Mihai Dogariu, Liviu-Daniel Stefan, M. Constantin, B. Ionescu
{"title":"人-物交互:在视频监控场景中弃置行李检测中的应用","authors":"Mihai Dogariu, Liviu-Daniel Stefan, M. Constantin, B. Ionescu","doi":"10.1109/COMM48946.2020.9141973","DOIUrl":null,"url":null,"abstract":"CCTV systems bring numerous advantages to security systems, but they require notable efforts from human operators in case of alarming events in order to detect the precise triggering moments. This paper proposes a system that can automatically trigger alarms when it detects abandoned luggage, detects the person that left the baggage and then tracks the suspicious person throughout the perimeter covered by a CCTV system. The system is based on Mask R-CNN and has been tested with several backbone configurations. Wee valuate each subsystem independently on datasets specific for their task. The network model proves to be robust enough to carry on all of the three different tasks as demonstrated by tests.","PeriodicalId":405841,"journal":{"name":"2020 13th International Conference on Communications (COMM)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Human-Object Interaction: Application to Abandoned Luggage Detection in Video Surveillance Scenarios\",\"authors\":\"Mihai Dogariu, Liviu-Daniel Stefan, M. Constantin, B. Ionescu\",\"doi\":\"10.1109/COMM48946.2020.9141973\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"CCTV systems bring numerous advantages to security systems, but they require notable efforts from human operators in case of alarming events in order to detect the precise triggering moments. This paper proposes a system that can automatically trigger alarms when it detects abandoned luggage, detects the person that left the baggage and then tracks the suspicious person throughout the perimeter covered by a CCTV system. The system is based on Mask R-CNN and has been tested with several backbone configurations. Wee valuate each subsystem independently on datasets specific for their task. The network model proves to be robust enough to carry on all of the three different tasks as demonstrated by tests.\",\"PeriodicalId\":405841,\"journal\":{\"name\":\"2020 13th International Conference on Communications (COMM)\",\"volume\":\"67 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 13th International Conference on Communications (COMM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/COMM48946.2020.9141973\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 13th International Conference on Communications (COMM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COMM48946.2020.9141973","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Human-Object Interaction: Application to Abandoned Luggage Detection in Video Surveillance Scenarios
CCTV systems bring numerous advantages to security systems, but they require notable efforts from human operators in case of alarming events in order to detect the precise triggering moments. This paper proposes a system that can automatically trigger alarms when it detects abandoned luggage, detects the person that left the baggage and then tracks the suspicious person throughout the perimeter covered by a CCTV system. The system is based on Mask R-CNN and has been tested with several backbone configurations. Wee valuate each subsystem independently on datasets specific for their task. The network model proves to be robust enough to carry on all of the three different tasks as demonstrated by tests.