SlideShare a Scribd company logo
A Lecture On
VARIOUS OBJECT DETECTION AND TRACKING
METHODS
Presented by ,
Sujeesh kumar j
M2 CSIP
OUTLINE
• Object Detection and Methods
• Object Tracking and Methods
OBJECT DETECTION
• It detecting instances of semantic objects of a certain class (such as humans, buildings, or
vehicles) in digital videos and images.
• It has proved to be a prominent module for numerous important applications like video
surveillance, autonomous driving, face detection, etc.
• Feature detectors such as Scale Invariant Feature Transform and Speeded Up Robust Feature are
good methods which yield high quality features but it requires high computational time when it
works in real time.
• Based on the information support vector machine and back-propagation neural network training
are performed for the efficient recognition of objects.
OBJECT DETECTION METHODS
1. SCALE-INAVARIENT FEATURE TRANSFORM(SIFT)
2. YOU LOOK ONLY ONCE (YOLO)
3. HISTOGRAM OF GRADIENT(HOG)
1. SCALE-INAVARIENT FEATURE TRANSFORM(SIFT)
• The SIFT method can robustly identify objects even among clutter and under partial occlusion
because the SIFT feature descriptor is invariant to scale, orientation, and affine distortion.
• It is used in application of scale of an image.
• It also used to detect corners, circles, blobs etc.
• Procedure here is a multi step process
SIFT PROCEDURES
1. SCALE SPACE EXTREMA DETECTION.
2. KEYPOINT LOCALIZATION
3. ORIENTATION ASSIGNMENT
4. KEYPOINT DESCRIPTOR
5. KEYPOINT MATCHING
1. SCALE SPACE EXTREMA DETECTION.
• Once the image is blurred using Difference of Gaussian blurring, the pixel is compared with 8
neighbours.
• Also compared with nine pixels in next and previous scale, if it is a local extrema ,it is a
potential keypoint(best keypoint in scale).
2. KEYPOINT LOCALIZATION
• If the intensity at the extrema is less than the threshold value, they are rejected.
• Edges are removed using eigen values and their ratios.
• Removal of low contrast keypoint and edge point. Strong interest point.
3. ORIENTATION ASSIGNMENT
• Orientation is assigned to each keypoint.
• Orientation histogram created. Highest peak in the histogram or any peak above 80% is
considered.
• Created keypoint with same location and scale but different directions.
4. KEYPOINT DESCRIPTOR AND 5. KEYPOINT MATCHING
• Descriptors are vectors of size (no: of keypoints *128) achieved from orientation histogram.
• 128 = ?
• 16*16 neighbourhood and 16 sub-blocks and each sub-block here 4*4 = 8bins orientation.
• Keypoint matching between two images is done by identifying the nearest neighbours. Further
ratio analysis between closest and second closest is done.
a
2. YOU LOOK ONLY ONCE (YOLO)
• YOLO is a new and a novel approach to object detection.
• In earlier work on object detection repurposes classifiers to perform detection.
• YOLO frames object detection as a regression problem to spatially separated bounding boxes
and associated class probabilities.
• A single neural network predicts bounding boxes and class probabilities directly from full
images in one evaluation.
• The whole detection pipeline is a single network, it can be optimized end-to-end directly on
detection performance.
• It is used in real time object detection.
• The network divides the image into regions and predict the bounding boxes and probabilities of
each region.
• Bounding boxes are weighted with predicted probabilities.
3. HISTOGRAM OF GRADIENT(HOG)
• It is used for human detection.
A. HoG Feature Extraction
• Compute centered and horizontal gradient with no smoothing.
• Compute gradient orientation and magnitude.
• For color image ,pick the color channel with highest magnitude for each pixel.
• Computing gradient :
• Centered function f’(x)=lim(h->0)(f(x+h)-f(x-h))÷2h
• Filter masks in both x and y direction
• Calculated magnitude and orientation.
Blocks and Cells
• 16*16 blocks of 50% overlap.
• 7*15 = 120 blocks in total.
• Each block should consist of 2*2 cells and
ie. With size 8*8
Trilinear Interpolation
• Each blocks consist of 2*2 cells with size 8*8.
• Quantize the gradient orientation into 9bins (0-180).
• Interpolate votes linearly between neighbouring bin centre's.
• Eg: θ = 85 degree
• Distance to the bin center bin70 and bin90 respectively.
• They have degrees 15 and 5.
• Hence ratio is 5/20 = 1/4
15/20 = 3/4
• Vote can be weighted with gaussian to down weight the pixels near the edges of the block.
APPLICATIONS
• Traffic monitoring
• Human action recognition
• Used in application of computer vision such as digital forensics etc.
OBJECT TRACKING
• Estimating the trajectory of an object over time by locating its position in every frame.
• Estimating the trajectory of an object in the image plane as it moves around a scene.
• Important task within the field of computervision
• There are three key steps in video analysis:
 Detection of interesting moving objects
 Tracking of objects from frame to frame
 Objects tracks recognition
OBJECT TRACKING
• Difficulties in tracking objects can arise due to
 Abrupt object motion
 Changing appearance patterns of both the object and thescene.
APPLICATION
• Vehicle Navigation, that is, video-based path planning and obstacle avoidance capabilities.
• Motion-Based Recognition ,human identification based on gait, automatic object detection.
• Automated Surveillance, that is, monitoring to detect suspicious activities.
• Human-Computer Interaction, that is, gesture recognition.
• Traffic monitoring, that is, real-time gathering of traffic statistics to direct traffic flow.
OBJECT DETECTION IN TRACKING
1. Background Subtraction
• It identifies the object from the video frame.
• It is technique for separating out foreground element from the background and is done by
generating a foreground mask.
• Used for detecting dynamically moving objects from static cameras.
• Several techniques used in background subtraction .Eg: Running average.
• Dst(x,y) = (1-alpha)*dst(x,y) + alpha*src(x,y)
src=source image. dst = destination image. alpha = weight of input image.
• Fundaments logic of moving object detection from the difference between the current and a
reference frame.
• Principles :
• It should segment objects of interest when they first appear in scene.
• The background model adapt for both sudden and gradual changes in background.
• Simple Approach:
• Estimate the background for time ‘t’.
• Subtract the background from input frame.
• Apply threshold to the absolute difference to get the foreground mask.
2. Object representation
• In a tracking, object is anything that is of interest for further analysis.
• For instance, boats on the sea, fish inside an aquarium, vehicles on a road, planes in the air,
people walking on a road are a set of objects that may be important to track in a specific
domain.
• Objects can be represented by shapes and appearances.
 Points
 Primitive geometric shapes
 Object silhouette and
• contour
 Articulated shape models
 Skeletal models
3. Segmentation
• Image segmentation algorithms is to partition the image into perceptually similar regions.
• Every segmentation algorithm addresses two problems the criteria for a good partition and
the method for achieving efficient partitioning.
• Mean Shift Clustering For the image segmentation problem, the mean-shift approach to find
clusters in the joint spatial+color space, [l , u, v,x, y], where [l , u, v] represents the color and [x,
y] represents the spatial location.
• Using Graph Cut
• A cut in a graph is a set of edges whose removal disconnects the graph.
• Image segmentation can also be formulated as a graph partitioning problem, where the vertices
(pixels), V ={u, v, . . .}, of a graph (image), G, are partitioned into N disjoint sub graphs
(regions), Ai , N
i = 1 Ai = V, Ai ∩ Aj = ∅, i = j.
• Limitation of minimum cut is its bias toward over segmenting the image
• Shi and Malik [2000] propose the normalized cut to overcome the over segmentation
problem.
OBJECT TRACKING METHODS
1. POINT TRACKING
A. Deterministic method
• Deterministic methods define a cost function which is made up of constraints like maximum
velocity, common motion and rigidity.
• A greedy algorithm can be used for this which iteratively optimizes point correspondences.
• This cost function must then be minimized for tracking
• The algorithm is modified to preserve a lot of motion information so that point measurements
are not missed.
• Proximity assumes location of object would not change notably from one frame to other.
• Small velocity change (smooth motion) assumes direction and speed of object does not change
drastically.
B. Statistical methods
• Statistical methods models uncertainties to handle noise in an image.
• A well-known method for statistical point tracking is multiple hypothesis tracking(MHT).
• A set of hypotheses are designed for an object and predictions are made for each hypothesis for
the object's position.
• The hypothesis with the highest prediction is the most likely and is chosen for tracking.
• For tracking single objects are the Kalman filter and Particle filters. The Kalman filter is
limited to a linear system and uses prediction and correction to estimate an object's motion
2. KERNAL TRACKING
• Represents object as a geometric shape, called a kernel, and estimates motion of this kernel in
consecutive frames.
• KT commonly used to track a single object. Uses brute force to search an image for a region
that matches the template in the previous image.
• The brute force searching results in this method computationally expensive, but this can be
overcome by optimizations to the method, such as limiting the search to a certain region.
• A limitation of kernel tracking is that parts of the background may appear inside the kernel,
but this can be overcome by making the kernel inside the object, instead of around it.
3. SILHOUETTE TRACKING
• Objects have complex shapes, for example, hands, head, and shoulders cannot be well
described by simple geometric shapes. Silhouette based methods provide an accurate shape
description for these objects.
• This model can be in the form of a color histogram, object edges or the object contour. We
divide silhouette trackers into two categories shape matching and contour tracking.
 Shape Matching can be performed similar to tracking based on template matching where an
object silhouette and its associated model is searched in the current frame.
 Contour Tracking
• methods, in contrast to shape matching methods. iteratively evolve an initial contour in the
previous frame to its new position in the current frame.
• Silhouette tracking is employed when tracking the complete region.
THANK YOU

More Related Content

What's hot

Overview Of Video Object Tracking System
Overview Of Video Object Tracking SystemOverview Of Video Object Tracking System
Overview Of Video Object Tracking System
Editor IJMTER
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
Md Shabir Alam
 
Object tracking
Object trackingObject tracking
Object tracking
ahmadamin636
 
Feature detection and matching
Feature detection and matchingFeature detection and matching
Feature detection and matching
Kuppusamy P
 
Line detection algorithms
Line detection algorithmsLine detection algorithms
Line detection algorithms
Supun Kandaudahewa, MIEEE
 
Detection and Tracking of Moving Object: A Survey
Detection and Tracking of Moving Object: A SurveyDetection and Tracking of Moving Object: A Survey
Detection and Tracking of Moving Object: A Survey
IJERA Editor
 
Object tracking
Object trackingObject tracking
Object tracking
Sri vidhya k
 
Image segmentation in Digital Image Processing
Image segmentation in Digital Image ProcessingImage segmentation in Digital Image Processing
Image segmentation in Digital Image Processing
DHIVYADEVAKI
 
motion and feature based person tracking in survillance videos
motion and feature based person tracking in survillance videosmotion and feature based person tracking in survillance videos
motion and feature based person tracking in survillance videos
shiva kumar cheruku
 
Image Segmentation using Otsu's Method - Computer Graphics (UCS505) Project PPT
Image Segmentation using Otsu's Method - Computer Graphics (UCS505) Project PPTImage Segmentation using Otsu's Method - Computer Graphics (UCS505) Project PPT
Image Segmentation using Otsu's Method - Computer Graphics (UCS505) Project PPT
Akshit Arora
 
Threshold Selection for Image segmentation
Threshold Selection for Image segmentationThreshold Selection for Image segmentation
Threshold Selection for Image segmentationParijat Sinha
 
A Genetic Algorithm-Based Moving Object Detection For Real-Time Traffic Surv...
 A Genetic Algorithm-Based Moving Object Detection For Real-Time Traffic Surv... A Genetic Algorithm-Based Moving Object Detection For Real-Time Traffic Surv...
A Genetic Algorithm-Based Moving Object Detection For Real-Time Traffic Surv...
Chennai Networks
 
PPT s04-machine vision-s2
PPT s04-machine vision-s2PPT s04-machine vision-s2
PPT s04-machine vision-s2
Binus Online Learning
 
Edge Detection and Segmentation
Edge Detection and SegmentationEdge Detection and Segmentation
Edge Detection and Segmentation
A B Shinde
 
Segmentation Techniques -I
Segmentation Techniques -ISegmentation Techniques -I
Segmentation Techniques -I
Hemantha Kulathilake
 
Real-time Object Tracking
Real-time Object TrackingReal-time Object Tracking
Real-time Object Tracking
Wonsang You
 
Image Segmentation using Otsu's Method - Computer Graphics (UCS505) Project R...
Image Segmentation using Otsu's Method - Computer Graphics (UCS505) Project R...Image Segmentation using Otsu's Method - Computer Graphics (UCS505) Project R...
Image Segmentation using Otsu's Method - Computer Graphics (UCS505) Project R...
Akshit Arora
 
Visual object tracking using particle clustering - ICITACEE 2014
Visual object tracking using particle clustering - ICITACEE 2014Visual object tracking using particle clustering - ICITACEE 2014
Visual object tracking using particle clustering - ICITACEE 2014
Harindra Pradhana
 
PPT s09-machine vision-s2
PPT s09-machine vision-s2PPT s09-machine vision-s2
PPT s09-machine vision-s2
Binus Online Learning
 
Texture based feature extraction and object tracking
Texture based feature extraction and object trackingTexture based feature extraction and object tracking
Texture based feature extraction and object tracking
Priyanka Goswami
 

What's hot (20)

Overview Of Video Object Tracking System
Overview Of Video Object Tracking SystemOverview Of Video Object Tracking System
Overview Of Video Object Tracking System
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
 
Object tracking
Object trackingObject tracking
Object tracking
 
Feature detection and matching
Feature detection and matchingFeature detection and matching
Feature detection and matching
 
Line detection algorithms
Line detection algorithmsLine detection algorithms
Line detection algorithms
 
Detection and Tracking of Moving Object: A Survey
Detection and Tracking of Moving Object: A SurveyDetection and Tracking of Moving Object: A Survey
Detection and Tracking of Moving Object: A Survey
 
Object tracking
Object trackingObject tracking
Object tracking
 
Image segmentation in Digital Image Processing
Image segmentation in Digital Image ProcessingImage segmentation in Digital Image Processing
Image segmentation in Digital Image Processing
 
motion and feature based person tracking in survillance videos
motion and feature based person tracking in survillance videosmotion and feature based person tracking in survillance videos
motion and feature based person tracking in survillance videos
 
Image Segmentation using Otsu's Method - Computer Graphics (UCS505) Project PPT
Image Segmentation using Otsu's Method - Computer Graphics (UCS505) Project PPTImage Segmentation using Otsu's Method - Computer Graphics (UCS505) Project PPT
Image Segmentation using Otsu's Method - Computer Graphics (UCS505) Project PPT
 
Threshold Selection for Image segmentation
Threshold Selection for Image segmentationThreshold Selection for Image segmentation
Threshold Selection for Image segmentation
 
A Genetic Algorithm-Based Moving Object Detection For Real-Time Traffic Surv...
 A Genetic Algorithm-Based Moving Object Detection For Real-Time Traffic Surv... A Genetic Algorithm-Based Moving Object Detection For Real-Time Traffic Surv...
A Genetic Algorithm-Based Moving Object Detection For Real-Time Traffic Surv...
 
PPT s04-machine vision-s2
PPT s04-machine vision-s2PPT s04-machine vision-s2
PPT s04-machine vision-s2
 
Edge Detection and Segmentation
Edge Detection and SegmentationEdge Detection and Segmentation
Edge Detection and Segmentation
 
Segmentation Techniques -I
Segmentation Techniques -ISegmentation Techniques -I
Segmentation Techniques -I
 
Real-time Object Tracking
Real-time Object TrackingReal-time Object Tracking
Real-time Object Tracking
 
Image Segmentation using Otsu's Method - Computer Graphics (UCS505) Project R...
Image Segmentation using Otsu's Method - Computer Graphics (UCS505) Project R...Image Segmentation using Otsu's Method - Computer Graphics (UCS505) Project R...
Image Segmentation using Otsu's Method - Computer Graphics (UCS505) Project R...
 
Visual object tracking using particle clustering - ICITACEE 2014
Visual object tracking using particle clustering - ICITACEE 2014Visual object tracking using particle clustering - ICITACEE 2014
Visual object tracking using particle clustering - ICITACEE 2014
 
PPT s09-machine vision-s2
PPT s09-machine vision-s2PPT s09-machine vision-s2
PPT s09-machine vision-s2
 
Texture based feature extraction and object tracking
Texture based feature extraction and object trackingTexture based feature extraction and object tracking
Texture based feature extraction and object tracking
 

Similar to Various object detection and tracking methods

Object detection at night
Object detection at nightObject detection at night
Object detection at night
Sanjay Crúzé
 
Cahall Final Intern Presentation
Cahall Final Intern PresentationCahall Final Intern Presentation
Cahall Final Intern PresentationDaniel Cahall
 
Motion Analysis in Image Processing using ML
Motion Analysis in Image Processing using MLMotion Analysis in Image Processing using ML
Motion Analysis in Image Processing using ML
Ameenbarech1
 
06 image features
06 image features06 image features
06 image features
ankit_ppt
 
cohenmedioni.ppt
cohenmedioni.pptcohenmedioni.ppt
cohenmedioni.ppt
ChinnuDS
 
Passive stereo vision with deep learning
Passive stereo vision with deep learningPassive stereo vision with deep learning
Passive stereo vision with deep learning
Yu Huang
 
SIRG-BSU_3_used-important.pdf
SIRG-BSU_3_used-important.pdfSIRG-BSU_3_used-important.pdf
SIRG-BSU_3_used-important.pdf
DrAhmedElngar
 
Digital Image Processing.pptx
Digital Image Processing.pptxDigital Image Processing.pptx
Digital Image Processing.pptx
Aishwarya SenthilNathan
 
People counting in low density video sequences2
People counting in low density video sequences2People counting in low density video sequences2
People counting in low density video sequences2
Ahmed Tememe
 
Chapter10 image segmentation
Chapter10 image segmentationChapter10 image segmentation
Chapter10 image segmentation
asodariyabhavesh
 
Module-5-1_230523_171754 (1).pdf
Module-5-1_230523_171754 (1).pdfModule-5-1_230523_171754 (1).pdf
Module-5-1_230523_171754 (1).pdf
vikasmittal92
 
Handwritten mathematical symbol recognition
Handwritten mathematical symbol recognitionHandwritten mathematical symbol recognition
Handwritten mathematical symbol recognition
Meghana Kantharaj
 
OpenCV.pdf
OpenCV.pdfOpenCV.pdf
OpenCV.pdf
sagarawasthi5
 
Image processing.pdf
Image processing.pdfImage processing.pdf
Image processing.pdf
JasaRChoudhary
 
J017426467
J017426467J017426467
J017426467
IOSR Journals
 
IRJET- Image Feature Extraction using Hough Transformation Principle
IRJET- Image Feature Extraction using Hough Transformation PrincipleIRJET- Image Feature Extraction using Hough Transformation Principle
IRJET- Image Feature Extraction using Hough Transformation Principle
IRJET Journal
 
Computer vision-nit-silchar-hackathon
Computer vision-nit-silchar-hackathonComputer vision-nit-silchar-hackathon
Computer vision-nit-silchar-hackathon
Aditya Bhattacharya
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
Kuppusamy P
 

Similar to Various object detection and tracking methods (20)

Object detection at night
Object detection at nightObject detection at night
Object detection at night
 
Cahall Final Intern Presentation
Cahall Final Intern PresentationCahall Final Intern Presentation
Cahall Final Intern Presentation
 
Motion Analysis in Image Processing using ML
Motion Analysis in Image Processing using MLMotion Analysis in Image Processing using ML
Motion Analysis in Image Processing using ML
 
06 image features
06 image features06 image features
06 image features
 
cohenmedioni.ppt
cohenmedioni.pptcohenmedioni.ppt
cohenmedioni.ppt
 
Passive stereo vision with deep learning
Passive stereo vision with deep learningPassive stereo vision with deep learning
Passive stereo vision with deep learning
 
SIRG-BSU_3_used-important.pdf
SIRG-BSU_3_used-important.pdfSIRG-BSU_3_used-important.pdf
SIRG-BSU_3_used-important.pdf
 
Digital Image Processing.pptx
Digital Image Processing.pptxDigital Image Processing.pptx
Digital Image Processing.pptx
 
People counting in low density video sequences2
People counting in low density video sequences2People counting in low density video sequences2
People counting in low density video sequences2
 
Chapter10 image segmentation
Chapter10 image segmentationChapter10 image segmentation
Chapter10 image segmentation
 
Module-5-1_230523_171754 (1).pdf
Module-5-1_230523_171754 (1).pdfModule-5-1_230523_171754 (1).pdf
Module-5-1_230523_171754 (1).pdf
 
thesis
thesisthesis
thesis
 
Handwritten mathematical symbol recognition
Handwritten mathematical symbol recognitionHandwritten mathematical symbol recognition
Handwritten mathematical symbol recognition
 
project_PPT_final
project_PPT_finalproject_PPT_final
project_PPT_final
 
OpenCV.pdf
OpenCV.pdfOpenCV.pdf
OpenCV.pdf
 
Image processing.pdf
Image processing.pdfImage processing.pdf
Image processing.pdf
 
J017426467
J017426467J017426467
J017426467
 
IRJET- Image Feature Extraction using Hough Transformation Principle
IRJET- Image Feature Extraction using Hough Transformation PrincipleIRJET- Image Feature Extraction using Hough Transformation Principle
IRJET- Image Feature Extraction using Hough Transformation Principle
 
Computer vision-nit-silchar-hackathon
Computer vision-nit-silchar-hackathonComputer vision-nit-silchar-hackathon
Computer vision-nit-silchar-hackathon
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
 

Recently uploaded

Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Soumen Santra
 
Basic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparelBasic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparel
top1002
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSCW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
veerababupersonal22
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
aqil azizi
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 

Recently uploaded (20)

Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
 
Basic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparelBasic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparel
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSCW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 

Various object detection and tracking methods

  • 1. A Lecture On VARIOUS OBJECT DETECTION AND TRACKING METHODS Presented by , Sujeesh kumar j M2 CSIP
  • 2. OUTLINE • Object Detection and Methods • Object Tracking and Methods
  • 3. OBJECT DETECTION • It detecting instances of semantic objects of a certain class (such as humans, buildings, or vehicles) in digital videos and images. • It has proved to be a prominent module for numerous important applications like video surveillance, autonomous driving, face detection, etc. • Feature detectors such as Scale Invariant Feature Transform and Speeded Up Robust Feature are good methods which yield high quality features but it requires high computational time when it works in real time. • Based on the information support vector machine and back-propagation neural network training are performed for the efficient recognition of objects.
  • 4. OBJECT DETECTION METHODS 1. SCALE-INAVARIENT FEATURE TRANSFORM(SIFT) 2. YOU LOOK ONLY ONCE (YOLO) 3. HISTOGRAM OF GRADIENT(HOG)
  • 5. 1. SCALE-INAVARIENT FEATURE TRANSFORM(SIFT) • The SIFT method can robustly identify objects even among clutter and under partial occlusion because the SIFT feature descriptor is invariant to scale, orientation, and affine distortion. • It is used in application of scale of an image. • It also used to detect corners, circles, blobs etc. • Procedure here is a multi step process
  • 6. SIFT PROCEDURES 1. SCALE SPACE EXTREMA DETECTION. 2. KEYPOINT LOCALIZATION 3. ORIENTATION ASSIGNMENT 4. KEYPOINT DESCRIPTOR 5. KEYPOINT MATCHING
  • 7. 1. SCALE SPACE EXTREMA DETECTION. • Once the image is blurred using Difference of Gaussian blurring, the pixel is compared with 8 neighbours. • Also compared with nine pixels in next and previous scale, if it is a local extrema ,it is a potential keypoint(best keypoint in scale).
  • 8. 2. KEYPOINT LOCALIZATION • If the intensity at the extrema is less than the threshold value, they are rejected. • Edges are removed using eigen values and their ratios. • Removal of low contrast keypoint and edge point. Strong interest point.
  • 9. 3. ORIENTATION ASSIGNMENT • Orientation is assigned to each keypoint. • Orientation histogram created. Highest peak in the histogram or any peak above 80% is considered. • Created keypoint with same location and scale but different directions.
  • 10. 4. KEYPOINT DESCRIPTOR AND 5. KEYPOINT MATCHING • Descriptors are vectors of size (no: of keypoints *128) achieved from orientation histogram. • 128 = ? • 16*16 neighbourhood and 16 sub-blocks and each sub-block here 4*4 = 8bins orientation. • Keypoint matching between two images is done by identifying the nearest neighbours. Further ratio analysis between closest and second closest is done. a
  • 11. 2. YOU LOOK ONLY ONCE (YOLO) • YOLO is a new and a novel approach to object detection. • In earlier work on object detection repurposes classifiers to perform detection. • YOLO frames object detection as a regression problem to spatially separated bounding boxes and associated class probabilities. • A single neural network predicts bounding boxes and class probabilities directly from full images in one evaluation.
  • 12. • The whole detection pipeline is a single network, it can be optimized end-to-end directly on detection performance. • It is used in real time object detection. • The network divides the image into regions and predict the bounding boxes and probabilities of each region. • Bounding boxes are weighted with predicted probabilities.
  • 13. 3. HISTOGRAM OF GRADIENT(HOG) • It is used for human detection. A. HoG Feature Extraction • Compute centered and horizontal gradient with no smoothing. • Compute gradient orientation and magnitude. • For color image ,pick the color channel with highest magnitude for each pixel. • Computing gradient : • Centered function f’(x)=lim(h->0)(f(x+h)-f(x-h))÷2h • Filter masks in both x and y direction • Calculated magnitude and orientation.
  • 14. Blocks and Cells • 16*16 blocks of 50% overlap. • 7*15 = 120 blocks in total. • Each block should consist of 2*2 cells and ie. With size 8*8
  • 15. Trilinear Interpolation • Each blocks consist of 2*2 cells with size 8*8. • Quantize the gradient orientation into 9bins (0-180). • Interpolate votes linearly between neighbouring bin centre's. • Eg: θ = 85 degree • Distance to the bin center bin70 and bin90 respectively. • They have degrees 15 and 5. • Hence ratio is 5/20 = 1/4 15/20 = 3/4 • Vote can be weighted with gaussian to down weight the pixels near the edges of the block.
  • 16. APPLICATIONS • Traffic monitoring • Human action recognition • Used in application of computer vision such as digital forensics etc.
  • 17. OBJECT TRACKING • Estimating the trajectory of an object over time by locating its position in every frame. • Estimating the trajectory of an object in the image plane as it moves around a scene. • Important task within the field of computervision • There are three key steps in video analysis:  Detection of interesting moving objects  Tracking of objects from frame to frame  Objects tracks recognition
  • 18. OBJECT TRACKING • Difficulties in tracking objects can arise due to  Abrupt object motion  Changing appearance patterns of both the object and thescene.
  • 19. APPLICATION • Vehicle Navigation, that is, video-based path planning and obstacle avoidance capabilities. • Motion-Based Recognition ,human identification based on gait, automatic object detection. • Automated Surveillance, that is, monitoring to detect suspicious activities. • Human-Computer Interaction, that is, gesture recognition. • Traffic monitoring, that is, real-time gathering of traffic statistics to direct traffic flow.
  • 20. OBJECT DETECTION IN TRACKING 1. Background Subtraction • It identifies the object from the video frame. • It is technique for separating out foreground element from the background and is done by generating a foreground mask. • Used for detecting dynamically moving objects from static cameras. • Several techniques used in background subtraction .Eg: Running average. • Dst(x,y) = (1-alpha)*dst(x,y) + alpha*src(x,y) src=source image. dst = destination image. alpha = weight of input image.
  • 21. • Fundaments logic of moving object detection from the difference between the current and a reference frame. • Principles : • It should segment objects of interest when they first appear in scene. • The background model adapt for both sudden and gradual changes in background. • Simple Approach: • Estimate the background for time ‘t’. • Subtract the background from input frame. • Apply threshold to the absolute difference to get the foreground mask.
  • 22. 2. Object representation • In a tracking, object is anything that is of interest for further analysis. • For instance, boats on the sea, fish inside an aquarium, vehicles on a road, planes in the air, people walking on a road are a set of objects that may be important to track in a specific domain. • Objects can be represented by shapes and appearances.  Points  Primitive geometric shapes  Object silhouette and • contour  Articulated shape models  Skeletal models
  • 23.
  • 24. 3. Segmentation • Image segmentation algorithms is to partition the image into perceptually similar regions. • Every segmentation algorithm addresses two problems the criteria for a good partition and the method for achieving efficient partitioning. • Mean Shift Clustering For the image segmentation problem, the mean-shift approach to find clusters in the joint spatial+color space, [l , u, v,x, y], where [l , u, v] represents the color and [x, y] represents the spatial location.
  • 25. • Using Graph Cut • A cut in a graph is a set of edges whose removal disconnects the graph. • Image segmentation can also be formulated as a graph partitioning problem, where the vertices (pixels), V ={u, v, . . .}, of a graph (image), G, are partitioned into N disjoint sub graphs (regions), Ai , N i = 1 Ai = V, Ai ∩ Aj = ∅, i = j. • Limitation of minimum cut is its bias toward over segmenting the image • Shi and Malik [2000] propose the normalized cut to overcome the over segmentation problem.
  • 27. 1. POINT TRACKING A. Deterministic method • Deterministic methods define a cost function which is made up of constraints like maximum velocity, common motion and rigidity. • A greedy algorithm can be used for this which iteratively optimizes point correspondences. • This cost function must then be minimized for tracking • The algorithm is modified to preserve a lot of motion information so that point measurements are not missed. • Proximity assumes location of object would not change notably from one frame to other. • Small velocity change (smooth motion) assumes direction and speed of object does not change drastically.
  • 28. B. Statistical methods • Statistical methods models uncertainties to handle noise in an image. • A well-known method for statistical point tracking is multiple hypothesis tracking(MHT). • A set of hypotheses are designed for an object and predictions are made for each hypothesis for the object's position. • The hypothesis with the highest prediction is the most likely and is chosen for tracking. • For tracking single objects are the Kalman filter and Particle filters. The Kalman filter is limited to a linear system and uses prediction and correction to estimate an object's motion
  • 29. 2. KERNAL TRACKING • Represents object as a geometric shape, called a kernel, and estimates motion of this kernel in consecutive frames. • KT commonly used to track a single object. Uses brute force to search an image for a region that matches the template in the previous image. • The brute force searching results in this method computationally expensive, but this can be overcome by optimizations to the method, such as limiting the search to a certain region. • A limitation of kernel tracking is that parts of the background may appear inside the kernel, but this can be overcome by making the kernel inside the object, instead of around it.
  • 30. 3. SILHOUETTE TRACKING • Objects have complex shapes, for example, hands, head, and shoulders cannot be well described by simple geometric shapes. Silhouette based methods provide an accurate shape description for these objects. • This model can be in the form of a color histogram, object edges or the object contour. We divide silhouette trackers into two categories shape matching and contour tracking.  Shape Matching can be performed similar to tracking based on template matching where an object silhouette and its associated model is searched in the current frame.  Contour Tracking • methods, in contrast to shape matching methods. iteratively evolve an initial contour in the previous frame to its new position in the current frame. • Silhouette tracking is employed when tracking the complete region.