WO2012081969A1 - Système et procédé de détection d'événement d'intrusion - Google Patents
Système et procédé de détection d'événement d'intrusion Download PDFInfo
- Publication number
- WO2012081969A1 WO2012081969A1 PCT/MY2011/000164 MY2011000164W WO2012081969A1 WO 2012081969 A1 WO2012081969 A1 WO 2012081969A1 MY 2011000164 W MY2011000164 W MY 2011000164W WO 2012081969 A1 WO2012081969 A1 WO 2012081969A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- blob
- properties
- motion
- pixels
- component
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19602—Image analysis to detect motion of the intruder, e.g. by frame subtraction
- G08B13/19604—Image analysis to detect motion of the intruder, e.g. by frame subtraction involving reference image or background adaptation with time to compensate for changing conditions, e.g. reference image update on detection of light level change
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T7/00—Image analysis
- G06T7/10—Segmentation; Edge detection
- G06T7/11—Region-based segmentation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T7/00—Image analysis
- G06T7/10—Segmentation; Edge detection
- G06T7/155—Segmentation; Edge detection involving morphological operators
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T7/00—Image analysis
- G06T7/10—Segmentation; Edge detection
- G06T7/174—Segmentation; Edge detection involving the use of two or more images
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T7/00—Image analysis
- G06T7/10—Segmentation; Edge detection
- G06T7/194—Segmentation; Edge detection involving foreground-background segmentation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T7/00—Image analysis
- G06T7/20—Analysis of motion
- G06T7/254—Analysis of motion involving subtraction of images
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V20/00—Scenes; Scene-specific elements
- G06V20/50—Context or environment of the image
- G06V20/52—Surveillance or monitoring of activities, e.g. for recognising suspicious objects
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19602—Image analysis to detect motion of the intruder, e.g. by frame subtraction
- G08B13/19606—Discriminating between target movement or movement in an area of interest and other non-signicative movements, e.g. target movements induced by camera shake or movements of pets, falling leaves, rotating fan
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19602—Image analysis to detect motion of the intruder, e.g. by frame subtraction
- G08B13/19613—Recognition of a predetermined image pattern or behaviour pattern indicating theft or intrusion
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2207/00—Indexing scheme for image analysis or image enhancement
- G06T2207/10—Image acquisition modality
- G06T2207/10016—Video; Image sequence
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2207/00—Indexing scheme for image analysis or image enhancement
- G06T2207/10—Image acquisition modality
- G06T2207/10024—Color image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2207/00—Indexing scheme for image analysis or image enhancement
- G06T2207/20—Special algorithmic details
- G06T2207/20036—Morphological image processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2207/00—Indexing scheme for image analysis or image enhancement
- G06T2207/30—Subject of image; Context of image processing
- G06T2207/30232—Surveillance
Definitions
- a SYSTEM AND METHOD TO DETECT INTRUSION EVENT FIELD OF INVENTION The present invention relates to a system and method for detection of intrusion event within one or more predefined regions of interest (ROIs) while minimizing false alarm due to noise and reduction of misdetection.
- ROIs regions of interest
- video surveillance utilizes human operators to monitor multiple screens and to identify occurrence of any abnormal event in monitored area.
- Existing intrusion detection methods are based on motion detection technology, whereby existence of object within the scene is detected by frame differencing current image frame with reference image which is generated from series of history images.
- this area of intrusion detection refers to 'blob detection' where blobs are visual modules.
- the detection method is aimed at detecting points and/or regions in the image that are either brighter or darker than the surrounding area or ROI.
- the present invention provides a system and method to detect intrusion event within one or more predefined regions-of-interest by validating noise removal analysis prior to actual removal, updating background image by considering object significance level, and including temporal analysis during event analysis based on a predefined sensitivity level for each region-of-interest in the scene.
- the subject matter claimed herein is not limited to embodiments that solve any disadvantages or that operate only in environments such as those described above. Rather, this background is only provided to illustrate one exemplary technology area where some embodiments described herein may be practice.
- the present invention provides a system (100) for detecting intrusion event in region of interest.
- the system comprising at least one blob segmentation sub-component (102), at least one blob properties computation sub-component (104), at least one blob filtering analysis and validation sub-component (106), at least one background model update sub-component (108) and at least one intrusion event analysis sub-component (1 0).
- the said blob segmentation sub-component (102) processes current image and extracts motion pixels by subtracting current image from reference or background image.
- the said blob properties computation sub-component (104) classifies motion pixels by applying morphology closing and filling holes to current motion map and labeling each of adjacent motion pixels.
- the said blob filtering analysis and validation sub-component (106) validates intruder blobs using combination of rules based on blob geometric properties, temporal properties and blob significancy based on similarity properties of blob with surrounding pixels.
- the said background model update sub-component (108) updates background image using combination of rules based on similarity value of detected blob and its surrounding by updating pixel in background image using predefined increment or decrement values if current pixel is background pixel and updating background pixel with current pixel intensity if current pixel belongs to motion blob and blob is non-significant while the said intrusion event analysis sub-component (110) triggers alert when event is detected and verified.
- the said blob properties computation sub-component (104) determines intruder blobs by determining similarity between blob and surrounding pixels in current image by calculating intersection value between histograms of motion pixels and non-motion pixels within blob bounding box for current image, determining similarity between blob and surrounding pixels in background image by calculating histogram intersection value between histograms of motion pixels and non-motion pixels within blob bounding box for background image and determining motion blob as non-siginificant if histogram intersection value of background image is larger than histogram intersection value of current image for more than predefined threshold value.
- the said blob filtering analysis and validation sub-component (106) calculates blob properties validates intruder blobs using rule set which combines information of calculated properties by considering blob as noise if blob status is new and blob is non- significant, examining blob geometric properties against acceptable range of values if blob status is not new, considering blob as noise if blob property is out of predefined range and blob status is not split and blob lifespan is more than predefined threshold value else considering blob as intruder blob.
- Another aspect of the present invention provides a method (700) for detecting intrusion event in region of interest.
- the method comprising the steps of processing current image and extracting motion pixels (702), classifying motion pixels (704), determining intruder blobs using combination of rules based on blob geometric properties, temporal properties and similarity properties of blob with surrounding pixels (706), updating background image using combination of rules based on similarity value of detected blob and its surrounding (708) and triggering alert when event is detected and verified (710).
- a method for determining intruder blobs further comprises calculating blob properties (802) and validating intruder blobs using rule set which combines information of calculated properties (804).
- a method for updating background image using combination of rules based on similarity value of detected blob and its surrounding further comprises updating pixel in background image using predefined increment or decrement values if current pixel is background pixel (902) and updating background pixel with current pixel intensity if current pixel belongs to motion blob and blob is non-significant (904).
- a method for calculating blob properties further comprises calculating blob geometrical properties (1002), calculating blob temporal properties (1004) and calculating blob significancy based on similarity properties with surrounding pixels (1006).
- a method for determining intruder blobs further comprises determining similarity between blob and surrounding pixels in current image by calculating histogram intersection value between histograms of motion pixels and non-motion pixels within blob bounding box for current image (1102), determining similarity between blob and surrounding pixels in background image by calculating histogram intersection value between histograms of motion pixels and non-motion pixels within blob bounding box for background image (1104) and determining motion blob as non-significant if histogram intersection value of background image is larger than histogram intersection value of current image for more than predefined threshold value ( 106).
- a method for validating intruder blobs using rule set which combines information of calculated properties further comprises considering blob as noise if blob status is new and blob is non-significant (1202), examining blob geometric properties against acceptable range of values if blob status is not new (1204), considering blob as noise if blob property is out of predefined range and blob status is not split and blob lifespan is more than predefined threshold value (1206), else considering blob as intruder blob (1208).
- Fig. 1 illustrates architecture of intrusion detection system of the present invention.
- Fig. 2 illustrates blob segmentation sub-component.
- Fig. 3 is a flowchart illustrating blob filtering analysis and validation sub-component.
- Fig. 4 is a flowchart illustrating blob properties analysis.
- Fig. 5 is a flowchart illustrating motion and non-motion histogram intersection computation.
- Fig. 6 illustrates background updating rule.
- Fig. 7 is a flowchart illustrating a method for detecting intrusion event in region of interest.
- Fig. 8 is a flowchart illustrating a method for determining intruder blobs.
- Fig. 9 is a flowchart illustrating a method for updating background image using combination of rules based on similarity value of detected blob and its surrounding.
- Fig. 10 is a flowchart illustrating a method for calculating blob properties.
- Fig. 11 is a flowchart illustrating a method for further determining intruder blob.
- Fig. 12 is a flowchart illustrating a method for validating intruder blobs using rule set which combines information of calculated properties.
- the present invention provides a system and method for detection of intrusion event within one or more predefined regions of interest (ROIs) while minimizing false alarm due to noise and reduction of misdetection.
- ROIs regions of interest
- Fig. 1 illustrates general architecture of the present invention for intrusion event detection.
- the illustrated intrusion detection system (100) comprises at least one blob segmentation sub-component (102), at least one blob properties computation sub-component (104), at least one blob filtering analysis and validation sub-component (106), at least one background model update sub-component (108) and at least one intrusion event analysis sub-component (110).
- the said system comprises of inputs wherein the inputs includes at least one sensor device, at least one region of interest (ROI) map and at least one sensitivity level detection.
- Sensitivity level determines responsiveness of the system of the present invention by detecting intrusion event as well as to provide for consistency of the system in maintaining event alert.
- blob segmentation subcomponent (102) processes current image and extracts motion pixels by subtracting current image from reference or background image. The difference of the image is thresholded to produce current motion map.
- Motion map is a binary map where pixels with zero values indicate background pixels whereas non-zero pixels are motion or foreground pixels.
- Blob properties computation sub-component (104) classifies motion pixels by applying morphology closing and filling holes to current motion map. Resultant map is labeled using pixel connect algorithm whereby each group of connected motion pixels will be labeled with the same label to indicate pixels which belongs to the same group. A connected motion pixel is called motion blob.
- the said blob properties computation sub-component (104) further determines blobs significancy by determining similarity between blob and surrounding pixels in current image by calculating histogram intersection value between histograms of motion pixels and non-motion pixels within blob bounding box for current image, determining similarity between blob and surrounding pixels in background image by calculating histogram intersection value between histograms of motion pixels and non-motion pixels within blob bounding box for background image and determining motion blob as nonsignificant if histogram intersection value of background image is larger than histogram intersection value of current image for more than predefined threshold value.
- Fig. 3 is a flowchart illustrating blob filtering analysis and validation sub-component (106).
- Blob filtering analysis and validation subcomponent (106) validates intruder blobs using rule set which combines information of calculated properties based on blob geometrical properties, temporal properties and blob significancy based on similarity properties of blob with surrounding pixels.
- Blob filtering analysis and validation sub-component (106) validates intruder blobs using rule set which combines information of calculated properties by considering blob as noise if blob status is new and blob is non-significant, examining blob geometric properties against acceptable range of values if blob status is not new, considering blob as noise if blob property is out of predefined range and blob status is not split and blob lifespan is more than predefined threshold value else considering blob as intruder blob.
- process flow of blob filtering analysis and validation subcomponent (106) comprises of current blobs properties analysis, blobs temporal analysis, blobs neighboring pixels analysis and validation of blobs.
- current blobs properties analysis probability that motion blob belongs to noise based on its properties is computed.
- User can select to invoke any of the filters, for example size filter, compact filter, or orientation filter, then the properties for each blob will be compared against each filters predetermined minimum and maximum acceptable range of values. Blob will be flagged as 'to be-removed' if any blob properties does not fall within the acceptable range. Prior to this step, all small motion blobs will be removed first. This entire step is illustrated in Fig. 4.
- blob temporal properties are updated based on current- previous blob overlapping analysis.
- Each detected blob in current image frame will be compared against all of previous motion blobs and percentage of overlapping between current and previous blob will be calculated. If overlapping percentage is above a certain threshold value, the corresponding blobs are considered as related and vice versa.
- temporal properties of each detected blob in current image frame will be updated. These properties include blob lifespan, blob's average and standard deviation area, centroid etc.
- blobs neighboring pixels analysis all motion and non-motion pixels are enclosed within blob bounding box which will be analyzed using histogram intersection in order to determine if motion blob is an actual object or a 'ghost' of object. Thereafter, blobs are validated to be removed and object map is updated.
- Fig. 5 is a flowchart illustrating motion and non-motion histogram intersection computation of background model update sub-component (108).
- Color histogram of background pixels and foreground pixels will be computed as illustrated in FIG. 5.
- background or reference image will be updated. Updating image is crucial as gradual background changes in the scene will be gradually updated as part of background.
- background updating step will be taken into consideration as the current object significance level which have been computed in previous sub-component.
- the said background model update sub-component updates background image using combination of rules based on similarity value of detected blob and its surrounding by updating pixel in background image using predefined increment or decrement values if current pixel is background pixel and updating background pixel with current pixel intensity if current pixel belongs to motion blob and blob is non-significant.
- Fig. 6 Rules to update the said background is illustrated in Fig. 6. For each image pixels, if pixel is background, then update pixel. If pixel is foreground and non-significant then update pixel. Otherwise, pixels will not be updated. After all steps above completed, the final object map will contain only possible human blobs. Then these blobs will be analyzed by event analysis sub-component. The said intrusion event analysis sub-component triggers alert when event is detected and verified. First each of these blobs reference points will be examined whether they fall within the predefined ROI or not. Only blobs which reference points fall within ROI will be considered.
- Fig. 7 is a flowchart illustrating a method for detecting intrusion event in region of interest.
- a method (700) for detecting intrusion event in region of interest comprising the steps of processing current image and extracting motion pixels (702), classifying motion pixels (704) by applying morphology closing and filing holes to current motion map and labeling each of adjacent motion pixels, determining intruder blobs using combination of rules based on blob geometric properties, temporal properties and similarity properties of blob with surrounding pixels (706), updating background image using combination of rules based on similarity value of detected blob and its surrounding (708) and triggering alert when event is detected and verified (710).
- Fig. 8 is a flowchart illustrating a method for determining intruder blobs
- Fig. 9 is a flowchart illustrating a method for updating background image using combination of rules based on similarity value of detected blob and its surrounding
- Fig. 10 is a flowchart illustrating a method for calculating blob properties.
- blob properties is first calculated to determine intruder blobs (802) and thereafter intruder blobs is validated using rule set which combines information of calculated properties (804).
- rule set which combines information of calculated properties (804).
- the method for computing blob properties further comprises calculating blob geometrical properties (1002), calculating blob temporal properties (1004) and calculating blob significancy based on similarity properties with surrounding pixels (1006).
- Blob geometrical properties include area, orientation and compactness
- blob temporal properties include blob lifespan and blob status.
- background image is updated by updating pixel in background image using predefined increment or decrement values if current pixel is background pixel (902) and background image is updated with current pixel intensity if current pixel belongs to motion blob and blob is non-significant (904).
- Fig. 11 provides further steps for determining intruder blobs by determining similarity between blob and surrounding pixels in current image by calculating histogram intersection value between histograms of motion pixels and non-motion pixels within blob bounding box for current image (1102). Thereafter, similarity between blob and surrounding pixels in background image is determined by calculating histogram intersection value between histograms of motion pixels and non- motion pixels within blob bounding box for background image (1104). Subsequently, motion blob is determined as non-significant if histogram intersection value of background image is larger than histogram intersection value of current image for more than predefined threshold value (1106).
- Fig. 12 a flowchart illustrating a method for validating intruder blobs using rule set which combines information of calculated properties.
- intruder blobs are validated using rule set which combines information of calculated properties.
- Blob is considered as noise if blob status is new (1202) and blob is non-significant while blob geometric properties are examined against acceptable range of values if blob status is not new (1204).
- blob is considered as noise if blob property is out of predefined range and blob status is not split and blob lifespan is more than predefined threshold value (1206); else blob is considered as intruder blob (1208).
- Alert is triggered when event is detected and verified wherein only blobs which reference points fall within ROI will be considered.
- the said intrusion event analysis subcomponent (110) triggers alert when event is detected and verified.
- the approach of the present invention provides a system and method to detect intrusion event within one or more predefined regions-of-interest by validating noise removal analysis prior to actual removal, updating background image by considering object significance level, and including temporal analysis during event analysis based on a predefined sensitivity level for each region-of-interest in the scene.
- the present invention may be embodied in other specific forms without departing from its essential characteristics.
- the described embodiments are to be considered in all respects only as illustrative and not restrictive.
- the scope of the invention is, therefore indicated by the appended claims rather than by the foregoing description. All changes, which come within the meaning and range of equivalency of the claims, are to be embraced within their scope.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Image Analysis (AREA)
Abstract
La présente invention porte sur un système et un procédé de détection d'événement d'intrusion dans une région d'intérêt. Le système comprend au moins un sous-composant de segmentation de tache qui traite une image courante et extrait des pixels de mouvement par soustraction de l'image courante à une image de référence ou d'arrière-plan ; au moins un sous-composant de calcul de propriétés de tâche, qui classe les pixels de mouvement par application de trous de fermeture et de classement de morphologie à une carte de mouvement courante et étiquetage de chacun des pixels de mouvement adjacents ; au moins un sous-composant d'analyse et de validation de filtrage de tache qui valide des taches d'intrus à l'aide d'ensemble de règles ; au moins un sous-composant de mise à jour de modèle d'arrière-plan, qui met à jour une image d'arrière-plan à l'aide d'une combinaison de règles sur la base d'une valeur de similarité d'une tache détectée et de son environnement ; et au moins un sous-composant d'analyse d'événement d'intrusion qui déclenche une alerte lorsqu'un événement est détecté et vérifié.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
MYPI2010005928 | 2010-12-13 | ||
MYPI2010005928 MY152782A (en) | 2010-12-13 | 2010-12-13 | A system and method to detect intrusion event |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2012081969A1 true WO2012081969A1 (fr) | 2012-06-21 |
Family
ID=46244924
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/MY2011/000164 WO2012081969A1 (fr) | 2010-12-13 | 2011-06-30 | Système et procédé de détection d'événement d'intrusion |
Country Status (2)
Country | Link |
---|---|
MY (1) | MY152782A (fr) |
WO (1) | WO2012081969A1 (fr) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103209321A (zh) * | 2013-04-03 | 2013-07-17 | 南京邮电大学 | 一种视频背景快速更新方法 |
CN103606166A (zh) * | 2013-12-04 | 2014-02-26 | 天津普达软件技术有限公司 | 一种药丸灌装图像分割方法 |
WO2017129804A1 (fr) * | 2016-01-29 | 2017-08-03 | Kiwisecurity Software Gmbh | Procédés et appareil permettant d'utiliser une analytique vidéo pour détecter des régions en vue d'une protection de la confidentialité dans des images provenant de caméras mobiles |
CN110244998A (zh) * | 2019-06-13 | 2019-09-17 | 广州酷狗计算机科技有限公司 | 页面背景、直播页面背景的设置方法、装置及存储介质 |
CN113158800A (zh) * | 2021-03-19 | 2021-07-23 | 上海云赛智联信息科技有限公司 | 围界入侵混合检测方法及围界入侵混合检测系统 |
CN118247933A (zh) * | 2024-04-18 | 2024-06-25 | 江苏臻星美悦健康科技有限公司 | 应用图像大数据处理的现场劝阻警示系统 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050100192A1 (en) * | 2003-10-09 | 2005-05-12 | Kikuo Fujimura | Moving object detection using low illumination depth capable computer vision |
US20060140481A1 (en) * | 2004-12-08 | 2006-06-29 | Kye-Kyung Kim | Target detecting system and method |
US20080166045A1 (en) * | 2005-03-17 | 2008-07-10 | Li-Qun Xu | Method of Tracking Objects in a Video Sequence |
US20080219573A1 (en) * | 2007-02-28 | 2008-09-11 | Interuniversitair Microelektronica Centrum Vzw (Imec) | System and method for motion detection and the use thereof in video coding |
WO2010124062A1 (fr) * | 2009-04-22 | 2010-10-28 | Cernium Corporation | Système et procédé de détection de mouvement dans une vidéo de surveillance |
-
2010
- 2010-12-13 MY MYPI2010005928 patent/MY152782A/en unknown
-
2011
- 2011-06-30 WO PCT/MY2011/000164 patent/WO2012081969A1/fr active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050100192A1 (en) * | 2003-10-09 | 2005-05-12 | Kikuo Fujimura | Moving object detection using low illumination depth capable computer vision |
US20060140481A1 (en) * | 2004-12-08 | 2006-06-29 | Kye-Kyung Kim | Target detecting system and method |
US20080166045A1 (en) * | 2005-03-17 | 2008-07-10 | Li-Qun Xu | Method of Tracking Objects in a Video Sequence |
US20080219573A1 (en) * | 2007-02-28 | 2008-09-11 | Interuniversitair Microelektronica Centrum Vzw (Imec) | System and method for motion detection and the use thereof in video coding |
WO2010124062A1 (fr) * | 2009-04-22 | 2010-10-28 | Cernium Corporation | Système et procédé de détection de mouvement dans une vidéo de surveillance |
Non-Patent Citations (1)
Title |
---|
TANG S.L. ET AL.: "Hybrid Blob and Particle Filter Tracking Approach for Robust Object Tracking", INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE, ICCS 2010, PROCEDIA COMPUTER SCIENCE, vol. 1, May 2010 (2010-05-01), pages 2549 - 2557, XP027492187, DOI: doi:10.1016/j.procs.2010.04.288 * |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103209321A (zh) * | 2013-04-03 | 2013-07-17 | 南京邮电大学 | 一种视频背景快速更新方法 |
CN103209321B (zh) * | 2013-04-03 | 2016-04-13 | 南京邮电大学 | 一种视频背景快速更新方法 |
CN103606166A (zh) * | 2013-12-04 | 2014-02-26 | 天津普达软件技术有限公司 | 一种药丸灌装图像分割方法 |
WO2017129804A1 (fr) * | 2016-01-29 | 2017-08-03 | Kiwisecurity Software Gmbh | Procédés et appareil permettant d'utiliser une analytique vidéo pour détecter des régions en vue d'une protection de la confidentialité dans des images provenant de caméras mobiles |
US10565395B2 (en) | 2016-01-29 | 2020-02-18 | Kiwi Security Software GmbH | Methods and apparatus for using video analytics to detect regions for privacy protection within images from moving cameras |
US12062268B2 (en) | 2016-01-29 | 2024-08-13 | Kiwisecurity Software Gmbh | Methods and apparatus for using video analytics to detect regions for privacy protection within images from moving cameras |
CN110244998A (zh) * | 2019-06-13 | 2019-09-17 | 广州酷狗计算机科技有限公司 | 页面背景、直播页面背景的设置方法、装置及存储介质 |
CN113158800A (zh) * | 2021-03-19 | 2021-07-23 | 上海云赛智联信息科技有限公司 | 围界入侵混合检测方法及围界入侵混合检测系统 |
CN118247933A (zh) * | 2024-04-18 | 2024-06-25 | 江苏臻星美悦健康科技有限公司 | 应用图像大数据处理的现场劝阻警示系统 |
Also Published As
Publication number | Publication date |
---|---|
MY152782A (en) | 2014-11-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110516609B (zh) | 一种基于图像多特征融合的火灾视频检测及预警方法 | |
EP1683105B1 (fr) | Detection d'objets dans des images | |
JP5518359B2 (ja) | 煙検出装置 | |
Bayona et al. | Comparative evaluation of stationary foreground object detection algorithms based on background subtraction techniques | |
CN106056079B (zh) | 一种图像采集设备及人脸五官的遮挡检测方法 | |
CN111723644A (zh) | 一种监控视频遮挡检测方法及系统 | |
WO2012081969A1 (fr) | Système et procédé de détection d'événement d'intrusion | |
US20090310822A1 (en) | Feedback object detection method and system | |
CN108198206A (zh) | 基于多特征联合和Camshift算法结合的多目标跟踪方法 | |
WO2023039781A1 (fr) | Procédé de détection d'objet abandonné, appareil, dispositif électronique et support de stockage | |
CN103729858A (zh) | 一种视频监控系统中遗留物品的检测方法 | |
JP2010097412A (ja) | 煙検出装置 | |
CN111259718A (zh) | 一种基于高斯混合模型的扶梯滞留检测方法及系统 | |
CN113297926A (zh) | 行为检测识别方法及系统 | |
JP2010015469A (ja) | 静止領域検出方法とその装置、プログラム及び記録媒体 | |
TWI493510B (zh) | 跌倒偵測方法 | |
Tang et al. | Hybrid blob and particle filter tracking approach for robust object tracking | |
CN112927262A (zh) | 一种基于视频的相机镜头遮挡检测方法及系统 | |
Murari et al. | Algorithms for the automatic identification of MARFEs and UFOs in JET database of visible camera videos | |
KR101690050B1 (ko) | 지능형 영상보안 시스템 및 객체 추적 방법 | |
KR101581162B1 (ko) | 실시간 영상 기반의 화염, 연기 및 물체 움직임 자동 감지 방법, 장치 및 시스템 | |
KR20200060868A (ko) | 객체 탐지 및 자동 추적이 가능한 다시점 영상 감시 시스템 | |
CN111667419A (zh) | 一种基于Vibe算法的移动目标鬼影消除方法及系统 | |
US10916016B2 (en) | Image processing apparatus and method and monitoring system | |
Płaczek | A real time vehicle detection algorithm for vision-based sensors |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 11848668 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 11848668 Country of ref document: EP Kind code of ref document: A1 |