Liao et al., 2017 - Google Patents
Security event recognition for visual surveillanceLiao et al., 2017
View PDF- Document ID
- 10127525685284916372
- Author
- Liao W
- Yang C
- Ying Yang M
- Rosenhahn B
- Publication year
- Publication venue
- ISPRS Annals of the Photogrammetry, Remote Sensing and Spatial Information Sciences
External Links
Snippet
With rapidly increasing deployment of surveillance cameras, the reliable methods for automatically analyzing the surveillance video and recognizing special events are demanded by different practical applications. This paper proposes a novel effective …
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19602—Image analysis to detect motion of the intruder, e.g. by frame subtraction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00624—Recognising scenes, i.e. recognition of a whole field of perception; recognising scene-specific objects
- G06K9/00771—Recognising scenes under surveillance, e.g. with Markovian modelling of scene activity
- G06K9/00778—Recognition or static of dynamic crowd images, e.g. recognition of crowd congestion
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00624—Recognising scenes, i.e. recognition of a whole field of perception; recognising scene-specific objects
- G06K9/00711—Recognising video content, e.g. extracting audiovisual features from movies, extracting representative key-frames, discriminating news vs. sport content
- G06K9/00718—Higher-level, semantic clustering, classification or understanding of video scenes, e.g. detection, labelling or Markovian modelling of sport events or news items
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
- G06K9/00288—Classification, e.g. identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00335—Recognising movements or behaviour, e.g. recognition of gestures, dynamic facial expressions; Lip-reading
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T7/00—Image analysis
- G06T7/20—Analysis of motion
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30781—Information retrieval; Database structures therefor; File system structures therefor of video data
- G06F17/30784—Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre
- G06F17/30799—Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre using low-level visual features of the video content
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Tripathi et al. | Suspicious human activity recognition: a review | |
Colque et al. | Histograms of optical flow orientation and magnitude and entropy to detect anomalous events in videos | |
Lin et al. | Abandoned object detection via temporal consistency modeling and back-tracing verification for visual surveillance | |
Filonenko et al. | Unattended object identification for intelligent surveillance systems using sequence of dual background difference | |
Foresti et al. | Automatic detection and indexing of video-event shots for surveillance applications | |
Liao et al. | Security event recognition for visual surveillance | |
US20090319560A1 (en) | System and method for multi-agent event detection and recognition | |
US9977970B2 (en) | Method and system for detecting the occurrence of an interaction event via trajectory-based analysis | |
Ferryman et al. | Performance evaluation of crowd image analysis using the PETS2009 dataset | |
Bouma et al. | Automatic detection of suspicious behavior of pickpockets with track-based features in a shopping mall | |
Patil et al. | Suspicious movement detection and tracking based on color histogram | |
Bhargava et al. | Detection of object abandonment using temporal logic | |
US10929688B2 (en) | System and method of video content filtering | |
Kalaivani et al. | Towards comprehensive understanding of event detection and video summarization approaches | |
Lin et al. | Left-luggage detection from finite-state-machine analysis in static-camera videos | |
Yang et al. | Cluster-based crowd movement behavior detection | |
Lu et al. | Detecting unattended packages through human activity recognition and object association | |
Yang et al. | Security event recognition for visual surveillance | |
Yang et al. | Surveillance system using abandoned object detection | |
Velastin | CCTV video analytics: Recent advances and limitations | |
Huang et al. | Unsupervised pedestrian re-identification for loitering detection | |
Mahareek et al. | Detecting anomalies in security cameras with 3DCNN and ConvLSTM | |
Ghasemi et al. | A novel algorithm to predict and detect suspicious behaviors of people at public areas for surveillave cameras | |
Zhang et al. | What makes for good multiple object trackers? | |
Avinash et al. | Automated video surveillance for retail store statistics generation |