English  |  正體中文  |  简体中文  |  Items with full text/Total items : 69561/69561 (100%)
Visitors : 23083776      Online Users : 684
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version

    Please use this identifier to cite or link to this item: http://ir.lib.ncu.edu.tw/handle/987654321/29111

    Title: Carried Object Detection Using Ratio Histogram and its Application to Suspicious Event Analysis
    Authors: Chuang,CH;Hsieh,JW;Tsai,LW;Chen,SY;Fan,KC
    Contributors: 資訊工程研究所
    Date: 2009
    Issue Date: 2010-06-29 20:13:59 (UTC+8)
    Publisher: 中央大學
    Abstract: This letter proposes a novel method to detect carried objects from videos and applies it for analysis of suspicious events. First of all, we propose a novel kernel-based tracking method for tracking each foreground object and further obtaining its trajectory. With the trajectory, a novel ratio histogram is then proposed for analyzing the interactions between the carried object and its owner. After color re-projection, different carried objects can be then accurately segmented from the background by taking advantages of Gaussian mixture models. After bag detection, an event analyzer is then designed to analyze various suspicious events from the videos. Even though there is no prior knowledge about the bag (such as shape or color), our proposed method still performs well to detect these suspicious events. As we know, due to the uncertainties of the shape and color of the bag, there is no automatic system that can analyze various suspicious events involving bags (such as robbery) without using any manual effort. However, by taking advantages of our proposed ratio histogram, different carried bags can be well segmented from videos and applied for event analysis. Experimental results have proved that the proposed method is robust, accurate, and powerful in carried object detection and suspicious event analysis.
    Appears in Collections:[資訊工程研究所] 期刊論文

    Files in This Item:

    File Description SizeFormat

    All items in NCUIR are protected by copyright, with all rights reserved.

    社群 sharing

    ::: Copyright National Central University. | 國立中央大學圖書館版權所有 | 收藏本站 | 設為首頁 | 最佳瀏覽畫面: 1024*768 | 建站日期:8-24-2009 :::
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback  - 隱私權政策聲明