SlideShare une entreprise Scribd logo
1  sur  26
Télécharger pour lire hors ligne
I. Gómez-Conde, D. Olivieri, X.A. Vila Sobrino, A. Orosa-Rodríguez
(University of Vigo)
Salamanca (6-8th April, 2011)
Intelligent Video
Monitoring for Anomalous
Event Detection
www.milegroup.net
• Introduction
• Our approach
oSoftware algorithms for the tele-assistance for the elderly
oMultiple object tracking techniques
oBehavior detectors based on human body positions
• Experimental Results
• Conclusions
Index
Iván Gómez Conde
o % people (65 years and over)
o % youth (under 15 years)
o In 2050, % elderly people % youth
o Problems:
 Sociologic
 Economic
Computer Vision can be used as early warning
monitor for anomalous event detection!!!
 The aging of the population has increased
dramatically.
Current problem
Iván Gómez Conde
 The motivation for this paper is the development of
a tele-assistance application.
Detect foreground objects
Track these objects in time
Action Recognition
Motivation
Iván Gómez Conde
o Image analysis
o Machine learning
o Transate the low level
signal to a higher
semantic level
o Inference actions and
behaviors
 Present computer aplications go far beyond the
simple security camera of a decade ago and now
include:
What is the monitoring?
Iván Gómez Conde
Method for comparing foreground-
background segmentation
Feature vector tracking algorithm
Simple real-time histogram based algorithm
for discriminating movements and actions
 There are several original contributions proposed by
this paper:
Contributions
Iván Gómez Conde
• C++
• OpenCV (Open Source
Computer Vision)
 Qt
 Octave
Software
Iván Gómez Conde
System
Iván Gómez Conde
 This software is an experimental application. The
graphical interface provides maximum information.
Detecting movement
 There are several background subtraction methods.
We use two methods:
• Running Average
• Gaussian Mixture
Model
Iván Gómez Conde
Running Average
A = Matrix of accumulated pixels
I = Image
Nf = nº of used frames
α = weighting parameter Є [0,1]
 Each point of the background is calculated with the
mean of the backgrounds over Nf previous frames.
At(Nf) = (1-α) At-1(Nf) + α It
Iván Gómez Conde
Running average
Iván Gómez Conde
Gaussian Mixture Model
 This method models each background pixel as a
mixture of K Gaussian distributions
o K is tipically from 3 to 5
o Eliminates many of the artefacts that Running
Average is unable to treat
Iván Gómez Conde
Gaussian Mixture Model
Iván Gómez Conde
Testing Methods (% error)
FN + FP
640∙480
Iván Gómez Conde
• False Negatives (FN):
Foreground pixels
labeled as background
• False Positives (FP):
Background pixels
labeled as foreground
% error =
Finding individual objects
• Foreground objects rectangular “blobs”
detect blob
while (∃ blob) do
apply mask
create color histogram
aproximate with gauss
create feature vector
detect new blob
end while
Iván Gómez Conde
Feature vector for classification
Feature Vector
Size and coordinates
of the blob center
Gaussian fitted values
of RGB components
Motion vector
Iván Gómez Conde
Discrimination objects
Norm difference of red channel
Normdifferenceofgreenchannel
Iván Gómez Conde
Tracking algorithm
 Once objects have been separated and characterized by their
feature vector, we tracks
 Tracking is performed by matching features of the rectangular
regions
Iván Gómez Conde
Tracking algorithm
• Position from t to t+1 (x = xo + vt)
Iván Gómez Conde
Time chart
Bg-Fg Seg. Blob Detection Normal Video Video with Qt
Frame 1 28.3 ms 168.5 ms 33.2 ms 2.5 ms
Frame 30 847.5 ms 5065.4 ms 997.2 ms 75.82 ms
Frame 361 10198.2 ms 60954.1 ms 12000 ms 912.36 ms
Iván Gómez Conde
Detecting gestures
 We have considered a limited domain of events
 Discrimination arms gestures
o The mass histogram
o Statistical moments
Iván Gómez Conde
Detecting actions
Normalized Histogram
Iván Gómez Conde
• Basic body position
o Upright
o Lying down
• The inset image is the
histogram normalized to
unity
Discrimination actions
Figure 1 Figure 2 Figure 3
µ 0.54 0.33 0.44
σ 0.21 0.17 0.21
µ3 0.17 3.99 3.12
Iván Gómez Conde
Conclusions
 Our software aplication will allow track people and
discriminate basic actions
 The system is actually part of a more complete tele-
monitoring system
 The paper opens many possibilities for future study.
o Using our quantitative comparison to optimize parameters
o Combining feature vector with sequential Monte Carlo
methods
Iván Gómez Conde
Conclusions
 The histogram model developed in this paper provides
detection for a limited set of actions and events:
Real-time method
Easy to implement
Should have utility in real systems
It is not sufficiently robust
Iván Gómez Conde
Many thanks for your
attention
Iván Gómez Conde

Contenu connexe

En vedette

Intelligent wireless video monitoring system using computer111111
Intelligent wireless video monitoring system using computer111111Intelligent wireless video monitoring system using computer111111
Intelligent wireless video monitoring system using computer111111venkatesh deekonda
 
Next Generation Intelligent Camera technologies - Composec 2014 Keynote
Next Generation Intelligent Camera technologies - Composec 2014 KeynoteNext Generation Intelligent Camera technologies - Composec 2014 Keynote
Next Generation Intelligent Camera technologies - Composec 2014 KeynoteJacob Jose
 
Captchas are becoming security theater
Captchas are becoming security theaterCaptchas are becoming security theater
Captchas are becoming security theaterPeter Gordon
 
War Field Spying Robot with Night Vision Wireless Camera
War Field Spying Robot with Night Vision Wireless CameraWar Field Spying Robot with Night Vision Wireless Camera
War Field Spying Robot with Night Vision Wireless CameraEdgefxkits & Solutions
 
Li-Fi – Light Fidelity (Animated)
Li-Fi – Light Fidelity (Animated)Li-Fi – Light Fidelity (Animated)
Li-Fi – Light Fidelity (Animated)Mohammed Khan
 
Moving object detection
Moving object detectionMoving object detection
Moving object detectionManav Mittal
 
Securing underwater wireless communication by Nisha Menon K
Securing underwater wireless communication by Nisha Menon KSecuring underwater wireless communication by Nisha Menon K
Securing underwater wireless communication by Nisha Menon KNisha Menon K
 
Smart card technology
Smart card technologySmart card technology
Smart card technologyLav Pratap
 
Laser Communications
Laser CommunicationsLaser Communications
Laser CommunicationsSeminar Links
 
Automatic control of street light using LDR
Automatic control of street light using LDRAutomatic control of street light using LDR
Automatic control of street light using LDRDevang Loharikar
 

En vedette (20)

Best Paper winning PPT
Best Paper winning PPTBest Paper winning PPT
Best Paper winning PPT
 
Intelligent wireless video monitoring system using computer111111
Intelligent wireless video monitoring system using computer111111Intelligent wireless video monitoring system using computer111111
Intelligent wireless video monitoring system using computer111111
 
Next Generation Intelligent Camera technologies - Composec 2014 Keynote
Next Generation Intelligent Camera technologies - Composec 2014 KeynoteNext Generation Intelligent Camera technologies - Composec 2014 Keynote
Next Generation Intelligent Camera technologies - Composec 2014 Keynote
 
Captchas are becoming security theater
Captchas are becoming security theaterCaptchas are becoming security theater
Captchas are becoming security theater
 
Background Subtraction Algorithm for Moving Object Detection Using Denoising ...
Background Subtraction Algorithm for Moving Object Detection Using Denoising ...Background Subtraction Algorithm for Moving Object Detection Using Denoising ...
Background Subtraction Algorithm for Moving Object Detection Using Denoising ...
 
War Field Spying Robot with Night Vision Wireless Camera
War Field Spying Robot with Night Vision Wireless CameraWar Field Spying Robot with Night Vision Wireless Camera
War Field Spying Robot with Night Vision Wireless Camera
 
Li-Fi – Light Fidelity (Animated)
Li-Fi – Light Fidelity (Animated)Li-Fi – Light Fidelity (Animated)
Li-Fi – Light Fidelity (Animated)
 
Captchas
CaptchasCaptchas
Captchas
 
Captcha
CaptchaCaptcha
Captcha
 
Captcha
CaptchaCaptcha
Captcha
 
Light tree
Light treeLight tree
Light tree
 
Background subtraction
Background subtractionBackground subtraction
Background subtraction
 
Moving object detection
Moving object detectionMoving object detection
Moving object detection
 
Smart Card
Smart CardSmart Card
Smart Card
 
Securing underwater wireless communication by Nisha Menon K
Securing underwater wireless communication by Nisha Menon KSecuring underwater wireless communication by Nisha Menon K
Securing underwater wireless communication by Nisha Menon K
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
 
Smart cards
Smart cards Smart cards
Smart cards
 
Laser Communications
Laser CommunicationsLaser Communications
Laser Communications
 
Smart card system ppt
Smart card system ppt Smart card system ppt
Smart card system ppt
 
Automatic control of street light using LDR
Automatic control of street light using LDRAutomatic control of street light using LDR
Automatic control of street light using LDR
 

Similaire à Intelligent video monitoring

物件偵測與辨識技術
物件偵測與辨識技術物件偵測與辨識技術
物件偵測與辨識技術CHENHuiMei
 
Road signs detection using voila jone's algorithm with the help of opencv
Road signs detection using voila jone's algorithm with the help of opencvRoad signs detection using voila jone's algorithm with the help of opencv
Road signs detection using voila jone's algorithm with the help of opencvMohdSalim34
 
Surveillance using Video Analytics
Surveillance using Video AnalyticsSurveillance using Video Analytics
Surveillance using Video Analyticsidescitation
 
Motion analysis in video surveillance using edge detection techniques
Motion analysis in video surveillance using edge detection techniquesMotion analysis in video surveillance using edge detection techniques
Motion analysis in video surveillance using edge detection techniquesIOSR Journals
 
Talk 2011-buet-perception-event
Talk 2011-buet-perception-eventTalk 2011-buet-perception-event
Talk 2011-buet-perception-eventMahfuzul Haque
 
Moving object detection in video surveillance
Moving object detection in video surveillanceMoving object detection in video surveillance
Moving object detection in video surveillanceAshfaqul Haque John
 
Antispoofing techniques in Facial recognition
Antispoofing techniques in Facial recognitionAntispoofing techniques in Facial recognition
Antispoofing techniques in Facial recognitionRishabh shah
 
A Pointing Gesture-based Signal to Text Communication System Using OpenCV in ...
A Pointing Gesture-based Signal to Text Communication System Using OpenCV in ...A Pointing Gesture-based Signal to Text Communication System Using OpenCV in ...
A Pointing Gesture-based Signal to Text Communication System Using OpenCV in ...IRJET Journal
 
SCALE RATIO ICP FOR 3D POINT CLOUDS WITH DIFFERENT SCALES
SCALE RATIO ICP FOR 3D POINT CLOUDS WITH DIFFERENT SCALES SCALE RATIO ICP FOR 3D POINT CLOUDS WITH DIFFERENT SCALES
SCALE RATIO ICP FOR 3D POINT CLOUDS WITH DIFFERENT SCALES Toru Tamaki
 
Gesture Recognition?
Gesture Recognition?Gesture Recognition?
Gesture Recognition?Dayo Choul
 
Tracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance systemTracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance systemiaemedu
 
Tracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance systemTracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance systemIAEME Publication
 
Tracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance systemTracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance systemiaemedu
 
Tracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance systemTracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance systemiaemedu
 
ANISH_and_DR.DANIEL_VRINCEANU_Presentation
ANISH_and_DR.DANIEL_VRINCEANU_PresentationANISH_and_DR.DANIEL_VRINCEANU_Presentation
ANISH_and_DR.DANIEL_VRINCEANU_PresentationAnish Patel
 
People counting in low density video sequences2
People counting in low density video sequences2People counting in low density video sequences2
People counting in low density video sequences2Ahmed Tememe
 
Implementing Camshift on a Mobile Robot for Person Tracking and Pursuit_ICDM
Implementing Camshift on a Mobile Robot for Person Tracking and Pursuit_ICDMImplementing Camshift on a Mobile Robot for Person Tracking and Pursuit_ICDM
Implementing Camshift on a Mobile Robot for Person Tracking and Pursuit_ICDMSoma Boubou
 

Similaire à Intelligent video monitoring (20)

物件偵測與辨識技術
物件偵測與辨識技術物件偵測與辨識技術
物件偵測與辨識技術
 
Road signs detection using voila jone's algorithm with the help of opencv
Road signs detection using voila jone's algorithm with the help of opencvRoad signs detection using voila jone's algorithm with the help of opencv
Road signs detection using voila jone's algorithm with the help of opencv
 
Surveillance using Video Analytics
Surveillance using Video AnalyticsSurveillance using Video Analytics
Surveillance using Video Analytics
 
Motion analysis in video surveillance using edge detection techniques
Motion analysis in video surveillance using edge detection techniquesMotion analysis in video surveillance using edge detection techniques
Motion analysis in video surveillance using edge detection techniques
 
Talk 2011-buet-perception-event
Talk 2011-buet-perception-eventTalk 2011-buet-perception-event
Talk 2011-buet-perception-event
 
Moving object detection in video surveillance
Moving object detection in video surveillanceMoving object detection in video surveillance
Moving object detection in video surveillance
 
Antispoofing techniques in Facial recognition
Antispoofing techniques in Facial recognitionAntispoofing techniques in Facial recognition
Antispoofing techniques in Facial recognition
 
A Pointing Gesture-based Signal to Text Communication System Using OpenCV in ...
A Pointing Gesture-based Signal to Text Communication System Using OpenCV in ...A Pointing Gesture-based Signal to Text Communication System Using OpenCV in ...
A Pointing Gesture-based Signal to Text Communication System Using OpenCV in ...
 
SCALE RATIO ICP FOR 3D POINT CLOUDS WITH DIFFERENT SCALES
SCALE RATIO ICP FOR 3D POINT CLOUDS WITH DIFFERENT SCALES SCALE RATIO ICP FOR 3D POINT CLOUDS WITH DIFFERENT SCALES
SCALE RATIO ICP FOR 3D POINT CLOUDS WITH DIFFERENT SCALES
 
Gesture Recognition?
Gesture Recognition?Gesture Recognition?
Gesture Recognition?
 
Tracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance systemTracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance system
 
Tracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance systemTracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance system
 
Tracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance systemTracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance system
 
Tracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance systemTracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance system
 
Cell Tracking!
Cell Tracking!Cell Tracking!
Cell Tracking!
 
Leap Motion ppt
Leap Motion pptLeap Motion ppt
Leap Motion ppt
 
ANISH_and_DR.DANIEL_VRINCEANU_Presentation
ANISH_and_DR.DANIEL_VRINCEANU_PresentationANISH_and_DR.DANIEL_VRINCEANU_Presentation
ANISH_and_DR.DANIEL_VRINCEANU_Presentation
 
People counting in low density video sequences2
People counting in low density video sequences2People counting in low density video sequences2
People counting in low density video sequences2
 
Implementing Camshift on a Mobile Robot for Person Tracking and Pursuit_ICDM
Implementing Camshift on a Mobile Robot for Person Tracking and Pursuit_ICDMImplementing Camshift on a Mobile Robot for Person Tracking and Pursuit_ICDM
Implementing Camshift on a Mobile Robot for Person Tracking and Pursuit_ICDM
 
I0343065072
I0343065072I0343065072
I0343065072
 

Dernier

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Dernier (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Intelligent video monitoring

  • 1. I. Gómez-Conde, D. Olivieri, X.A. Vila Sobrino, A. Orosa-Rodríguez (University of Vigo) Salamanca (6-8th April, 2011) Intelligent Video Monitoring for Anomalous Event Detection www.milegroup.net
  • 2. • Introduction • Our approach oSoftware algorithms for the tele-assistance for the elderly oMultiple object tracking techniques oBehavior detectors based on human body positions • Experimental Results • Conclusions Index Iván Gómez Conde
  • 3. o % people (65 years and over) o % youth (under 15 years) o In 2050, % elderly people % youth o Problems:  Sociologic  Economic Computer Vision can be used as early warning monitor for anomalous event detection!!!  The aging of the population has increased dramatically. Current problem Iván Gómez Conde
  • 4.  The motivation for this paper is the development of a tele-assistance application. Detect foreground objects Track these objects in time Action Recognition Motivation Iván Gómez Conde
  • 5. o Image analysis o Machine learning o Transate the low level signal to a higher semantic level o Inference actions and behaviors  Present computer aplications go far beyond the simple security camera of a decade ago and now include: What is the monitoring? Iván Gómez Conde
  • 6. Method for comparing foreground- background segmentation Feature vector tracking algorithm Simple real-time histogram based algorithm for discriminating movements and actions  There are several original contributions proposed by this paper: Contributions Iván Gómez Conde
  • 7. • C++ • OpenCV (Open Source Computer Vision)  Qt  Octave Software Iván Gómez Conde
  • 8. System Iván Gómez Conde  This software is an experimental application. The graphical interface provides maximum information.
  • 9. Detecting movement  There are several background subtraction methods. We use two methods: • Running Average • Gaussian Mixture Model Iván Gómez Conde
  • 10. Running Average A = Matrix of accumulated pixels I = Image Nf = nº of used frames α = weighting parameter Є [0,1]  Each point of the background is calculated with the mean of the backgrounds over Nf previous frames. At(Nf) = (1-α) At-1(Nf) + α It Iván Gómez Conde
  • 12. Gaussian Mixture Model  This method models each background pixel as a mixture of K Gaussian distributions o K is tipically from 3 to 5 o Eliminates many of the artefacts that Running Average is unable to treat Iván Gómez Conde
  • 14. Testing Methods (% error) FN + FP 640∙480 Iván Gómez Conde • False Negatives (FN): Foreground pixels labeled as background • False Positives (FP): Background pixels labeled as foreground % error =
  • 15. Finding individual objects • Foreground objects rectangular “blobs” detect blob while (∃ blob) do apply mask create color histogram aproximate with gauss create feature vector detect new blob end while Iván Gómez Conde
  • 16. Feature vector for classification Feature Vector Size and coordinates of the blob center Gaussian fitted values of RGB components Motion vector Iván Gómez Conde
  • 17. Discrimination objects Norm difference of red channel Normdifferenceofgreenchannel Iván Gómez Conde
  • 18. Tracking algorithm  Once objects have been separated and characterized by their feature vector, we tracks  Tracking is performed by matching features of the rectangular regions Iván Gómez Conde
  • 19. Tracking algorithm • Position from t to t+1 (x = xo + vt) Iván Gómez Conde
  • 20. Time chart Bg-Fg Seg. Blob Detection Normal Video Video with Qt Frame 1 28.3 ms 168.5 ms 33.2 ms 2.5 ms Frame 30 847.5 ms 5065.4 ms 997.2 ms 75.82 ms Frame 361 10198.2 ms 60954.1 ms 12000 ms 912.36 ms Iván Gómez Conde
  • 21. Detecting gestures  We have considered a limited domain of events  Discrimination arms gestures o The mass histogram o Statistical moments Iván Gómez Conde
  • 22. Detecting actions Normalized Histogram Iván Gómez Conde • Basic body position o Upright o Lying down • The inset image is the histogram normalized to unity
  • 23. Discrimination actions Figure 1 Figure 2 Figure 3 µ 0.54 0.33 0.44 σ 0.21 0.17 0.21 µ3 0.17 3.99 3.12 Iván Gómez Conde
  • 24. Conclusions  Our software aplication will allow track people and discriminate basic actions  The system is actually part of a more complete tele- monitoring system  The paper opens many possibilities for future study. o Using our quantitative comparison to optimize parameters o Combining feature vector with sequential Monte Carlo methods Iván Gómez Conde
  • 25. Conclusions  The histogram model developed in this paper provides detection for a limited set of actions and events: Real-time method Easy to implement Should have utility in real systems It is not sufficiently robust Iván Gómez Conde
  • 26. Many thanks for your attention Iván Gómez Conde