Srinivasan et al., 2022 - Google Patents
Artificial Intelligence Based Efficient Activity Recognition with Real Time Implementation for ATM SecuritySrinivasan et al., 2022
- Document ID
- 1693938262312032468
- Author
- Srinivasan S
- Vallikannu A
- Ganesh A
- Kumar I
- Gopal B
- Publication year
- Publication venue
- International Conference on Intelligent Cyber Physical Systems and Internet of Things
External Links
Snippet
Recognizing human activities plays a substantial role in human-to-human and human-to- computer interactions. Recognizing human activities from video sequences or pictures is a difficult task because of troubles, such as history clutter, partial occlusion, modifications in …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00624—Recognising scenes, i.e. recognition of a whole field of perception; recognising scene-specific objects
- G06K9/00771—Recognising scenes under surveillance, e.g. with Markovian modelling of scene activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/20—Image acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T7/00—Image analysis
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11295139B2 (en) | Human presence detection in edge devices | |
Roy | Snatch theft detection in unconstrained surveillance videos using action attribute modelling | |
WO2020134238A1 (en) | Living body detection method and apparatus, and storage medium | |
Pazho et al. | Ancilia: Scalable intelligent video surveillance for the artificial intelligence of things | |
Kaur et al. | Deepfakes: temporal sequential analysis to detect face-swapped video clips using convolutional long short-term memory | |
Myagmar-Ochir et al. | A survey of video surveillance systems in smart city | |
Erdélyi et al. | Privacy protection vs. utility in visual data: An objective evaluation framework | |
Zhang et al. | Recent advances in video analytics for rail network surveillance for security, trespass and suicide prevention—A survey | |
Huszár et al. | Live spoofing detection for automatic human activity recognition applications | |
Semerikov et al. | Mask and emotion: computer vision in the age of COVID-19 | |
Giorgi et al. | Privacy-Preserving Analysis for Remote Video Anomaly Detection in Real Life Environments. | |
Choudhry et al. | A Comprehensive Survey of Machine Learning Methods for Surveillance Videos Anomaly Detection | |
Yang et al. | Distributed multi-camera multi-target association for real-time tracking | |
Nanda et al. | Soft computing techniques-based digital video forensics for fraud medical anomaly detection | |
Dharmalingam et al. | Vector space based augmented structural kinematic feature descriptor for human activity recognition in videos | |
Parashar et al. | A robust covariate‐invariant gait recognition based on pose features | |
Srinivasan et al. | Artificial Intelligence Based Efficient Activity Recognition with Real Time Implementation for ATM Security | |
Kulbacki et al. | Intelligent video monitoring system with the functionality of online recognition of people’s behavior and interactions between people | |
Condell et al. | Automatic gait recognition and its potential role in counterterrorism | |
Mir et al. | Criminal action recognition using spatiotemporal human motion acceleration descriptor | |
Kumar et al. | Anomalous Human Action Monitoring in Video Images Using RPCA-MFTSL AND PSO-CNN | |
Akole et al. | Real time cctv violence detection system using deep learning | |
Solmaz | Video-based detection of abnormal activities in crowd using a combination of motion-based features | |
Mumtaz et al. | Towards Real-world Violence Recognition via Efficient Deep Features and Sequential Patterns Analysis | |
Bidstrup et al. | Privacy-aware anomaly detection using semantic segmentation |