A novel approach to identify unobvious entities from real time and offline video streaming

N. Pujari, M. Kothari
{"title":"A novel approach to identify unobvious entities from real time and offline video streaming","authors":"N. Pujari, M. Kothari","doi":"10.1109/ICCCT2.2014.7066728","DOIUrl":null,"url":null,"abstract":"Security and its related ecosystem have always been given priority in the form of procedures, policies, technology and research. Technology as an assisting component in case of security plays a major role in identifying lapses, loopholes and thus prevent situations to turn into catastrophes. Video surveillance these days has gained significant importance for keeping any place secure. Video cameras are being installed in public places such as malls, theatres, railway stations, super markets, airports and so on. Security personnel monitor these camera feeds from the control centre to observe unobvious entities and manually label the suspected frames. This sometimes turn into lapses due to oversight, fatigue, and negligence because of manual surveillance. This work carried out attempts to overcome these limitations by automating identification of unobvious entities from real time and offline video streams by using the proposed computer vision algorithm. It also proposes to indicate the relative suspicious activity in each frame on a scale of 1 to 10 using the concept of suspectMeter. In addition this algorithm also proposes to reduce the space required for storing suspected frame(s).","PeriodicalId":6860,"journal":{"name":"2021 RIVF International Conference on Computing and Communication Technologies (RIVF)","volume":"68 1","pages":"1-6"},"PeriodicalIF":0.0000,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 RIVF International Conference on Computing and Communication Technologies (RIVF)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCT2.2014.7066728","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Security and its related ecosystem have always been given priority in the form of procedures, policies, technology and research. Technology as an assisting component in case of security plays a major role in identifying lapses, loopholes and thus prevent situations to turn into catastrophes. Video surveillance these days has gained significant importance for keeping any place secure. Video cameras are being installed in public places such as malls, theatres, railway stations, super markets, airports and so on. Security personnel monitor these camera feeds from the control centre to observe unobvious entities and manually label the suspected frames. This sometimes turn into lapses due to oversight, fatigue, and negligence because of manual surveillance. This work carried out attempts to overcome these limitations by automating identification of unobvious entities from real time and offline video streams by using the proposed computer vision algorithm. It also proposes to indicate the relative suspicious activity in each frame on a scale of 1 to 10 using the concept of suspectMeter. In addition this algorithm also proposes to reduce the space required for storing suspected frame(s).
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
一种从实时和离线视频流中识别不明显实体的新方法
安全及其相关生态系统一直以程序、政策、技术和研究的形式得到优先考虑。技术作为安全方面的辅助组成部分,在识别失误和漏洞,从而防止局势变成灾难方面发挥着重要作用。如今,视频监控对于保证任何地方的安全都具有重要意义。摄像机被安装在公共场所,如商场、剧院、火车站、超市、机场等。安全人员从控制中心监控这些摄像头的馈送,观察不明显的实体,并手动标记可疑的帧。这有时会由于疏忽、疲劳和人工监督的疏忽而导致失误。这项工作试图通过使用所提出的计算机视觉算法自动识别实时和离线视频流中的不明显实体来克服这些限制。它还建议使用怀疑计量的概念在1到10的范围内表示每帧中的相对可疑活动。此外,该算法还提出减少存储可疑帧所需的空间。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A Novel Image Watermarking Scheme Using LU Decomposition Streaming Algorithm for Submodular Cover Problem Under Noise Hand part segmentations in hand mask of egocentric images using Distance Transformation Map and SVM Classifier Multiple Imputation by Generative Adversarial Networks for Classification with Incomplete Data MC-OCR Challenge 2021: Simple approach for receipt information extraction and quality evaluation
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1