Terdal et al., 2023 - Google Patents
YOLO-Based Video Processing for CCTV SurveillanceTerdal et al., 2023
- Document ID
- 5509273311411252008
- Author
- Terdal S
- Sayyada F
- Fatima A
- Reddy A
- Koppal M
- Publication year
- Publication venue
- 2023 5th International Conference on Inventive Research in Computing Applications (ICIRCA)
External Links
Snippet
A visual surveillance system is primarily employed for the analysis and interpretation of object behaviours within a given video scene. Surveillance system is important because it acts as a deterrent to crime, helping prevent theft, vandalism, assault and enhances public …
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19602—Image analysis to detect motion of the intruder, e.g. by frame subtraction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00624—Recognising scenes, i.e. recognition of a whole field of perception; recognising scene-specific objects
- G06K9/00771—Recognising scenes under surveillance, e.g. with Markovian modelling of scene activity
- G06K9/00778—Recognition or static of dynamic crowd images, e.g. recognition of crowd congestion
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
- G06K9/00288—Classification, e.g. identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/20—Image acquisition
- G06K9/32—Aligning or centering of the image pick-up or image-field
- G06K9/3233—Determination of region of interest
- G06K9/3241—Recognising objects as potential recognition candidates based on visual cues, e.g. shape
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T7/00—Image analysis
- G06T7/20—Analysis of motion
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Singh et al. | Real-time anomaly recognition through CCTV using neural networks | |
KR101897923B1 (en) | System for providing identify target object based on neural network learning model, method thereof, and computer readable storage having the same | |
Kalsotra et al. | A comprehensive survey of video datasets for background subtraction | |
Mishra et al. | An intelligent motion detection using OpenCV | |
Patil et al. | An approach of understanding human activity recognition and detection for video surveillance using HOG descriptor and SVM classifier | |
Ansari et al. | An expert video surveillance system to identify and mitigate shoplifting in megastores | |
Mantini et al. | UHCTD: A comprehensive dataset for camera tampering detection | |
Altowairqi et al. | A Review of the Recent Progress on Crowd Anomaly Detection | |
Terdal et al. | YOLO-Based Video Processing for CCTV Surveillance | |
Aqeel et al. | Detection of anomaly in videos using convolutional autoencoder and generative adversarial network model | |
CN117523668A (en) | Abnormal behavior detection method of space-time action network | |
Agarwal et al. | Suspicious Activity Detection in Surveillance Applications Using Slow-Fast Convolutional Neural Network | |
Babiyola et al. | A hybrid learning frame work for recognition abnormal events intended from surveillance videos | |
Aarthy et al. | Crowd violence detection in videos using deep learning architecture | |
Shamnath et al. | Human Suspicious Activity Detection Using Ensemble Machine Learning Techniques | |
Bangare et al. | An approach for detecting abandoned object from real time video | |
Joshi et al. | Suspicious object detection | |
Anandhi | Edge Computing-Based Crime Scene Object Detection from Surveillance Video Using Deep Learning Algorithms | |
Khan | Violence Detection From Industrial Surveillance Videos Using Deep Learning | |
Singh et al. | A cellular logic array based data mining framework for object detection in video surveillance system | |
Mahin et al. | A simple approach for abandoned object detection | |
Ahmed et al. | Object Motion Tracking and Detection in Surveillance Videos using Resnet Architecture | |
Pava et al. | Object Detection and Motion Analysis in a Low Resolution 3-D Model | |
KR102722580B1 (en) | Abuse Protection System Based on Deep Learning with CCTV Video | |
Srivastava et al. | Anomaly Detection Approach for Human Detection in Crowd Based Locations |