簡易檢索 / 詳目顯示

研究生: 吳健綱
Chien-Kang Wu
論文名稱: 利用本質圖像抽離技術於人潮擁擠環境中對於被遺棄物體之偵測
Abandoned object detection within crowded environment with intrinsic image
指導教授: 王家祥
Jia-Shung Wang
口試委員:
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 資訊系統與應用研究所
Institute of Information Systems and Applications
論文出版年: 2007
畢業學年度: 95
語文別: 中文
論文頁數: 47
中文關鍵詞: 可疑物體偵測本質影像
外文關鍵詞: Abandoned object detection, intrinsic image
相關次數: 點閱:1下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 傳統的保全監視系統只利用CCD攝影機和儲存裝置來顯示並紀錄畫面,他不但缺乏自動化的監控警告機制且需要耗費監控者大量的時間來處理繁雜的工作,在保全系統中加入自動化監控警告的機制將可大幅提升安全性且減少大量人力成本的支出。近年來由於恐怖攻擊行動在世界各地不斷發生,對於公共安全產生極大的威脅,因此在公共場合中對於可疑的人或物體的偵測研究近年來越來越受重視,本篇論文的目的即是在人潮擁擠的環境下找出可疑的人或被遺棄的物體,在本論文中,我們將以本質影像(intrinsic image)的想法為基礎在時間軸上找尋一序列的本質影像,另外我們將利用Motion filter和stable image的更新機制來過濾人潮並更新目前的背景以提高人潮擁擠環境中對於可疑物體判斷的正確性。此外我們將利用目前及過去一段時間內所得到的本質影像來建構短期及長期的偵測架構。經由實驗證明本論文在人潮擁擠的環境下可以正確且有效率的偵測到可疑物體,我們不僅在室內環境中得到良好的偵測效果,也在室外環境的實驗裡得到很好的驗證。


    In traditional security surveillance systems, only CCD cameras and storage devices are equipped for the operators to monitor the surveillance environment. Thus, the watchmen have to handle lots of thorny tasks to take care of the security problem. It is generally considered that integrate automatic alarm mechanism into traditional surveillance system will contribute to the system reliability and save lots of labor works as well.
    In this thesis, a novel approach was proposed to find suspicious people or objects within crowded environment. We formulate the detection system with the help of intrinsic-image-based background modeling, motion filtering, and alarm event validation. The intrinsic images which derive from consecutive frames were utilized to disclose the suspicious region within observed scenes. And the block-based motion filter incorporated with stable image updating strategy was applied to filter out the interference issue caused by large stream of moving pedestrians. Also, a block-based alarm method based on different examined period was employed to threshold the foreground objects within consecutive intrinsic images. The proposed method has been testified within various real-world video sequences and demonstrates its efficiency to disclose suspicious objects under crowded environment.

    中文摘要 ………………………………………………………………….I 致謝 ………………………………………………………………… II Abstract ……………………………………………………………….III Table of Contents ……………………………………………………………….IV List of Figures and Tables V Chapter 1. Introduction 1 Chapter 2. Related work 6 2.1. Scenarios of abandoned object detection 6 2.2. Intrinsic-image-based surveillance systems 9 Chapter 3. Abandoned object detection using intrinsic image with motion filter 13 3.1. Finding intrinsic images in consecutive timeframe 14 3.2. Moving object filtering with motion filter 18 3.3. Stable region update incorporated with sparse filter 24 3.4. Abandoned object detection from consecutive intrinsic images 28 3.4.1. Short-Term detection method 29 3.4.2. Long-Term detection method 31 3.5. Background updating with α-blending method 33 Chapter 4. Experimental results 36 4.1. System parameters 36 4.2. Performance evaluation 38 4.2.1. Medium complexity environment 39 4.2.2. High complexity 41 4.2.3. Outdoor environment with traffic jam 43 Chapter 5. Conclusion 44 References …………………………………………………………………46

    [1] C. Stauffer and W.E.L Grimson, “Adaptive background mixture models for real-time tracking,” IEEE Computer Society Conference on Computer Vision and Pattern Recognition, Vol. 2, pp. 23-25, June 1999.
    [2] D.-S. Lee, “Effective Gaussian mixture learning for video background subtraction,” IEEE Trans. Pattern Anal. Mach. Intell., Vol. 27, No. 5, pp. 827–832, 2005.
    [3] Y. Weiss, “Deriving intrinsic images from image sequences,” Proc. of IEEE Int’l Conf. on Computer Vision, pp. 68-75, July, 2001.
    [4] Y. Matsushita, K. Nishino, K. Ikeuchi, and S. Masao, “Illumination normalization with time-dependent intrinsic images for video surveillance,” Proc. of IEEE Int’l Conf. on Computer Vision and Pattern Recognition, 2004.
    [5] F. Porikli, “Multiplicative background-foreground estimation under uncontrolled illumination using intrinsic images,” Workshop on Motion and Video Computing, Vol. 2, 2005.
    [6] T. Yang, Q. Pan, S. Z. Li, and J. Li, “Multiple layer based background maintenance in complex environment,” Image and Graphics, Proceedings. Third International Conference on, pp.112-115, Dec. 2004.
    [7] L. Li and M.K.H. Leung, “Fusion of two different motion cues for intelligent video surveillance,” Proceedings of IEEE Region 10 International Conference on Electrical and Electronic Technology, Vol. 1, pp. 341 – 344, Aug. 2001.
    [8] M. Spengler and B. Schiele, “Automatic detection and tracking of abandoned objects,” Proc. 5th International Workshop on Performance and Evaluation for Tracking and Surveillance, pp. 149-156, 2003.
    [9] S. Gera. Ferrando, G. Massa, and C.M. Regazzoni, “A new method for real time abandoned object detection and owner tracking,” IEEE International Conference on Image Processing, pp. 3329-3332, 2006.
    [10] G.L. Foresti, L. Marcenaro, and C.S. Regdzzoni, “Automatic detection and indexing of video-event shots for surveillance applications,” IEEE Transactions on Multimedia, Vol. 4, No. 4, pp. 459-471, 2002.
    [11] W.-H. Tung, “Abandoned Object Detection for Indoor Public Surveillance Video,” Master Thesis, Computer Science Department, National Tsing Hua University, 2006.
    [12] M.D. Beynon, D.J. Van Hook, M. Seibert, A. Peacock, and D. Dudgeon, “Detecting abandoned packages in a multi-camera video surveillance system,” IEEE Conference on Advanced Video and Signal Based Surveillance, pp. 221 – 228, July 2003.
    [13] C. Sacchi and C.S. Regazzoni, “A distributed surveillance system for detection of abandoned objects in unmanned railway environments,” IEEE Transactions on Vehicular Technology, Vol. 49, No. 5, pp. 2013-2026, 2000.
    [14] S.A. Velastin, B.A. Boghossian, B. Lo, J. Sun, and M.A. Vicencio-Silva, "PRISMATICA: Toward ambient intelligence in public transport environments," IEEE Transactions on Systems, Man, and Cybernetics - Part A, Vol. 35, No. 1, pp. 164-182, 2005.
    [15] H.G. Barrow and J.M. Tenenbaum, “Recovering intrinsic scene characteristics from images,” Computer Vision Systems, Academic Press, pp. 3-26, 1978.
    [16] G.D. Finlayson, S.D. Hordley, and M.S. Drew, “Removing shadows from images,” Proc. European Conf. Computer Vision, Vol. 4, pp. 823-836, 2002.
    [17] M. Tappen, W. Freeman, and E. Adelson, “Recovering shading and reflectance from a single image,” Neural Information Processing Systems, 2002.

    無法下載圖示 全文公開日期 本全文未授權公開 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)

    QR CODE