SlideShare a Scribd company logo
1 of 7
Download to read offline
International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.2, April 2014
DOI:10.5121/ijcsa.2014.4206 49
Implementation And Performance Evaluation Of
Background Subtraction Algorithms
Mr. Deepjoy Das and Dr. Sarat Saharia
Department of Computer Science & Engineering, Tezpur University, Assam, India
ABSTRACT
The study evaluates three background subtraction techniques. The techniques ranges from very basic
algorithm to state of the art published techniques categorized based on speed, memory requirements and
accuracy. Such a review can effectively guide the designer to select the most suitable method for a given
application in a principled way. The algorithms used in the study ranges from varying levels of accuracy
and computational complexity. Few of them can also deal with real time challenges like rain, snow, hails,
swaying branches, objects overlapping, varying light intensity or slow moving objects.
KEYWORDS
Background subtraction, background removal, shadow detection, background mixture model.
1. INTRODUCTION
Background subtraction is basically detecting moving objects in videos using static cameras. The
basic idea in the approach is detecting the moving objects from the difference between the current
frame and a reference frame, which is called “background image” or “background model”. The
background image must be good enough to represent the scene with no moving objects and be
regularly updated so that it adapt to the varying luminance conditions and geometry settings. Poor
background image may result in poor background subtraction results, because it is to be
subtracted with the current image to obtain the final result.
Processing a video stream to segment foreground objects from the background is a critical first
step in many computer vision applications. The popularity of background subtraction algorithms
largely comes from its computational efficiency, which allows applications such as human
computer interaction, video surveillance and traffic monitoring to meet their real-time goals.
Many different methods have been proposed over the recent years. Some of them are currently
used in the CCTV detection application by the defense personals these different techniques varies
in computational speed, memory requirements and accuracy basically.
There are many challenges faced during examining some of the techniques. Some of the
challenges are shadows, wind causing cluttered areas. Traditional methods of background
subtraction fails, if introduced with moving objects, reflections, illumination changes, Noise e.g.
camera movement, object overlapping in the visual field, slow moving objects, objects being
introduced or removed from the scene, movements through one or more above mentioned
challenges and may produce inappropriate results. Robust, subtraction techniques are flexible
enough to handle variations in lighting, moving scene clutter, multiple moving objects and other
International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.2, April 2014
50
arbitrary changes to the observed scene. Such techniques are called real time background
subtraction techniques.
2. BACKGROUND SUBTRACTION ALGORITHMS
We have implemented three background subtraction algorithms ranging from very basic strategy
used to state of art techniques published. Some simple approaches aims to maximize speed and
limits the memory requirements which produce a low accurate output such as the “frame
difference” method [1] and other sophisticated approaches [2] [3] [5] aims to achieve the highest
possible accuracy under possible circumstances.
2.1 FRAME DIFFERENCE TECHNIQUE THEORY [1]
Frame difference is the simplest form of background subtraction. The current frame is simply
subtracted from the previous frame, and if the difference in pixel values for a given pixel is
greater than a threshold hT then the pixel is considered part of the foreground [4].
hii Tframeframe >− −1
The estimated background is just the previous frame and it is very sensitive to the threshold hT .
Advantages of this method are it is a lowest computation speed of all the methods, background
model is highly adaptive. Which means, this method adapt changes in the background faster than
any other methods, since background is just the previous frame (precisely 1/fps). Disadvantages
of this method are objects produced with uniformly distributed intensity values (such as the side
of a car); the interior pixels can be interpreted as part of the background, objects must be
continuously moving. If an object stays still for more than a frame period (1/fps), it becomes part
of the background. This is an error.
The frame difference method also subtracts out background noise (such as waving trees), much
better than the more complex approximate median and mixture of Gaussians methods A
Challenge with this method is determining the threshold value. The result depends on threshold
values thus each different video depends on different thresholds.
2.2 REAL TIME BACKGROUND SUBTRACTION AND SHADOW DETECTION
TECHNIQUE THEORY [2]
The algorithms for real time background subtraction and shadow detection technique is published
by T Horprasert, et al in the paper entitled “A statistical approach for real-time robust background
subtraction and shadow detection” [2]. We briefly describe the method published in the paper by
T Horprasert, et al [2]. This method is used for color image which has RGB components. A
pixeli in the image )](),(),([ iii BGRi  = [2] represent the pixel's expected RGB color value
in the background and )](),(),([ iii BGRi  = [2] denote the pixel's RGB color value in a
current image that is to be subtracted from the background. The main aims is to measure the
distortion of i from i which is done by breaking down the distortion into two parts, namely
the brightness distortion [ 2
)()( iiii  −= ] [2] and chromaticity distortion
[ iiii  −=∂ ] [2].Where i represents the pixel's strength of brightness with respect to the
International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.2, April 2014
51
expected value. i = 1 if the brightness of the given pixel in the current image is the same as in
the reference image. i < 1 if it is darker, and i > 1 if it becomes brighter than the expected
brightness. By applying suitable threshold on the brightness distortion )( i and chromatic
distortion i∂ , we can distinguish the pixels as follows: original background (B) if it has both
brightness and chromaticity similar to those of the same pixel in the background image.
Shadow (S) if it has similar chromaticity but lower brightness than those of the same pixel in the
background image.
2.3 ADAPTIVE BACKGROUND MIXTURE MODEL FOR REAL TIME
TRACKING TECHNIQUE THEORY [3]
The algorithms for adaptive background mixture model for real time tracking technique is
published by Stauffer, et al. in the paper entitled “Adaptive background mixture models for real-
time tracking." [3]. we briefly describe the method mentioned in the paper by Stauffer, at al [3].
At first we need to know about pixel process. A pixel process of pixel M is the values from
frame 1 to framet also represented as { }...,...1 tj MMM where tj ≤≤1 . The probability of
observing a pixel M at frame j denoted by ∑=
Σ×=
K
j
tjtjttjj MwMP
1
,,, ),,()(  [3], where,
 is the Gaussian probability density function
)()(
2
1
,,
1
2
1
),,(
tt
T
tt MM
n
tjtjt eM



−Σ−− −
Σ
=Σ ,
tj, and tj,Σ are the mean and co-variance matrix of the th
j Gaussian in the mixture at time j
respectively. K is the no. of Gaussians in the mixture (proportional to memory available and
computational power needed, usual value in 3-5). Covariance matrix is assumed to be of the
form Iltl
2
, =Σ .
We update the probabilistic model every new pixel for each Gaussian in the mixture of pixel tM .
If 5.2≤tM standard deviations from the mean then label 1 else labelled 0. For labeling of each
Gaussian we have the following cases. I). If tj, is marked 1; then increase tjw , , adjust t closer
to tM and decrease tΣ . II). If the tj, is marked as 0; then decrease the tjw , . III). If ∀ tj, where
tj ≤≤1 in the mixture for pixel tM are marked as 0 then Mark tM as a foreground pixel and
find least probable Gaussian in the mixture and set t = tM , 2
t as high value, tjw , as a low
value. For determining background pixel we look for distributions which have a high weight and
low variance [3].
Update equations are as follows: tjtjtj Mww ,1,, **)1(  +−= − , ttt X**)1( 1  +−= − ,
)(*)(**)1( 2
1
2
tt
T
tttt XX  −−+−= − , ),,(* 11 −− Σ= tttX  .  is the learning
parameter [3].
The methods has an advantage that it’s robust against any background object if introduced with
the walking subject such as rain, snow, handles motion from waving leaves and branches, noise
International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.2, April 2014
52
or working under day and night cycles. The disadvantages of this methods are when it’s very
windy and partly cloudy, if it’s full sunny day because of long shadows (shadow can be classified
as walking subject), varying illumination and if new object overlapping were some of the issues.
3. EXPERIMENTAL RESULTS
The data collection have been carried out with Nikon S3000 DLSR camera. QVGA (320×240)
resolution videos has been captured and computations are performed using MATLAB version
7.8. For experiment video, five subjects were asked to walk at slow speed, normal speed and fast
in front of the camera and these were shot in both indoor and outdoor settings. To test the
efficiency of the algorithm in a proficient way, we have also introduced moving object and
obstacles in few videos that forms the background of the walking subject. A total of 35 walking
sequences were collected, between 5 to 7 sequences for each subject, averaging 15 to 35 seconds
per subject. These videos were captured in 30 frames/seconds. Background subtraction of these
video sequences is carried out using method “A statistical Approach for Real time Robust
Background Subtraction and Shadow detection”[2] and “Adaptive background mixture models
for real-time tracking”[3]. Video for method “frame difference” have been downloaded from
internet since it requires appropriate lighting conditions and quality camera frames. Some of the
results are shown below.
3.1 RESULT OF “FRAME DIFFERENCE” METHOD [1]
The result shows “the frame difference” [1] method as very low computationally intensive and
efficient method. It also subtracts out background noise (such as waving trees), much better than
the more complex approximate median and mixture of Gaussians methods (high computation
methods). But the main challenge in this method is the determination of appropriate threshold,
since the result solely depends on the threshold used.
Fig 1: Result of frame difference background subtraction method. Low accuracy and low computational
intensive.
International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.2, April 2014
53
3.2 RESULT OF “A STATISTICAL APPROACH FOR REAL TIME ROBUST
BACKGROUND SUBTRACTION AND SHADOW DETECTION” METHOD[2]
This method produces average result with average computation efficiency among the other two
methods, it classifies background and shadow according to two computation models i.e.
Brightness distortion and colour distortion. So, the methods solely depend on the each pixels
colour value, each pixels colour value should be precise enough to represent itself in one of the
component of the result. So, the image has to be of good quality, possibly greater than QVGA
resolution for better output. The experiment was performed on QVGA resolution, the result
(some of which are given below) is not that efficient, but it compensates on computational
efficiency.
Fig 2: Result of background subtraction using statistical approach for real time robust background
subtraction and shadow detection technique. Red coloured part denotes foreground object and blue
coloured part denotes shadow. Medium accuracy and medium computational intensive.
3.3 RESULT OF “ADAPTIVE BACKGROUND MIXTURE MODELS FOR REAL-TIME
TRACKING” METHOD [3]
This method has the best result among all the above method discussed because it can deal with
slow lighting changes and other challenges. It also deals with multi-modal distributions caused by
moving branches of tress, snow falls, shadows, flying birds and other troublesome features of the
real world, but it also costs the maximum in computational time and memory. The computation
time mainly depend on number of Gaussian components (Gaussian distribution) considered for
Mixture of Gaussian (MOG) models, which typically ranges from 3 to 5. In the experiment
number of component taken is 3, one can take it as 5 depending on multimodal density required.
Some of the experimental results are shown below.
International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.2, April 2014
54
Fig 3: Result of background subtraction using adaptive background mixture models for real time
tracking. High accuracy and high computational intensive.
4. CONCLUSION
The results for some of the video are imperfect due to camera noise and appropriate lighting
condition. The result of “Adaptive background mixture models for real-time tracking ” and “A
statistical Approach for Real time Robust Background Subtraction and Shadow detection” does
not depends on lighting condition and some of the mentioned challenges though it depends on
quality of the image to an extent. The result of frame difference depends on lighting conditions
etc. which is the reason a different video is taken to produce the result (the video was downloaded
from internet), as the frame difference methods subtracts background frame from the current
frame, the background is just the previous frame, It produce an erroneous result due to slow
moving objects, lighting condition and many other challenges if introduced with.
The result of the A Statistical Approach for Real-time Robust Background Subtraction and
Shadow Detection” [2] and “Adaptive background mixture models for real-time tracking”[3]
papers can be used for real time background subtraction method, but the result of mixture of
Gaussian method [3] is computationally intensive. The most appropriate method is [2] due to
average computation cost and average result.
REFERENCES
[1] Piccardi, Massimo. "Background subtraction techniques: a review." Systems, man and cybernetics,
2004 IEEE international conference on. Vol. 4. IEEE, 2004.
[2] Horprasert, Thanarat, David Harwood, and Larry S. Davis. "A statistical approach for real-time robust
background subtraction and shadow detection."IEEE ICCV. Vol. 99. 1999”.
[3] Stauffer, Chris, and W. Eric L. Grimson. "Adaptive background mixture models for real-time
tracking." Computer Vision and Pattern Recognition, 1999. IEEE Computer Society Conference on.
Vol. 2. IEEE, 1999.
International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.2, April 2014
55
[4] Gonzalez, Rafael C., Richard E. Woods, and Steven L. Eddins. Digital image processing using
MATLAB. Vol. 2. Knoxville: Gatesmark Publishing, 2009.
[5] Chris Stauffer and W.E.L Grimson “Adaptive background mixture models for real-time tracking” [4]
Digital Image Processing by Rafael C. Gonzalez and Richard E. woods, 3rd edition.
[6] Prasanna, S. R. M., et al. "Online Stroke and Akshara Recognition GUI in Assamese Language Using
Hidden Markov Model."
AUTHORS
Dr. Sarat Saharia
He is currently working as Associate Professor in the department of computer
science and engineering at Tezpur University, Assam, India. His research interest
includes pattern recognition and image processing
Deepjoy Das
Has done Bachelor of Technology from Tezpur University and was held as
Assistant Project Engineer in Indian Institute of Technology for one year. His
research interest includes image processing with supervised and unsupervised
learning and handwriting recognition.

More Related Content

What's hot

Flame and smoke estimation for fire detection in videos based on optical flow...
Flame and smoke estimation for fire detection in videos based on optical flow...Flame and smoke estimation for fire detection in videos based on optical flow...
Flame and smoke estimation for fire detection in videos based on optical flow...eSAT Publishing House
 
Automatic Image Segmentation Using Wavelet Transform Based On Normalized Gra...
Automatic Image Segmentation Using Wavelet Transform Based  On Normalized Gra...Automatic Image Segmentation Using Wavelet Transform Based  On Normalized Gra...
Automatic Image Segmentation Using Wavelet Transform Based On Normalized Gra...IJMER
 
Region-based Semi-supervised Clustering Image Segmentation
Region-based Semi-supervised Clustering Image SegmentationRegion-based Semi-supervised Clustering Image Segmentation
Region-based Semi-supervised Clustering Image SegmentationOnur Yılmaz
 
Non-Blind Deblurring Using Partial Differential Equation Method
Non-Blind Deblurring Using Partial Differential Equation MethodNon-Blind Deblurring Using Partial Differential Equation Method
Non-Blind Deblurring Using Partial Differential Equation MethodEditor IJCATR
 
Brain tumor segmentation using asymmetry based histogram thresholding and k m...
Brain tumor segmentation using asymmetry based histogram thresholding and k m...Brain tumor segmentation using asymmetry based histogram thresholding and k m...
Brain tumor segmentation using asymmetry based histogram thresholding and k m...eSAT Publishing House
 
Removal of Gaussian noise on the image edges using the Prewitt operator and t...
Removal of Gaussian noise on the image edges using the Prewitt operator and t...Removal of Gaussian noise on the image edges using the Prewitt operator and t...
Removal of Gaussian noise on the image edges using the Prewitt operator and t...IOSR Journals
 
Improved nonlocal means based on pre classification and invariant block matching
Improved nonlocal means based on pre classification and invariant block matchingImproved nonlocal means based on pre classification and invariant block matching
Improved nonlocal means based on pre classification and invariant block matchingIAEME Publication
 
Human detection in hours of
Human detection in hours ofHuman detection in hours of
Human detection in hours ofijistjournal
 
A modified pso based graph cut algorithm for the selection of optimal regular...
A modified pso based graph cut algorithm for the selection of optimal regular...A modified pso based graph cut algorithm for the selection of optimal regular...
A modified pso based graph cut algorithm for the selection of optimal regular...IAEME Publication
 
Unsupervised region of interest
Unsupervised region of interestUnsupervised region of interest
Unsupervised region of interestcsandit
 
Target Detection by Fuzzy Gustafson-Kessel Algorithm
Target Detection by Fuzzy Gustafson-Kessel AlgorithmTarget Detection by Fuzzy Gustafson-Kessel Algorithm
Target Detection by Fuzzy Gustafson-Kessel AlgorithmCSCJournals
 
Robust Adaptive Threshold Algorithm based on Kernel Fuzzy Clustering on Image...
Robust Adaptive Threshold Algorithm based on Kernel Fuzzy Clustering on Image...Robust Adaptive Threshold Algorithm based on Kernel Fuzzy Clustering on Image...
Robust Adaptive Threshold Algorithm based on Kernel Fuzzy Clustering on Image...cscpconf
 

What's hot (18)

Flame and smoke estimation for fire detection in videos based on optical flow...
Flame and smoke estimation for fire detection in videos based on optical flow...Flame and smoke estimation for fire detection in videos based on optical flow...
Flame and smoke estimation for fire detection in videos based on optical flow...
 
Automatic Image Segmentation Using Wavelet Transform Based On Normalized Gra...
Automatic Image Segmentation Using Wavelet Transform Based  On Normalized Gra...Automatic Image Segmentation Using Wavelet Transform Based  On Normalized Gra...
Automatic Image Segmentation Using Wavelet Transform Based On Normalized Gra...
 
Region-based Semi-supervised Clustering Image Segmentation
Region-based Semi-supervised Clustering Image SegmentationRegion-based Semi-supervised Clustering Image Segmentation
Region-based Semi-supervised Clustering Image Segmentation
 
H1802054851
H1802054851H1802054851
H1802054851
 
Non-Blind Deblurring Using Partial Differential Equation Method
Non-Blind Deblurring Using Partial Differential Equation MethodNon-Blind Deblurring Using Partial Differential Equation Method
Non-Blind Deblurring Using Partial Differential Equation Method
 
G1802053147
G1802053147G1802053147
G1802053147
 
Brain tumor segmentation using asymmetry based histogram thresholding and k m...
Brain tumor segmentation using asymmetry based histogram thresholding and k m...Brain tumor segmentation using asymmetry based histogram thresholding and k m...
Brain tumor segmentation using asymmetry based histogram thresholding and k m...
 
Removal of Gaussian noise on the image edges using the Prewitt operator and t...
Removal of Gaussian noise on the image edges using the Prewitt operator and t...Removal of Gaussian noise on the image edges using the Prewitt operator and t...
Removal of Gaussian noise on the image edges using the Prewitt operator and t...
 
J010245458
J010245458J010245458
J010245458
 
Improved nonlocal means based on pre classification and invariant block matching
Improved nonlocal means based on pre classification and invariant block matchingImproved nonlocal means based on pre classification and invariant block matching
Improved nonlocal means based on pre classification and invariant block matching
 
Human detection in hours of
Human detection in hours ofHuman detection in hours of
Human detection in hours of
 
A modified pso based graph cut algorithm for the selection of optimal regular...
A modified pso based graph cut algorithm for the selection of optimal regular...A modified pso based graph cut algorithm for the selection of optimal regular...
A modified pso based graph cut algorithm for the selection of optimal regular...
 
Unsupervised region of interest
Unsupervised region of interestUnsupervised region of interest
Unsupervised region of interest
 
Target Detection by Fuzzy Gustafson-Kessel Algorithm
Target Detection by Fuzzy Gustafson-Kessel AlgorithmTarget Detection by Fuzzy Gustafson-Kessel Algorithm
Target Detection by Fuzzy Gustafson-Kessel Algorithm
 
12
1212
12
 
20120140504013
2012014050401320120140504013
20120140504013
 
Robust Adaptive Threshold Algorithm based on Kernel Fuzzy Clustering on Image...
Robust Adaptive Threshold Algorithm based on Kernel Fuzzy Clustering on Image...Robust Adaptive Threshold Algorithm based on Kernel Fuzzy Clustering on Image...
Robust Adaptive Threshold Algorithm based on Kernel Fuzzy Clustering on Image...
 
Extended fuzzy c means clustering algorithm in segmentation of noisy images
Extended fuzzy c means clustering algorithm in segmentation of noisy imagesExtended fuzzy c means clustering algorithm in segmentation of noisy images
Extended fuzzy c means clustering algorithm in segmentation of noisy images
 

Viewers also liked

Modeling of manufacturing of a field effect transistor to determine condition...
Modeling of manufacturing of a field effect transistor to determine condition...Modeling of manufacturing of a field effect transistor to determine condition...
Modeling of manufacturing of a field effect transistor to determine condition...ijcsa
 
Some alternative ways to find m ambiguous binary words corresponding to a par...
Some alternative ways to find m ambiguous binary words corresponding to a par...Some alternative ways to find m ambiguous binary words corresponding to a par...
Some alternative ways to find m ambiguous binary words corresponding to a par...ijcsa
 
IMPACT OF DIFFERENT SELECTION STRATEGIES ON PERFORMANCE OF GA BASED INFORMATI...
IMPACT OF DIFFERENT SELECTION STRATEGIES ON PERFORMANCE OF GA BASED INFORMATI...IMPACT OF DIFFERENT SELECTION STRATEGIES ON PERFORMANCE OF GA BASED INFORMATI...
IMPACT OF DIFFERENT SELECTION STRATEGIES ON PERFORMANCE OF GA BASED INFORMATI...ijcsa
 
Impact of HeartBleed Bug in Android and Counter Measures
Impact of HeartBleed Bug in Android and Counter  Measures Impact of HeartBleed Bug in Android and Counter  Measures
Impact of HeartBleed Bug in Android and Counter Measures ijcsa
 
Accelerating the ant colony optimization by
Accelerating the ant colony optimization byAccelerating the ant colony optimization by
Accelerating the ant colony optimization byijcsa
 
A survey on cloud security issues and techniques
A survey on cloud security issues and techniquesA survey on cloud security issues and techniques
A survey on cloud security issues and techniquesijcsa
 
Vulnerabilities and attacks targeting social networks and industrial control ...
Vulnerabilities and attacks targeting social networks and industrial control ...Vulnerabilities and attacks targeting social networks and industrial control ...
Vulnerabilities and attacks targeting social networks and industrial control ...ijcsa
 
Nocs performance improvement using parallel transmission through wireless links
Nocs performance improvement using parallel transmission through wireless linksNocs performance improvement using parallel transmission through wireless links
Nocs performance improvement using parallel transmission through wireless linksijcsa
 
Vulnerability scanners a proactive approach to assess web application security
Vulnerability scanners a proactive approach to assess web application securityVulnerability scanners a proactive approach to assess web application security
Vulnerability scanners a proactive approach to assess web application securityijcsa
 
A survey early detection of
A survey early detection ofA survey early detection of
A survey early detection ofijcsa
 
Persian arabic document segmentation based on hybrid approach
Persian arabic document segmentation based on hybrid approachPersian arabic document segmentation based on hybrid approach
Persian arabic document segmentation based on hybrid approachijcsa
 
Web log data analysis by enhanced fuzzy c
Web log data analysis by enhanced fuzzy cWeb log data analysis by enhanced fuzzy c
Web log data analysis by enhanced fuzzy cijcsa
 
Labview with dwt for denoising the blurred biometric images
Labview with dwt for denoising the blurred biometric imagesLabview with dwt for denoising the blurred biometric images
Labview with dwt for denoising the blurred biometric imagesijcsa
 
Comparative study of augmented reality
Comparative study of augmented realityComparative study of augmented reality
Comparative study of augmented realityijcsa
 
Robust face recognition by applying partitioning around medoids over eigen fa...
Robust face recognition by applying partitioning around medoids over eigen fa...Robust face recognition by applying partitioning around medoids over eigen fa...
Robust face recognition by applying partitioning around medoids over eigen fa...ijcsa
 
An ahp (analytic hierarchy process)fce (fuzzy comprehensive evaluation) based...
An ahp (analytic hierarchy process)fce (fuzzy comprehensive evaluation) based...An ahp (analytic hierarchy process)fce (fuzzy comprehensive evaluation) based...
An ahp (analytic hierarchy process)fce (fuzzy comprehensive evaluation) based...ijcsa
 
Automatic speech emotion and speaker recognition based on hybrid gmm and ffbnn
Automatic speech emotion and speaker recognition based on hybrid gmm and ffbnnAutomatic speech emotion and speaker recognition based on hybrid gmm and ffbnn
Automatic speech emotion and speaker recognition based on hybrid gmm and ffbnnijcsa
 
Security issues in grid computing
Security issues in grid computingSecurity issues in grid computing
Security issues in grid computingijcsa
 
Energy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor networkEnergy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor networkijcsa
 
Koi Restaurant
Koi  RestaurantKoi  Restaurant
Koi RestaurantTom Aikins
 

Viewers also liked (20)

Modeling of manufacturing of a field effect transistor to determine condition...
Modeling of manufacturing of a field effect transistor to determine condition...Modeling of manufacturing of a field effect transistor to determine condition...
Modeling of manufacturing of a field effect transistor to determine condition...
 
Some alternative ways to find m ambiguous binary words corresponding to a par...
Some alternative ways to find m ambiguous binary words corresponding to a par...Some alternative ways to find m ambiguous binary words corresponding to a par...
Some alternative ways to find m ambiguous binary words corresponding to a par...
 
IMPACT OF DIFFERENT SELECTION STRATEGIES ON PERFORMANCE OF GA BASED INFORMATI...
IMPACT OF DIFFERENT SELECTION STRATEGIES ON PERFORMANCE OF GA BASED INFORMATI...IMPACT OF DIFFERENT SELECTION STRATEGIES ON PERFORMANCE OF GA BASED INFORMATI...
IMPACT OF DIFFERENT SELECTION STRATEGIES ON PERFORMANCE OF GA BASED INFORMATI...
 
Impact of HeartBleed Bug in Android and Counter Measures
Impact of HeartBleed Bug in Android and Counter  Measures Impact of HeartBleed Bug in Android and Counter  Measures
Impact of HeartBleed Bug in Android and Counter Measures
 
Accelerating the ant colony optimization by
Accelerating the ant colony optimization byAccelerating the ant colony optimization by
Accelerating the ant colony optimization by
 
A survey on cloud security issues and techniques
A survey on cloud security issues and techniquesA survey on cloud security issues and techniques
A survey on cloud security issues and techniques
 
Vulnerabilities and attacks targeting social networks and industrial control ...
Vulnerabilities and attacks targeting social networks and industrial control ...Vulnerabilities and attacks targeting social networks and industrial control ...
Vulnerabilities and attacks targeting social networks and industrial control ...
 
Nocs performance improvement using parallel transmission through wireless links
Nocs performance improvement using parallel transmission through wireless linksNocs performance improvement using parallel transmission through wireless links
Nocs performance improvement using parallel transmission through wireless links
 
Vulnerability scanners a proactive approach to assess web application security
Vulnerability scanners a proactive approach to assess web application securityVulnerability scanners a proactive approach to assess web application security
Vulnerability scanners a proactive approach to assess web application security
 
A survey early detection of
A survey early detection ofA survey early detection of
A survey early detection of
 
Persian arabic document segmentation based on hybrid approach
Persian arabic document segmentation based on hybrid approachPersian arabic document segmentation based on hybrid approach
Persian arabic document segmentation based on hybrid approach
 
Web log data analysis by enhanced fuzzy c
Web log data analysis by enhanced fuzzy cWeb log data analysis by enhanced fuzzy c
Web log data analysis by enhanced fuzzy c
 
Labview with dwt for denoising the blurred biometric images
Labview with dwt for denoising the blurred biometric imagesLabview with dwt for denoising the blurred biometric images
Labview with dwt for denoising the blurred biometric images
 
Comparative study of augmented reality
Comparative study of augmented realityComparative study of augmented reality
Comparative study of augmented reality
 
Robust face recognition by applying partitioning around medoids over eigen fa...
Robust face recognition by applying partitioning around medoids over eigen fa...Robust face recognition by applying partitioning around medoids over eigen fa...
Robust face recognition by applying partitioning around medoids over eigen fa...
 
An ahp (analytic hierarchy process)fce (fuzzy comprehensive evaluation) based...
An ahp (analytic hierarchy process)fce (fuzzy comprehensive evaluation) based...An ahp (analytic hierarchy process)fce (fuzzy comprehensive evaluation) based...
An ahp (analytic hierarchy process)fce (fuzzy comprehensive evaluation) based...
 
Automatic speech emotion and speaker recognition based on hybrid gmm and ffbnn
Automatic speech emotion and speaker recognition based on hybrid gmm and ffbnnAutomatic speech emotion and speaker recognition based on hybrid gmm and ffbnn
Automatic speech emotion and speaker recognition based on hybrid gmm and ffbnn
 
Security issues in grid computing
Security issues in grid computingSecurity issues in grid computing
Security issues in grid computing
 
Energy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor networkEnergy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor network
 
Koi Restaurant
Koi  RestaurantKoi  Restaurant
Koi Restaurant
 

Similar to Implementation and performance evaluation of

A Robust Method for Moving Object Detection Using Modified Statistical Mean M...
A Robust Method for Moving Object Detection Using Modified Statistical Mean M...A Robust Method for Moving Object Detection Using Modified Statistical Mean M...
A Robust Method for Moving Object Detection Using Modified Statistical Mean M...ijait
 
Threshold adaptation and XOR accumulation algorithm for objects detection
Threshold adaptation and XOR accumulation algorithm for  objects detectionThreshold adaptation and XOR accumulation algorithm for  objects detection
Threshold adaptation and XOR accumulation algorithm for objects detectionIJECEIAES
 
IRJET- Moving Object Detection using Foreground Detection for Video Surveil...
IRJET- 	 Moving Object Detection using Foreground Detection for Video Surveil...IRJET- 	 Moving Object Detection using Foreground Detection for Video Surveil...
IRJET- Moving Object Detection using Foreground Detection for Video Surveil...IRJET Journal
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
A Novel Background Subtraction Algorithm for Dynamic Texture Scenes
A Novel Background Subtraction Algorithm for Dynamic Texture ScenesA Novel Background Subtraction Algorithm for Dynamic Texture Scenes
A Novel Background Subtraction Algorithm for Dynamic Texture ScenesIJMER
 
Tracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance systemTracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance systemiaemedu
 
Tracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance systemTracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance systemIAEME Publication
 
Tracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance systemTracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance systemiaemedu
 
Tracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance systemTracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance systemiaemedu
 
A Novel Approach for Tracking with Implicit Video Shot Detection
A Novel Approach for Tracking with Implicit Video Shot DetectionA Novel Approach for Tracking with Implicit Video Shot Detection
A Novel Approach for Tracking with Implicit Video Shot DetectionIOSR Journals
 
Design and implementation of video tracking system based on camera field of view
Design and implementation of video tracking system based on camera field of viewDesign and implementation of video tracking system based on camera field of view
Design and implementation of video tracking system based on camera field of viewsipij
 
Algorithmic Analysis to Video Object Tracking and Background Segmentation and...
Algorithmic Analysis to Video Object Tracking and Background Segmentation and...Algorithmic Analysis to Video Object Tracking and Background Segmentation and...
Algorithmic Analysis to Video Object Tracking and Background Segmentation and...Editor IJCATR
 
A Review on Haze Removal Techniques
A Review on Haze Removal TechniquesA Review on Haze Removal Techniques
A Review on Haze Removal TechniquesIRJET Journal
 
IRJET-Motion Segmentation
IRJET-Motion SegmentationIRJET-Motion Segmentation
IRJET-Motion SegmentationIRJET Journal
 
Development and Hardware Implementation of an Efficient Algorithm for Cloud D...
Development and Hardware Implementation of an Efficient Algorithm for Cloud D...Development and Hardware Implementation of an Efficient Algorithm for Cloud D...
Development and Hardware Implementation of an Efficient Algorithm for Cloud D...sipij
 
K-Means Clustering in Moving Objects Extraction with Selective Background
K-Means Clustering in Moving Objects Extraction with Selective BackgroundK-Means Clustering in Moving Objects Extraction with Selective Background
K-Means Clustering in Moving Objects Extraction with Selective BackgroundIJCSIS Research Publications
 

Similar to Implementation and performance evaluation of (20)

A Robust Method for Moving Object Detection Using Modified Statistical Mean M...
A Robust Method for Moving Object Detection Using Modified Statistical Mean M...A Robust Method for Moving Object Detection Using Modified Statistical Mean M...
A Robust Method for Moving Object Detection Using Modified Statistical Mean M...
 
Threshold adaptation and XOR accumulation algorithm for objects detection
Threshold adaptation and XOR accumulation algorithm for  objects detectionThreshold adaptation and XOR accumulation algorithm for  objects detection
Threshold adaptation and XOR accumulation algorithm for objects detection
 
IRJET- Moving Object Detection using Foreground Detection for Video Surveil...
IRJET- 	 Moving Object Detection using Foreground Detection for Video Surveil...IRJET- 	 Moving Object Detection using Foreground Detection for Video Surveil...
IRJET- Moving Object Detection using Foreground Detection for Video Surveil...
 
D018112429
D018112429D018112429
D018112429
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Kk3517971799
Kk3517971799Kk3517971799
Kk3517971799
 
Ijnsa050207
Ijnsa050207Ijnsa050207
Ijnsa050207
 
A Novel Background Subtraction Algorithm for Dynamic Texture Scenes
A Novel Background Subtraction Algorithm for Dynamic Texture ScenesA Novel Background Subtraction Algorithm for Dynamic Texture Scenes
A Novel Background Subtraction Algorithm for Dynamic Texture Scenes
 
Tracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance systemTracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance system
 
Tracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance systemTracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance system
 
Tracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance systemTracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance system
 
Tracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance systemTracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance system
 
A Novel Approach for Tracking with Implicit Video Shot Detection
A Novel Approach for Tracking with Implicit Video Shot DetectionA Novel Approach for Tracking with Implicit Video Shot Detection
A Novel Approach for Tracking with Implicit Video Shot Detection
 
Design and implementation of video tracking system based on camera field of view
Design and implementation of video tracking system based on camera field of viewDesign and implementation of video tracking system based on camera field of view
Design and implementation of video tracking system based on camera field of view
 
Algorithmic Analysis to Video Object Tracking and Background Segmentation and...
Algorithmic Analysis to Video Object Tracking and Background Segmentation and...Algorithmic Analysis to Video Object Tracking and Background Segmentation and...
Algorithmic Analysis to Video Object Tracking and Background Segmentation and...
 
A Review on Haze Removal Techniques
A Review on Haze Removal TechniquesA Review on Haze Removal Techniques
A Review on Haze Removal Techniques
 
Kq3518291832
Kq3518291832Kq3518291832
Kq3518291832
 
IRJET-Motion Segmentation
IRJET-Motion SegmentationIRJET-Motion Segmentation
IRJET-Motion Segmentation
 
Development and Hardware Implementation of an Efficient Algorithm for Cloud D...
Development and Hardware Implementation of an Efficient Algorithm for Cloud D...Development and Hardware Implementation of an Efficient Algorithm for Cloud D...
Development and Hardware Implementation of an Efficient Algorithm for Cloud D...
 
K-Means Clustering in Moving Objects Extraction with Selective Background
K-Means Clustering in Moving Objects Extraction with Selective BackgroundK-Means Clustering in Moving Objects Extraction with Selective Background
K-Means Clustering in Moving Objects Extraction with Selective Background
 

Recently uploaded

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 

Recently uploaded (20)

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 

Implementation and performance evaluation of

  • 1. International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.2, April 2014 DOI:10.5121/ijcsa.2014.4206 49 Implementation And Performance Evaluation Of Background Subtraction Algorithms Mr. Deepjoy Das and Dr. Sarat Saharia Department of Computer Science & Engineering, Tezpur University, Assam, India ABSTRACT The study evaluates three background subtraction techniques. The techniques ranges from very basic algorithm to state of the art published techniques categorized based on speed, memory requirements and accuracy. Such a review can effectively guide the designer to select the most suitable method for a given application in a principled way. The algorithms used in the study ranges from varying levels of accuracy and computational complexity. Few of them can also deal with real time challenges like rain, snow, hails, swaying branches, objects overlapping, varying light intensity or slow moving objects. KEYWORDS Background subtraction, background removal, shadow detection, background mixture model. 1. INTRODUCTION Background subtraction is basically detecting moving objects in videos using static cameras. The basic idea in the approach is detecting the moving objects from the difference between the current frame and a reference frame, which is called “background image” or “background model”. The background image must be good enough to represent the scene with no moving objects and be regularly updated so that it adapt to the varying luminance conditions and geometry settings. Poor background image may result in poor background subtraction results, because it is to be subtracted with the current image to obtain the final result. Processing a video stream to segment foreground objects from the background is a critical first step in many computer vision applications. The popularity of background subtraction algorithms largely comes from its computational efficiency, which allows applications such as human computer interaction, video surveillance and traffic monitoring to meet their real-time goals. Many different methods have been proposed over the recent years. Some of them are currently used in the CCTV detection application by the defense personals these different techniques varies in computational speed, memory requirements and accuracy basically. There are many challenges faced during examining some of the techniques. Some of the challenges are shadows, wind causing cluttered areas. Traditional methods of background subtraction fails, if introduced with moving objects, reflections, illumination changes, Noise e.g. camera movement, object overlapping in the visual field, slow moving objects, objects being introduced or removed from the scene, movements through one or more above mentioned challenges and may produce inappropriate results. Robust, subtraction techniques are flexible enough to handle variations in lighting, moving scene clutter, multiple moving objects and other
  • 2. International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.2, April 2014 50 arbitrary changes to the observed scene. Such techniques are called real time background subtraction techniques. 2. BACKGROUND SUBTRACTION ALGORITHMS We have implemented three background subtraction algorithms ranging from very basic strategy used to state of art techniques published. Some simple approaches aims to maximize speed and limits the memory requirements which produce a low accurate output such as the “frame difference” method [1] and other sophisticated approaches [2] [3] [5] aims to achieve the highest possible accuracy under possible circumstances. 2.1 FRAME DIFFERENCE TECHNIQUE THEORY [1] Frame difference is the simplest form of background subtraction. The current frame is simply subtracted from the previous frame, and if the difference in pixel values for a given pixel is greater than a threshold hT then the pixel is considered part of the foreground [4]. hii Tframeframe >− −1 The estimated background is just the previous frame and it is very sensitive to the threshold hT . Advantages of this method are it is a lowest computation speed of all the methods, background model is highly adaptive. Which means, this method adapt changes in the background faster than any other methods, since background is just the previous frame (precisely 1/fps). Disadvantages of this method are objects produced with uniformly distributed intensity values (such as the side of a car); the interior pixels can be interpreted as part of the background, objects must be continuously moving. If an object stays still for more than a frame period (1/fps), it becomes part of the background. This is an error. The frame difference method also subtracts out background noise (such as waving trees), much better than the more complex approximate median and mixture of Gaussians methods A Challenge with this method is determining the threshold value. The result depends on threshold values thus each different video depends on different thresholds. 2.2 REAL TIME BACKGROUND SUBTRACTION AND SHADOW DETECTION TECHNIQUE THEORY [2] The algorithms for real time background subtraction and shadow detection technique is published by T Horprasert, et al in the paper entitled “A statistical approach for real-time robust background subtraction and shadow detection” [2]. We briefly describe the method published in the paper by T Horprasert, et al [2]. This method is used for color image which has RGB components. A pixeli in the image )](),(),([ iii BGRi  = [2] represent the pixel's expected RGB color value in the background and )](),(),([ iii BGRi  = [2] denote the pixel's RGB color value in a current image that is to be subtracted from the background. The main aims is to measure the distortion of i from i which is done by breaking down the distortion into two parts, namely the brightness distortion [ 2 )()( iiii  −= ] [2] and chromaticity distortion [ iiii  −=∂ ] [2].Where i represents the pixel's strength of brightness with respect to the
  • 3. International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.2, April 2014 51 expected value. i = 1 if the brightness of the given pixel in the current image is the same as in the reference image. i < 1 if it is darker, and i > 1 if it becomes brighter than the expected brightness. By applying suitable threshold on the brightness distortion )( i and chromatic distortion i∂ , we can distinguish the pixels as follows: original background (B) if it has both brightness and chromaticity similar to those of the same pixel in the background image. Shadow (S) if it has similar chromaticity but lower brightness than those of the same pixel in the background image. 2.3 ADAPTIVE BACKGROUND MIXTURE MODEL FOR REAL TIME TRACKING TECHNIQUE THEORY [3] The algorithms for adaptive background mixture model for real time tracking technique is published by Stauffer, et al. in the paper entitled “Adaptive background mixture models for real- time tracking." [3]. we briefly describe the method mentioned in the paper by Stauffer, at al [3]. At first we need to know about pixel process. A pixel process of pixel M is the values from frame 1 to framet also represented as { }...,...1 tj MMM where tj ≤≤1 . The probability of observing a pixel M at frame j denoted by ∑= Σ×= K j tjtjttjj MwMP 1 ,,, ),,()(  [3], where,  is the Gaussian probability density function )()( 2 1 ,, 1 2 1 ),,( tt T tt MM n tjtjt eM    −Σ−− − Σ =Σ , tj, and tj,Σ are the mean and co-variance matrix of the th j Gaussian in the mixture at time j respectively. K is the no. of Gaussians in the mixture (proportional to memory available and computational power needed, usual value in 3-5). Covariance matrix is assumed to be of the form Iltl 2 , =Σ . We update the probabilistic model every new pixel for each Gaussian in the mixture of pixel tM . If 5.2≤tM standard deviations from the mean then label 1 else labelled 0. For labeling of each Gaussian we have the following cases. I). If tj, is marked 1; then increase tjw , , adjust t closer to tM and decrease tΣ . II). If the tj, is marked as 0; then decrease the tjw , . III). If ∀ tj, where tj ≤≤1 in the mixture for pixel tM are marked as 0 then Mark tM as a foreground pixel and find least probable Gaussian in the mixture and set t = tM , 2 t as high value, tjw , as a low value. For determining background pixel we look for distributions which have a high weight and low variance [3]. Update equations are as follows: tjtjtj Mww ,1,, **)1(  +−= − , ttt X**)1( 1  +−= − , )(*)(**)1( 2 1 2 tt T tttt XX  −−+−= − , ),,(* 11 −− Σ= tttX  .  is the learning parameter [3]. The methods has an advantage that it’s robust against any background object if introduced with the walking subject such as rain, snow, handles motion from waving leaves and branches, noise
  • 4. International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.2, April 2014 52 or working under day and night cycles. The disadvantages of this methods are when it’s very windy and partly cloudy, if it’s full sunny day because of long shadows (shadow can be classified as walking subject), varying illumination and if new object overlapping were some of the issues. 3. EXPERIMENTAL RESULTS The data collection have been carried out with Nikon S3000 DLSR camera. QVGA (320×240) resolution videos has been captured and computations are performed using MATLAB version 7.8. For experiment video, five subjects were asked to walk at slow speed, normal speed and fast in front of the camera and these were shot in both indoor and outdoor settings. To test the efficiency of the algorithm in a proficient way, we have also introduced moving object and obstacles in few videos that forms the background of the walking subject. A total of 35 walking sequences were collected, between 5 to 7 sequences for each subject, averaging 15 to 35 seconds per subject. These videos were captured in 30 frames/seconds. Background subtraction of these video sequences is carried out using method “A statistical Approach for Real time Robust Background Subtraction and Shadow detection”[2] and “Adaptive background mixture models for real-time tracking”[3]. Video for method “frame difference” have been downloaded from internet since it requires appropriate lighting conditions and quality camera frames. Some of the results are shown below. 3.1 RESULT OF “FRAME DIFFERENCE” METHOD [1] The result shows “the frame difference” [1] method as very low computationally intensive and efficient method. It also subtracts out background noise (such as waving trees), much better than the more complex approximate median and mixture of Gaussians methods (high computation methods). But the main challenge in this method is the determination of appropriate threshold, since the result solely depends on the threshold used. Fig 1: Result of frame difference background subtraction method. Low accuracy and low computational intensive.
  • 5. International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.2, April 2014 53 3.2 RESULT OF “A STATISTICAL APPROACH FOR REAL TIME ROBUST BACKGROUND SUBTRACTION AND SHADOW DETECTION” METHOD[2] This method produces average result with average computation efficiency among the other two methods, it classifies background and shadow according to two computation models i.e. Brightness distortion and colour distortion. So, the methods solely depend on the each pixels colour value, each pixels colour value should be precise enough to represent itself in one of the component of the result. So, the image has to be of good quality, possibly greater than QVGA resolution for better output. The experiment was performed on QVGA resolution, the result (some of which are given below) is not that efficient, but it compensates on computational efficiency. Fig 2: Result of background subtraction using statistical approach for real time robust background subtraction and shadow detection technique. Red coloured part denotes foreground object and blue coloured part denotes shadow. Medium accuracy and medium computational intensive. 3.3 RESULT OF “ADAPTIVE BACKGROUND MIXTURE MODELS FOR REAL-TIME TRACKING” METHOD [3] This method has the best result among all the above method discussed because it can deal with slow lighting changes and other challenges. It also deals with multi-modal distributions caused by moving branches of tress, snow falls, shadows, flying birds and other troublesome features of the real world, but it also costs the maximum in computational time and memory. The computation time mainly depend on number of Gaussian components (Gaussian distribution) considered for Mixture of Gaussian (MOG) models, which typically ranges from 3 to 5. In the experiment number of component taken is 3, one can take it as 5 depending on multimodal density required. Some of the experimental results are shown below.
  • 6. International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.2, April 2014 54 Fig 3: Result of background subtraction using adaptive background mixture models for real time tracking. High accuracy and high computational intensive. 4. CONCLUSION The results for some of the video are imperfect due to camera noise and appropriate lighting condition. The result of “Adaptive background mixture models for real-time tracking ” and “A statistical Approach for Real time Robust Background Subtraction and Shadow detection” does not depends on lighting condition and some of the mentioned challenges though it depends on quality of the image to an extent. The result of frame difference depends on lighting conditions etc. which is the reason a different video is taken to produce the result (the video was downloaded from internet), as the frame difference methods subtracts background frame from the current frame, the background is just the previous frame, It produce an erroneous result due to slow moving objects, lighting condition and many other challenges if introduced with. The result of the A Statistical Approach for Real-time Robust Background Subtraction and Shadow Detection” [2] and “Adaptive background mixture models for real-time tracking”[3] papers can be used for real time background subtraction method, but the result of mixture of Gaussian method [3] is computationally intensive. The most appropriate method is [2] due to average computation cost and average result. REFERENCES [1] Piccardi, Massimo. "Background subtraction techniques: a review." Systems, man and cybernetics, 2004 IEEE international conference on. Vol. 4. IEEE, 2004. [2] Horprasert, Thanarat, David Harwood, and Larry S. Davis. "A statistical approach for real-time robust background subtraction and shadow detection."IEEE ICCV. Vol. 99. 1999”. [3] Stauffer, Chris, and W. Eric L. Grimson. "Adaptive background mixture models for real-time tracking." Computer Vision and Pattern Recognition, 1999. IEEE Computer Society Conference on. Vol. 2. IEEE, 1999.
  • 7. International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.2, April 2014 55 [4] Gonzalez, Rafael C., Richard E. Woods, and Steven L. Eddins. Digital image processing using MATLAB. Vol. 2. Knoxville: Gatesmark Publishing, 2009. [5] Chris Stauffer and W.E.L Grimson “Adaptive background mixture models for real-time tracking” [4] Digital Image Processing by Rafael C. Gonzalez and Richard E. woods, 3rd edition. [6] Prasanna, S. R. M., et al. "Online Stroke and Akshara Recognition GUI in Assamese Language Using Hidden Markov Model." AUTHORS Dr. Sarat Saharia He is currently working as Associate Professor in the department of computer science and engineering at Tezpur University, Assam, India. His research interest includes pattern recognition and image processing Deepjoy Das Has done Bachelor of Technology from Tezpur University and was held as Assistant Project Engineer in Indian Institute of Technology for one year. His research interest includes image processing with supervised and unsupervised learning and handwriting recognition.