Nothing Special   »   [go: up one dir, main page]

Terdal et al., 2023 - Google Patents

YOLO-Based Video Processing for CCTV Surveillance

Terdal et al., 2023

Document ID
5509273311411252008
Author
Terdal S
Sayyada F
Fatima A
Reddy A
Koppal M
Publication year
Publication venue
2023 5th International Conference on Inventive Research in Computing Applications (ICIRCA)

External Links

Snippet

A visual surveillance system is primarily employed for the analysis and interpretation of object behaviours within a given video scene. Surveillance system is important because it acts as a deterrent to crime, helping prevent theft, vandalism, assault and enhances public …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00624Recognising scenes, i.e. recognition of a whole field of perception; recognising scene-specific objects
    • G06K9/00771Recognising scenes under surveillance, e.g. with Markovian modelling of scene activity
    • G06K9/00778Recognition or static of dynamic crowd images, e.g. recognition of crowd congestion
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00221Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
    • G06K9/00288Classification, e.g. identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/20Image acquisition
    • G06K9/32Aligning or centering of the image pick-up or image-field
    • G06K9/3233Determination of region of interest
    • G06K9/3241Recognising objects as potential recognition candidates based on visual cues, e.g. shape
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T7/00Image analysis
    • G06T7/20Analysis of motion
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass

Similar Documents

Publication Publication Date Title
Singh et al. Real-time anomaly recognition through CCTV using neural networks
KR101897923B1 (en) System for providing identify target object based on neural network learning model, method thereof, and computer readable storage having the same
Kalsotra et al. A comprehensive survey of video datasets for background subtraction
Mishra et al. An intelligent motion detection using OpenCV
Patil et al. An approach of understanding human activity recognition and detection for video surveillance using HOG descriptor and SVM classifier
Ansari et al. An expert video surveillance system to identify and mitigate shoplifting in megastores
Mantini et al. UHCTD: A comprehensive dataset for camera tampering detection
Altowairqi et al. A Review of the Recent Progress on Crowd Anomaly Detection
Terdal et al. YOLO-Based Video Processing for CCTV Surveillance
Aqeel et al. Detection of anomaly in videos using convolutional autoencoder and generative adversarial network model
CN117523668A (en) Abnormal behavior detection method of space-time action network
Agarwal et al. Suspicious Activity Detection in Surveillance Applications Using Slow-Fast Convolutional Neural Network
Babiyola et al. A hybrid learning frame work for recognition abnormal events intended from surveillance videos
Aarthy et al. Crowd violence detection in videos using deep learning architecture
Shamnath et al. Human Suspicious Activity Detection Using Ensemble Machine Learning Techniques
Bangare et al. An approach for detecting abandoned object from real time video
Joshi et al. Suspicious object detection
Anandhi Edge Computing-Based Crime Scene Object Detection from Surveillance Video Using Deep Learning Algorithms
Khan Violence Detection From Industrial Surveillance Videos Using Deep Learning
Singh et al. A cellular logic array based data mining framework for object detection in video surveillance system
Mahin et al. A simple approach for abandoned object detection
Ahmed et al. Object Motion Tracking and Detection in Surveillance Videos using Resnet Architecture
Pava et al. Object Detection and Motion Analysis in a Low Resolution 3-D Model
KR102722580B1 (en) Abuse Protection System Based on Deep Learning with CCTV Video
Srivastava et al. Anomaly Detection Approach for Human Detection in Crowd Based Locations