{"title":"拥挤环境下的对象安全检测","authors":"Xingxing Zou, Jun Wen","doi":"10.1109/ICCPS.2015.7454083","DOIUrl":null,"url":null,"abstract":"This paper describes a new approach aimed at automatic identify events of abandoned and stolen objects detection in video surveillance system. Our method mainly include three steps of data processing: the first processing phrase is object extraction, involving a background subtraction algorithm which dynamically updates two sets of background. Then, extracted objects are classified as static or dynamic objects. Finally, a decision-making model is employed to calculate a confidence score for the classification about event, and an alarm will be automatically triggered if the score of corresponding action is higher than a pre-defined threshold. Also, Compared with the existing detection algorithm, the robustness and efficiency of the method was tested on our real time video surveillance system and evaluated by public database such as AVSS 2007 data sets.","PeriodicalId":319991,"journal":{"name":"2015 IEEE International Conference on Communication Problem-Solving (ICCP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Detection of object security in crowed environment\",\"authors\":\"Xingxing Zou, Jun Wen\",\"doi\":\"10.1109/ICCPS.2015.7454083\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper describes a new approach aimed at automatic identify events of abandoned and stolen objects detection in video surveillance system. Our method mainly include three steps of data processing: the first processing phrase is object extraction, involving a background subtraction algorithm which dynamically updates two sets of background. Then, extracted objects are classified as static or dynamic objects. Finally, a decision-making model is employed to calculate a confidence score for the classification about event, and an alarm will be automatically triggered if the score of corresponding action is higher than a pre-defined threshold. Also, Compared with the existing detection algorithm, the robustness and efficiency of the method was tested on our real time video surveillance system and evaluated by public database such as AVSS 2007 data sets.\",\"PeriodicalId\":319991,\"journal\":{\"name\":\"2015 IEEE International Conference on Communication Problem-Solving (ICCP)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 IEEE International Conference on Communication Problem-Solving (ICCP)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCPS.2015.7454083\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE International Conference on Communication Problem-Solving (ICCP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCPS.2015.7454083","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Detection of object security in crowed environment
This paper describes a new approach aimed at automatic identify events of abandoned and stolen objects detection in video surveillance system. Our method mainly include three steps of data processing: the first processing phrase is object extraction, involving a background subtraction algorithm which dynamically updates two sets of background. Then, extracted objects are classified as static or dynamic objects. Finally, a decision-making model is employed to calculate a confidence score for the classification about event, and an alarm will be automatically triggered if the score of corresponding action is higher than a pre-defined threshold. Also, Compared with the existing detection algorithm, the robustness and efficiency of the method was tested on our real time video surveillance system and evaluated by public database such as AVSS 2007 data sets.