Detection of Abandoned Objects in Crowded Environments

Similar documents
Security Management System - Configuring Video Analytics

Overview. Executive Summary. Solution Description CHAPTER

Smart Fire Prevention

Smoke and Fire Detection

Fire Detection System using Matlab

Fire Detection on a Surveillance System using Image Processing

Performance Evaluation of Event Detection Solutions: the CREDS experience

Fire Detection Using Image Processing

Video Analytics Technology for Disaster Management and Security Solutions

IMAGE PROCESSING BASED FIRE DETECTION ANDALERT SYSTEM

White Paper: Video/Audio Analysis Technology. hanwhasecurity.com

Automobile Security System Based on Face Recognition Structure Using GSM Network

Datasheet Crowd Management

TechnoAware s.r.l. Company profile, technical and functional specifications Page 1/10

Aviation Solutions. Why Tyco for airports? Our systems help protect over 110 airports. Secures over 80% of UK Airports and more than 60 US Airports

Equipment Based on NDT Technique and Used in Security and Safety Provision Systems

Complete solutions for commercial security. Verex delivers leading intrusion, access and video products to protect today s companies

smart modules An integrated and customised video analytics solution for the real-time events detection

integrated security management

Professional Perimeter Security Solutions

Re: ENSC440 Functional Specification for a License Plate Recognition Auto-gate System

Facility Commander Complete, Integrated Command and Control

Fire Detection using Computer Vision Models in Surveillance Videos

Fire Detection in Video

Smart Sensing and Tracking with Video and Mote Sensor Collaboration

VISEUM UK PRESENTATION

Standoff CWA/TIC Detection. Innovation with Integrity. Toxic Gas/Vapour Threat Mitigation RAPIDplus CBRNE

FIRE DETECTION USING COMPUTER VISION MODELS IN SURVEILLANCE VIDEOS

Chapter 2 Background. 2.1 VID Technology

State of the art in vision-based fire and smoke detection

Security & Monitoring Services

«Smart Home Technology» by Quadrobit: security energy comfort

Fast and Efficient Method for Fire Detection Using Image Processing

Driving simplicity. Facility and security management in a single interface

Perimeter protection for airports with intelligent video surveillance

Radar technology in surveillance

Integrating & Synthesizing Data for Perimeter Security Awareness

NeXT is a powerful stand-alone application running fully embedded in network cameras to perform an intelligent video surveillance for ATM devices.

A new view on building protection. Cerberus DMS makes building protection smarter, easier and more flexible. Answers for infrastructure.

A Comparative Analysis on Different Image Processing Techniques for Forest Fire Detection

An affiliate company of AR Challenges, Ltd. ISRAEL

The Design of MLX90621 Based Intelligent Lighting Control System Hui-jiao Wang*, Meng-meng Liu and Cong-cong Shi

Real time Video Fire Detection using Spatio-Temporal Consistency Energy

PYROSOFT. Software for DIAS infrared cameras in industry and research & development. Standard and application specific software Overview & Features

Automatic Detection of Defects on Radiant Heaters Based on Infrared Radiation

FLIR Optical Gas Imaging Camera Helps Improve Environment And Safety At Borealis Stenungsund

Vision Based Intelligent Fire Detection System

Automating Wide Area Surveillance with Radar, AIS, and GPS. Dan Flynn Honeywell July 19, 2007

Apex: Screening at Speed (SaS)

CCTV, HOW DOES IT WORK?

Introducing the innovative ipids Indoor Outdoor Detection System MANUFACTURING SECURITY SOLUTIONS

The WAVE Plus Instant Notification System for Schools and Colleges

FAQ S VIDEO BASED FIRE DETECTION (VFD)

Ekin PATROL The First and Only Smart Patrol of the World

Facility Commander Wnx

The IPPS was developed on IBM-PC platform under QNX real time operating system (RTOS) and uses QNX-Windows GUI.

Bringing Smarts to Methane Emissions Detection

Table of Contents PART I: The History and Current Status of the Industrial HMI PART II: Fundamentals of HMI Design and Best Practices

IMAGE PROCESSING COLOR MODEL TECHNIQUES AND SENSOR NETWORKING IN IDENTIFYING FIRE FROM VIDEO SENSOR NODE S. R. VIJAYALAKSHMI & S.

I am Rick Jeffress and I handle sales for Fike Video Image Detection. We thank the AFAA for coordinating the venue for this presentation, and we

An Intelligent Automatic Early Detection System of Forest Fire Smoke Signatures using Gaussian Mixture Model

Powered by HERE IS THE SOLUTION FOR YOUR NEEDS TRANSPORT SECURITY SOLUTIONS

In-Car Suffocating Prevention Using Image Motion Detection

Where Technology Shapes Solutions. Alarm management : Wasn t that problem already solved years ago?

Your best choice for long distances. We don t wait for things to happen. Technology you can believe in. Sharing knowledge

VIDEO SURVEILLANCE. for more safety in operation FOR OPERATION YOUR TASK. OUR CHALLANGE. Safety management without compromises.

Comprehensive solutions for greater safety and security Answers for infrastructure.

Solutions for Smarter Home Security

Airport Perimeter Security

Oxford Fire Department: 2008 Service Analysis. Prepared for the Subcommittee studying the Oxford Division of Fire. April 8, 2009

Totally Wireless Video Security

Axis thermal cameras. Reliable detection and verification, without compromising privacy.

BUILDING SECURITY and EVACUATION RELATED POLICIES: REVIEWED: AS NEEDED

Guidance on Video Smoke Detection Technology (VSD)

Selecting appropriate egress strategies

Australian Standard. Closed circuit television (CCTV) Part 4: Remote video AS AS

Smart Surveillance System using Background Subtraction Technique in IoT Application

Force Protection Joint Experiment (FPJE) Battlefield Anti-Intrusion System (BAIS) Sensors Data Analysis and Filtering Metrics

Building Automation solutions

Outdoor Detection. Intelligent perimeter surveillance solution range

FlameRanger. Revolutionary Firefighting Robot.

Video-based Smoke Detection Algorithms: A Chronological Survey

Video Analytics for Perimeter Protection

Government Security Solutions YOUR PARTNER OF CHOICE. Protecting People, Places And Perimeters

Analysis and Recognition of Flames from Different Fuels

SUPERYACHT SAFETY & SECURITY 360 AIR, SURFACE & UNDERWATER PROTECTION

INNOVATION THAT LEAVES RISK BEHIND.

Airmux Market. Airmux Family Sept 2013 Slide1

Siemens Enterprise Security. Integrated Security Process. Airports. & Resource Management for Today s Airports. Steve Batt, Market Manager Airports

SIMPLY MORE SECURITY MOSRO

Chapter 1 Introduction

HERE IS THE SOLUTION FOR YOUR NEEDS. Powered by BANK SECURITY SOLUTIONS

How SWIR Imaging contributes to the optimization of automatic quality control in the food industry

Engineering Specification

Intelligent Video Analysis

Threat Warning System

Session VI Smart safety systems

Access Professional Edition. The flexible access control system that grows with your business.

A vision-based monitoring system for very early automatic detection of forest fires

Mass Notification and Intelligent Response TM The European Way

Transcription:

1 Higher Institute for Applied Sciences and Technology Communications Department Detection of Abandoned Objects in Crowded Environments June 22 2016 Submitted by : Ali Assi Supervisors : Dr. Nizar zarka En. Bassel Shanor Multimedia 4 th year Project

Contents 1. Table of Figures... 3 2. List of Abbreviations... 4 3. Key Words... 5 4. Abstract... 6 5. Introduction... 7 6. General Idea... 8 7. Algorithm of this project... 8 Region Of Interest (ROI)... 8 Auto Threshold... 8 Subtraction... 9 Convert color Type... 9 Image Segmentation... 10 Morphological Operation... 10 Object Tracking... 10 Alarm... 11 8. Flowchart... 12 9. Results... 13

1. Table of Figures Figure 1 : Subtraction... 9 Figure 2 : RGB to YCrCb Conversion... 9 Figure 3 : Image Segmentation... 10 Figure 4 : Flowchart... 12 Figure 5 : All objects... 13 Figure 6 : Abandoned Objects... 13 Figure 7 : All Objects... 14 Figure 8 : Abandoned Objects... 14

2. List of Abbreviations ROI : Region Of Interest RGB : Red Green Blue (Color Type) YCrCb : Color Type.

3. Key Words Abandoned objects. Crowded environments.

4. Abstract We present a new project to robustly and efficiently detect abandoned and removed objects in complex environments. Several improvements are implemented to the background subtraction method for shadow removal, quick lighting change adaptation. The system is capable of handling concurrent detection of multiple abandoned objects, up to 200 objects, track them, and set an alarm if any abandoned object was detected. Any object could be left for specified period of time (certain number of frames); if it exceeds the limit, the system will set an alarm. On the other hand, abandoned object could be missed for certain number of frames, if it exceeds the limit of frames, the system will turn the alarm off.

5. Introduction The monitoring and surveillance of unattended baggage has become a priority for the security, because of the increasing number of incidents where terror organizations have planted explosive devices in ordinary baggage. One of the more critical challenges faced by security personnel monitoring mass transportation terminals and other busy public facilities is the issue of real-time detection of unattended or abandoned luggage. From airports to train stations and bus depots, museums, sports stadium and other places which are considered as crowded environments. Recent studies have shown that the average human can focus on tracking the movements of up to four dynamic targets simultaneously, and can efficiently detect changes to the attended targets but not the neighboring distractors, that is why we need to depend on the technology, which can be used to assist security officers monitoring live surveillance video by directing their attention to a potential area of interest. Professor of Artificial Intelligence at the University of Leeds, David Hogg, says: "Due to increased anxieties around the threat of terrorism, the monitoring and surveillance of unattended baggage has become a top priority across the globe. By employing advanced computer technology our system will make this kind of surveillance much less prone to human error."

6. General Idea In this project, our main goal is to detect any abandoned object in crowded environments, and then if the abandoned was left for a specified time, we will set an alarm by drawing a rectangle over the detected abandoned object. 7. Algorithm of this project Region Of Interest (ROI) You don`t need to watch all the area which the camera covers, may all you need is to watch a specified region, that`s what we called the region of interest. Selecting the region of interest minimize the errors that could happened because of the movement of some objects that we don`t care about, such as train in the train station etc. Auto Threshold Since many functions work with binary pictures it`s recommended to convert the frames to binary. The auto threshold operation determines the threshold by splitting the histogram of the input image to minimize the variance for each of the pixel groups, and that`s what we called Otsu's method.

Subtraction First, we will consider the first frame of the video as a background, and to detect the new object in the video; we will subtract the background from each frame,, we will detect every new object because of the difference between the background and the current frame. Figure 1 : Subtraction Convert color Type To get a better results, it`s recommended to convert the color type from RGB to YCbCr, which offers greater robustness to changes in illumination. Figure 2 : RGB to YCrCb Conversion

Image Segmentation To define the many objects in the videos, the segmentation process will return statics of the input video, and that`s how we get the parts of object connected to each other. Having blobs or segmented objects is necessary to detect the various objects. Figure 3 : Image Segmentation Morphological Operation A series of morphological operations may be carried out to clean up the image, retaining only the most useful segments Applying Closing operation on the segmented objects will help to get clearer frames and obvious connected objects. Object Tracking The system will track the movement of the detected object, to notify the client about any new elements in the video, and maybe to track the owner of the abandoned baggage.

Alarm If any abandoned object was detected and still exist for a period of time, we will set an alarm, and if the detected abandoned object was missed for a specified time, the alarm will turn off again. In our case, the alarm is a filled rectangle drawn over the detected object.

8. Flowchart Figure 4 : Flowchart

9. Results After applying the project on video, we notice that by changing the ROI we will get a different results, it`s necessary to select the region of interest before starting the detecting object in order to minimize the errors. Any change in the frames will be considered as new object, and could be considered as abandoned object. Even after changing the color type from RGB to YCrCb, the change in luminance and the existing of shadows will affect the result. Selecting small ROI, we got the following results: Figure 5 : All objects Figure 6 : Abandoned Objects

We notice that we got 100% correct result, but with a bigger ROI, we will get some errors : Figure 7 : All Objects Figure 8 : Abandoned Objects So we got one false detection in this case.

10. Conclusion and future work Public safety is a critical issue in our world today. Through the assistance of automatic threat detection systems, security personnel may be equipped with instant and comprehensive awareness of potential crises. In this paper, we introduce a general framework to recognize the event of object abandonment in a busy scene. The proposed algorithm is characterized by its simplicity and intuitiveness. Segmentation is another challenging issue, including foreground as well as object segmentation. For better foreground segmentation, it would be worth exploring techniques of adaptive background modeling, or a mechanism for switching among pre-stored background models (backgrounds of the platform with and without the train, for example). Many improvements could be applied on this project, when an unattended object is detected, the system traces it back in time to determine and record who its most likely owner(s) may be.