Nothing Special   »   [go: up one dir, main page]

Srinivasan et al., 2022 - Google Patents

Artificial Intelligence Based Efficient Activity Recognition with Real Time Implementation for ATM Security

Srinivasan et al., 2022

Document ID
1693938262312032468
Author
Srinivasan S
Vallikannu A
Ganesh A
Kumar I
Gopal B
Publication year
Publication venue
International Conference on Intelligent Cyber Physical Systems and Internet of Things

External Links

Snippet

Recognizing human activities plays a substantial role in human-to-human and human-to- computer interactions. Recognizing human activities from video sequences or pictures is a difficult task because of troubles, such as history clutter, partial occlusion, modifications in …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00624Recognising scenes, i.e. recognition of a whole field of perception; recognising scene-specific objects
    • G06K9/00771Recognising scenes under surveillance, e.g. with Markovian modelling of scene activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00221Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/20Image acquisition
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T7/00Image analysis

Similar Documents

Publication Publication Date Title
US11295139B2 (en) Human presence detection in edge devices
Roy Snatch theft detection in unconstrained surveillance videos using action attribute modelling
WO2020134238A1 (en) Living body detection method and apparatus, and storage medium
Pazho et al. Ancilia: Scalable intelligent video surveillance for the artificial intelligence of things
Kaur et al. Deepfakes: temporal sequential analysis to detect face-swapped video clips using convolutional long short-term memory
Myagmar-Ochir et al. A survey of video surveillance systems in smart city
Erdélyi et al. Privacy protection vs. utility in visual data: An objective evaluation framework
Zhang et al. Recent advances in video analytics for rail network surveillance for security, trespass and suicide prevention—A survey
Huszár et al. Live spoofing detection for automatic human activity recognition applications
Semerikov et al. Mask and emotion: computer vision in the age of COVID-19
Giorgi et al. Privacy-Preserving Analysis for Remote Video Anomaly Detection in Real Life Environments.
Choudhry et al. A Comprehensive Survey of Machine Learning Methods for Surveillance Videos Anomaly Detection
Yang et al. Distributed multi-camera multi-target association for real-time tracking
Nanda et al. Soft computing techniques-based digital video forensics for fraud medical anomaly detection
Dharmalingam et al. Vector space based augmented structural kinematic feature descriptor for human activity recognition in videos
Parashar et al. A robust covariate‐invariant gait recognition based on pose features
Srinivasan et al. Artificial Intelligence Based Efficient Activity Recognition with Real Time Implementation for ATM Security
Kulbacki et al. Intelligent video monitoring system with the functionality of online recognition of people’s behavior and interactions between people
Condell et al. Automatic gait recognition and its potential role in counterterrorism
Mir et al. Criminal action recognition using spatiotemporal human motion acceleration descriptor
Kumar et al. Anomalous Human Action Monitoring in Video Images Using RPCA-MFTSL AND PSO-CNN
Akole et al. Real time cctv violence detection system using deep learning
Solmaz Video-based detection of abnormal activities in crowd using a combination of motion-based features
Mumtaz et al. Towards Real-world Violence Recognition via Efficient Deep Features and Sequential Patterns Analysis
Bidstrup et al. Privacy-aware anomaly detection using semantic segmentation