SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
IOSR Journal of Computer Engineering (IOSRJCE)
ISSN: 2278-0661 Volume 4, Issue 2 (Sep.-Oct. 2012), PP 26-30
www.iosrjournals.org
www.iosrjournals.org 26 | Page
Development of Human Tracking in Video Surveillance System
for Activity Analysis
Neelam V. Puri 1
and Prof. P. R. Devale 2
1(
PG Scholar, Department of Information Technology, Bharti Vidyapeeth Deemed University,
Pune, India.)
2(
Professor & Head, Department of Information Technology, Bharti Vidyapeeth Deemed
University, Pune, India.)
Abstract : In current era of digital technology visual surveillance systems are persistently in pursuance of
being easier to use, versatile, inexpensive and very fast. Continuous video capturing systems are the
replacement for human watch, because as we know human can be easily distracted and one mistake may lead to
big disaster. So video surveillance systems make this kind of work very easier for user and it provides security
and control where all time watch is required. Proposed algorithm will helpful for to detect moving object and
classify it as human being and keep track of moving human. This procedure is done without getting help of any
additional sensing device. In this paper proposed system can classify in three steps detection, tracking and
action analysis. Detection of human being is done by combination of morphological procedure and feature
extraction method. Tracking of same human and occlusion handling is done in second phase. At last phase
activity analysis is done and in case of any abnormal activities, an alert should be issued.
Keywords: Automated Video surveillance system, Human Detection, Human Tracking, Motion Detection ,
Occlusion handling.
I. INTRODUCTION
There are several studies on the human tracking especially human detection using various methods like
template matching, skin color recognition, gesture modeling etc. Human body gestures can be finding out by
modeling human body and creating consolidated body of knowledge. But this kind of techniques has some
drawbacks like highly sophisticated and very complex for implementation of the procedures. Solution for this
kind of problem is pattern recognition and matching methods.
In video surveillance system to provide better solution for security and monitoring problems new
technologies are introduced. Input device just capture the video streams and store it for the future purpose.
Detecting, tracking and monitoring different activities by the same object are the more complicated and difficult
job for the same capturing device. Every capturing device will not going to have the same configuration and will
not be affordable by each user. Now we know that these video streams are always watched on the computer
system or on same kind of the electronic devices which has some processing capability. While recording video
stream this algorithm may helpful to analyze different actions taken by the moving object (i.e. human being).
This paper is further subdivided as, Section 2 provides an over view of previous research done related to
Automatic Video surveillance. Section 3 discusses an overview of the architecture of the proposed system in
step by step procedure. Section 4, section 5 and section 6 have been dedicated to brief discussion of three major
steps of proposed algorithm that is detecting object as human being, tracking same human being with occlusion
handling and activity analysis. And conclusion work in section 6. Due citation are given in the references
section.
II. PREVIOUS WORK DONE
Normally Background extraction technique is used for the foreground segmentation. There is another
method called as optical flow computation [1]. Optical flow method is computationally expensive method and it
can provide better performance. But for the real time system like video surveillance optical flow method are not
so much suitable. To provide better computational consumption, these two techniques are combined in [2], to
detect movement area they used background subtraction method, and they used optical flow computation
method to remove unnecessary pixels from motion area. Subtracting current image from the reference
background image motion area information can extracted. In recent foreground segmentation method to handle
modelling multiple background objects like tree shaking, water waves etc. mixture of codebook [19],
nonparametric kernel [18], different Gaussian distribution adaptive models [20] are used. To modelling multiple
backgrounds more memory and more complicated algorithms are required even if these are more effective
algorithms. Different Gaussian models considered with environments change like tree shaking, shadow, light
change etc.
Development of Human Tracking in Video Surveillance System for Activity Analysis
www.iosrjournals.org 27 | Page
After detecting object from motion area, object can be classified as human being using different
approaches like model based technique [3], Shape-based [4], neural network based technique [5] or blob based
approaches. Shape based approach highly used in still images, in this shapes are modelled as local curves [6, 7],
then implicitly represented by local or global descriptors in [8]. For pattern recognition neural network models
are very much useful. Mostly part-based modelling is very efficient for detection of articulated objects like
humans. For example, [9] use local features for part detection. [4] Introduce Hierarchical Part-Template
Matching features for human detection.
Then object tracking algorithms in video surveillance system are established to track same object from
two different frames. By creating human model which includes the human features tracking is possible. In
human tracking system occlusion handling is difficult part. To solve this problem, Kalman filter based method
was proposed [10]. Let study different techniques that are used to detect human and next phase human tracking.
III. ARCHITECTURE
Visual surveillance process that takes video as an input, processes the video and performs actions
accordingly. The process of video surveillance consists of many phases.
Figure 1. Architecture of Proposed System
This algorithm approach specifies three sub processes as follows and as shown in Fig. 1.
Detection of Moving Object: This algorithm takes any video stream as an input with static background. Then
detect any motion as an object and then it will identify that object as human being.
Tracking of an object: After detection of an object as human being same object will track using its speed and
velocity. Also in this phase occlusion handling is done.
Activity Analysis: At last phase using gathered information analyze different activities of tracked human
recorded and if any sign of unusual activity or abnormal behaviour of human noticed then alarm will be
triggered.
IV. HUMAN BEING DETECTION
4.1 IMAGE FRAMING AND IMAGE ACQUISITION
In Data acquisition phase different kind of sensing and capturing input devices used for data gathering
from the working environment. For example video capturing and monitoring devices used to record video
stream. For Image framing video must be divided into sequence of frames. Video must be divided mostly into
20-30 frames which are sent to the next phases for further processing.
Most probably background subtraction method applies on the static background images [11]. System
can detect „motion area‟ (only useful data) by comparing reference frame with current frame and get the
extraction of a (new) moving object from the background.
This phase attempt background subtraction comparing reference image and current image in a pixel-by-pixel
fashion as shown by equation below:
| P X1, Y1 C – P X2, Y2 bk | > Th (1)
Where,P(X1, Y1)C is current frame pixel present at (X1, Y1) co-ordinate P(X2, Y2)bk is reference frame pixel
present at (X2, Y2) co-ordinate and this threshold value of difference.
Here foreground pixels are extracted from the static background image so the threshold is fixed. When
the threshold value is less than the pixel difference, it is considered as foreground image. In this way the
foreground objects present in the scene are detected. Only patterns are preprocessed for selection of significant
features.
Development of Human Tracking in Video Surveillance System for Activity Analysis
www.iosrjournals.org 28 | Page
4.2 BACKGROUND SUBTRACTION
Basically background subtraction done subtracting reference image from current image, here in this
algorithm temporal differencing [12] is used to perform background subtraction. In this method the reference
image is the previous images, and it is subtracted from the current image. In order to produce difference
between two images the subtraction value must be greater than a threshold value:
ITh X, Y = 1, ITh X, Y > Th (2)
= 0, ITh X, Y ≤ Th
From the above three human detection methods, the background subtraction is the simplest and mostly used
when the background is stationery. In our implementation we will be keeping static background and hence will
use the simple background subtraction method of human detection.
4.3 SEGMENTATION USING OPTICAL FLOW
Selected feature then passed through the classification phase where classified objects are compared
with the features of object using any mapping function. Optical flow segmentation can be used to provide the
velocity of the moving object is distinguish from that of the background, and has expected characteristics.
Optical flow is the amount of image movement within a given time period [21], [22], [23]. Optical flow method
also known as Lucas-Kanade Method [21],[23]. Assume reference image captured at time T and current image
capture at time ΔT then the optical flow method calculate the motion between these two images for every pixel
position as shown in Fig. 2.
Figure 2. Motion of the moving Object
In reference image pixel present at location (X1, Y1, T) with intensity I (X1, Y1, T) will have moved in current
frame by ΔX, ΔY and ΔT the following image constraint equation can be given:
𝐼(𝑋1, 𝑌1, 𝑇) = (𝑋1 + 𝛥𝑋, 𝑌1 + 𝛥𝑌, 𝑇 + 𝛥𝑇) (3)
Here, the movement is small enough. Equation (2) can be further written as:
𝛥𝐼
𝛥𝑋
𝑉𝑥 +
𝛥𝐼
𝛥𝑌
𝑉𝑦 +
𝛥𝐼
𝛥𝑇
= 0 (4)
Where, 𝑉𝑥 and𝑉𝑦 are optical flow of I(X, Y, T) or the X and Y components of the velocity and ∆𝐼
∆𝑇 at a given
pixel is just how fast the intensity is changing with time.
4.4 MORPHOLOGICAL OPERATIONS FOR NOISE REMOVAL
Due to environment factors (for example, humidity or fog in the area under surveillance, during
transmission of video from the camera to the processing unit the illumination changes) the image is expected to
contain noises. To get proper boundary lines (edges) without any noise portion morphological operations [1]
like opening and closing on the subtracted image are very useful. Opening is a combination of erosion and
dilation operations with erosion followed by dilation whereas closing is dilation followed by erosion [13].
Human detection is based on the Navneet Dallal and Bill Triggs‟ Histogram of Oriented Gradients (HOG) for
Human Detection [14]. They used small region (cell) structure which accumulates a local 1-D histogram of edge
orientations of the pixel value. A unique representation for the image and better invariance to illumination
changes is given by combine entries of the histogram with contrast normalization.
By simple 1-D masking the Gradients in the image is calculated, in the vertical (↑) and the horizontal
(→) direction. A histogram of gradient direction is computed for multiple regions of fixed rectangular size
which generates a 9 component feature vector. Gradient sign shows the contrast difference between the
foreground and the background in the image so it is ignored. The histograms clearly capture the edge or gradient
structure that is very characteristic of local shape. The SVM classifier decides whether the region of interest
contains a human figure or not.
Development of Human Tracking in Video Surveillance System for Activity Analysis
www.iosrjournals.org 29 | Page
V. HUMAN TRACKING AND HANDLING OCCLUSION
To track same object between two consecutive frames some correspondence should be there, if
correspondence found then mark that object with same color rectangle and classify that object as human being.
To find correspondence few features [15] of previous frame are stored and compared with the next frame, if
features matches then same object found in both frames. And these features can be color, orientation, speed,
intensity etc.
For tracking any object these features plays an important role. Tracking can be categories in two types
[16] one is region based tracking and second one is contour based tracking. In region based tracking features of
the blob detected from two consecutive images if both matches then these two frame object gets related. In
contour based tracking [2] the energy of the boundary/ contour of blob detected from both frames and if that
energy of the boundary matches then same object present in both images is declared. In this paper static
background images are used and region tracking is very efficient with stationary background. So for tracking
human being region tracking method is used. Region tracking stores the features of whole object for matching
the features with the features of the object in the next frame.
But in this procedure required so much time for comparison, to reduce this wastage of time another
approach can be applicable that is salient region tracking. In most salient region method only matches the most
salient region of the previous frame with the most salient region of the current frame. Hence, in less amount of
time required to match the whole image.
The most salient region tracking fetches the basic features from the image like color, orientation and
intensity [17]. Then from these fetched features, the feature vector is calculated for color, orientation and
intensity using centre-surround method [10]. After the feature map has been created to find out which feature
more uniquely identifies the object 3 features are weighted. Using their weight the saliency map created for the
detected object. Finally from the previous image feature weight vector is calculated for this most salient region
and this feature weight vector is matched with the subsequent next frame‟s feature weight vector. If match is
above the threshold value then there is a match and can predict the same object is present in both images. If
match not found the search area is doubled and the same salient feature matching procedure is repeated. If the
detected object match is not found after doubling the search area, then object is expected to be occluded by
some other object or any stationary background object.
As seen in Figure1 Occlusion handling is not the separate process. Occlusion handling is done with the
tracking of object. When motion area of the moving object has been detected then its centroid of an object can
easily obtained from both images. Using centroid of these two images speed or velocity of an object can be
obtained:
𝑉𝑥1 + 𝑉𝑦1 = 𝑆 (5)
𝑉𝑥2 + 𝑉𝑦2 = 𝑆
Even after doubling the search area if object not found then algorithm can conclude that object is occluded by
some other object area. Using previously calculated velocity and direction of motion system can predict the next
possible area of an object, minimum 5 frames should be processed to calculate the velocity and the direction of
motion.
VI. ACTIVITY ANALYSIS AND ALARM TRIGGERING
After the detecting and tracking object as a human being activity analysis provides intelligence to this
whole process. Algorithm stores the information about the detected human which will study its position, pose,
motion and analyse them. After analysis, in case of any abnormal activity is found then an alarm is triggered.
Any action like moving into any highly secure area, moving with speed more than a limit, any typical pose that
is not normal, mass movement and many other actions can refer as abnormal action and for this alarm will be
triggered. The list of abnormal activities varies according to place and users.
In addition, any sign of unusual activity notification for this is done by making entry into the data base,
generating reports, actually ringing any alarm [15], or sending message like email, SMS etc. Thus in this stage
deal with utilizes of information has been received from last stages and notify unusual activities are involved in.
VII. CONCLUSION AND FUTURE WORK
While performing most salient region tracking using the direction and the speed of an object then
object can be identified as human being and tracked with activity analysis. If this method is not able to find the
human in initial search window, then just doubling the search window algorithm again search for human being
and even if this fails too then the position of the human is predicted using previous stage information. In case the
object is hidden and as algorithm is not searching whole frame instead just doubling the search area this process
reduces the processing time. For proposed algorithm only static background is considered, in future it can be
enhanced for moving background or on changed background.
Development of Human Tracking in Video Surveillance System for Activity Analysis
www.iosrjournals.org 30 | Page
REFERENCES
[1] S.S. Beauchemin and J.L.Barron, “The Computation of Optical flow”, ACM Computing Surveys, Vol.27, 1995, pp 433 - 466
[2] Y.L.Tian and A.Hampapur, “Robust Salient Motion Detection with Complex Background for Real-time Video Surveillance”, in
Proc. Of IEEE Computer Society Workshop on Motion and Video Computing, January, 2005
[3] I.Haritaoglu, D.Harwood and L.S.Davis ,”W4: Who? When? Where? What? A Real Time System for Detecting and Tracking
People”, In Proc. Of the International Conference on Face and Gesture Recognition, April, 1998
[4] Zhe Lin, Larry S. Davis, David Doermann, and Daniel DeMenthon,” Hierarchical Part-Template Matching for Human Detection
and Segmentation” , University of Maryland, College Park, MD 20742
[5] L.Zhao and C.E.Torpe, “Stereo- and Neural Network-Based Pedestrian Detection”, IEEE Trans. Intelligent Transportation System,
Vol.1,No.3, Sept., 2000
[6] Bo Wu, and Ram Nevatia. “Detection and Tracking of Multiple, Partially Occluded Humans by Bayesian Combination of Edgelet
based Part Detectors.”, International Journal of Computer Vision, 75(2): 247-266, 2007.
[7] A. Opelt, A. Pinz, and A. Zisserman. “A Boundary-Fragment- Model for Object Detection”. In Proc. Of the European Conference
on Computer Vision, 2006.
[8] E. Seemann, B. Leibe, and B. Schiele, "Multi-Aspect Detection of Articulated Objects", IEEE Conference on Computer Vision
and Pattern Recognition, June 2006.
[9] K. Mikolajczyk, C. Schmid, and A. Zisserman. “Human Detection based on A Probabilistic Assembly of Robust Part Detectors”. In
Proc. Of the European Conference on Computer Vision, 2004.
[10] J.W.Lee, M.S.Kim, I.S.Kweon, “A Kalman filter based visual tracking algorithm for an object moving in 3D ”, IEEE International
Conference on Intelligent Robots and System, Vol.1,Aug., 1995
[11] J. Connell, A.W. Senior, A. Hampapur, Y-L Tian, L.Brown, and S. Pankanti, “Detection and Tracking in the IBM People Vision
System”, IEEE International Conference on Multimedia and Expo., June 2004
[12] L.M.Fuentes and S.A.Velastin, “People Tracking in surveillance application”, in Proc. 2nd IEEE International Workshop on
Performance Evaluation of Tracking and Surveillance, Dec. 2001
[13] M. Balcells-Capellades, D. DeMenthon and D. Doermann. “An Appearance-based Approach for Consistent Labeling of Humans
and Objects in Video”. Pattern Analysis and Applications, November 2004.
[14] N. Dalal and B. Triggs, “Histograms of oriented gradients for human Detection”, In Proc. Of the Conference on computer Vision
and Pattern Recognition, San Diego, California, USA, pp. 886–893, 2005.
[15] Suzaimah Bt Ramli, Kamarul Hawari B Ghazali, Muhammad Faiz Bin Mohd Ali, Zakaria Hifzan B Hisahuddin, ―”Human Motion
Detection Framework”, IEEE 2011, pp. 158-161.
[16] A.Senior, A.Hampapur, Y.L.Tian, L.Brown, S.Pankanti and R.Bolle,”Appearance Models for Occlusion Handling”, In Proc. Of
Second International workshop on Performance valuation of Tracking and Surveillance systems in conjunction with Computer
Vision and Pattern Recognition, Dec. 2001
[17] C.BenAbdelkader and L.Davis,” Detection of People Carrying Objects: a Motion-based Recognition Approach”, 5th IEEE
International Conference on Automatic Face and Gesture Recognition ,May, 2002
[18] A.Elgammal, R.Duraiswami, D.Harwood and L.Davis, “Background and Foreground Modeling Using Nonparametric Kernel
Density Estimation for Visual Surveillance”, In Proc. Of the IEEE, Vol.90, No.7, July, 2002
[19] Kim, T. H. Chalidabhongse, D. Harwood and L. Davis, "”",IEEE International Conference on Image Processing (ICIP), 2004.
[20] C.Stauffer and W.E.L.Grimson, “Adaptive background mixture models for real tracking”. Int. Conf. Computer Vision and Pattern
Recognition, Vol.2, 1999,pp246-252
[21] Nan Lu, Jihong Wang, Q.H. Wu and Li Yang, ―”An improved Motion Detection Method for Real-Time Surveillance”,
International Association of Engineers (IAENG) International Journal of Computer Science, 35:1, IJCS_35_1_16
[22] Denman, Simon P. and Chandran, Vinod and Sridharan, Sridha (2007)” An adaptive optical flow technique for person tracking
systems”. Pattern Recognition Letters 28(10):pp. 1232-1239
[23] Yokoyama, M. and T. Poggio. “A Contour-Based Moving Object Detection and Tracking.” In: Proceedings of Second Joint IEEE
International Workshop on Visual Surveillance and Performance Evaluation of Tracking and Surveillance (in conjunction with
ICCV 2005), Beijing, China, October 15-16, 2005. pp. 271-276

Contenu connexe

Tendances

Survey on video object detection & tracking
Survey on video object detection & trackingSurvey on video object detection & tracking
Survey on video object detection & trackingijctet
 
Analysis of Human Behavior Based On Centroid and Treading Track
Analysis of Human Behavior Based On Centroid and Treading  TrackAnalysis of Human Behavior Based On Centroid and Treading  Track
Analysis of Human Behavior Based On Centroid and Treading TrackIJMER
 
Human Motion Detection in Video Surveillance using Computer Vision Technique
Human Motion Detection in Video Surveillance using Computer Vision TechniqueHuman Motion Detection in Video Surveillance using Computer Vision Technique
Human Motion Detection in Video Surveillance using Computer Vision TechniqueIRJET Journal
 
IRJET- Moving Object Detection using Foreground Detection for Video Surveil...
IRJET- 	 Moving Object Detection using Foreground Detection for Video Surveil...IRJET- 	 Moving Object Detection using Foreground Detection for Video Surveil...
IRJET- Moving Object Detection using Foreground Detection for Video Surveil...IRJET Journal
 
HUMAN MOTION DETECTION AND TRACKING FOR VIDEO SURVEILLANCE
HUMAN MOTION DETECTION AND TRACKING FOR VIDEO SURVEILLANCEHUMAN MOTION DETECTION AND TRACKING FOR VIDEO SURVEILLANCE
HUMAN MOTION DETECTION AND TRACKING FOR VIDEO SURVEILLANCEAswinraj Manickam
 
IRJET- Full Body Motion Detection and Surveillance System Application
IRJET-  	  Full Body Motion Detection and Surveillance System ApplicationIRJET-  	  Full Body Motion Detection and Surveillance System Application
IRJET- Full Body Motion Detection and Surveillance System ApplicationIRJET Journal
 
K-Means Clustering in Moving Objects Extraction with Selective Background
K-Means Clustering in Moving Objects Extraction with Selective BackgroundK-Means Clustering in Moving Objects Extraction with Selective Background
K-Means Clustering in Moving Objects Extraction with Selective BackgroundIJCSIS Research Publications
 
Applying edge density based region growing with frame difference for detectin...
Applying edge density based region growing with frame difference for detectin...Applying edge density based region growing with frame difference for detectin...
Applying edge density based region growing with frame difference for detectin...eSAT Publishing House
 
Interactive Full-Body Motion Capture Using Infrared Sensor Network
Interactive Full-Body Motion Capture Using Infrared Sensor Network  Interactive Full-Body Motion Capture Using Infrared Sensor Network
Interactive Full-Body Motion Capture Using Infrared Sensor Network ijcga
 
VIDEO SEGMENTATION FOR MOVING OBJECT DETECTION USING LOCAL CHANGE & ENTROPY B...
VIDEO SEGMENTATION FOR MOVING OBJECT DETECTION USING LOCAL CHANGE & ENTROPY B...VIDEO SEGMENTATION FOR MOVING OBJECT DETECTION USING LOCAL CHANGE & ENTROPY B...
VIDEO SEGMENTATION FOR MOVING OBJECT DETECTION USING LOCAL CHANGE & ENTROPY B...csandit
 
A ROBUST BACKGROUND REMOVAL ALGORTIHMS USING FUZZY C-MEANS CLUSTERING
A ROBUST BACKGROUND REMOVAL ALGORTIHMS USING FUZZY C-MEANS CLUSTERINGA ROBUST BACKGROUND REMOVAL ALGORTIHMS USING FUZZY C-MEANS CLUSTERING
A ROBUST BACKGROUND REMOVAL ALGORTIHMS USING FUZZY C-MEANS CLUSTERINGIJNSA Journal
 
A NOVEL METHOD FOR PERSON TRACKING BASED K-NN : COMPARISON WITH SIFT AND MEAN...
A NOVEL METHOD FOR PERSON TRACKING BASED K-NN : COMPARISON WITH SIFT AND MEAN...A NOVEL METHOD FOR PERSON TRACKING BASED K-NN : COMPARISON WITH SIFT AND MEAN...
A NOVEL METHOD FOR PERSON TRACKING BASED K-NN : COMPARISON WITH SIFT AND MEAN...sipij
 
Interactive full body motion capture using infrared sensor network
Interactive full body motion capture using infrared sensor networkInteractive full body motion capture using infrared sensor network
Interactive full body motion capture using infrared sensor networkijcga
 
Proposed Multi-object Tracking Algorithm Using Sobel Edge Detection operator
Proposed Multi-object Tracking Algorithm Using Sobel Edge Detection operatorProposed Multi-object Tracking Algorithm Using Sobel Edge Detection operator
Proposed Multi-object Tracking Algorithm Using Sobel Edge Detection operatorQUESTJOURNAL
 
A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN
A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN
A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN csandit
 

Tendances (19)

[IJET-V1I3P20] Authors:Prof. D.S.Patil, Miss. R.B.Khanderay, Prof.Teena Padvi.
[IJET-V1I3P20] Authors:Prof. D.S.Patil, Miss. R.B.Khanderay, Prof.Teena Padvi.[IJET-V1I3P20] Authors:Prof. D.S.Patil, Miss. R.B.Khanderay, Prof.Teena Padvi.
[IJET-V1I3P20] Authors:Prof. D.S.Patil, Miss. R.B.Khanderay, Prof.Teena Padvi.
 
Survey on video object detection & tracking
Survey on video object detection & trackingSurvey on video object detection & tracking
Survey on video object detection & tracking
 
Analysis of Human Behavior Based On Centroid and Treading Track
Analysis of Human Behavior Based On Centroid and Treading  TrackAnalysis of Human Behavior Based On Centroid and Treading  Track
Analysis of Human Behavior Based On Centroid and Treading Track
 
Human Motion Detection in Video Surveillance using Computer Vision Technique
Human Motion Detection in Video Surveillance using Computer Vision TechniqueHuman Motion Detection in Video Surveillance using Computer Vision Technique
Human Motion Detection in Video Surveillance using Computer Vision Technique
 
Motion Human Detection & Tracking Based On Background Subtraction
Motion Human Detection & Tracking Based On Background SubtractionMotion Human Detection & Tracking Based On Background Subtraction
Motion Human Detection & Tracking Based On Background Subtraction
 
Background subtraction
Background subtractionBackground subtraction
Background subtraction
 
IRJET- Moving Object Detection using Foreground Detection for Video Surveil...
IRJET- 	 Moving Object Detection using Foreground Detection for Video Surveil...IRJET- 	 Moving Object Detection using Foreground Detection for Video Surveil...
IRJET- Moving Object Detection using Foreground Detection for Video Surveil...
 
HUMAN MOTION DETECTION AND TRACKING FOR VIDEO SURVEILLANCE
HUMAN MOTION DETECTION AND TRACKING FOR VIDEO SURVEILLANCEHUMAN MOTION DETECTION AND TRACKING FOR VIDEO SURVEILLANCE
HUMAN MOTION DETECTION AND TRACKING FOR VIDEO SURVEILLANCE
 
IRJET- Full Body Motion Detection and Surveillance System Application
IRJET-  	  Full Body Motion Detection and Surveillance System ApplicationIRJET-  	  Full Body Motion Detection and Surveillance System Application
IRJET- Full Body Motion Detection and Surveillance System Application
 
K-Means Clustering in Moving Objects Extraction with Selective Background
K-Means Clustering in Moving Objects Extraction with Selective BackgroundK-Means Clustering in Moving Objects Extraction with Selective Background
K-Means Clustering in Moving Objects Extraction with Selective Background
 
Ls3520052009
Ls3520052009Ls3520052009
Ls3520052009
 
Applying edge density based region growing with frame difference for detectin...
Applying edge density based region growing with frame difference for detectin...Applying edge density based region growing with frame difference for detectin...
Applying edge density based region growing with frame difference for detectin...
 
Interactive Full-Body Motion Capture Using Infrared Sensor Network
Interactive Full-Body Motion Capture Using Infrared Sensor Network  Interactive Full-Body Motion Capture Using Infrared Sensor Network
Interactive Full-Body Motion Capture Using Infrared Sensor Network
 
VIDEO SEGMENTATION FOR MOVING OBJECT DETECTION USING LOCAL CHANGE & ENTROPY B...
VIDEO SEGMENTATION FOR MOVING OBJECT DETECTION USING LOCAL CHANGE & ENTROPY B...VIDEO SEGMENTATION FOR MOVING OBJECT DETECTION USING LOCAL CHANGE & ENTROPY B...
VIDEO SEGMENTATION FOR MOVING OBJECT DETECTION USING LOCAL CHANGE & ENTROPY B...
 
A ROBUST BACKGROUND REMOVAL ALGORTIHMS USING FUZZY C-MEANS CLUSTERING
A ROBUST BACKGROUND REMOVAL ALGORTIHMS USING FUZZY C-MEANS CLUSTERINGA ROBUST BACKGROUND REMOVAL ALGORTIHMS USING FUZZY C-MEANS CLUSTERING
A ROBUST BACKGROUND REMOVAL ALGORTIHMS USING FUZZY C-MEANS CLUSTERING
 
A NOVEL METHOD FOR PERSON TRACKING BASED K-NN : COMPARISON WITH SIFT AND MEAN...
A NOVEL METHOD FOR PERSON TRACKING BASED K-NN : COMPARISON WITH SIFT AND MEAN...A NOVEL METHOD FOR PERSON TRACKING BASED K-NN : COMPARISON WITH SIFT AND MEAN...
A NOVEL METHOD FOR PERSON TRACKING BASED K-NN : COMPARISON WITH SIFT AND MEAN...
 
Interactive full body motion capture using infrared sensor network
Interactive full body motion capture using infrared sensor networkInteractive full body motion capture using infrared sensor network
Interactive full body motion capture using infrared sensor network
 
Proposed Multi-object Tracking Algorithm Using Sobel Edge Detection operator
Proposed Multi-object Tracking Algorithm Using Sobel Edge Detection operatorProposed Multi-object Tracking Algorithm Using Sobel Edge Detection operator
Proposed Multi-object Tracking Algorithm Using Sobel Edge Detection operator
 
A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN
A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN
A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN
 

En vedette

Impact of Hepatitis B Virus (HBV) Vaccination in Childrens Born to HBV Positi...
Impact of Hepatitis B Virus (HBV) Vaccination in Childrens Born to HBV Positi...Impact of Hepatitis B Virus (HBV) Vaccination in Childrens Born to HBV Positi...
Impact of Hepatitis B Virus (HBV) Vaccination in Childrens Born to HBV Positi...IOSR Journals
 
Fuzzy numbers, Nth - order Fuzzy Initial Value Problems, Runge-Kutta method, ...
Fuzzy numbers, Nth - order Fuzzy Initial Value Problems, Runge-Kutta method, ...Fuzzy numbers, Nth - order Fuzzy Initial Value Problems, Runge-Kutta method, ...
Fuzzy numbers, Nth - order Fuzzy Initial Value Problems, Runge-Kutta method, ...IOSR Journals
 
Numerical Simulation and Design Optimization of Intake and Spiral Case for Lo...
Numerical Simulation and Design Optimization of Intake and Spiral Case for Lo...Numerical Simulation and Design Optimization of Intake and Spiral Case for Lo...
Numerical Simulation and Design Optimization of Intake and Spiral Case for Lo...IOSR Journals
 
Performance Analysis of Rician Fading Channels using Nonlinear Modulation Met...
Performance Analysis of Rician Fading Channels using Nonlinear Modulation Met...Performance Analysis of Rician Fading Channels using Nonlinear Modulation Met...
Performance Analysis of Rician Fading Channels using Nonlinear Modulation Met...IOSR Journals
 
Software Development Multi-Sourcing Relationship Management Model (Sdmrmm) P...
Software Development Multi-Sourcing Relationship Management  Model (Sdmrmm) P...Software Development Multi-Sourcing Relationship Management  Model (Sdmrmm) P...
Software Development Multi-Sourcing Relationship Management Model (Sdmrmm) P...IOSR Journals
 
Securing Group Communication in Partially Distributed Systems
Securing Group Communication in Partially Distributed SystemsSecuring Group Communication in Partially Distributed Systems
Securing Group Communication in Partially Distributed SystemsIOSR Journals
 
Seismic Study and Spatial Variation of b-value in Northeast India
Seismic Study and Spatial Variation of b-value in Northeast IndiaSeismic Study and Spatial Variation of b-value in Northeast India
Seismic Study and Spatial Variation of b-value in Northeast IndiaIOSR Journals
 
Correlation Study For the Assessment of Water Quality and Its Parameters of G...
Correlation Study For the Assessment of Water Quality and Its Parameters of G...Correlation Study For the Assessment of Water Quality and Its Parameters of G...
Correlation Study For the Assessment of Water Quality and Its Parameters of G...IOSR Journals
 
Traditional use of Monocotyledon Plants of Arakuvalley Mandalam, Visakhapatna...
Traditional use of Monocotyledon Plants of Arakuvalley Mandalam, Visakhapatna...Traditional use of Monocotyledon Plants of Arakuvalley Mandalam, Visakhapatna...
Traditional use of Monocotyledon Plants of Arakuvalley Mandalam, Visakhapatna...IOSR Journals
 
Performance Evaluation of a Distributed System Based Upon Fault Tree Analysis
Performance Evaluation of a Distributed System Based Upon Fault Tree AnalysisPerformance Evaluation of a Distributed System Based Upon Fault Tree Analysis
Performance Evaluation of a Distributed System Based Upon Fault Tree AnalysisIOSR Journals
 
Combination of Cubic and Quartic Plane Curve
Combination of Cubic and Quartic Plane CurveCombination of Cubic and Quartic Plane Curve
Combination of Cubic and Quartic Plane CurveIOSR Journals
 
Spectral studies of 5-({4-amino-2-[(Z)-(2-hydroxybenzylidene) amino] pyrimidi...
Spectral studies of 5-({4-amino-2-[(Z)-(2-hydroxybenzylidene) amino] pyrimidi...Spectral studies of 5-({4-amino-2-[(Z)-(2-hydroxybenzylidene) amino] pyrimidi...
Spectral studies of 5-({4-amino-2-[(Z)-(2-hydroxybenzylidene) amino] pyrimidi...IOSR Journals
 

En vedette (20)

Impact of Hepatitis B Virus (HBV) Vaccination in Childrens Born to HBV Positi...
Impact of Hepatitis B Virus (HBV) Vaccination in Childrens Born to HBV Positi...Impact of Hepatitis B Virus (HBV) Vaccination in Childrens Born to HBV Positi...
Impact of Hepatitis B Virus (HBV) Vaccination in Childrens Born to HBV Positi...
 
Fuzzy numbers, Nth - order Fuzzy Initial Value Problems, Runge-Kutta method, ...
Fuzzy numbers, Nth - order Fuzzy Initial Value Problems, Runge-Kutta method, ...Fuzzy numbers, Nth - order Fuzzy Initial Value Problems, Runge-Kutta method, ...
Fuzzy numbers, Nth - order Fuzzy Initial Value Problems, Runge-Kutta method, ...
 
L1302037480
L1302037480L1302037480
L1302037480
 
E012644143
E012644143E012644143
E012644143
 
K013166871
K013166871K013166871
K013166871
 
C013151420
C013151420C013151420
C013151420
 
Q130303117128
Q130303117128Q130303117128
Q130303117128
 
Numerical Simulation and Design Optimization of Intake and Spiral Case for Lo...
Numerical Simulation and Design Optimization of Intake and Spiral Case for Lo...Numerical Simulation and Design Optimization of Intake and Spiral Case for Lo...
Numerical Simulation and Design Optimization of Intake and Spiral Case for Lo...
 
Performance Analysis of Rician Fading Channels using Nonlinear Modulation Met...
Performance Analysis of Rician Fading Channels using Nonlinear Modulation Met...Performance Analysis of Rician Fading Channels using Nonlinear Modulation Met...
Performance Analysis of Rician Fading Channels using Nonlinear Modulation Met...
 
Software Development Multi-Sourcing Relationship Management Model (Sdmrmm) P...
Software Development Multi-Sourcing Relationship Management  Model (Sdmrmm) P...Software Development Multi-Sourcing Relationship Management  Model (Sdmrmm) P...
Software Development Multi-Sourcing Relationship Management Model (Sdmrmm) P...
 
C1802050815
C1802050815C1802050815
C1802050815
 
J1803026569
J1803026569J1803026569
J1803026569
 
Securing Group Communication in Partially Distributed Systems
Securing Group Communication in Partially Distributed SystemsSecuring Group Communication in Partially Distributed Systems
Securing Group Communication in Partially Distributed Systems
 
Seismic Study and Spatial Variation of b-value in Northeast India
Seismic Study and Spatial Variation of b-value in Northeast IndiaSeismic Study and Spatial Variation of b-value in Northeast India
Seismic Study and Spatial Variation of b-value in Northeast India
 
Correlation Study For the Assessment of Water Quality and Its Parameters of G...
Correlation Study For the Assessment of Water Quality and Its Parameters of G...Correlation Study For the Assessment of Water Quality and Its Parameters of G...
Correlation Study For the Assessment of Water Quality and Its Parameters of G...
 
Traditional use of Monocotyledon Plants of Arakuvalley Mandalam, Visakhapatna...
Traditional use of Monocotyledon Plants of Arakuvalley Mandalam, Visakhapatna...Traditional use of Monocotyledon Plants of Arakuvalley Mandalam, Visakhapatna...
Traditional use of Monocotyledon Plants of Arakuvalley Mandalam, Visakhapatna...
 
Performance Evaluation of a Distributed System Based Upon Fault Tree Analysis
Performance Evaluation of a Distributed System Based Upon Fault Tree AnalysisPerformance Evaluation of a Distributed System Based Upon Fault Tree Analysis
Performance Evaluation of a Distributed System Based Upon Fault Tree Analysis
 
Combination of Cubic and Quartic Plane Curve
Combination of Cubic and Quartic Plane CurveCombination of Cubic and Quartic Plane Curve
Combination of Cubic and Quartic Plane Curve
 
Spectral studies of 5-({4-amino-2-[(Z)-(2-hydroxybenzylidene) amino] pyrimidi...
Spectral studies of 5-({4-amino-2-[(Z)-(2-hydroxybenzylidene) amino] pyrimidi...Spectral studies of 5-({4-amino-2-[(Z)-(2-hydroxybenzylidene) amino] pyrimidi...
Spectral studies of 5-({4-amino-2-[(Z)-(2-hydroxybenzylidene) amino] pyrimidi...
 
J01046673
J01046673J01046673
J01046673
 

Similaire à Tracking Human Activity in Video Surveillance

A Novel Background Subtraction Algorithm for Person Tracking Based on K-NN
A Novel Background Subtraction Algorithm for Person Tracking Based on K-NN A Novel Background Subtraction Algorithm for Person Tracking Based on K-NN
A Novel Background Subtraction Algorithm for Person Tracking Based on K-NN cscpconf
 
Real Time Detection of Moving Object Based on Fpga
Real Time Detection of Moving Object Based on FpgaReal Time Detection of Moving Object Based on Fpga
Real Time Detection of Moving Object Based on Fpgaiosrjce
 
A Robust Method for Moving Object Detection Using Modified Statistical Mean M...
A Robust Method for Moving Object Detection Using Modified Statistical Mean M...A Robust Method for Moving Object Detection Using Modified Statistical Mean M...
A Robust Method for Moving Object Detection Using Modified Statistical Mean M...ijait
 
A Framework for Human Action Detection via Extraction of Multimodal Features
A Framework for Human Action Detection via Extraction of Multimodal FeaturesA Framework for Human Action Detection via Extraction of Multimodal Features
A Framework for Human Action Detection via Extraction of Multimodal FeaturesCSCJournals
 
Motion Object Detection Using BGS Technique
Motion Object Detection Using BGS TechniqueMotion Object Detection Using BGS Technique
Motion Object Detection Using BGS TechniqueMangaiK4
 
Motion Object Detection Using BGS Technique
Motion Object Detection Using BGS TechniqueMotion Object Detection Using BGS Technique
Motion Object Detection Using BGS TechniqueMangaiK4
 
IRJET- Behavior Analysis from Videos using Motion based Feature Extraction
IRJET-  	  Behavior Analysis from Videos using Motion based Feature ExtractionIRJET-  	  Behavior Analysis from Videos using Motion based Feature Extraction
IRJET- Behavior Analysis from Videos using Motion based Feature ExtractionIRJET Journal
 
Intelligent Video Surveillance System using Deep Learning
Intelligent Video Surveillance System using Deep LearningIntelligent Video Surveillance System using Deep Learning
Intelligent Video Surveillance System using Deep LearningIRJET Journal
 
Objects detection and tracking using fast principle component purist and kalm...
Objects detection and tracking using fast principle component purist and kalm...Objects detection and tracking using fast principle component purist and kalm...
Objects detection and tracking using fast principle component purist and kalm...IJECEIAES
 
SENSITIVITY OF A VIDEO SURVEILLANCE SYSTEM BASED ON MOTION DETECTION
SENSITIVITY OF A VIDEO SURVEILLANCE SYSTEM BASED ON MOTION DETECTIONSENSITIVITY OF A VIDEO SURVEILLANCE SYSTEM BASED ON MOTION DETECTION
SENSITIVITY OF A VIDEO SURVEILLANCE SYSTEM BASED ON MOTION DETECTIONsipij
 
Tracking-based Visual Surveillance System
Tracking-based Visual Surveillance SystemTracking-based Visual Surveillance System
Tracking-based Visual Surveillance SystemIRJET Journal
 
Abnormal activity detection in surveillance video scenes
Abnormal activity detection in surveillance video scenesAbnormal activity detection in surveillance video scenes
Abnormal activity detection in surveillance video scenesTELKOMNIKA JOURNAL
 
An Innovative Moving Object Detection and Tracking System by Using Modified R...
An Innovative Moving Object Detection and Tracking System by Using Modified R...An Innovative Moving Object Detection and Tracking System by Using Modified R...
An Innovative Moving Object Detection and Tracking System by Using Modified R...sipij
 
Automated Surveillance System and Data Communication
Automated Surveillance System and Data CommunicationAutomated Surveillance System and Data Communication
Automated Surveillance System and Data CommunicationIOSR Journals
 
Java Implementation based Heterogeneous Video Sequence Automated Surveillance...
Java Implementation based Heterogeneous Video Sequence Automated Surveillance...Java Implementation based Heterogeneous Video Sequence Automated Surveillance...
Java Implementation based Heterogeneous Video Sequence Automated Surveillance...CSCJournals
 
Robust techniques for background subtraction in urban
Robust techniques for background subtraction in urbanRobust techniques for background subtraction in urban
Robust techniques for background subtraction in urbantaylor_1313
 

Similaire à Tracking Human Activity in Video Surveillance (20)

A Novel Background Subtraction Algorithm for Person Tracking Based on K-NN
A Novel Background Subtraction Algorithm for Person Tracking Based on K-NN A Novel Background Subtraction Algorithm for Person Tracking Based on K-NN
A Novel Background Subtraction Algorithm for Person Tracking Based on K-NN
 
F011113741
F011113741F011113741
F011113741
 
Real Time Detection of Moving Object Based on Fpga
Real Time Detection of Moving Object Based on FpgaReal Time Detection of Moving Object Based on Fpga
Real Time Detection of Moving Object Based on Fpga
 
D018112429
D018112429D018112429
D018112429
 
A Robust Method for Moving Object Detection Using Modified Statistical Mean M...
A Robust Method for Moving Object Detection Using Modified Statistical Mean M...A Robust Method for Moving Object Detection Using Modified Statistical Mean M...
A Robust Method for Moving Object Detection Using Modified Statistical Mean M...
 
A Framework for Human Action Detection via Extraction of Multimodal Features
A Framework for Human Action Detection via Extraction of Multimodal FeaturesA Framework for Human Action Detection via Extraction of Multimodal Features
A Framework for Human Action Detection via Extraction of Multimodal Features
 
Motion Object Detection Using BGS Technique
Motion Object Detection Using BGS TechniqueMotion Object Detection Using BGS Technique
Motion Object Detection Using BGS Technique
 
Motion Object Detection Using BGS Technique
Motion Object Detection Using BGS TechniqueMotion Object Detection Using BGS Technique
Motion Object Detection Using BGS Technique
 
IRJET- Behavior Analysis from Videos using Motion based Feature Extraction
IRJET-  	  Behavior Analysis from Videos using Motion based Feature ExtractionIRJET-  	  Behavior Analysis from Videos using Motion based Feature Extraction
IRJET- Behavior Analysis from Videos using Motion based Feature Extraction
 
Intelligent Video Surveillance System using Deep Learning
Intelligent Video Surveillance System using Deep LearningIntelligent Video Surveillance System using Deep Learning
Intelligent Video Surveillance System using Deep Learning
 
Objects detection and tracking using fast principle component purist and kalm...
Objects detection and tracking using fast principle component purist and kalm...Objects detection and tracking using fast principle component purist and kalm...
Objects detection and tracking using fast principle component purist and kalm...
 
HMotion: An Algorithm for Human Motion Detection
HMotion: An Algorithm for Human Motion DetectionHMotion: An Algorithm for Human Motion Detection
HMotion: An Algorithm for Human Motion Detection
 
SENSITIVITY OF A VIDEO SURVEILLANCE SYSTEM BASED ON MOTION DETECTION
SENSITIVITY OF A VIDEO SURVEILLANCE SYSTEM BASED ON MOTION DETECTIONSENSITIVITY OF A VIDEO SURVEILLANCE SYSTEM BASED ON MOTION DETECTION
SENSITIVITY OF A VIDEO SURVEILLANCE SYSTEM BASED ON MOTION DETECTION
 
Tracking-based Visual Surveillance System
Tracking-based Visual Surveillance SystemTracking-based Visual Surveillance System
Tracking-based Visual Surveillance System
 
Abnormal activity detection in surveillance video scenes
Abnormal activity detection in surveillance video scenesAbnormal activity detection in surveillance video scenes
Abnormal activity detection in surveillance video scenes
 
An Innovative Moving Object Detection and Tracking System by Using Modified R...
An Innovative Moving Object Detection and Tracking System by Using Modified R...An Innovative Moving Object Detection and Tracking System by Using Modified R...
An Innovative Moving Object Detection and Tracking System by Using Modified R...
 
Automated Surveillance System and Data Communication
Automated Surveillance System and Data CommunicationAutomated Surveillance System and Data Communication
Automated Surveillance System and Data Communication
 
Q180305116119
Q180305116119Q180305116119
Q180305116119
 
Java Implementation based Heterogeneous Video Sequence Automated Surveillance...
Java Implementation based Heterogeneous Video Sequence Automated Surveillance...Java Implementation based Heterogeneous Video Sequence Automated Surveillance...
Java Implementation based Heterogeneous Video Sequence Automated Surveillance...
 
Robust techniques for background subtraction in urban
Robust techniques for background subtraction in urbanRobust techniques for background subtraction in urban
Robust techniques for background subtraction in urban
 

Plus de IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Dernier

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Dernier (20)

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 

Tracking Human Activity in Video Surveillance

  • 1. IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661 Volume 4, Issue 2 (Sep.-Oct. 2012), PP 26-30 www.iosrjournals.org www.iosrjournals.org 26 | Page Development of Human Tracking in Video Surveillance System for Activity Analysis Neelam V. Puri 1 and Prof. P. R. Devale 2 1( PG Scholar, Department of Information Technology, Bharti Vidyapeeth Deemed University, Pune, India.) 2( Professor & Head, Department of Information Technology, Bharti Vidyapeeth Deemed University, Pune, India.) Abstract : In current era of digital technology visual surveillance systems are persistently in pursuance of being easier to use, versatile, inexpensive and very fast. Continuous video capturing systems are the replacement for human watch, because as we know human can be easily distracted and one mistake may lead to big disaster. So video surveillance systems make this kind of work very easier for user and it provides security and control where all time watch is required. Proposed algorithm will helpful for to detect moving object and classify it as human being and keep track of moving human. This procedure is done without getting help of any additional sensing device. In this paper proposed system can classify in three steps detection, tracking and action analysis. Detection of human being is done by combination of morphological procedure and feature extraction method. Tracking of same human and occlusion handling is done in second phase. At last phase activity analysis is done and in case of any abnormal activities, an alert should be issued. Keywords: Automated Video surveillance system, Human Detection, Human Tracking, Motion Detection , Occlusion handling. I. INTRODUCTION There are several studies on the human tracking especially human detection using various methods like template matching, skin color recognition, gesture modeling etc. Human body gestures can be finding out by modeling human body and creating consolidated body of knowledge. But this kind of techniques has some drawbacks like highly sophisticated and very complex for implementation of the procedures. Solution for this kind of problem is pattern recognition and matching methods. In video surveillance system to provide better solution for security and monitoring problems new technologies are introduced. Input device just capture the video streams and store it for the future purpose. Detecting, tracking and monitoring different activities by the same object are the more complicated and difficult job for the same capturing device. Every capturing device will not going to have the same configuration and will not be affordable by each user. Now we know that these video streams are always watched on the computer system or on same kind of the electronic devices which has some processing capability. While recording video stream this algorithm may helpful to analyze different actions taken by the moving object (i.e. human being). This paper is further subdivided as, Section 2 provides an over view of previous research done related to Automatic Video surveillance. Section 3 discusses an overview of the architecture of the proposed system in step by step procedure. Section 4, section 5 and section 6 have been dedicated to brief discussion of three major steps of proposed algorithm that is detecting object as human being, tracking same human being with occlusion handling and activity analysis. And conclusion work in section 6. Due citation are given in the references section. II. PREVIOUS WORK DONE Normally Background extraction technique is used for the foreground segmentation. There is another method called as optical flow computation [1]. Optical flow method is computationally expensive method and it can provide better performance. But for the real time system like video surveillance optical flow method are not so much suitable. To provide better computational consumption, these two techniques are combined in [2], to detect movement area they used background subtraction method, and they used optical flow computation method to remove unnecessary pixels from motion area. Subtracting current image from the reference background image motion area information can extracted. In recent foreground segmentation method to handle modelling multiple background objects like tree shaking, water waves etc. mixture of codebook [19], nonparametric kernel [18], different Gaussian distribution adaptive models [20] are used. To modelling multiple backgrounds more memory and more complicated algorithms are required even if these are more effective algorithms. Different Gaussian models considered with environments change like tree shaking, shadow, light change etc.
  • 2. Development of Human Tracking in Video Surveillance System for Activity Analysis www.iosrjournals.org 27 | Page After detecting object from motion area, object can be classified as human being using different approaches like model based technique [3], Shape-based [4], neural network based technique [5] or blob based approaches. Shape based approach highly used in still images, in this shapes are modelled as local curves [6, 7], then implicitly represented by local or global descriptors in [8]. For pattern recognition neural network models are very much useful. Mostly part-based modelling is very efficient for detection of articulated objects like humans. For example, [9] use local features for part detection. [4] Introduce Hierarchical Part-Template Matching features for human detection. Then object tracking algorithms in video surveillance system are established to track same object from two different frames. By creating human model which includes the human features tracking is possible. In human tracking system occlusion handling is difficult part. To solve this problem, Kalman filter based method was proposed [10]. Let study different techniques that are used to detect human and next phase human tracking. III. ARCHITECTURE Visual surveillance process that takes video as an input, processes the video and performs actions accordingly. The process of video surveillance consists of many phases. Figure 1. Architecture of Proposed System This algorithm approach specifies three sub processes as follows and as shown in Fig. 1. Detection of Moving Object: This algorithm takes any video stream as an input with static background. Then detect any motion as an object and then it will identify that object as human being. Tracking of an object: After detection of an object as human being same object will track using its speed and velocity. Also in this phase occlusion handling is done. Activity Analysis: At last phase using gathered information analyze different activities of tracked human recorded and if any sign of unusual activity or abnormal behaviour of human noticed then alarm will be triggered. IV. HUMAN BEING DETECTION 4.1 IMAGE FRAMING AND IMAGE ACQUISITION In Data acquisition phase different kind of sensing and capturing input devices used for data gathering from the working environment. For example video capturing and monitoring devices used to record video stream. For Image framing video must be divided into sequence of frames. Video must be divided mostly into 20-30 frames which are sent to the next phases for further processing. Most probably background subtraction method applies on the static background images [11]. System can detect „motion area‟ (only useful data) by comparing reference frame with current frame and get the extraction of a (new) moving object from the background. This phase attempt background subtraction comparing reference image and current image in a pixel-by-pixel fashion as shown by equation below: | P X1, Y1 C – P X2, Y2 bk | > Th (1) Where,P(X1, Y1)C is current frame pixel present at (X1, Y1) co-ordinate P(X2, Y2)bk is reference frame pixel present at (X2, Y2) co-ordinate and this threshold value of difference. Here foreground pixels are extracted from the static background image so the threshold is fixed. When the threshold value is less than the pixel difference, it is considered as foreground image. In this way the foreground objects present in the scene are detected. Only patterns are preprocessed for selection of significant features.
  • 3. Development of Human Tracking in Video Surveillance System for Activity Analysis www.iosrjournals.org 28 | Page 4.2 BACKGROUND SUBTRACTION Basically background subtraction done subtracting reference image from current image, here in this algorithm temporal differencing [12] is used to perform background subtraction. In this method the reference image is the previous images, and it is subtracted from the current image. In order to produce difference between two images the subtraction value must be greater than a threshold value: ITh X, Y = 1, ITh X, Y > Th (2) = 0, ITh X, Y ≤ Th From the above three human detection methods, the background subtraction is the simplest and mostly used when the background is stationery. In our implementation we will be keeping static background and hence will use the simple background subtraction method of human detection. 4.3 SEGMENTATION USING OPTICAL FLOW Selected feature then passed through the classification phase where classified objects are compared with the features of object using any mapping function. Optical flow segmentation can be used to provide the velocity of the moving object is distinguish from that of the background, and has expected characteristics. Optical flow is the amount of image movement within a given time period [21], [22], [23]. Optical flow method also known as Lucas-Kanade Method [21],[23]. Assume reference image captured at time T and current image capture at time ΔT then the optical flow method calculate the motion between these two images for every pixel position as shown in Fig. 2. Figure 2. Motion of the moving Object In reference image pixel present at location (X1, Y1, T) with intensity I (X1, Y1, T) will have moved in current frame by ΔX, ΔY and ΔT the following image constraint equation can be given: 𝐼(𝑋1, 𝑌1, 𝑇) = (𝑋1 + 𝛥𝑋, 𝑌1 + 𝛥𝑌, 𝑇 + 𝛥𝑇) (3) Here, the movement is small enough. Equation (2) can be further written as: 𝛥𝐼 𝛥𝑋 𝑉𝑥 + 𝛥𝐼 𝛥𝑌 𝑉𝑦 + 𝛥𝐼 𝛥𝑇 = 0 (4) Where, 𝑉𝑥 and𝑉𝑦 are optical flow of I(X, Y, T) or the X and Y components of the velocity and ∆𝐼 ∆𝑇 at a given pixel is just how fast the intensity is changing with time. 4.4 MORPHOLOGICAL OPERATIONS FOR NOISE REMOVAL Due to environment factors (for example, humidity or fog in the area under surveillance, during transmission of video from the camera to the processing unit the illumination changes) the image is expected to contain noises. To get proper boundary lines (edges) without any noise portion morphological operations [1] like opening and closing on the subtracted image are very useful. Opening is a combination of erosion and dilation operations with erosion followed by dilation whereas closing is dilation followed by erosion [13]. Human detection is based on the Navneet Dallal and Bill Triggs‟ Histogram of Oriented Gradients (HOG) for Human Detection [14]. They used small region (cell) structure which accumulates a local 1-D histogram of edge orientations of the pixel value. A unique representation for the image and better invariance to illumination changes is given by combine entries of the histogram with contrast normalization. By simple 1-D masking the Gradients in the image is calculated, in the vertical (↑) and the horizontal (→) direction. A histogram of gradient direction is computed for multiple regions of fixed rectangular size which generates a 9 component feature vector. Gradient sign shows the contrast difference between the foreground and the background in the image so it is ignored. The histograms clearly capture the edge or gradient structure that is very characteristic of local shape. The SVM classifier decides whether the region of interest contains a human figure or not.
  • 4. Development of Human Tracking in Video Surveillance System for Activity Analysis www.iosrjournals.org 29 | Page V. HUMAN TRACKING AND HANDLING OCCLUSION To track same object between two consecutive frames some correspondence should be there, if correspondence found then mark that object with same color rectangle and classify that object as human being. To find correspondence few features [15] of previous frame are stored and compared with the next frame, if features matches then same object found in both frames. And these features can be color, orientation, speed, intensity etc. For tracking any object these features plays an important role. Tracking can be categories in two types [16] one is region based tracking and second one is contour based tracking. In region based tracking features of the blob detected from two consecutive images if both matches then these two frame object gets related. In contour based tracking [2] the energy of the boundary/ contour of blob detected from both frames and if that energy of the boundary matches then same object present in both images is declared. In this paper static background images are used and region tracking is very efficient with stationary background. So for tracking human being region tracking method is used. Region tracking stores the features of whole object for matching the features with the features of the object in the next frame. But in this procedure required so much time for comparison, to reduce this wastage of time another approach can be applicable that is salient region tracking. In most salient region method only matches the most salient region of the previous frame with the most salient region of the current frame. Hence, in less amount of time required to match the whole image. The most salient region tracking fetches the basic features from the image like color, orientation and intensity [17]. Then from these fetched features, the feature vector is calculated for color, orientation and intensity using centre-surround method [10]. After the feature map has been created to find out which feature more uniquely identifies the object 3 features are weighted. Using their weight the saliency map created for the detected object. Finally from the previous image feature weight vector is calculated for this most salient region and this feature weight vector is matched with the subsequent next frame‟s feature weight vector. If match is above the threshold value then there is a match and can predict the same object is present in both images. If match not found the search area is doubled and the same salient feature matching procedure is repeated. If the detected object match is not found after doubling the search area, then object is expected to be occluded by some other object or any stationary background object. As seen in Figure1 Occlusion handling is not the separate process. Occlusion handling is done with the tracking of object. When motion area of the moving object has been detected then its centroid of an object can easily obtained from both images. Using centroid of these two images speed or velocity of an object can be obtained: 𝑉𝑥1 + 𝑉𝑦1 = 𝑆 (5) 𝑉𝑥2 + 𝑉𝑦2 = 𝑆 Even after doubling the search area if object not found then algorithm can conclude that object is occluded by some other object area. Using previously calculated velocity and direction of motion system can predict the next possible area of an object, minimum 5 frames should be processed to calculate the velocity and the direction of motion. VI. ACTIVITY ANALYSIS AND ALARM TRIGGERING After the detecting and tracking object as a human being activity analysis provides intelligence to this whole process. Algorithm stores the information about the detected human which will study its position, pose, motion and analyse them. After analysis, in case of any abnormal activity is found then an alarm is triggered. Any action like moving into any highly secure area, moving with speed more than a limit, any typical pose that is not normal, mass movement and many other actions can refer as abnormal action and for this alarm will be triggered. The list of abnormal activities varies according to place and users. In addition, any sign of unusual activity notification for this is done by making entry into the data base, generating reports, actually ringing any alarm [15], or sending message like email, SMS etc. Thus in this stage deal with utilizes of information has been received from last stages and notify unusual activities are involved in. VII. CONCLUSION AND FUTURE WORK While performing most salient region tracking using the direction and the speed of an object then object can be identified as human being and tracked with activity analysis. If this method is not able to find the human in initial search window, then just doubling the search window algorithm again search for human being and even if this fails too then the position of the human is predicted using previous stage information. In case the object is hidden and as algorithm is not searching whole frame instead just doubling the search area this process reduces the processing time. For proposed algorithm only static background is considered, in future it can be enhanced for moving background or on changed background.
  • 5. Development of Human Tracking in Video Surveillance System for Activity Analysis www.iosrjournals.org 30 | Page REFERENCES [1] S.S. Beauchemin and J.L.Barron, “The Computation of Optical flow”, ACM Computing Surveys, Vol.27, 1995, pp 433 - 466 [2] Y.L.Tian and A.Hampapur, “Robust Salient Motion Detection with Complex Background for Real-time Video Surveillance”, in Proc. Of IEEE Computer Society Workshop on Motion and Video Computing, January, 2005 [3] I.Haritaoglu, D.Harwood and L.S.Davis ,”W4: Who? When? Where? What? A Real Time System for Detecting and Tracking People”, In Proc. Of the International Conference on Face and Gesture Recognition, April, 1998 [4] Zhe Lin, Larry S. Davis, David Doermann, and Daniel DeMenthon,” Hierarchical Part-Template Matching for Human Detection and Segmentation” , University of Maryland, College Park, MD 20742 [5] L.Zhao and C.E.Torpe, “Stereo- and Neural Network-Based Pedestrian Detection”, IEEE Trans. Intelligent Transportation System, Vol.1,No.3, Sept., 2000 [6] Bo Wu, and Ram Nevatia. “Detection and Tracking of Multiple, Partially Occluded Humans by Bayesian Combination of Edgelet based Part Detectors.”, International Journal of Computer Vision, 75(2): 247-266, 2007. [7] A. Opelt, A. Pinz, and A. Zisserman. “A Boundary-Fragment- Model for Object Detection”. In Proc. Of the European Conference on Computer Vision, 2006. [8] E. Seemann, B. Leibe, and B. Schiele, "Multi-Aspect Detection of Articulated Objects", IEEE Conference on Computer Vision and Pattern Recognition, June 2006. [9] K. Mikolajczyk, C. Schmid, and A. Zisserman. “Human Detection based on A Probabilistic Assembly of Robust Part Detectors”. In Proc. Of the European Conference on Computer Vision, 2004. [10] J.W.Lee, M.S.Kim, I.S.Kweon, “A Kalman filter based visual tracking algorithm for an object moving in 3D ”, IEEE International Conference on Intelligent Robots and System, Vol.1,Aug., 1995 [11] J. Connell, A.W. Senior, A. Hampapur, Y-L Tian, L.Brown, and S. Pankanti, “Detection and Tracking in the IBM People Vision System”, IEEE International Conference on Multimedia and Expo., June 2004 [12] L.M.Fuentes and S.A.Velastin, “People Tracking in surveillance application”, in Proc. 2nd IEEE International Workshop on Performance Evaluation of Tracking and Surveillance, Dec. 2001 [13] M. Balcells-Capellades, D. DeMenthon and D. Doermann. “An Appearance-based Approach for Consistent Labeling of Humans and Objects in Video”. Pattern Analysis and Applications, November 2004. [14] N. Dalal and B. Triggs, “Histograms of oriented gradients for human Detection”, In Proc. Of the Conference on computer Vision and Pattern Recognition, San Diego, California, USA, pp. 886–893, 2005. [15] Suzaimah Bt Ramli, Kamarul Hawari B Ghazali, Muhammad Faiz Bin Mohd Ali, Zakaria Hifzan B Hisahuddin, ―”Human Motion Detection Framework”, IEEE 2011, pp. 158-161. [16] A.Senior, A.Hampapur, Y.L.Tian, L.Brown, S.Pankanti and R.Bolle,”Appearance Models for Occlusion Handling”, In Proc. Of Second International workshop on Performance valuation of Tracking and Surveillance systems in conjunction with Computer Vision and Pattern Recognition, Dec. 2001 [17] C.BenAbdelkader and L.Davis,” Detection of People Carrying Objects: a Motion-based Recognition Approach”, 5th IEEE International Conference on Automatic Face and Gesture Recognition ,May, 2002 [18] A.Elgammal, R.Duraiswami, D.Harwood and L.Davis, “Background and Foreground Modeling Using Nonparametric Kernel Density Estimation for Visual Surveillance”, In Proc. Of the IEEE, Vol.90, No.7, July, 2002 [19] Kim, T. H. Chalidabhongse, D. Harwood and L. Davis, "”",IEEE International Conference on Image Processing (ICIP), 2004. [20] C.Stauffer and W.E.L.Grimson, “Adaptive background mixture models for real tracking”. Int. Conf. Computer Vision and Pattern Recognition, Vol.2, 1999,pp246-252 [21] Nan Lu, Jihong Wang, Q.H. Wu and Li Yang, ―”An improved Motion Detection Method for Real-Time Surveillance”, International Association of Engineers (IAENG) International Journal of Computer Science, 35:1, IJCS_35_1_16 [22] Denman, Simon P. and Chandran, Vinod and Sridharan, Sridha (2007)” An adaptive optical flow technique for person tracking systems”. Pattern Recognition Letters 28(10):pp. 1232-1239 [23] Yokoyama, M. and T. Poggio. “A Contour-Based Moving Object Detection and Tracking.” In: Proceedings of Second Joint IEEE International Workshop on Visual Surveillance and Performance Evaluation of Tracking and Surveillance (in conjunction with ICCV 2005), Beijing, China, October 15-16, 2005. pp. 271-276