SlideShare a Scribd company logo
International Journal of Computer Applications Technology and Research
Volume 2– Issue 6, 708 - 713, 2013

Occlusion and Abandoned Object Detection for
Surveillance Applications
M. Chitra
RVS college of Engineering
and Technology
Karaikal, India

M.Kalaiselvi Geetha
Annamalai University
Chidambaram, India

L.Menaka
RVS college of Engineering
and Technology
Karaikal, India

Abstract: Object detection is an important step in any video analysis. Difficulties of the object detection are finding hidden objects
and finding unrecognized objects. Although many algorithms have been developed to avoid them as outliers, occlusion boundaries
could potentially provide useful information about the scene’s structure and composition. A novel framework for blob based occluded
object detection is proposed. A technique that can be used to detect occlusion is presented. It detects and tracks the occluded objects in
video sequences captured by a fixed camera in crowded environment with occlusions. Initially the background subtraction is modeled
by a Mixture of Gaussians technique (MOG). Pedestrians are detected using the pedestrian detector by computing the Histogram of
Oriented Gradients descriptors (HOG), using a linear Support Vector Machine (SVM) as the classifier. In this work, a recognition and
tracking system is built to detect the abandoned objects in the public transportation area such as train stations, airports etc. Several
experiments were conducted to demonstrate the effectiveness of the proposed approach. The results show the robustness and
effectiveness of the proposed method.
Keyword: Occlusion, Histograms of Oriented Gradients descriptors, Support Vector Machine, mixture of Gaussians techniques, Blob,
abandoned object.

1. INTRODUCTION
Surveillance is monitoring the behavior, activities for the
purpose of influencing, managing, directing, or protecting.
One of the main advantages of video surveillance is that it
could be used both as a preventive mechanism and a forensic
tool for crimes. Unfortunately, constant surveillance of public
domains is challenging and labor-intensive. Therefore,
improved automated abandoned object detection and
occlusion detection systems are increasingly in demand.

(a). Occluded frame

(b). Abandoned object

Figure. 1 Occluded and abandoned frames

Robustness of object detection is affected by occlusion in the
presence of multiple objects. Occlusion is the hiding of an
object by another during multiple object tracking. In video
sequences Fig 1(a), occlusions create several challenges to the
tracking algorithm. The task of reliable detection and tracking
of multiple objects becomes highly complex for crowded
scenarios. The detection of suspicious object is one of the
most important task in video surveillance. Suspicious objects
are generally unattended packages left in public places. This
work aims to detect occlusions and abandoned object
detection which captures most of the researches working in
video surveillance. Object detection in monocular image
sequences still suffers from a lack of robustness due to
temporary occlusions, objects crossing and changing lighting
conditions.
Abandoned objects are detected by difference image. An
example for occluded scene and abandoned object/baggage is
shown in Fig. 1(b).

www.ijcat.com

The rest of the paper is arranged as follows: Section 2
discusses a few approaches explored by other researchers to
solve the problem. Section 3 explains the technical details of
our method, Section 4. Section 5 wraps up the paper with an
experimental result and conclusion of this paper.

2. RELATED WORKS
Although many algorithms have been proposed in the
literature, the problem of multiple interacting objects tracking
in complex scene is still open. Methods to solve the occlusion
problem in multiple interacting objects tracking have been
previously presented in [8, 12, 15, 16]. Sensor based
occlusion tracking methods [8, 18] cannot handle the
difference between moving and nonmoving obstacles. In
general, solutions to both pedestrian and vehicle occlusion
problems extend from spatial to temporal domains can be
broadly classified into many types. Some types like active
contour –based [2], stereo vision-based, region based, model
based [16], feature based [12] are also seen in the literature.
Object tracking in [17] overcome occlusion by fusing multiple
camera inputs, but it cannot handle complete occlusion.

708
International Journal of Computer Applications Technology and Research
Volume 2– Issue 6, 708 - 713, 2013
Several methods using color, texture and motion [13, 14, 19].
[14] Performs robust tracking that deals some instances of
occlusion but it cannot handle illumination changes.
Histograms of Oriented Gradients (HOG) and Local Binary
Pattern (LBP) [9] are used to detect partial occlusion but it
cannot handle the articulated deformation of people. Multicue model widely used in tracking and detection systems [14]
has achieved considerable success in object tracking because
of its simplicity and robustness. However, color features
cannot give good performance when an object and its
background have the similar colors. Contour-based object
detection and recognition method proposed in [2, 4]. [7,10]
uses filter based detection and tracking.
Most of the proposed techniques for abandoned object
detection rely on tracking information [24, 25] to detect dropoff events, while fusing information from multiple cameras.
As stated by Porikli [26], these methods are not well suited to
complex environments like scenes involving crowds and large
amounts of occlusion. Stauffer and Grimson [27] present an
event detection module that classifies objects, including
abandoned objects, using a neural network, but is limited to
detecting only one abandoned object at a time. In [28] a multicamera video surveillance system is proposed to detect the
owner of each abandoned object is determined and tracked
using distance and time constraints and multiple cameras with
overlapping fields of view are exploited to cope with
occlusion of various types.

3. OCCLUSION AND ABANDONED
OBJECT DETECTION
3.1 Occlusion Detection
Manual surveillance requires the system to be monitored by
personnel and is expensive and inconvenient. Hence, efforts
have been put into automatic surveillance. One of the main
components of automatic video surveillance is detecting
occluded objects. Fig.2 shows the proposed system
architecture for occlusion detection.
Occlusion is the main cause for performance degradation in
surveillance systems. Under occlusion, the objects will
become overlapped and may be found moving together in a
scene. Occlusion can be of three types. Self occlusion, interobject occlusion, background occlusion. The goal of our work
is to develop a general framework to detect and track objects
with persistent and occasional heavy occlusion. Background
subtraction is carried out by a mixture of Gaussians
techniques (MOG) is in Fig.3. Blob detection for detecting
occluded object is carried out in OpenCV. Multiple occluded
object detection involves computing the Histogram of
Oriented Gradients descriptors (HOG) and linear Support
Vector Machine (SVM) as a classifier.

Figure. 2 Occlusion detection

Figure. 3 Mixture of Gaussians algorithms

Model the values of a particular pixel as a mixture of
Gaussians. We determine which Gaussians may correspond
to background colors-Based on the persistence and the
variance of each of the Gaussians [23]. Pixel values that do
not fit the background distributions are considered foreground
until there is a Gaussian that includes them. Update the
Gaussians. Pixel values that do not match one of the pixel's
―background‖ Gaussians are grouped using connected
components.
Background modeling - constructs a reference image
representing the background.
Threshold selection- determines appropriate threshold values
used in the subtraction operation to obtain a desired detection
rate.
Pixel classification - classifies the type of a given pixel, i.e.,
the pixel is the part of background (including ordinary
background and shaded background), or it is a moving object.

3.1.1 Mixture of Gaussian Algorithm(MOG)
Pixelprocesses–
{X1,…….,XT} = {I(x0, y0, i): 1≤ i ≤ t},
Where, I- image sequence, t- time, {x0,y0}- the history of
pixels.
Figure. 4 Background subtraction using MOG

www.ijcat.com

709
International Journal of Computer Applications Technology and Research
Volume 2– Issue 6, 708 - 713, 2013
3.1.2 Blob Detection
Once the background subtraction is done with MOG, each
foreground object is detected as a blob. Each module is
applied on a bi-level image obtained though a mixture of
Gaussian background subtraction and some basic filtering
performed. Using OpenCV [22]. A tracked blob is considered
to be occluded if its major region is covered by foreground
and it should continue to be tracked if either it is occluded or
its area and centroid is matched with any of the blobs. When
two objects pass close to each other, they are detected as a
single blob. Fig.5 shows the blob detection.
Often, one object will become occluded by the other one. One
of the challenging problems is to maintain correct labeling of
each object after they split again. Fig.6 demonstrates the blob
merging and splitting at the time of occlusion.

of each gradient sample rotated relative to key point
orientation.

Image gradients
Key point descriptor
Figure. 7 Histograms of Oriented Gradients

For normalization process all blocks are typically
overlapped and rotation invariance. It is typically combined
with SVM classifier.

3.1.4 SVM Classifier

Figure. 5 Blob Detection and Tracking

The Support Vector Machine classifier is a binary classifier
which looks for an optimal hyper plane as a decision function.
Once trained on images containing some particular object, the
SVM [20] classifier can make decisions regarding pedestrians.
SVM is based on the principle of structural risk minimization.
For linearly separable data, SVM finds the separating hyper
plane which separates the data within the largest margin. For,
linearly inseparable data, it maps the data in the input space
into high dimension feature space x € Iı—>Φ(x) € H With
kernel function Φ(x) , to find the separating hyper plane.
SVM was originally developed for two class classification
problems. The N class classification problem can be solved
using N SVMs. Each SVM separates a single class from all
the remaining classes (One-vs.-rest approach).Given a set of
frames corresponding to N classed for training, N SVMs are
trained. Each SVM is trained to distinguish a class and other
classes in the training set. During testing, the class label y of a
class x can be determined using:

y=
Where, dn (x) = max{di (x)}N i=1, and di(x) is the distance
from x to the SVM hyper plane corresponding to frame i,
the Classification threshold is t, and the class label y=0 stands
for unknown.
Figure. 6 Blob Merging and splitting at the time of occlusion

3.1.3 Histogram of Oriented Gradients descriptors
(HOG)
Histograms of Oriented Gradients (HOG) are feature
descriptors used in computer vision and image processing for
the purpose of object detection. The technique counts
occurrences of gradient orientation in localized portions of an
image. This method is similar to that of edge orientation
histograms, but differs in that it is computed on a dense grid
of uniformly spaced cells and uses overlapping local contrast
normalization for improved accuracy. Fig.7 shows orientation

www.ijcat.com

Figure. 8 Blob Optimal separating hyper plane and margin for a two
dimensional feature space

710
International Journal of Computer Applications Technology and Research
Volume 2– Issue 6, 708 - 713, 2013

3.2 Abandoned Object Detection

4. EXPERIMENTAL RESULTS

The detection of suspicious (dangerous) object is one of the
most important task in video surveillance. An abandoned
object not belonging to the background scene and remaining
in the same position for a long time. Our system for
abandoned object detection was designed to assist operators
surveilling indoor environments, such as airports, railway, or
metro stations etc. Fig 9 shows the abandoned object
detection.

Experiments were carried out on a PC with Intel IV cores
2.67GHz processor with C++ and the OpenCV library. The
above approaches are implemented and experiments are
performed on video clips freely available and PETS 2006 .The
detection rate of proposed methods are shown in Table 1. The
video data are processed at 20fps, and 320x240 resolution.
We present some snapshots for occlusion detection and
abandoned object detection in Fig.13, 14.

4.1 Occlusion detection
4.1.1 Occlusion degree and detection rate
The occlusion degree is calculated by the number of moving
pedestrians and moving vehicles present in the frame with
occlusion. For example if a video sequence contains 10
pedestrians, in which 5 pedestrians are occluded with each
other, then the calculated occlusion degree is 50 %. More than
10 persons is considered as high, more than 5 as medium less
than 5 as low occlusion degree. The occlusion rate is
compared with the ground truth information.Fig.11 represents
the graphical representation of occlusion detection.

4.1.2 Ground truth method
The ground-truth data allows us to do a quantitative
comparison between occlusion detection method and
the facts that are confirmed in an actual field. The ground
truth method calculation is carried out manually.
Table 1. Detection rate of proposed method

Figure. 9 Abandoned Object Detection

Occlusion degree (%)
Detection rate
Ground truth method

High
80
90

medium
90.3
95

low
91.2
100

3.2.1 Difference Image
The difference image is defined as the residual image that
results from subtracting the scenes at two consecutive time
instants from each other. Difference images capture target
motion in the scene and can be used for target tracking. Fig.
10 illustrates the basic idea behind difference images. Fig.
10(a), 10(b) show a scene with moving targets at two
consecutive time instants. Fig. 10(c) shows the difference
image resulting from subtracting the two image frames.

Figure. 11 Graphical reprsentation of our detection rate.

4.2 Abandoned Object Detection
4.2.1 Intensity Calculation of Difference Image

(a)

(b)

(c)

The intensity of the difference images are taken as an input to
the SVM classifier.
Fig. 12 shows the graphical
representation of difference images intensity values of 346
difference images from the abandoned object dataset.

Figure. 10 (a). Image x1 at time instance t1 (b). Image x2 at time
instance t2, and (c). Difference image.

www.ijcat.com

711
International Journal of Computer Applications Technology and Research
Volume 2– Issue 6, 708 - 713, 2013

Table 2. Data set for abandoned object detection

S.NO

Dataset or video name

Video length

1

Abandoned object

59

Figure. 13 (b). Occlusion detetion in frame 1 at video 10
Figure. 13 Occlusion detection in random frame number.

Video 1

3

30

PETS 2006

2

60

(a) Frame differencing done with first and 4th frame

(b) Frame differencing done with first and 12th frame

Figure. 12 Intensity values of the difference image in abandoned
object detection

4.2.2 Results with SVM Classifier
The Support Vector Machine classifier is a binary classifier
which looks for an optimal hyper plane as a decision function.
Once trained on images containing some particular object, the
SVM classifier can make decisions regarding the presence of
an object, such as a human being. Classification results using
quadratic discriminant analysis were found to be quite
accurate. A training set of 60 cases, where 30 of them belong
to one class - bag, and the rest belong to the second class non-bag(people) is used. Using a test set of 50 cases, gave us
an accuracy of 91%. Fig. 28 shows the SVM training and
testing.

(c)Frame differencing done with first and 18th frame

(d) Frame differencing done with first and 26th frame.
Figure. 14 Abandoned object detection using frame differencing
at frame 4, 12, 18, 26.

5. CONCLUSION

Figure. 13 (a). Occlusion detetion in frame 1 at video 4

www.ijcat.com

This research work will lay a stepping stone for the further
developments of the automatic object tracking system in a
secured area. A real-time multiple occluded objects detection
and abandoned object detection system is presented.
Experiments on complex indoor and outdoor environments
show that the system can deal with difficult situations such as
ghosts and illumination changes. Moreover, it can track
multiple objects with long-duration and complete occlusion.
While the system is highly computationally cost effective and

712
International Journal of Computer Applications Technology and Research
Volume 2– Issue 6, 708 - 713, 2013
accurate. The testing results which are based on different
scenarios have proved that our approach can be successfully
applied in real world surveillance applications. Future work
includes extending multiple camera view occlusion detection
and abandoned object detection.

6. REFERENCES
[1] Pallavi S. Bangare, Nilesh J. Uke, Sunil L. Bangare, ― An
Approach for Detecting Abandoned Object from Real Time
Video‖, International Journal of Engineering Research and
Applications (IJERA), Vol. 2, Issue 3, 2012.
[2] Geo Guo,Ting Tiang, Yizhou wang and Wen Gao,
―Recovering missing Contours for occluded Object
detection‖, IEEE Signal processing letters, Vol.19,No.8, Aug
2012.
[3] A.A.shafie,M.H Ali,Fadhlan Hafiz and Rosilizer M.Ali,
―Smart video Surveillance System for Vehicle Detection and
traffic Flow control‖, Journal of Engineering Science and
technology, Vol. 6, No. 4, 2011.
[4] Tianyang Ma and Longin Jan Latecki, ―From Partial
Shape Matching through Local Deformation to Robust Global
Shape Similarity for Object Detection‖, CPVR 2011.
[5] Manmohan Singh Rawat, Varun N.S, Vinotha S.R,
―Occlusion Detection and Handling In Video Surveillance‖,
2011 International Conference on Future Information
Technology, IPCSIT vol. 13 2011.
[6] Kung –Chung Lee,Anand Oka, Emmanual Pollakis and
Lutz Lampe, ― A Comparison between unscented Kalman
filtering and Particle filtering for RSII-BasedTracking,‖
Positioning Navigation and Communication (WPNC), 2010.
[7] Breitenstein, M.D., Reichlin, F., Leibe, B., Koller-Meier,
E., Van Gool,L., ‖ Robust tracking-by-detection using a
detector confidence particle filter‖,
IEEE International
Conference on Computer Vision ,2009.

[14] Valtteri Takala and Matti Pietik¨ainen, ―Multi-Object
Tracking Using Color, Texture and Motion‖, IEEE Trans on.
Image Processing, 2007.
[15] Tao Yang, Stan Z.Li, Quan Pan, Jing Li, ―Real-time
Multiple Objects Tracking with Occlusion Handling in
Dynamic Scenes‖, Foundation of National Laboratory of
Pattern Recognition and National Natural Science Foundation
of China (60172037) , 2005.
[16] Clement Chun Cheong Pang, William Wai Leung Lam,
Nelson Han Ching Yung, ―A Novel method for Resolving
vehicle occlusion in a monocular Traffic-Images Sequences‖,
IEEE Transaction on Intelligent Transportation systems, Vol.
5, no. 3, sep 2004.
[17] Tao Zhao, Ram Nevatia ―Tracking Multiple Humans in
Crowded Environment‖, IEEE Computer Society Conference
on Computer Vision and Pattern Recognition (CVPR’04)
[18] MichaelBramberger, RomanPflugfelder, BernhardRinner,
Helmet Schwabach and Bernhard Strobl, ―Intelligent Traffic
Video Sensor : Architecture and Applications‖, IEEE 2003.
[19] P.Perez, C.Hue, J.Vermaak, and M.Gangnet ―ColorBased Probabilistic Tracking‖, A. Heyden et al. (Eds.): ECCV
2002, LNCS 2350, pp. 661–675, 2002.
[20] Navneet Dalal and Bill Triggs, ―Histograms of Oriented
Gradients for Human Detection‖,IEEE Computer Society
Conference on Computer Vision and Pattern Recognition,
2005.
[21] Asbjørn Berge, ―INF 5300 Video Analysis Detecting
motion‖, SINTEF.
[22] http://mateuszstankiewicz.eu/?p=189
[23] P. KaewTraKulPong, R. Bowden, ―An Improved
Adaptive Background Mixture Model for Realtime Tracking
with Shadow Detection‖, In Proc. 2nd European Workshop on
Advanced Video Based Surveillance Systems, AVBS01. Sept
2001.

[8] Michael S. Darms, Paul E. Rybski, Christopher Baker, and
Chris Urmson, ―Obstacle Detection and Tracking for the
Urban Challenge‖, IEEE Transaction on Intelligent
Transportation systems,Vol. 10, No. 3, Sep 2009.

[24] S. Guler, J. A. Silverstein, and I. H. Pushee, ―Stationary
Objects in Multiple Object Tracking‖, IEEE International
Conference on Advanced Video and Signal-Based
Surveillance, London , UK , Sep 2007.

[9] Xiaoyu Wang, Tony X. Han, Shuicheng Yan, ―An HOGLBP Human Detector with Partial Occlusion Handling‖,
Computer Vision, IEEE 12th International Conference, 2009.

[25] J. M. del Rincn, J. E. Herrero-Jaraba, J. R. Gomez, and
C. Orrite Urunuela, ―Automatic left luggage detection and
tracking using multi cameras,‖ in PETS, 2006, pp. 59–66.

[10] Junliang Xing, Haizhou Ai, Shihong Lao,―Multi-object
tracking through occlusions by localtracklets filtering
and global tracklets association with detection responses‖,
Computer Vision and Pattern Recognition, 2009. CVPR
2009.

[26] F. Porikli, Y. Ivanov, and T. Haga, Robust Abandoned
Object detection Using Dual Foregrounds, EURASIP Journal
on Advances in Signal Processing, Vol. 2008, Hindawi
Publishing Corporation.

[11]
Dollar, P., Wojek, C. ., Schiele, B. , Perona,
P. ,―Pedestrian detection: A benchmark‖, Computer Vision
and Pattern Recognition, . CVPR 2009.

[27] Stauffer, C., Grimson, W.E.L.: Learning patterns of
activity using real-time tracking. IEEE Trans. Pattern Anal.
Mach. Intell. (PAMI) 22(8), 747–757 2000

[12] Pang, C.C.C. ; Lam, W.W.L. ; Yung, N.H.C. , ―A
Method for Vehicle Count in the Presence of MultipleVehicle Occlusions in Traffic Images‖, IEEE Transactions on
Intelligent Transportation Systems, Sept. 2007.
[13] Junqiu WANG and Yasushi YAGI, ―Integrating Color
and Shape-Texture Features for Adaptive Real-time Object
Tracking‖, IEEE Trans on. Image Processing, 2007.

www.ijcat.com

[28] M.D.Beynon, D.J.Van Hook, M.Seibert, A.Peacock,
D.Dudgeon ―Detecting Abandoned Packages in a Multicamera Video Surveillance System‖ IEEE Conference on
Advanced Video and Signal Based Surveillance (AVSS'03)
July 21 - 22, 2003 Miami, Florida P. 221.

713

More Related Content

What's hot

Image Segmentation using Otsu's Method - Computer Graphics (UCS505) Project PPT
Image Segmentation using Otsu's Method - Computer Graphics (UCS505) Project PPTImage Segmentation using Otsu's Method - Computer Graphics (UCS505) Project PPT
Image Segmentation using Otsu's Method - Computer Graphics (UCS505) Project PPT
Akshit Arora
 
YOLOv4: optimal speed and accuracy of object detection review
YOLOv4: optimal speed and accuracy of object detection reviewYOLOv4: optimal speed and accuracy of object detection review
YOLOv4: optimal speed and accuracy of object detection review
LEE HOSEONG
 
You only look once: Unified, real-time object detection (UPC Reading Group)
You only look once: Unified, real-time object detection (UPC Reading Group)You only look once: Unified, real-time object detection (UPC Reading Group)
You only look once: Unified, real-time object detection (UPC Reading Group)
Universitat Politècnica de Catalunya
 
Object detection
Object detectionObject detection
Object detection
ROUSHAN RAJ KUMAR
 
Image segmentation
Image segmentationImage segmentation
Image segmentationDeepak Kumar
 
You only look once
You only look onceYou only look once
You only look once
Gin Kyeng Lee
 
A Brief History of Object Detection / Tommi Kerola
A Brief History of Object Detection / Tommi KerolaA Brief History of Object Detection / Tommi Kerola
A Brief History of Object Detection / Tommi Kerola
Preferred Networks
 
Object tracking presentation
Object tracking  presentationObject tracking  presentation
Object tracking presentation
MrsShwetaBanait1
 
You Only Look Once: Unified, Real-Time Object Detection
You Only Look Once: Unified, Real-Time Object DetectionYou Only Look Once: Unified, Real-Time Object Detection
You Only Look Once: Unified, Real-Time Object Detection
DADAJONJURAKUZIEV
 
Yolov3
Yolov3Yolov3
Yolov3
SHREY MOHAN
 
Real Time Object Dectection using machine learning
Real Time Object Dectection using machine learningReal Time Object Dectection using machine learning
Real Time Object Dectection using machine learning
pratik pratyay
 
Machine Learning - Convolutional Neural Network
Machine Learning - Convolutional Neural NetworkMachine Learning - Convolutional Neural Network
Machine Learning - Convolutional Neural Network
Richard Kuo
 
Introduction to object detection
Introduction to object detectionIntroduction to object detection
Introduction to object detection
Brodmann17
 
Single Image Super Resolution Overview
Single Image Super Resolution OverviewSingle Image Super Resolution Overview
Single Image Super Resolution Overview
LEE HOSEONG
 
Machine Learning - Object Detection and Classification
Machine Learning - Object Detection and ClassificationMachine Learning - Object Detection and Classification
Machine Learning - Object Detection and Classification
Vikas Jain
 
Deep learning for 3-D Scene Reconstruction and Modeling
Deep learning for 3-D Scene Reconstruction and Modeling Deep learning for 3-D Scene Reconstruction and Modeling
Deep learning for 3-D Scene Reconstruction and Modeling
Yu Huang
 
Visual Object Tracking: review
Visual Object Tracking: reviewVisual Object Tracking: review
Visual Object Tracking: review
Dmytro Mishkin
 
Action Recognition (Thesis presentation)
Action Recognition (Thesis presentation)Action Recognition (Thesis presentation)
Action Recognition (Thesis presentation)nikhilus85
 
Object detection
Object detectionObject detection
Object detection
Jksuryawanshi
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
Kuppusamy P
 

What's hot (20)

Image Segmentation using Otsu's Method - Computer Graphics (UCS505) Project PPT
Image Segmentation using Otsu's Method - Computer Graphics (UCS505) Project PPTImage Segmentation using Otsu's Method - Computer Graphics (UCS505) Project PPT
Image Segmentation using Otsu's Method - Computer Graphics (UCS505) Project PPT
 
YOLOv4: optimal speed and accuracy of object detection review
YOLOv4: optimal speed and accuracy of object detection reviewYOLOv4: optimal speed and accuracy of object detection review
YOLOv4: optimal speed and accuracy of object detection review
 
You only look once: Unified, real-time object detection (UPC Reading Group)
You only look once: Unified, real-time object detection (UPC Reading Group)You only look once: Unified, real-time object detection (UPC Reading Group)
You only look once: Unified, real-time object detection (UPC Reading Group)
 
Object detection
Object detectionObject detection
Object detection
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
 
You only look once
You only look onceYou only look once
You only look once
 
A Brief History of Object Detection / Tommi Kerola
A Brief History of Object Detection / Tommi KerolaA Brief History of Object Detection / Tommi Kerola
A Brief History of Object Detection / Tommi Kerola
 
Object tracking presentation
Object tracking  presentationObject tracking  presentation
Object tracking presentation
 
You Only Look Once: Unified, Real-Time Object Detection
You Only Look Once: Unified, Real-Time Object DetectionYou Only Look Once: Unified, Real-Time Object Detection
You Only Look Once: Unified, Real-Time Object Detection
 
Yolov3
Yolov3Yolov3
Yolov3
 
Real Time Object Dectection using machine learning
Real Time Object Dectection using machine learningReal Time Object Dectection using machine learning
Real Time Object Dectection using machine learning
 
Machine Learning - Convolutional Neural Network
Machine Learning - Convolutional Neural NetworkMachine Learning - Convolutional Neural Network
Machine Learning - Convolutional Neural Network
 
Introduction to object detection
Introduction to object detectionIntroduction to object detection
Introduction to object detection
 
Single Image Super Resolution Overview
Single Image Super Resolution OverviewSingle Image Super Resolution Overview
Single Image Super Resolution Overview
 
Machine Learning - Object Detection and Classification
Machine Learning - Object Detection and ClassificationMachine Learning - Object Detection and Classification
Machine Learning - Object Detection and Classification
 
Deep learning for 3-D Scene Reconstruction and Modeling
Deep learning for 3-D Scene Reconstruction and Modeling Deep learning for 3-D Scene Reconstruction and Modeling
Deep learning for 3-D Scene Reconstruction and Modeling
 
Visual Object Tracking: review
Visual Object Tracking: reviewVisual Object Tracking: review
Visual Object Tracking: review
 
Action Recognition (Thesis presentation)
Action Recognition (Thesis presentation)Action Recognition (Thesis presentation)
Action Recognition (Thesis presentation)
 
Object detection
Object detectionObject detection
Object detection
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
 

Viewers also liked

Cctv presentation
Cctv presentationCctv presentation
Cctv presentation
Mostafa Salah
 
Object detection
Object detectionObject detection
Object detection
Somesh Vyas
 
Object Detection & Tracking
Object Detection & TrackingObject Detection & Tracking
Object Detection & Tracking
Akshay Gujarathi
 
Major Project Final powerpoint
Major Project Final powerpointMajor Project Final powerpoint
Major Project Final powerpointRachel Donley
 
Object tracking
Object trackingObject tracking
Object tracking
Sri vidhya k
 
Real time image processing ppt
Real time image processing pptReal time image processing ppt
Real time image processing ppt
ashwini.jagdhane
 

Viewers also liked (6)

Cctv presentation
Cctv presentationCctv presentation
Cctv presentation
 
Object detection
Object detectionObject detection
Object detection
 
Object Detection & Tracking
Object Detection & TrackingObject Detection & Tracking
Object Detection & Tracking
 
Major Project Final powerpoint
Major Project Final powerpointMajor Project Final powerpoint
Major Project Final powerpoint
 
Object tracking
Object trackingObject tracking
Object tracking
 
Real time image processing ppt
Real time image processing pptReal time image processing ppt
Real time image processing ppt
 

Similar to Occlusion and Abandoned Object Detection for Surveillance Applications

An optimized framework for detection and tracking of video objects in challen...
An optimized framework for detection and tracking of video objects in challen...An optimized framework for detection and tracking of video objects in challen...
An optimized framework for detection and tracking of video objects in challen...
ijma
 
Q180305116119
Q180305116119Q180305116119
Q180305116119
IOSR Journals
 
Proposed Multi-object Tracking Algorithm Using Sobel Edge Detection operator
Proposed Multi-object Tracking Algorithm Using Sobel Edge Detection operatorProposed Multi-object Tracking Algorithm Using Sobel Edge Detection operator
Proposed Multi-object Tracking Algorithm Using Sobel Edge Detection operator
QUESTJOURNAL
 
MULTIPLE OBJECTS TRACKING IN SURVEILLANCE VIDEO USING COLOR AND HU MOMENTS
MULTIPLE OBJECTS TRACKING IN SURVEILLANCE VIDEO USING COLOR AND HU MOMENTSMULTIPLE OBJECTS TRACKING IN SURVEILLANCE VIDEO USING COLOR AND HU MOMENTS
MULTIPLE OBJECTS TRACKING IN SURVEILLANCE VIDEO USING COLOR AND HU MOMENTS
sipij
 
26.motion and feature based person tracking
26.motion and feature based person tracking26.motion and feature based person tracking
26.motion and feature based person trackingsajit1975
 
Detection and Tracking of Objects: A Detailed Study
Detection and Tracking of Objects: A Detailed StudyDetection and Tracking of Objects: A Detailed Study
Detection and Tracking of Objects: A Detailed Study
IJEACS
 
Object Detection and Tracking AI Robot
Object Detection and Tracking AI RobotObject Detection and Tracking AI Robot
Object Detection and Tracking AI Robot
IRJET Journal
 
A Critical Survey on Detection of Object and Tracking of Object With differen...
A Critical Survey on Detection of Object and Tracking of Object With differen...A Critical Survey on Detection of Object and Tracking of Object With differen...
A Critical Survey on Detection of Object and Tracking of Object With differen...
Editor IJMTER
 
ppt - of a project will help you on your college projects
ppt - of a project will help you on your college projectsppt - of a project will help you on your college projects
ppt - of a project will help you on your college projects
vikaspandey0702
 
VIDEO SEGMENTATION FOR MOVING OBJECT DETECTION USING LOCAL CHANGE & ENTROPY B...
VIDEO SEGMENTATION FOR MOVING OBJECT DETECTION USING LOCAL CHANGE & ENTROPY B...VIDEO SEGMENTATION FOR MOVING OBJECT DETECTION USING LOCAL CHANGE & ENTROPY B...
VIDEO SEGMENTATION FOR MOVING OBJECT DETECTION USING LOCAL CHANGE & ENTROPY B...
csandit
 
Real Time Object Identification for Intelligent Video Surveillance Applications
Real Time Object Identification for Intelligent Video Surveillance ApplicationsReal Time Object Identification for Intelligent Video Surveillance Applications
Real Time Object Identification for Intelligent Video Surveillance Applications
Editor IJCATR
 
Java Implementation based Heterogeneous Video Sequence Automated Surveillance...
Java Implementation based Heterogeneous Video Sequence Automated Surveillance...Java Implementation based Heterogeneous Video Sequence Automated Surveillance...
Java Implementation based Heterogeneous Video Sequence Automated Surveillance...
CSCJournals
 
Survey on video object detection & tracking
Survey on video object detection & trackingSurvey on video object detection & tracking
Survey on video object detection & tracking
ijctet
 
Paper id 25201468
Paper id 25201468Paper id 25201468
Paper id 25201468IJRAT
 
DEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEM
DEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEMDEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEM
DEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEM
IJMIT JOURNAL
 
An Object Detection, Tracking And Parametric Classification– A Review
An Object Detection, Tracking And Parametric Classification– A ReviewAn Object Detection, Tracking And Parametric Classification– A Review
An Object Detection, Tracking And Parametric Classification– A Review
IRJET Journal
 
Analysis of Human Behavior Based On Centroid and Treading Track
Analysis of Human Behavior Based On Centroid and Treading  TrackAnalysis of Human Behavior Based On Centroid and Treading  Track
Analysis of Human Behavior Based On Centroid and Treading Track
IJMER
 
[IJET-V1I6P15] Authors : Sadhana Raut, Poonam Rohani,Sumera Shaikh, Tehesin S...
[IJET-V1I6P15] Authors : Sadhana Raut, Poonam Rohani,Sumera Shaikh, Tehesin S...[IJET-V1I6P15] Authors : Sadhana Raut, Poonam Rohani,Sumera Shaikh, Tehesin S...
[IJET-V1I6P15] Authors : Sadhana Raut, Poonam Rohani,Sumera Shaikh, Tehesin S...
IJET - International Journal of Engineering and Techniques
 
[IJET-V1I3P20] Authors:Prof. D.S.Patil, Miss. R.B.Khanderay, Prof.Teena Padvi.
[IJET-V1I3P20] Authors:Prof. D.S.Patil, Miss. R.B.Khanderay, Prof.Teena Padvi.[IJET-V1I3P20] Authors:Prof. D.S.Patil, Miss. R.B.Khanderay, Prof.Teena Padvi.
[IJET-V1I3P20] Authors:Prof. D.S.Patil, Miss. R.B.Khanderay, Prof.Teena Padvi.
IJET - International Journal of Engineering and Techniques
 
Csit3916
Csit3916Csit3916
Csit3916
TejashwiniSG
 

Similar to Occlusion and Abandoned Object Detection for Surveillance Applications (20)

An optimized framework for detection and tracking of video objects in challen...
An optimized framework for detection and tracking of video objects in challen...An optimized framework for detection and tracking of video objects in challen...
An optimized framework for detection and tracking of video objects in challen...
 
Q180305116119
Q180305116119Q180305116119
Q180305116119
 
Proposed Multi-object Tracking Algorithm Using Sobel Edge Detection operator
Proposed Multi-object Tracking Algorithm Using Sobel Edge Detection operatorProposed Multi-object Tracking Algorithm Using Sobel Edge Detection operator
Proposed Multi-object Tracking Algorithm Using Sobel Edge Detection operator
 
MULTIPLE OBJECTS TRACKING IN SURVEILLANCE VIDEO USING COLOR AND HU MOMENTS
MULTIPLE OBJECTS TRACKING IN SURVEILLANCE VIDEO USING COLOR AND HU MOMENTSMULTIPLE OBJECTS TRACKING IN SURVEILLANCE VIDEO USING COLOR AND HU MOMENTS
MULTIPLE OBJECTS TRACKING IN SURVEILLANCE VIDEO USING COLOR AND HU MOMENTS
 
26.motion and feature based person tracking
26.motion and feature based person tracking26.motion and feature based person tracking
26.motion and feature based person tracking
 
Detection and Tracking of Objects: A Detailed Study
Detection and Tracking of Objects: A Detailed StudyDetection and Tracking of Objects: A Detailed Study
Detection and Tracking of Objects: A Detailed Study
 
Object Detection and Tracking AI Robot
Object Detection and Tracking AI RobotObject Detection and Tracking AI Robot
Object Detection and Tracking AI Robot
 
A Critical Survey on Detection of Object and Tracking of Object With differen...
A Critical Survey on Detection of Object and Tracking of Object With differen...A Critical Survey on Detection of Object and Tracking of Object With differen...
A Critical Survey on Detection of Object and Tracking of Object With differen...
 
ppt - of a project will help you on your college projects
ppt - of a project will help you on your college projectsppt - of a project will help you on your college projects
ppt - of a project will help you on your college projects
 
VIDEO SEGMENTATION FOR MOVING OBJECT DETECTION USING LOCAL CHANGE & ENTROPY B...
VIDEO SEGMENTATION FOR MOVING OBJECT DETECTION USING LOCAL CHANGE & ENTROPY B...VIDEO SEGMENTATION FOR MOVING OBJECT DETECTION USING LOCAL CHANGE & ENTROPY B...
VIDEO SEGMENTATION FOR MOVING OBJECT DETECTION USING LOCAL CHANGE & ENTROPY B...
 
Real Time Object Identification for Intelligent Video Surveillance Applications
Real Time Object Identification for Intelligent Video Surveillance ApplicationsReal Time Object Identification for Intelligent Video Surveillance Applications
Real Time Object Identification for Intelligent Video Surveillance Applications
 
Java Implementation based Heterogeneous Video Sequence Automated Surveillance...
Java Implementation based Heterogeneous Video Sequence Automated Surveillance...Java Implementation based Heterogeneous Video Sequence Automated Surveillance...
Java Implementation based Heterogeneous Video Sequence Automated Surveillance...
 
Survey on video object detection & tracking
Survey on video object detection & trackingSurvey on video object detection & tracking
Survey on video object detection & tracking
 
Paper id 25201468
Paper id 25201468Paper id 25201468
Paper id 25201468
 
DEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEM
DEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEMDEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEM
DEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEM
 
An Object Detection, Tracking And Parametric Classification– A Review
An Object Detection, Tracking And Parametric Classification– A ReviewAn Object Detection, Tracking And Parametric Classification– A Review
An Object Detection, Tracking And Parametric Classification– A Review
 
Analysis of Human Behavior Based On Centroid and Treading Track
Analysis of Human Behavior Based On Centroid and Treading  TrackAnalysis of Human Behavior Based On Centroid and Treading  Track
Analysis of Human Behavior Based On Centroid and Treading Track
 
[IJET-V1I6P15] Authors : Sadhana Raut, Poonam Rohani,Sumera Shaikh, Tehesin S...
[IJET-V1I6P15] Authors : Sadhana Raut, Poonam Rohani,Sumera Shaikh, Tehesin S...[IJET-V1I6P15] Authors : Sadhana Raut, Poonam Rohani,Sumera Shaikh, Tehesin S...
[IJET-V1I6P15] Authors : Sadhana Raut, Poonam Rohani,Sumera Shaikh, Tehesin S...
 
[IJET-V1I3P20] Authors:Prof. D.S.Patil, Miss. R.B.Khanderay, Prof.Teena Padvi.
[IJET-V1I3P20] Authors:Prof. D.S.Patil, Miss. R.B.Khanderay, Prof.Teena Padvi.[IJET-V1I3P20] Authors:Prof. D.S.Patil, Miss. R.B.Khanderay, Prof.Teena Padvi.
[IJET-V1I3P20] Authors:Prof. D.S.Patil, Miss. R.B.Khanderay, Prof.Teena Padvi.
 
Csit3916
Csit3916Csit3916
Csit3916
 

More from Editor IJCATR

Text Mining in Digital Libraries using OKAPI BM25 Model
 Text Mining in Digital Libraries using OKAPI BM25 Model Text Mining in Digital Libraries using OKAPI BM25 Model
Text Mining in Digital Libraries using OKAPI BM25 Model
Editor IJCATR
 
Green Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendlyGreen Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendly
Editor IJCATR
 
Policies for Green Computing and E-Waste in Nigeria
 Policies for Green Computing and E-Waste in Nigeria Policies for Green Computing and E-Waste in Nigeria
Policies for Green Computing and E-Waste in Nigeria
Editor IJCATR
 
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Editor IJCATR
 
Optimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation ConditionsOptimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation Conditions
Editor IJCATR
 
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Editor IJCATR
 
Web Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source SiteWeb Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source Site
Editor IJCATR
 
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
 Evaluating Semantic Similarity between Biomedical Concepts/Classes through S... Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
Editor IJCATR
 
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
 Semantic Similarity Measures between Terms in the Biomedical Domain within f... Semantic Similarity Measures between Terms in the Biomedical Domain within f...
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
Editor IJCATR
 
A Strategy for Improving the Performance of Small Files in Openstack Swift
 A Strategy for Improving the Performance of Small Files in Openstack Swift  A Strategy for Improving the Performance of Small Files in Openstack Swift
A Strategy for Improving the Performance of Small Files in Openstack Swift
Editor IJCATR
 
Integrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and RegistrationIntegrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and Registration
Editor IJCATR
 
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
 Assessment of the Efficiency of Customer Order Management System: A Case Stu... Assessment of the Efficiency of Customer Order Management System: A Case Stu...
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
Editor IJCATR
 
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Editor IJCATR
 
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Editor IJCATR
 
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Editor IJCATR
 
Hangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector MachineHangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector Machine
Editor IJCATR
 
Application of 3D Printing in Education
Application of 3D Printing in EducationApplication of 3D Printing in Education
Application of 3D Printing in Education
Editor IJCATR
 
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Editor IJCATR
 
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Editor IJCATR
 
Decay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsDecay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable Coefficients
Editor IJCATR
 

More from Editor IJCATR (20)

Text Mining in Digital Libraries using OKAPI BM25 Model
 Text Mining in Digital Libraries using OKAPI BM25 Model Text Mining in Digital Libraries using OKAPI BM25 Model
Text Mining in Digital Libraries using OKAPI BM25 Model
 
Green Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendlyGreen Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendly
 
Policies for Green Computing and E-Waste in Nigeria
 Policies for Green Computing and E-Waste in Nigeria Policies for Green Computing and E-Waste in Nigeria
Policies for Green Computing and E-Waste in Nigeria
 
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
 
Optimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation ConditionsOptimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation Conditions
 
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
 
Web Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source SiteWeb Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source Site
 
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
 Evaluating Semantic Similarity between Biomedical Concepts/Classes through S... Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
 
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
 Semantic Similarity Measures between Terms in the Biomedical Domain within f... Semantic Similarity Measures between Terms in the Biomedical Domain within f...
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
 
A Strategy for Improving the Performance of Small Files in Openstack Swift
 A Strategy for Improving the Performance of Small Files in Openstack Swift  A Strategy for Improving the Performance of Small Files in Openstack Swift
A Strategy for Improving the Performance of Small Files in Openstack Swift
 
Integrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and RegistrationIntegrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and Registration
 
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
 Assessment of the Efficiency of Customer Order Management System: A Case Stu... Assessment of the Efficiency of Customer Order Management System: A Case Stu...
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
 
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
 
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
 
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
 
Hangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector MachineHangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector Machine
 
Application of 3D Printing in Education
Application of 3D Printing in EducationApplication of 3D Printing in Education
Application of 3D Printing in Education
 
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
 
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
 
Decay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsDecay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable Coefficients
 

Recently uploaded

Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 

Recently uploaded (20)

Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 

Occlusion and Abandoned Object Detection for Surveillance Applications

  • 1. International Journal of Computer Applications Technology and Research Volume 2– Issue 6, 708 - 713, 2013 Occlusion and Abandoned Object Detection for Surveillance Applications M. Chitra RVS college of Engineering and Technology Karaikal, India M.Kalaiselvi Geetha Annamalai University Chidambaram, India L.Menaka RVS college of Engineering and Technology Karaikal, India Abstract: Object detection is an important step in any video analysis. Difficulties of the object detection are finding hidden objects and finding unrecognized objects. Although many algorithms have been developed to avoid them as outliers, occlusion boundaries could potentially provide useful information about the scene’s structure and composition. A novel framework for blob based occluded object detection is proposed. A technique that can be used to detect occlusion is presented. It detects and tracks the occluded objects in video sequences captured by a fixed camera in crowded environment with occlusions. Initially the background subtraction is modeled by a Mixture of Gaussians technique (MOG). Pedestrians are detected using the pedestrian detector by computing the Histogram of Oriented Gradients descriptors (HOG), using a linear Support Vector Machine (SVM) as the classifier. In this work, a recognition and tracking system is built to detect the abandoned objects in the public transportation area such as train stations, airports etc. Several experiments were conducted to demonstrate the effectiveness of the proposed approach. The results show the robustness and effectiveness of the proposed method. Keyword: Occlusion, Histograms of Oriented Gradients descriptors, Support Vector Machine, mixture of Gaussians techniques, Blob, abandoned object. 1. INTRODUCTION Surveillance is monitoring the behavior, activities for the purpose of influencing, managing, directing, or protecting. One of the main advantages of video surveillance is that it could be used both as a preventive mechanism and a forensic tool for crimes. Unfortunately, constant surveillance of public domains is challenging and labor-intensive. Therefore, improved automated abandoned object detection and occlusion detection systems are increasingly in demand. (a). Occluded frame (b). Abandoned object Figure. 1 Occluded and abandoned frames Robustness of object detection is affected by occlusion in the presence of multiple objects. Occlusion is the hiding of an object by another during multiple object tracking. In video sequences Fig 1(a), occlusions create several challenges to the tracking algorithm. The task of reliable detection and tracking of multiple objects becomes highly complex for crowded scenarios. The detection of suspicious object is one of the most important task in video surveillance. Suspicious objects are generally unattended packages left in public places. This work aims to detect occlusions and abandoned object detection which captures most of the researches working in video surveillance. Object detection in monocular image sequences still suffers from a lack of robustness due to temporary occlusions, objects crossing and changing lighting conditions. Abandoned objects are detected by difference image. An example for occluded scene and abandoned object/baggage is shown in Fig. 1(b). www.ijcat.com The rest of the paper is arranged as follows: Section 2 discusses a few approaches explored by other researchers to solve the problem. Section 3 explains the technical details of our method, Section 4. Section 5 wraps up the paper with an experimental result and conclusion of this paper. 2. RELATED WORKS Although many algorithms have been proposed in the literature, the problem of multiple interacting objects tracking in complex scene is still open. Methods to solve the occlusion problem in multiple interacting objects tracking have been previously presented in [8, 12, 15, 16]. Sensor based occlusion tracking methods [8, 18] cannot handle the difference between moving and nonmoving obstacles. In general, solutions to both pedestrian and vehicle occlusion problems extend from spatial to temporal domains can be broadly classified into many types. Some types like active contour –based [2], stereo vision-based, region based, model based [16], feature based [12] are also seen in the literature. Object tracking in [17] overcome occlusion by fusing multiple camera inputs, but it cannot handle complete occlusion. 708
  • 2. International Journal of Computer Applications Technology and Research Volume 2– Issue 6, 708 - 713, 2013 Several methods using color, texture and motion [13, 14, 19]. [14] Performs robust tracking that deals some instances of occlusion but it cannot handle illumination changes. Histograms of Oriented Gradients (HOG) and Local Binary Pattern (LBP) [9] are used to detect partial occlusion but it cannot handle the articulated deformation of people. Multicue model widely used in tracking and detection systems [14] has achieved considerable success in object tracking because of its simplicity and robustness. However, color features cannot give good performance when an object and its background have the similar colors. Contour-based object detection and recognition method proposed in [2, 4]. [7,10] uses filter based detection and tracking. Most of the proposed techniques for abandoned object detection rely on tracking information [24, 25] to detect dropoff events, while fusing information from multiple cameras. As stated by Porikli [26], these methods are not well suited to complex environments like scenes involving crowds and large amounts of occlusion. Stauffer and Grimson [27] present an event detection module that classifies objects, including abandoned objects, using a neural network, but is limited to detecting only one abandoned object at a time. In [28] a multicamera video surveillance system is proposed to detect the owner of each abandoned object is determined and tracked using distance and time constraints and multiple cameras with overlapping fields of view are exploited to cope with occlusion of various types. 3. OCCLUSION AND ABANDONED OBJECT DETECTION 3.1 Occlusion Detection Manual surveillance requires the system to be monitored by personnel and is expensive and inconvenient. Hence, efforts have been put into automatic surveillance. One of the main components of automatic video surveillance is detecting occluded objects. Fig.2 shows the proposed system architecture for occlusion detection. Occlusion is the main cause for performance degradation in surveillance systems. Under occlusion, the objects will become overlapped and may be found moving together in a scene. Occlusion can be of three types. Self occlusion, interobject occlusion, background occlusion. The goal of our work is to develop a general framework to detect and track objects with persistent and occasional heavy occlusion. Background subtraction is carried out by a mixture of Gaussians techniques (MOG) is in Fig.3. Blob detection for detecting occluded object is carried out in OpenCV. Multiple occluded object detection involves computing the Histogram of Oriented Gradients descriptors (HOG) and linear Support Vector Machine (SVM) as a classifier. Figure. 2 Occlusion detection Figure. 3 Mixture of Gaussians algorithms Model the values of a particular pixel as a mixture of Gaussians. We determine which Gaussians may correspond to background colors-Based on the persistence and the variance of each of the Gaussians [23]. Pixel values that do not fit the background distributions are considered foreground until there is a Gaussian that includes them. Update the Gaussians. Pixel values that do not match one of the pixel's ―background‖ Gaussians are grouped using connected components. Background modeling - constructs a reference image representing the background. Threshold selection- determines appropriate threshold values used in the subtraction operation to obtain a desired detection rate. Pixel classification - classifies the type of a given pixel, i.e., the pixel is the part of background (including ordinary background and shaded background), or it is a moving object. 3.1.1 Mixture of Gaussian Algorithm(MOG) Pixelprocesses– {X1,…….,XT} = {I(x0, y0, i): 1≤ i ≤ t}, Where, I- image sequence, t- time, {x0,y0}- the history of pixels. Figure. 4 Background subtraction using MOG www.ijcat.com 709
  • 3. International Journal of Computer Applications Technology and Research Volume 2– Issue 6, 708 - 713, 2013 3.1.2 Blob Detection Once the background subtraction is done with MOG, each foreground object is detected as a blob. Each module is applied on a bi-level image obtained though a mixture of Gaussian background subtraction and some basic filtering performed. Using OpenCV [22]. A tracked blob is considered to be occluded if its major region is covered by foreground and it should continue to be tracked if either it is occluded or its area and centroid is matched with any of the blobs. When two objects pass close to each other, they are detected as a single blob. Fig.5 shows the blob detection. Often, one object will become occluded by the other one. One of the challenging problems is to maintain correct labeling of each object after they split again. Fig.6 demonstrates the blob merging and splitting at the time of occlusion. of each gradient sample rotated relative to key point orientation. Image gradients Key point descriptor Figure. 7 Histograms of Oriented Gradients For normalization process all blocks are typically overlapped and rotation invariance. It is typically combined with SVM classifier. 3.1.4 SVM Classifier Figure. 5 Blob Detection and Tracking The Support Vector Machine classifier is a binary classifier which looks for an optimal hyper plane as a decision function. Once trained on images containing some particular object, the SVM [20] classifier can make decisions regarding pedestrians. SVM is based on the principle of structural risk minimization. For linearly separable data, SVM finds the separating hyper plane which separates the data within the largest margin. For, linearly inseparable data, it maps the data in the input space into high dimension feature space x € Iı—>Φ(x) € H With kernel function Φ(x) , to find the separating hyper plane. SVM was originally developed for two class classification problems. The N class classification problem can be solved using N SVMs. Each SVM separates a single class from all the remaining classes (One-vs.-rest approach).Given a set of frames corresponding to N classed for training, N SVMs are trained. Each SVM is trained to distinguish a class and other classes in the training set. During testing, the class label y of a class x can be determined using: y= Where, dn (x) = max{di (x)}N i=1, and di(x) is the distance from x to the SVM hyper plane corresponding to frame i, the Classification threshold is t, and the class label y=0 stands for unknown. Figure. 6 Blob Merging and splitting at the time of occlusion 3.1.3 Histogram of Oriented Gradients descriptors (HOG) Histograms of Oriented Gradients (HOG) are feature descriptors used in computer vision and image processing for the purpose of object detection. The technique counts occurrences of gradient orientation in localized portions of an image. This method is similar to that of edge orientation histograms, but differs in that it is computed on a dense grid of uniformly spaced cells and uses overlapping local contrast normalization for improved accuracy. Fig.7 shows orientation www.ijcat.com Figure. 8 Blob Optimal separating hyper plane and margin for a two dimensional feature space 710
  • 4. International Journal of Computer Applications Technology and Research Volume 2– Issue 6, 708 - 713, 2013 3.2 Abandoned Object Detection 4. EXPERIMENTAL RESULTS The detection of suspicious (dangerous) object is one of the most important task in video surveillance. An abandoned object not belonging to the background scene and remaining in the same position for a long time. Our system for abandoned object detection was designed to assist operators surveilling indoor environments, such as airports, railway, or metro stations etc. Fig 9 shows the abandoned object detection. Experiments were carried out on a PC with Intel IV cores 2.67GHz processor with C++ and the OpenCV library. The above approaches are implemented and experiments are performed on video clips freely available and PETS 2006 .The detection rate of proposed methods are shown in Table 1. The video data are processed at 20fps, and 320x240 resolution. We present some snapshots for occlusion detection and abandoned object detection in Fig.13, 14. 4.1 Occlusion detection 4.1.1 Occlusion degree and detection rate The occlusion degree is calculated by the number of moving pedestrians and moving vehicles present in the frame with occlusion. For example if a video sequence contains 10 pedestrians, in which 5 pedestrians are occluded with each other, then the calculated occlusion degree is 50 %. More than 10 persons is considered as high, more than 5 as medium less than 5 as low occlusion degree. The occlusion rate is compared with the ground truth information.Fig.11 represents the graphical representation of occlusion detection. 4.1.2 Ground truth method The ground-truth data allows us to do a quantitative comparison between occlusion detection method and the facts that are confirmed in an actual field. The ground truth method calculation is carried out manually. Table 1. Detection rate of proposed method Figure. 9 Abandoned Object Detection Occlusion degree (%) Detection rate Ground truth method High 80 90 medium 90.3 95 low 91.2 100 3.2.1 Difference Image The difference image is defined as the residual image that results from subtracting the scenes at two consecutive time instants from each other. Difference images capture target motion in the scene and can be used for target tracking. Fig. 10 illustrates the basic idea behind difference images. Fig. 10(a), 10(b) show a scene with moving targets at two consecutive time instants. Fig. 10(c) shows the difference image resulting from subtracting the two image frames. Figure. 11 Graphical reprsentation of our detection rate. 4.2 Abandoned Object Detection 4.2.1 Intensity Calculation of Difference Image (a) (b) (c) The intensity of the difference images are taken as an input to the SVM classifier. Fig. 12 shows the graphical representation of difference images intensity values of 346 difference images from the abandoned object dataset. Figure. 10 (a). Image x1 at time instance t1 (b). Image x2 at time instance t2, and (c). Difference image. www.ijcat.com 711
  • 5. International Journal of Computer Applications Technology and Research Volume 2– Issue 6, 708 - 713, 2013 Table 2. Data set for abandoned object detection S.NO Dataset or video name Video length 1 Abandoned object 59 Figure. 13 (b). Occlusion detetion in frame 1 at video 10 Figure. 13 Occlusion detection in random frame number. Video 1 3 30 PETS 2006 2 60 (a) Frame differencing done with first and 4th frame (b) Frame differencing done with first and 12th frame Figure. 12 Intensity values of the difference image in abandoned object detection 4.2.2 Results with SVM Classifier The Support Vector Machine classifier is a binary classifier which looks for an optimal hyper plane as a decision function. Once trained on images containing some particular object, the SVM classifier can make decisions regarding the presence of an object, such as a human being. Classification results using quadratic discriminant analysis were found to be quite accurate. A training set of 60 cases, where 30 of them belong to one class - bag, and the rest belong to the second class non-bag(people) is used. Using a test set of 50 cases, gave us an accuracy of 91%. Fig. 28 shows the SVM training and testing. (c)Frame differencing done with first and 18th frame (d) Frame differencing done with first and 26th frame. Figure. 14 Abandoned object detection using frame differencing at frame 4, 12, 18, 26. 5. CONCLUSION Figure. 13 (a). Occlusion detetion in frame 1 at video 4 www.ijcat.com This research work will lay a stepping stone for the further developments of the automatic object tracking system in a secured area. A real-time multiple occluded objects detection and abandoned object detection system is presented. Experiments on complex indoor and outdoor environments show that the system can deal with difficult situations such as ghosts and illumination changes. Moreover, it can track multiple objects with long-duration and complete occlusion. While the system is highly computationally cost effective and 712
  • 6. International Journal of Computer Applications Technology and Research Volume 2– Issue 6, 708 - 713, 2013 accurate. The testing results which are based on different scenarios have proved that our approach can be successfully applied in real world surveillance applications. Future work includes extending multiple camera view occlusion detection and abandoned object detection. 6. REFERENCES [1] Pallavi S. Bangare, Nilesh J. Uke, Sunil L. Bangare, ― An Approach for Detecting Abandoned Object from Real Time Video‖, International Journal of Engineering Research and Applications (IJERA), Vol. 2, Issue 3, 2012. [2] Geo Guo,Ting Tiang, Yizhou wang and Wen Gao, ―Recovering missing Contours for occluded Object detection‖, IEEE Signal processing letters, Vol.19,No.8, Aug 2012. [3] A.A.shafie,M.H Ali,Fadhlan Hafiz and Rosilizer M.Ali, ―Smart video Surveillance System for Vehicle Detection and traffic Flow control‖, Journal of Engineering Science and technology, Vol. 6, No. 4, 2011. [4] Tianyang Ma and Longin Jan Latecki, ―From Partial Shape Matching through Local Deformation to Robust Global Shape Similarity for Object Detection‖, CPVR 2011. [5] Manmohan Singh Rawat, Varun N.S, Vinotha S.R, ―Occlusion Detection and Handling In Video Surveillance‖, 2011 International Conference on Future Information Technology, IPCSIT vol. 13 2011. [6] Kung –Chung Lee,Anand Oka, Emmanual Pollakis and Lutz Lampe, ― A Comparison between unscented Kalman filtering and Particle filtering for RSII-BasedTracking,‖ Positioning Navigation and Communication (WPNC), 2010. [7] Breitenstein, M.D., Reichlin, F., Leibe, B., Koller-Meier, E., Van Gool,L., ‖ Robust tracking-by-detection using a detector confidence particle filter‖, IEEE International Conference on Computer Vision ,2009. [14] Valtteri Takala and Matti Pietik¨ainen, ―Multi-Object Tracking Using Color, Texture and Motion‖, IEEE Trans on. Image Processing, 2007. [15] Tao Yang, Stan Z.Li, Quan Pan, Jing Li, ―Real-time Multiple Objects Tracking with Occlusion Handling in Dynamic Scenes‖, Foundation of National Laboratory of Pattern Recognition and National Natural Science Foundation of China (60172037) , 2005. [16] Clement Chun Cheong Pang, William Wai Leung Lam, Nelson Han Ching Yung, ―A Novel method for Resolving vehicle occlusion in a monocular Traffic-Images Sequences‖, IEEE Transaction on Intelligent Transportation systems, Vol. 5, no. 3, sep 2004. [17] Tao Zhao, Ram Nevatia ―Tracking Multiple Humans in Crowded Environment‖, IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR’04) [18] MichaelBramberger, RomanPflugfelder, BernhardRinner, Helmet Schwabach and Bernhard Strobl, ―Intelligent Traffic Video Sensor : Architecture and Applications‖, IEEE 2003. [19] P.Perez, C.Hue, J.Vermaak, and M.Gangnet ―ColorBased Probabilistic Tracking‖, A. Heyden et al. (Eds.): ECCV 2002, LNCS 2350, pp. 661–675, 2002. [20] Navneet Dalal and Bill Triggs, ―Histograms of Oriented Gradients for Human Detection‖,IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2005. [21] Asbjørn Berge, ―INF 5300 Video Analysis Detecting motion‖, SINTEF. [22] http://mateuszstankiewicz.eu/?p=189 [23] P. KaewTraKulPong, R. Bowden, ―An Improved Adaptive Background Mixture Model for Realtime Tracking with Shadow Detection‖, In Proc. 2nd European Workshop on Advanced Video Based Surveillance Systems, AVBS01. Sept 2001. [8] Michael S. Darms, Paul E. Rybski, Christopher Baker, and Chris Urmson, ―Obstacle Detection and Tracking for the Urban Challenge‖, IEEE Transaction on Intelligent Transportation systems,Vol. 10, No. 3, Sep 2009. [24] S. Guler, J. A. Silverstein, and I. H. Pushee, ―Stationary Objects in Multiple Object Tracking‖, IEEE International Conference on Advanced Video and Signal-Based Surveillance, London , UK , Sep 2007. [9] Xiaoyu Wang, Tony X. Han, Shuicheng Yan, ―An HOGLBP Human Detector with Partial Occlusion Handling‖, Computer Vision, IEEE 12th International Conference, 2009. [25] J. M. del Rincn, J. E. Herrero-Jaraba, J. R. Gomez, and C. Orrite Urunuela, ―Automatic left luggage detection and tracking using multi cameras,‖ in PETS, 2006, pp. 59–66. [10] Junliang Xing, Haizhou Ai, Shihong Lao,―Multi-object tracking through occlusions by localtracklets filtering and global tracklets association with detection responses‖, Computer Vision and Pattern Recognition, 2009. CVPR 2009. [26] F. Porikli, Y. Ivanov, and T. Haga, Robust Abandoned Object detection Using Dual Foregrounds, EURASIP Journal on Advances in Signal Processing, Vol. 2008, Hindawi Publishing Corporation. [11] Dollar, P., Wojek, C. ., Schiele, B. , Perona, P. ,―Pedestrian detection: A benchmark‖, Computer Vision and Pattern Recognition, . CVPR 2009. [27] Stauffer, C., Grimson, W.E.L.: Learning patterns of activity using real-time tracking. IEEE Trans. Pattern Anal. Mach. Intell. (PAMI) 22(8), 747–757 2000 [12] Pang, C.C.C. ; Lam, W.W.L. ; Yung, N.H.C. , ―A Method for Vehicle Count in the Presence of MultipleVehicle Occlusions in Traffic Images‖, IEEE Transactions on Intelligent Transportation Systems, Sept. 2007. [13] Junqiu WANG and Yasushi YAGI, ―Integrating Color and Shape-Texture Features for Adaptive Real-time Object Tracking‖, IEEE Trans on. Image Processing, 2007. www.ijcat.com [28] M.D.Beynon, D.J.Van Hook, M.Seibert, A.Peacock, D.Dudgeon ―Detecting Abandoned Packages in a Multicamera Video Surveillance System‖ IEEE Conference on Advanced Video and Signal Based Surveillance (AVSS'03) July 21 - 22, 2003 Miami, Florida P. 221. 713