], the center-body region (as shown in Fig. 3(a))
was determined according to the head width of the template, and
the template matching step will not be applied to the window
having few foreground pixels inside the center-body region.
Unfortunately, as shown in Fig. 2, the head width of the
generated templates might be quite small such that the center-
body region would be too narrow for providing discriminative
foreground ratio information. We defined the center-body region
in different ways (as shown in Fig. 3(b)-(e)), and empirically
found that if the width of the detecting window is 𝑤, then using
the middle 𝑤 3⁄ area of the detecting window as the center-body
region would result in better accuracy.
The horizontal/vertical foreground distribution trend inside
the detecting window is also an important clue for candidate
filtering. As shown in Fig. 4, we horizontally divided the
detecting window into 10 equal regions and computed the
foreground ratio in each bin. Fig. 4(a)-(c) show the horizontal
foreground distribution trend of a real pedestrian. Fig. 4(d)-(f)
show that even though a detecting window might have many
foreground pixels inside the center-body region because it
contains many human parts from multiple pedestrians, we can
still distinguish it from real humans according to the foreground
distribution trend. Compared to the filtering method described
in [7], our method took an additional step to calculate the
foreground distribution trend. It is worth noting that the
additional step did not increase the overall detection time
because it significantly reduced the number of candidates for the
template matching procedure.
C. Short-term Tracking
After frame-by-frame detection, we further applied a short term
tracking process to smoothen the detection results. We defined
30 consecutive frames as a tracking unit, and maintained several
tracking lists for each tracking unit. The lists were used to record
the detected pedestrians from different frames. If two
Background
Substraction
[7]
Candidate
Filtering
Edge Integral Image
Computation
[7]
Template
Generation
[7]
Input Video
Output Video
Detection
Phase
Training
Phase
Template
Matching
[7]
Non-maximum
Suppression
[7]
Tracking
1/4 w
Detecting
Window
Filter
Template
Hu’s 2/3 w 1/2 w 1/3 w
(e)(a) (b) (c) (d)
w
IT in Industry, vol. 3, no. 2, 2015 Published online 14-Sep-2015
ISSN (Print): 2204-0595
Copyright © Authors 35 ISSN (Online): 2203-1731
Fig. 4. The concept of foreground distribution trend. (a) and (d) show the
content of a pedestrian and a non-pedestrian region, respectively. (b) and (e)
show the foreground pixels in (a) and (d), respectively. (c) and (f) show the
foreground distribution trend of (b) and (e), respectively.
pedestrians in adjacent frames are close and have similar
appearances, we put them into the same tracking list. The
appearance similarity was defined based on the chi-squared
distance of the LAB color histogram. As shown in Fig. 5 the
pedestrian in tracking list (b) is lost in some frames due to
occlusions. In this case, we interpolate missing detections if the
number of consecutive null nodes is less than three. Also,
shadows may cause false detections and result in rather short
tracking lists such as the list show in Fig. 5 (c). In this case, we
simply delete lists shorter than 10 (frames).
III. EXPERIMENT RESULTS
The CAVIAR database [10] is a benchmark for human
detection evaluation. We utilized a video named as
‘OneStopMoveEnter1cor’ to perform our detection algorithm
The specification of this video and our experimental
environment are listed in Table 1.
Fig. 5. The process of establishing tracking lists.
TABLE I. SPECIFICATION OF VIDEO AND EXPERIMENT ENVIRONMENT
Specification of Video
Frame Rate 25 fps
Frame Resolution 384 x 288 pixels
Specification of Experiment Environment
CPU Core-i5 (use only dual core)
Graphic Card NVIDIA GeForce GT 630M
Some example results of the proposed pedestrian detection
method is shown in Fig. 6 below. In the experiment, the
background subtraction step spends a few seconds in learning
background information. Hence, the video sequence from frame
201 to 1,588 are used for accuracy evaluation. We exclude the
pedestrian object visibility less than 50% in the evaluation
process. In total there are 11,149 pedestrians in 1,588 frames.
The detected pedestrian was considered as a true positive if it
matches the ground truth by the following criterion:
max (
𝐴 𝐴𝑁𝐷
𝐴 𝐺𝑇
,
𝐴 𝐴𝑁𝐷
𝐴 𝐷𝑅
) > 0.5 ( 1 )
where 𝐴 𝐺𝑇 and 𝐴 𝐷𝑅 are the area of ground truth and the detected
pedestrian, respectively. 𝐴 𝐴𝑁𝐷 denotes the overlapping area
between 𝐴 𝐺𝑇 and 𝐴 𝐷𝑅. We first investigated into the effect of
applying different definitions of center-body region, including
method [7], the middle 2𝑤 3⁄ area of the detecting window, the
middle 𝑤 2⁄ area of the detecting window, the middle 𝑤 3⁄ area
of the detecting window, and the middle 𝑤 4⁄ area of the
detecting window. As shown in Figure 7, using the middle 𝑤 3⁄
area of the detecting window to construct the center-body region
resulted in better performances. The recall increased approx. 3%
and the precision increased approx. 0.7% compared to method
[7].
We further evaluated the effectiveness of the proposed candidate
filtering method, which included a center-body-based
foreground ratio filter and a foreground distribution trend filter.
On average, adding the foreground distribution trend filter
increased the precision by 3% and decreased the recall by less
than 1%. If we further apply the short-term tracking process, the
deletion mechanism can minimize the misjudgment of detected
pedestrians, and the interpolation mechanism can recover some
Fig. 6. The demo of our proposed pedestrian detection system.
128pixels
47 pixels 1 2 3
{
... 9 10
(a) (b) (c)
(d)
70pixels
54 pixels
(e)
(f)
Frame
TrackingList
1 2 3
a
b
c
… 29 30
…
…
…
NULL
NULL NULL
IT in Industry, vol. 3, no. 2, 2015 Published online 14-Sep-2015
ISSN (Print): 2204-0595
Copyright © Authors 36 ISSN (Online): 2203-1731
Fig. 7. The PR curve of the proposed pedestrian detection method using
different center-body region definitions.
Fig. 8. The P-R curves of the proposed pedestrian detection method with using
the best filtering size, foreground distribution trend filter and
deletion/interpolation of our tracking algorithm. Results show that our method
achieves higher precision and recall than method [7].
missing pedestrians. Fig. 8 shows that comparing to method [7],
our proposed pedestrian detection method successfully increases
the precision and recall by 5.1% and 3.6%, respectively.
Moreover, comparing with the HOG method built in OpenCV,
our method has a much higher recall with the same precision.
Fig. 9 shows the computation cost of applying different
candidate filtering methods to detect pedestrians in one frame.
For each method, the scanning step of the detecting window is 2
pixels, and a GPU is applied in the edge detection step. Since
template matching is a procedure that can be independently
conducted in each detecting window Ix,y, we can apply parallel
programming techniques and utilize multi-core CPUs to achieve
real-time detection. No matter we use [7] or our proposed
definition of center-body region, adding the foreground
distribution trend filter reduced the number of candidates for
template matching, and consequently reduced the overall
pedestrian detection time by about 2ms per frame. The overall
Fig. 9. Different filter size effect on execution time of detecting a frame.
execution time of our method is 56.02ms per frame, which is
lower than that of the method proposed in [7].
IV. CONCLUSIONS
We propose a real-time pedestrian detection method for
crowded environments based on contour and motion
information. Sparse contour templates of human shapes were
first generated on the basis of the PDM, and humans were
detected by the template matching step. We took the ratio and
distribution trend of foreground pixels inside each detecting
window into consideration to reduce the detecting time
complexity and improve the detection accuracy. A tracking
method was further applied to deal with the short-term
occlusions and noisy false alarms. In the experiment, we verified
the proposed method in a crowded environment. The results
show that comparing to method [7], the precision and recall of
our method are improved (from 0.78% to 81%, and 83% to 87%,
respectively). Moreover, the execution time of the proposed
pedestrian detection method was almost the same as method [7]
even though we had to additionally calculate the foreground
distribution trend. In addition, we observed that the shadow of
pedestrians would still be an issue that led to low precision rates
even after applying the short-term tracking step. Hence, in the
future we will apply shadow removal techniques to obtain more
accurate foreground information. We will also design a more
general method to determine the size of detecting window at
each position in the frame.
ACKNOWLEDGEMENT
This work is partially supported in part by National Science
Council of the Republic of China under Grant No. NSC101-
2221-E-006-148-MY3, and Research Center for Energy
Technology and Strategy, National Cheng Kung University.
REFERENCES
[1] P. Dollar, C. Wojek, B. Schiele and P. Perona, "Pedestrian detection: an
evaluation of the state of the art," IEEE Transactions on Pattern Analysis
and Machine Intelligence, vol. 34, no. 4, pp. 743–761, 2012.
[2] R. Benenson, M. Omran, J. Hosang and B. Schiele, "Ten years of
pedestrian detection, what have we learned?," in Proceedings of the
European Conference on Computer Vision, CVRSUAD Workshop,
Zurich, 2014, pp. 613–627.
[3] J. Yan, X. Zhang, Z. Lei, S. Liao and S. Li, "Robust multi-resolution
pedestrian detection in traffic scenes," in Proceedings of the 2013 IEEE
Conference on Computer Vision and Pattern Recognition (CVPR),
Portland, OR, 2013, pp. 3033–3040.
[4] P.-T. Huang, Y.-M. Chan, L.-C. Fu, S.-S. Huang, P.-Y. Hsiao, W.-Y. Wu,
C.-C. Lin, K.-C. Chang and P.-M. Hsu, "An image-range fusion
pedestrian detection system in low illumination conditions," in
IT in Industry, vol. 3, no. 2, 2015 Published online 14-Sep-2015
ISSN (Print): 2204-0595
Copyright © Authors 37 ISSN (Online): 2203-1731
Proceedings of the IPPR Conference on Computer Vision, Graphics, and
Image Processing, Taiwan, 2014.
[5] W.-J. Liao, C.-W. Lin, C.-S. Chen and Y.-P. Hung, "Combining
spatiotemporal background modeling and random forest classifier for
foreground segmentation and shadow removal," in Proceedings of the
IPPR Conference on Computer Vision, Graphics, and Image Processing,
Taiwan, 2014.
[6] S. Tang, M. Andriluka, A. Milan, K. Schindler and S. R. a. B. Schiele,
"Learning people detectors for tracking in crowded scenes," in
Proceedings of the IEEE International Conference on Computer Vision,
Sydney, NSW, 2013, pp. 1049–1056.
[7] M.-C. Hu, W.-H. Cheng, C.-S. Hu, J.-L. Wu and J.-W. Li, "Efficient
human detection in crowded environment," Multimedia Systems, pp. 1–
11, 2014.
[8] T. F. Cootes, C. J. Taylor, D. H. Cooper and J. Graham, "Active shape
models—their training and application," Computer Vision and Image
Understanding, vol. 61, no. 1, pp. 38–59, 1995.
[9] C. Beleznai and H. Bischof, "Fast human detection in crowded scenes by
contour integration and local shape estimation," in Proceedings of the
IEEE Computer Vision and Pattern Recognition, Miami, FL, 2009, pp.
2246–2253.
[10] R. Fisher, "Caviar dataset," [Online]. Available:
http://homepages.inf.ed.ac.uk/rbf/CAVIAR/.

More Related Content

What's hot

C012271015
C012271015C012271015
C012271015
IOSR Journals
 
Single Image Fog Removal Based on Fusion Strategy
Single Image Fog Removal Based on Fusion Strategy Single Image Fog Removal Based on Fusion Strategy
Single Image Fog Removal Based on Fusion Strategy
csandit
 
Basics of dip
Basics of dipBasics of dip
Basics of dip
Prateek Omer
 
Lw3620362041
Lw3620362041Lw3620362041
Lw3620362041
IJERA Editor
 
Single image super resolution with improved wavelet interpolation and iterati...
Single image super resolution with improved wavelet interpolation and iterati...Single image super resolution with improved wavelet interpolation and iterati...
Single image super resolution with improved wavelet interpolation and iterati...
iosrjce
 
Review on Various Algorithm for Cloud Detection and Removal for Images
Review on Various Algorithm for Cloud Detection and Removal for ImagesReview on Various Algorithm for Cloud Detection and Removal for Images
Review on Various Algorithm for Cloud Detection and Removal for Images
IJERA Editor
 
3D reconstruction
3D reconstruction3D reconstruction
3D reconstruction
Jorge Leandro, Ph.D.
 
Visual Saliency: Learning to Detect Salient Objects
Visual Saliency: Learning to Detect Salient ObjectsVisual Saliency: Learning to Detect Salient Objects
Visual Saliency: Learning to Detect Salient Objects
Vicente Ordonez
 
Synthetic aperture radar images
Synthetic aperture radar imagesSynthetic aperture radar images
Synthetic aperture radar images
sipij
 
Object tracking with SURF: ARM-Based platform Implementation
Object tracking with SURF: ARM-Based platform ImplementationObject tracking with SURF: ARM-Based platform Implementation
Object tracking with SURF: ARM-Based platform Implementation
Editor IJCATR
 
Enhancement performance of road recognition system of autonomous robots in sh...
Enhancement performance of road recognition system of autonomous robots in sh...Enhancement performance of road recognition system of autonomous robots in sh...
Enhancement performance of road recognition system of autonomous robots in sh...
sipij
 
AN IMPLEMENTATION OF ADAPTIVE PROPAGATION-BASED COLOR SAMPLING FOR IMAGE MATT...
AN IMPLEMENTATION OF ADAPTIVE PROPAGATION-BASED COLOR SAMPLING FOR IMAGE MATT...AN IMPLEMENTATION OF ADAPTIVE PROPAGATION-BASED COLOR SAMPLING FOR IMAGE MATT...
AN IMPLEMENTATION OF ADAPTIVE PROPAGATION-BASED COLOR SAMPLING FOR IMAGE MATT...
ijiert bestjournal
 
Comparative Study of Compressive Sensing Techniques For Image Enhancement
Comparative Study of Compressive Sensing Techniques For Image EnhancementComparative Study of Compressive Sensing Techniques For Image Enhancement
Comparative Study of Compressive Sensing Techniques For Image Enhancement
CSCJournals
 
International Journal of Pharmaceutical Science Invention (IJPSI)
International Journal of Pharmaceutical Science Invention (IJPSI)International Journal of Pharmaceutical Science Invention (IJPSI)
International Journal of Pharmaceutical Science Invention (IJPSI)
inventionjournals
 
Segmentation based image copy-move forgery detection scheme
Segmentation based image copy-move forgery detection schemeSegmentation based image copy-move forgery detection scheme
Segmentation based image copy-move forgery detection scheme
I3E Technologies
 
IEEE ICAPR 2009
IEEE ICAPR 2009IEEE ICAPR 2009
IEEE ICAPR 2009
Dakshina Ranjan Kisku
 
Online Multi-Person Tracking Using Variance Magnitude of Image colors and Sol...
Online Multi-Person Tracking Using Variance Magnitude of Image colors and Sol...Online Multi-Person Tracking Using Variance Magnitude of Image colors and Sol...
Online Multi-Person Tracking Using Variance Magnitude of Image colors and Sol...Pourya Jafarzadeh
 

What's hot (20)

C012271015
C012271015C012271015
C012271015
 
Single Image Fog Removal Based on Fusion Strategy
Single Image Fog Removal Based on Fusion Strategy Single Image Fog Removal Based on Fusion Strategy
Single Image Fog Removal Based on Fusion Strategy
 
Basics of dip
Basics of dipBasics of dip
Basics of dip
 
By4301435440
By4301435440By4301435440
By4301435440
 
Lw3620362041
Lw3620362041Lw3620362041
Lw3620362041
 
Single image super resolution with improved wavelet interpolation and iterati...
Single image super resolution with improved wavelet interpolation and iterati...Single image super resolution with improved wavelet interpolation and iterati...
Single image super resolution with improved wavelet interpolation and iterati...
 
Review on Various Algorithm for Cloud Detection and Removal for Images
Review on Various Algorithm for Cloud Detection and Removal for ImagesReview on Various Algorithm for Cloud Detection and Removal for Images
Review on Various Algorithm for Cloud Detection and Removal for Images
 
3D reconstruction
3D reconstruction3D reconstruction
3D reconstruction
 
Visual Saliency: Learning to Detect Salient Objects
Visual Saliency: Learning to Detect Salient ObjectsVisual Saliency: Learning to Detect Salient Objects
Visual Saliency: Learning to Detect Salient Objects
 
Synthetic aperture radar images
Synthetic aperture radar imagesSynthetic aperture radar images
Synthetic aperture radar images
 
Thesis summary
Thesis summaryThesis summary
Thesis summary
 
Object tracking with SURF: ARM-Based platform Implementation
Object tracking with SURF: ARM-Based platform ImplementationObject tracking with SURF: ARM-Based platform Implementation
Object tracking with SURF: ARM-Based platform Implementation
 
Enhancement performance of road recognition system of autonomous robots in sh...
Enhancement performance of road recognition system of autonomous robots in sh...Enhancement performance of road recognition system of autonomous robots in sh...
Enhancement performance of road recognition system of autonomous robots in sh...
 
AN IMPLEMENTATION OF ADAPTIVE PROPAGATION-BASED COLOR SAMPLING FOR IMAGE MATT...
AN IMPLEMENTATION OF ADAPTIVE PROPAGATION-BASED COLOR SAMPLING FOR IMAGE MATT...AN IMPLEMENTATION OF ADAPTIVE PROPAGATION-BASED COLOR SAMPLING FOR IMAGE MATT...
AN IMPLEMENTATION OF ADAPTIVE PROPAGATION-BASED COLOR SAMPLING FOR IMAGE MATT...
 
Comparative Study of Compressive Sensing Techniques For Image Enhancement
Comparative Study of Compressive Sensing Techniques For Image EnhancementComparative Study of Compressive Sensing Techniques For Image Enhancement
Comparative Study of Compressive Sensing Techniques For Image Enhancement
 
International Journal of Pharmaceutical Science Invention (IJPSI)
International Journal of Pharmaceutical Science Invention (IJPSI)International Journal of Pharmaceutical Science Invention (IJPSI)
International Journal of Pharmaceutical Science Invention (IJPSI)
 
Segmentation based image copy-move forgery detection scheme
Segmentation based image copy-move forgery detection schemeSegmentation based image copy-move forgery detection scheme
Segmentation based image copy-move forgery detection scheme
 
Final Review
Final ReviewFinal Review
Final Review
 
IEEE ICAPR 2009
IEEE ICAPR 2009IEEE ICAPR 2009
IEEE ICAPR 2009
 
Online Multi-Person Tracking Using Variance Magnitude of Image colors and Sol...
Online Multi-Person Tracking Using Variance Magnitude of Image colors and Sol...Online Multi-Person Tracking Using Variance Magnitude of Image colors and Sol...
Online Multi-Person Tracking Using Variance Magnitude of Image colors and Sol...
 

Similar to Contour-based Pedestrian Detection with Foreground Distribution Trend Filtering and Tracking

E017443136
E017443136E017443136
E017443136
IOSR Journals
 
A NOVEL APPROACH TO SMOOTHING ON 3D STRUCTURED ADAPTIVE MESH OF THE KINECT-BA...
A NOVEL APPROACH TO SMOOTHING ON 3D STRUCTURED ADAPTIVE MESH OF THE KINECT-BA...A NOVEL APPROACH TO SMOOTHING ON 3D STRUCTURED ADAPTIVE MESH OF THE KINECT-BA...
A NOVEL APPROACH TO SMOOTHING ON 3D STRUCTURED ADAPTIVE MESH OF THE KINECT-BA...
csandit
 
An improved particle filter tracking
An improved particle filter trackingAn improved particle filter tracking
An improved particle filter tracking
ijcsit
 
Implementation of Object Tracking for Real Time Video
Implementation of Object Tracking for Real Time VideoImplementation of Object Tracking for Real Time Video
Implementation of Object Tracking for Real Time Video
IDES Editor
 
D018112429
D018112429D018112429
D018112429
IOSR Journals
 
Symbolic representation and recognition of gait an approach based on lbp of ...
Symbolic representation and recognition of gait  an approach based on lbp of ...Symbolic representation and recognition of gait  an approach based on lbp of ...
Symbolic representation and recognition of gait an approach based on lbp of ...
sipij
 
AUTOMATED MANAGEMENT OF POTHOLE RELATED DISASTERS USING IMAGE PROCESSING AND ...
AUTOMATED MANAGEMENT OF POTHOLE RELATED DISASTERS USING IMAGE PROCESSING AND ...AUTOMATED MANAGEMENT OF POTHOLE RELATED DISASTERS USING IMAGE PROCESSING AND ...
AUTOMATED MANAGEMENT OF POTHOLE RELATED DISASTERS USING IMAGE PROCESSING AND ...
ijcsit
 
To identify the person using gait knn based approach
To identify the person using gait   knn based approachTo identify the person using gait   knn based approach
To identify the person using gait knn based approach
eSAT Journals
 
A NOVEL APPROACH TO SMOOTHING ON 3D STRUCTURED ADAPTIVE MESH OF THE KINECT-BA...
A NOVEL APPROACH TO SMOOTHING ON 3D STRUCTURED ADAPTIVE MESH OF THE KINECT-BA...A NOVEL APPROACH TO SMOOTHING ON 3D STRUCTURED ADAPTIVE MESH OF THE KINECT-BA...
A NOVEL APPROACH TO SMOOTHING ON 3D STRUCTURED ADAPTIVE MESH OF THE KINECT-BA...
cscpconf
 
HOL, GDCT AND LDCT FOR PEDESTRIAN DETECTION
HOL, GDCT AND LDCT FOR PEDESTRIAN DETECTIONHOL, GDCT AND LDCT FOR PEDESTRIAN DETECTION
HOL, GDCT AND LDCT FOR PEDESTRIAN DETECTION
csandit
 
HOL, GDCT AND LDCT FOR PEDESTRIAN DETECTION
HOL, GDCT AND LDCT FOR PEDESTRIAN DETECTIONHOL, GDCT AND LDCT FOR PEDESTRIAN DETECTION
HOL, GDCT AND LDCT FOR PEDESTRIAN DETECTION
cscpconf
 
Long-Term Robust Tracking Whith on Failure Recovery
Long-Term Robust Tracking Whith on Failure RecoveryLong-Term Robust Tracking Whith on Failure Recovery
Long-Term Robust Tracking Whith on Failure Recovery
TELKOMNIKA JOURNAL
 
One dimensional vector based pattern
One dimensional vector based patternOne dimensional vector based pattern
One dimensional vector based pattern
ijcsit
 
Self scale estimation of the tracking window merged with adaptive particle fi...
Self scale estimation of the tracking window merged with adaptive particle fi...Self scale estimation of the tracking window merged with adaptive particle fi...
Self scale estimation of the tracking window merged with adaptive particle fi...
IJECEIAES
 
Detection of Bridges using Different Types of High Resolution Satellite Images
Detection of Bridges using Different Types of High Resolution Satellite ImagesDetection of Bridges using Different Types of High Resolution Satellite Images
Detection of Bridges using Different Types of High Resolution Satellite Images
idescitation
 
Human Re-identification with Global and Local Siamese Convolution Neural Network
Human Re-identification with Global and Local Siamese Convolution Neural NetworkHuman Re-identification with Global and Local Siamese Convolution Neural Network
Human Re-identification with Global and Local Siamese Convolution Neural Network
TELKOMNIKA JOURNAL
 
Gait Based Person Recognition Using Partial Least Squares Selection Scheme
Gait Based Person Recognition Using Partial Least Squares Selection Scheme Gait Based Person Recognition Using Partial Least Squares Selection Scheme
Gait Based Person Recognition Using Partial Least Squares Selection Scheme
ijcisjournal
 
Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...
Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...
Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...
IJERA Editor
 
IRJET - Human Eye Pupil Detection Technique using Center of Gravity Method
IRJET - Human Eye Pupil Detection Technique using Center of Gravity MethodIRJET - Human Eye Pupil Detection Technique using Center of Gravity Method
IRJET - Human Eye Pupil Detection Technique using Center of Gravity Method
IRJET Journal
 
Locate, Size and Count: Accurately Resolving People in Dense Crowds via Detec...
Locate, Size and Count: Accurately Resolving People in Dense Crowds via Detec...Locate, Size and Count: Accurately Resolving People in Dense Crowds via Detec...
Locate, Size and Count: Accurately Resolving People in Dense Crowds via Detec...
IRJET Journal
 

Similar to Contour-based Pedestrian Detection with Foreground Distribution Trend Filtering and Tracking (20)

E017443136
E017443136E017443136
E017443136
 
A NOVEL APPROACH TO SMOOTHING ON 3D STRUCTURED ADAPTIVE MESH OF THE KINECT-BA...
A NOVEL APPROACH TO SMOOTHING ON 3D STRUCTURED ADAPTIVE MESH OF THE KINECT-BA...A NOVEL APPROACH TO SMOOTHING ON 3D STRUCTURED ADAPTIVE MESH OF THE KINECT-BA...
A NOVEL APPROACH TO SMOOTHING ON 3D STRUCTURED ADAPTIVE MESH OF THE KINECT-BA...
 
An improved particle filter tracking
An improved particle filter trackingAn improved particle filter tracking
An improved particle filter tracking
 
Implementation of Object Tracking for Real Time Video
Implementation of Object Tracking for Real Time VideoImplementation of Object Tracking for Real Time Video
Implementation of Object Tracking for Real Time Video
 
D018112429
D018112429D018112429
D018112429
 
Symbolic representation and recognition of gait an approach based on lbp of ...
Symbolic representation and recognition of gait  an approach based on lbp of ...Symbolic representation and recognition of gait  an approach based on lbp of ...
Symbolic representation and recognition of gait an approach based on lbp of ...
 
AUTOMATED MANAGEMENT OF POTHOLE RELATED DISASTERS USING IMAGE PROCESSING AND ...
AUTOMATED MANAGEMENT OF POTHOLE RELATED DISASTERS USING IMAGE PROCESSING AND ...AUTOMATED MANAGEMENT OF POTHOLE RELATED DISASTERS USING IMAGE PROCESSING AND ...
AUTOMATED MANAGEMENT OF POTHOLE RELATED DISASTERS USING IMAGE PROCESSING AND ...
 
To identify the person using gait knn based approach
To identify the person using gait   knn based approachTo identify the person using gait   knn based approach
To identify the person using gait knn based approach
 
A NOVEL APPROACH TO SMOOTHING ON 3D STRUCTURED ADAPTIVE MESH OF THE KINECT-BA...
A NOVEL APPROACH TO SMOOTHING ON 3D STRUCTURED ADAPTIVE MESH OF THE KINECT-BA...A NOVEL APPROACH TO SMOOTHING ON 3D STRUCTURED ADAPTIVE MESH OF THE KINECT-BA...
A NOVEL APPROACH TO SMOOTHING ON 3D STRUCTURED ADAPTIVE MESH OF THE KINECT-BA...
 
HOL, GDCT AND LDCT FOR PEDESTRIAN DETECTION
HOL, GDCT AND LDCT FOR PEDESTRIAN DETECTIONHOL, GDCT AND LDCT FOR PEDESTRIAN DETECTION
HOL, GDCT AND LDCT FOR PEDESTRIAN DETECTION
 
HOL, GDCT AND LDCT FOR PEDESTRIAN DETECTION
HOL, GDCT AND LDCT FOR PEDESTRIAN DETECTIONHOL, GDCT AND LDCT FOR PEDESTRIAN DETECTION
HOL, GDCT AND LDCT FOR PEDESTRIAN DETECTION
 
Long-Term Robust Tracking Whith on Failure Recovery
Long-Term Robust Tracking Whith on Failure RecoveryLong-Term Robust Tracking Whith on Failure Recovery
Long-Term Robust Tracking Whith on Failure Recovery
 
One dimensional vector based pattern
One dimensional vector based patternOne dimensional vector based pattern
One dimensional vector based pattern
 
Self scale estimation of the tracking window merged with adaptive particle fi...
Self scale estimation of the tracking window merged with adaptive particle fi...Self scale estimation of the tracking window merged with adaptive particle fi...
Self scale estimation of the tracking window merged with adaptive particle fi...
 
Detection of Bridges using Different Types of High Resolution Satellite Images
Detection of Bridges using Different Types of High Resolution Satellite ImagesDetection of Bridges using Different Types of High Resolution Satellite Images
Detection of Bridges using Different Types of High Resolution Satellite Images
 
Human Re-identification with Global and Local Siamese Convolution Neural Network
Human Re-identification with Global and Local Siamese Convolution Neural NetworkHuman Re-identification with Global and Local Siamese Convolution Neural Network
Human Re-identification with Global and Local Siamese Convolution Neural Network
 
Gait Based Person Recognition Using Partial Least Squares Selection Scheme
Gait Based Person Recognition Using Partial Least Squares Selection Scheme Gait Based Person Recognition Using Partial Least Squares Selection Scheme
Gait Based Person Recognition Using Partial Least Squares Selection Scheme
 
Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...
Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...
Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...
 
IRJET - Human Eye Pupil Detection Technique using Center of Gravity Method
IRJET - Human Eye Pupil Detection Technique using Center of Gravity MethodIRJET - Human Eye Pupil Detection Technique using Center of Gravity Method
IRJET - Human Eye Pupil Detection Technique using Center of Gravity Method
 
Locate, Size and Count: Accurately Resolving People in Dense Crowds via Detec...
Locate, Size and Count: Accurately Resolving People in Dense Crowds via Detec...Locate, Size and Count: Accurately Resolving People in Dense Crowds via Detec...
Locate, Size and Count: Accurately Resolving People in Dense Crowds via Detec...
 

More from ITIIIndustries

Securing Cloud Computing Through IT Governance
Securing Cloud Computing Through IT GovernanceSecuring Cloud Computing Through IT Governance
Securing Cloud Computing Through IT Governance
ITIIIndustries
 
Information Technology in Industry(ITII) - November Issue 2018
Information Technology in Industry(ITII) - November Issue 2018Information Technology in Industry(ITII) - November Issue 2018
Information Technology in Industry(ITII) - November Issue 2018
ITIIIndustries
 
Design of an IT Capstone Subject - Cloud Robotics
Design of an IT Capstone Subject - Cloud RoboticsDesign of an IT Capstone Subject - Cloud Robotics
Design of an IT Capstone Subject - Cloud Robotics
ITIIIndustries
 
Dimensionality Reduction and Feature Selection Methods for Script Identificat...
Dimensionality Reduction and Feature Selection Methods for Script Identificat...Dimensionality Reduction and Feature Selection Methods for Script Identificat...
Dimensionality Reduction and Feature Selection Methods for Script Identificat...
ITIIIndustries
 
Image Matting via LLE/iLLE Manifold Learning
Image Matting via LLE/iLLE Manifold LearningImage Matting via LLE/iLLE Manifold Learning
Image Matting via LLE/iLLE Manifold Learning
ITIIIndustries
 
Annotating Retina Fundus Images for Teaching and Learning Diabetic Retinopath...
Annotating Retina Fundus Images for Teaching and Learning Diabetic Retinopath...Annotating Retina Fundus Images for Teaching and Learning Diabetic Retinopath...
Annotating Retina Fundus Images for Teaching and Learning Diabetic Retinopath...
ITIIIndustries
 
A Framework for Traffic Planning and Forecasting using Micro-Simulation Calib...
A Framework for Traffic Planning and Forecasting using Micro-Simulation Calib...A Framework for Traffic Planning and Forecasting using Micro-Simulation Calib...
A Framework for Traffic Planning and Forecasting using Micro-Simulation Calib...
ITIIIndustries
 
Investigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityInvestigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet Security
ITIIIndustries
 
Blind Image Watermarking Based on Chaotic Maps
Blind Image Watermarking Based on Chaotic MapsBlind Image Watermarking Based on Chaotic Maps
Blind Image Watermarking Based on Chaotic Maps
ITIIIndustries
 
Programmatic detection of spatial behaviour in an agent-based model
Programmatic detection of spatial behaviour in an agent-based modelProgrammatic detection of spatial behaviour in an agent-based model
Programmatic detection of spatial behaviour in an agent-based model
ITIIIndustries
 
Design of an IT Capstone Subject - Cloud Robotics
Design of an IT Capstone Subject - Cloud RoboticsDesign of an IT Capstone Subject - Cloud Robotics
Design of an IT Capstone Subject - Cloud Robotics
ITIIIndustries
 
A Smart Fuzzing Approach for Integer Overflow Detection
A Smart Fuzzing Approach for Integer Overflow DetectionA Smart Fuzzing Approach for Integer Overflow Detection
A Smart Fuzzing Approach for Integer Overflow Detection
ITIIIndustries
 
Core Bank Transformation in Practice
Core Bank Transformation in PracticeCore Bank Transformation in Practice
Core Bank Transformation in Practice
ITIIIndustries
 
Detecting Fraud Using Transaction Frequency Data
Detecting Fraud Using Transaction Frequency DataDetecting Fraud Using Transaction Frequency Data
Detecting Fraud Using Transaction Frequency Data
ITIIIndustries
 
Mapping the Cybernetic Principles of Viable System Model to Enterprise Servic...
Mapping the Cybernetic Principles of Viable System Model to Enterprise Servic...Mapping the Cybernetic Principles of Viable System Model to Enterprise Servic...
Mapping the Cybernetic Principles of Viable System Model to Enterprise Servic...
ITIIIndustries
 
Using Watershed Transform for Vision-based Two-Hand Occlusion in an Interacti...
Using Watershed Transform for Vision-based Two-Hand Occlusion in an Interacti...Using Watershed Transform for Vision-based Two-Hand Occlusion in an Interacti...
Using Watershed Transform for Vision-based Two-Hand Occlusion in an Interacti...
ITIIIndustries
 
Speech Feature Extraction and Data Visualisation
Speech Feature Extraction and Data VisualisationSpeech Feature Extraction and Data Visualisation
Speech Feature Extraction and Data Visualisation
ITIIIndustries
 
Bayesian-Network-Based Algorithm Selection with High Level Representation Fee...
Bayesian-Network-Based Algorithm Selection with High Level Representation Fee...Bayesian-Network-Based Algorithm Selection with High Level Representation Fee...
Bayesian-Network-Based Algorithm Selection with High Level Representation Fee...
ITIIIndustries
 
Instance Selection and Optimization of Neural Networks
Instance Selection and Optimization of Neural NetworksInstance Selection and Optimization of Neural Networks
Instance Selection and Optimization of Neural Networks
ITIIIndustries
 
Signature Forgery and the Forger – An Assessment of Influence on Handwritten ...
Signature Forgery and the Forger – An Assessment of Influence on Handwritten ...Signature Forgery and the Forger – An Assessment of Influence on Handwritten ...
Signature Forgery and the Forger – An Assessment of Influence on Handwritten ...
ITIIIndustries
 

More from ITIIIndustries (20)

Securing Cloud Computing Through IT Governance
Securing Cloud Computing Through IT GovernanceSecuring Cloud Computing Through IT Governance
Securing Cloud Computing Through IT Governance
 
Information Technology in Industry(ITII) - November Issue 2018
Information Technology in Industry(ITII) - November Issue 2018Information Technology in Industry(ITII) - November Issue 2018
Information Technology in Industry(ITII) - November Issue 2018
 
Design of an IT Capstone Subject - Cloud Robotics
Design of an IT Capstone Subject - Cloud RoboticsDesign of an IT Capstone Subject - Cloud Robotics
Design of an IT Capstone Subject - Cloud Robotics
 
Dimensionality Reduction and Feature Selection Methods for Script Identificat...
Dimensionality Reduction and Feature Selection Methods for Script Identificat...Dimensionality Reduction and Feature Selection Methods for Script Identificat...
Dimensionality Reduction and Feature Selection Methods for Script Identificat...
 
Image Matting via LLE/iLLE Manifold Learning
Image Matting via LLE/iLLE Manifold LearningImage Matting via LLE/iLLE Manifold Learning
Image Matting via LLE/iLLE Manifold Learning
 
Annotating Retina Fundus Images for Teaching and Learning Diabetic Retinopath...
Annotating Retina Fundus Images for Teaching and Learning Diabetic Retinopath...Annotating Retina Fundus Images for Teaching and Learning Diabetic Retinopath...
Annotating Retina Fundus Images for Teaching and Learning Diabetic Retinopath...
 
A Framework for Traffic Planning and Forecasting using Micro-Simulation Calib...
A Framework for Traffic Planning and Forecasting using Micro-Simulation Calib...A Framework for Traffic Planning and Forecasting using Micro-Simulation Calib...
A Framework for Traffic Planning and Forecasting using Micro-Simulation Calib...
 
Investigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityInvestigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet Security
 
Blind Image Watermarking Based on Chaotic Maps
Blind Image Watermarking Based on Chaotic MapsBlind Image Watermarking Based on Chaotic Maps
Blind Image Watermarking Based on Chaotic Maps
 
Programmatic detection of spatial behaviour in an agent-based model
Programmatic detection of spatial behaviour in an agent-based modelProgrammatic detection of spatial behaviour in an agent-based model
Programmatic detection of spatial behaviour in an agent-based model
 
Design of an IT Capstone Subject - Cloud Robotics
Design of an IT Capstone Subject - Cloud RoboticsDesign of an IT Capstone Subject - Cloud Robotics
Design of an IT Capstone Subject - Cloud Robotics
 
A Smart Fuzzing Approach for Integer Overflow Detection
A Smart Fuzzing Approach for Integer Overflow DetectionA Smart Fuzzing Approach for Integer Overflow Detection
A Smart Fuzzing Approach for Integer Overflow Detection
 
Core Bank Transformation in Practice
Core Bank Transformation in PracticeCore Bank Transformation in Practice
Core Bank Transformation in Practice
 
Detecting Fraud Using Transaction Frequency Data
Detecting Fraud Using Transaction Frequency DataDetecting Fraud Using Transaction Frequency Data
Detecting Fraud Using Transaction Frequency Data
 
Mapping the Cybernetic Principles of Viable System Model to Enterprise Servic...
Mapping the Cybernetic Principles of Viable System Model to Enterprise Servic...Mapping the Cybernetic Principles of Viable System Model to Enterprise Servic...
Mapping the Cybernetic Principles of Viable System Model to Enterprise Servic...
 
Using Watershed Transform for Vision-based Two-Hand Occlusion in an Interacti...
Using Watershed Transform for Vision-based Two-Hand Occlusion in an Interacti...Using Watershed Transform for Vision-based Two-Hand Occlusion in an Interacti...
Using Watershed Transform for Vision-based Two-Hand Occlusion in an Interacti...
 
Speech Feature Extraction and Data Visualisation
Speech Feature Extraction and Data VisualisationSpeech Feature Extraction and Data Visualisation
Speech Feature Extraction and Data Visualisation
 
Bayesian-Network-Based Algorithm Selection with High Level Representation Fee...
Bayesian-Network-Based Algorithm Selection with High Level Representation Fee...Bayesian-Network-Based Algorithm Selection with High Level Representation Fee...
Bayesian-Network-Based Algorithm Selection with High Level Representation Fee...
 
Instance Selection and Optimization of Neural Networks
Instance Selection and Optimization of Neural NetworksInstance Selection and Optimization of Neural Networks
Instance Selection and Optimization of Neural Networks
 
Signature Forgery and the Forger – An Assessment of Influence on Handwritten ...
Signature Forgery and the Forger – An Assessment of Influence on Handwritten ...Signature Forgery and the Forger – An Assessment of Influence on Handwritten ...
Signature Forgery and the Forger – An Assessment of Influence on Handwritten ...
 

Recently uploaded

Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 

Recently uploaded (20)

Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 

Contour-based Pedestrian Detection with Foreground Distribution Trend Filtering and Tracking

  • 1. IT in Industry, vol. 3, no. 2, 2015 Published online 14-Sep-2015 ISSN (Print): 2204-0595 Copyright © Authors 33 ISSN (Online): 2203-1731 Contour-based Pedestrian Detection with Foreground Distribution Trend Filtering and Tracking Kiat Siong Ng, Min-Chun Hu, Yu-Jung Hsiao, Kuang-Yu Nien, and Pei-Yin Chen Department of Computer Science and Information Engineering National Cheng Kung University Tainan City, Taiwan (R. O. C) jason.ng@mail.csie.ncku.edu.tw, anita_hu@mail.ncku.edu.tw, yami.hsiao@gmail.com, kevin11030@gmail.com, pychen@mail.ncku.edu.tw Abstract— In this work, we propose a real-time pedestrian detection method for crowded environments based on contour and motion information. Sparse contour templates of human shapes are first generated on the basis of a point distribution model (PDM), then a template matching step is applied to detect humans. To reduce the detecting time complexity and improve the detection accuracy, we propose to take the ratio and distribution trend of foreground pixels inside each detecting window into consideration. A tracking method is further applied to deal with the short-term occlusions and false alarms. The experimental results show that our method can efficiently detect pedestrians in videos of crowded scenes. Keywords—pedestrian detection; sparse contour; foreground distribution trend; crowded scene I. INTRODUCTION Pedestrian detection is essential for intelligent surveillance systems. Knowing the number of pedestrians in a scene can benefit demographic statistics and have many applications. For example, a retail store manager may assign more staff to serve customers if the surveillance system detects more people in a certain area. Moreover, by analyzing the clothing appearance of a detected person enabling us to search the same person among an enormous collection of surveillance videos. There have been many types of research on pedestrian detection with different focuses: 1) How to detect pedestrians of various sizes and poses, 2) how to make the detection system robust under different lighting conditions, and 3) how to solve the shadow and occlusion problems especially in crowded scenes [1, 2]. For example, based on a Multi-Task model to jointly consider the commonness and differences, Yan [3] conducted resolution aware transformations to map local features from different resolutions to a common subspace. Huang [4] proposed the image-range fusion system (IRFS) in which a dynamically illuminated object (DIO) detector is designed to overcome the problem caused by uncertain partial lighting condition. Liao [5] utilized the spatiotemporal background extractor to detect moving objects and applied Random Forest to learn the shad model with shadow features. The trained Random Forest shadow detector is further used to remove the shadow from the result of the spatiotemporal background extractor. Tang [6] analyzed typical failures of human trackers and trained a detector explicitly using these cases to detect human with partial occlusion. Utilizing both motion and shape clues, Hu [7] targeted real-time pedestrian detection in crowded environments and showed that their method is efficient. Using the foreground filtering step proposed by Hu, the detection accuracy would be low if the background subtraction result is too noisy. In this work, the shadow detection method [8], which pre-selects shadow pixels based on chromaticity and then calculates the correlation of the gradient direction between the given frame and the background, was utilized to decrease false alarms caused by shadows. Furthermore, we modified the filtering step and smoothed out the detected results by using a short-term tracking procedure, which can more accurately detect pedestrians without significant processing overhead. II. PROPOSED METHOD The proposed system framework is shown in Fig. 1. Since pedestrians have similar shapes, we first trained the sparse contour templates of pedestrians based on the point distribution model (PDM) [9]. Then the contour templates were used to detect pedestrians in a template matching step. However, applying template matching to all scanning windows results in heavy computation time. To reduce the number of template matching procedures, the background subtraction technique was first applied to extract moving foreground pixels, and a candidate filtering step was used for reducing the number of detecting windows, where the template matching should have been performed. The candidate filtering step was designed according to the ratio/distribution of foreground pixels inside each detecting window. Moreover, a tracking method was applied to deal with short-term occlusions and noises. A. Templates Generation and Matching Sparse contour representation and PDM are applied to generate representative templates of human shapes. Fig. 2 shows 30 generated human templates, and each template consists of 13 line segments. This human template generation method has been proven to be effective for tolerating shape variations by Beleznai [9].
  • 2. IT in Industry, vol. 3, no. 2, 2015 Published online 14-Sep-2015 ISSN (Print): 2204-0595 Copyright © Authors 34 ISSN (Online): 2203-1731 Fig. 1. Overview of the proposed system. Images were scanned with a sliding detecting window, and a template matching procedure was used to determine whether the content inside the current window was similar to any of the generated templates. The size of the detecting window was adaptively determined by the regression method proposed by Hu [7], and the templates were normalized to the same size as the detecting window before matching. The input image was denoted as 𝐼, the content in the current detecting window as 𝐼𝑥,𝑦, and the compared template as 𝑇. The matching score between 𝐼𝑥,𝑦 and 𝑇 was determined according to the consistency of edge points in 𝐼𝑥,𝑦 and contour points in 𝑇. Given 𝐼, we first generated eight corresponding edge maps by applying Gabor filters, and each map 𝐸𝑀(𝜃) recorded edge points in one specific orientation defined in Θ = {0°, 26.57°, 45°, 63.43°, 90°, 116.57°, 135°, 153.43°}. Given a template T, each line segment Li was adjusted to the nearest orientation 𝜃 among Θ, and the new line segment was denoted as 𝐿̂𝑖 The matching score between 𝐼𝑥,𝑦 and 𝑇 was defined as (1) where 𝐸𝐼(𝐸𝑀(𝜃), 𝐿̂ 𝑖) was the edge integral value [10], along the line segment 𝐿̂𝑖 on the edge map 𝐸𝑀(𝜃). Note that a small value 𝜖 will be assigned to 𝐸𝐼(𝐸𝑀(𝜃), 𝐿̂ 𝑖) if it is zero, and therefore this formula can deal with partial occlusions. A non- maximum suppression step was applied to more accurately locate the positions of pedestrians in each frame. B. Candidate Filtering Exhaustively matching all sliding windows with the 30 templates is inefficient. Since pedestrian regions should contain enough foreground pixels, Hu [7], proposed to utilize the foreground ratio inside the detecting window to reduce the Fig. 2. The generated human sparse contour templates. Fig. 3. Examples of different center-body regions: (a) Center-body used in [7]. (b-e) use 2/3, 1/2, 1/3, and 1/4 of the detecting window to define the center- body region, respectively. matching number. This method also diminishes false alarms occurring when more than two subjects are gathered in a window and resulting a human-like shape between the two pedestrians. However, this filtering method is too naïve and does not work well when the background subtraction result is not robust. In this work, we modified the filtering step in order to find more reliable pedestrian candidates for further template matching by considering both the ratio and the distribution trend of foreground pixels inside the detecting window. In the method proposed in [7], the center-body region (as shown in Fig. 3(a)) was determined according to the head width of the template, and the template matching step will not be applied to the window having few foreground pixels inside the center-body region. Unfortunately, as shown in Fig. 2, the head width of the generated templates might be quite small such that the center- body region would be too narrow for providing discriminative foreground ratio information. We defined the center-body region in different ways (as shown in Fig. 3(b)-(e)), and empirically found that if the width of the detecting window is 𝑤, then using the middle 𝑤 3⁄ area of the detecting window as the center-body region would result in better accuracy. The horizontal/vertical foreground distribution trend inside the detecting window is also an important clue for candidate filtering. As shown in Fig. 4, we horizontally divided the detecting window into 10 equal regions and computed the foreground ratio in each bin. Fig. 4(a)-(c) show the horizontal foreground distribution trend of a real pedestrian. Fig. 4(d)-(f) show that even though a detecting window might have many foreground pixels inside the center-body region because it contains many human parts from multiple pedestrians, we can still distinguish it from real humans according to the foreground distribution trend. Compared to the filtering method described in [7], our method took an additional step to calculate the foreground distribution trend. It is worth noting that the additional step did not increase the overall detection time because it significantly reduced the number of candidates for the template matching procedure. C. Short-term Tracking After frame-by-frame detection, we further applied a short term tracking process to smoothen the detection results. We defined 30 consecutive frames as a tracking unit, and maintained several tracking lists for each tracking unit. The lists were used to record the detected pedestrians from different frames. If two Background Substraction [7] Candidate Filtering Edge Integral Image Computation [7] Template Generation [7] Input Video Output Video Detection Phase Training Phase Template Matching [7] Non-maximum Suppression [7] Tracking 1/4 w Detecting Window Filter Template Hu’s 2/3 w 1/2 w 1/3 w (e)(a) (b) (c) (d) w
  • 3. IT in Industry, vol. 3, no. 2, 2015 Published online 14-Sep-2015 ISSN (Print): 2204-0595 Copyright © Authors 35 ISSN (Online): 2203-1731 Fig. 4. The concept of foreground distribution trend. (a) and (d) show the content of a pedestrian and a non-pedestrian region, respectively. (b) and (e) show the foreground pixels in (a) and (d), respectively. (c) and (f) show the foreground distribution trend of (b) and (e), respectively. pedestrians in adjacent frames are close and have similar appearances, we put them into the same tracking list. The appearance similarity was defined based on the chi-squared distance of the LAB color histogram. As shown in Fig. 5 the pedestrian in tracking list (b) is lost in some frames due to occlusions. In this case, we interpolate missing detections if the number of consecutive null nodes is less than three. Also, shadows may cause false detections and result in rather short tracking lists such as the list show in Fig. 5 (c). In this case, we simply delete lists shorter than 10 (frames). III. EXPERIMENT RESULTS The CAVIAR database [10] is a benchmark for human detection evaluation. We utilized a video named as ‘OneStopMoveEnter1cor’ to perform our detection algorithm The specification of this video and our experimental environment are listed in Table 1. Fig. 5. The process of establishing tracking lists. TABLE I. SPECIFICATION OF VIDEO AND EXPERIMENT ENVIRONMENT Specification of Video Frame Rate 25 fps Frame Resolution 384 x 288 pixels Specification of Experiment Environment CPU Core-i5 (use only dual core) Graphic Card NVIDIA GeForce GT 630M Some example results of the proposed pedestrian detection method is shown in Fig. 6 below. In the experiment, the background subtraction step spends a few seconds in learning background information. Hence, the video sequence from frame 201 to 1,588 are used for accuracy evaluation. We exclude the pedestrian object visibility less than 50% in the evaluation process. In total there are 11,149 pedestrians in 1,588 frames. The detected pedestrian was considered as a true positive if it matches the ground truth by the following criterion: max ( 𝐴 𝐴𝑁𝐷 𝐴 𝐺𝑇 , 𝐴 𝐴𝑁𝐷 𝐴 𝐷𝑅 ) > 0.5 ( 1 ) where 𝐴 𝐺𝑇 and 𝐴 𝐷𝑅 are the area of ground truth and the detected pedestrian, respectively. 𝐴 𝐴𝑁𝐷 denotes the overlapping area between 𝐴 𝐺𝑇 and 𝐴 𝐷𝑅. We first investigated into the effect of applying different definitions of center-body region, including method [7], the middle 2𝑤 3⁄ area of the detecting window, the middle 𝑤 2⁄ area of the detecting window, the middle 𝑤 3⁄ area of the detecting window, and the middle 𝑤 4⁄ area of the detecting window. As shown in Figure 7, using the middle 𝑤 3⁄ area of the detecting window to construct the center-body region resulted in better performances. The recall increased approx. 3% and the precision increased approx. 0.7% compared to method [7]. We further evaluated the effectiveness of the proposed candidate filtering method, which included a center-body-based foreground ratio filter and a foreground distribution trend filter. On average, adding the foreground distribution trend filter increased the precision by 3% and decreased the recall by less than 1%. If we further apply the short-term tracking process, the deletion mechanism can minimize the misjudgment of detected pedestrians, and the interpolation mechanism can recover some Fig. 6. The demo of our proposed pedestrian detection system. 128pixels 47 pixels 1 2 3 { ... 9 10 (a) (b) (c) (d) 70pixels 54 pixels (e) (f) Frame TrackingList 1 2 3 a b c … 29 30 … … … NULL NULL NULL
  • 4. IT in Industry, vol. 3, no. 2, 2015 Published online 14-Sep-2015 ISSN (Print): 2204-0595 Copyright © Authors 36 ISSN (Online): 2203-1731 Fig. 7. The PR curve of the proposed pedestrian detection method using different center-body region definitions. Fig. 8. The P-R curves of the proposed pedestrian detection method with using the best filtering size, foreground distribution trend filter and deletion/interpolation of our tracking algorithm. Results show that our method achieves higher precision and recall than method [7]. missing pedestrians. Fig. 8 shows that comparing to method [7], our proposed pedestrian detection method successfully increases the precision and recall by 5.1% and 3.6%, respectively. Moreover, comparing with the HOG method built in OpenCV, our method has a much higher recall with the same precision. Fig. 9 shows the computation cost of applying different candidate filtering methods to detect pedestrians in one frame. For each method, the scanning step of the detecting window is 2 pixels, and a GPU is applied in the edge detection step. Since template matching is a procedure that can be independently conducted in each detecting window Ix,y, we can apply parallel programming techniques and utilize multi-core CPUs to achieve real-time detection. No matter we use [7] or our proposed definition of center-body region, adding the foreground distribution trend filter reduced the number of candidates for template matching, and consequently reduced the overall pedestrian detection time by about 2ms per frame. The overall Fig. 9. Different filter size effect on execution time of detecting a frame. execution time of our method is 56.02ms per frame, which is lower than that of the method proposed in [7]. IV. CONCLUSIONS We propose a real-time pedestrian detection method for crowded environments based on contour and motion information. Sparse contour templates of human shapes were first generated on the basis of the PDM, and humans were detected by the template matching step. We took the ratio and distribution trend of foreground pixels inside each detecting window into consideration to reduce the detecting time complexity and improve the detection accuracy. A tracking method was further applied to deal with the short-term occlusions and noisy false alarms. In the experiment, we verified the proposed method in a crowded environment. The results show that comparing to method [7], the precision and recall of our method are improved (from 0.78% to 81%, and 83% to 87%, respectively). Moreover, the execution time of the proposed pedestrian detection method was almost the same as method [7] even though we had to additionally calculate the foreground distribution trend. In addition, we observed that the shadow of pedestrians would still be an issue that led to low precision rates even after applying the short-term tracking step. Hence, in the future we will apply shadow removal techniques to obtain more accurate foreground information. We will also design a more general method to determine the size of detecting window at each position in the frame. ACKNOWLEDGEMENT This work is partially supported in part by National Science Council of the Republic of China under Grant No. NSC101- 2221-E-006-148-MY3, and Research Center for Energy Technology and Strategy, National Cheng Kung University. REFERENCES [1] P. Dollar, C. Wojek, B. Schiele and P. Perona, "Pedestrian detection: an evaluation of the state of the art," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 34, no. 4, pp. 743–761, 2012. [2] R. Benenson, M. Omran, J. Hosang and B. Schiele, "Ten years of pedestrian detection, what have we learned?," in Proceedings of the European Conference on Computer Vision, CVRSUAD Workshop, Zurich, 2014, pp. 613–627. [3] J. Yan, X. Zhang, Z. Lei, S. Liao and S. Li, "Robust multi-resolution pedestrian detection in traffic scenes," in Proceedings of the 2013 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Portland, OR, 2013, pp. 3033–3040. [4] P.-T. Huang, Y.-M. Chan, L.-C. Fu, S.-S. Huang, P.-Y. Hsiao, W.-Y. Wu, C.-C. Lin, K.-C. Chang and P.-M. Hsu, "An image-range fusion pedestrian detection system in low illumination conditions," in
  • 5. IT in Industry, vol. 3, no. 2, 2015 Published online 14-Sep-2015 ISSN (Print): 2204-0595 Copyright © Authors 37 ISSN (Online): 2203-1731 Proceedings of the IPPR Conference on Computer Vision, Graphics, and Image Processing, Taiwan, 2014. [5] W.-J. Liao, C.-W. Lin, C.-S. Chen and Y.-P. Hung, "Combining spatiotemporal background modeling and random forest classifier for foreground segmentation and shadow removal," in Proceedings of the IPPR Conference on Computer Vision, Graphics, and Image Processing, Taiwan, 2014. [6] S. Tang, M. Andriluka, A. Milan, K. Schindler and S. R. a. B. Schiele, "Learning people detectors for tracking in crowded scenes," in Proceedings of the IEEE International Conference on Computer Vision, Sydney, NSW, 2013, pp. 1049–1056. [7] M.-C. Hu, W.-H. Cheng, C.-S. Hu, J.-L. Wu and J.-W. Li, "Efficient human detection in crowded environment," Multimedia Systems, pp. 1– 11, 2014. [8] T. F. Cootes, C. J. Taylor, D. H. Cooper and J. Graham, "Active shape models—their training and application," Computer Vision and Image Understanding, vol. 61, no. 1, pp. 38–59, 1995. [9] C. Beleznai and H. Bischof, "Fast human detection in crowded scenes by contour integration and local shape estimation," in Proceedings of the IEEE Computer Vision and Pattern Recognition, Miami, FL, 2009, pp. 2246–2253. [10] R. Fisher, "Caviar dataset," [Online]. Available: http://homepages.inf.ed.ac.uk/rbf/CAVIAR/.