Multiple target tracking using multiple cameras

Download
2008
Yılmaz, Mehmet
Video surveillance has long been in use to monitor security sensitive areas such as banks, department stores, crowded public places and borders. The rise in computer speed, availability of cheap large-capacity storage devices and high speed network infrastructure enabled the way for cheaper, multi sensor video surveillance systems. In this thesis, the problem of tracking multiple targets with multiple cameras has been discussed. Cameras have been located so that they have overlapping fields of vision. A dynamic background-modeling algorithm is described for segmenting moving objects from the background, which is capable of adapting to dynamic scene changes and periodic motion, such as illumination change and swaying of trees. After segmentation of foreground scene, the objects to be tracked have been acquired by morphological operations and connected component analysis. For the purpose of tracking the moving objects, an active contour model (snakes) is one of the approaches, in addition to a Kalman tracker. As the main tracking algorithm, a rule based tracker has been developed first for a single camera, and then extended to multiple cameras. Results of used and proposed methods are given in detail.

Suggestions

Collaborative mobile target imaging in ultra-wideband wireless radar sensor networks
Arık, Muharrem; Akan, Özgür Barış; Department of Electrical and Electronics Engineering (2008)
Wireless sensor networks (WSN) have thus far been used for detection and tracking of static and mobile targets for surveillance and security applications. However, detection and tracking do not suffice for a complete satisfaction of these applications and an accurate target classification. To address this need, among various target classification methods, imaging of target yields the most valuable information. Nevertheless, imaging of mobile targets moving over an area requires networked and collaborative d...
Comparison of 3d facial anchor point localization methods
Yağcıoğlu, Mustafa; Ulusoy, İlkay; Department of Electrical and Electronics Engineering (2008)
Human identification systems are commonly used for security issues. Most of them are based on ID card. However, using an ID card for identification may not be safe enough since people may not have any protection against the theft. Another solution to the identification problem is to use iris or fingerprints. However, systems based on the iris or fingerprints need close interaction to identification machine. Identifying someone from his photograph overcomes all these problems which can be called as face reco...
Visual detection and tracking of moving objects
Ergezer, Hamza; Leblebicioğlu, Mehmet Kemal; Department of Electrical and Electronics Engineering (2007)
In this study, primary steps of a visual surveillance system are presented: moving object detection and tracking of these moving objects. Background subtraction has been performed to detect the moving objects in the video, which has been taken from a static camera. Four methods, frame differencing, running (moving) average, eigenbackground subtraction and mixture of Gaussians, have been used in the background subtraction process. After background subtraction, using some additional operations, such as morpho...
Local Anomaly Detection in Crowded Scenes Using Finite-Time Lyapunov Exponent Based Clustering
Öngün, Cihan; Temizel, Alptekin; Taşkaya Temizel, Tuğba (2014-08-29)
Surveillance of crowded public spaces and detection of anomalies from the video is important for public safety and security. While anomaly detection is possible by detection and tracking of individuals in low-density areas, such methods are not reliable in high-density crowded scenes. In this work we propose a holistic unsupervised approach to cluster different behaviors in high density crowds and detect the local anomalies using these clusters. Finite-Time Lyapunov Exponents (FTLE) is used for analyzing th...
Surveillance wireless sensor networks: Deployment quality analysis
Onur, Ertan; Delic, Hakan; Akarun, Lale (2007-11-01)
Surveillance wireless sensor networks are deployed at perimeter or border locations to detect unauthorized intrusions. For deterministic deployment of sensors, the quality of deployment can be determined sufficiently by analysis in advance of deployment. However, when random deployment is required, determining the deployment quality becomes challenging. To assess the quality of sensor deployment, appropriate measures can be employed that reveal the weaknesses in the coverage of SWSNs with respect to the suc...
Citation Formats
M. Yılmaz, “Multiple target tracking using multiple cameras,” M.S. - Master of Science, Middle East Technical University, 2008.