Академический Документы
Профессиональный Документы
Культура Документы
A.Makarov, J.-M. Vesin and M.Kunt Signal Processing Laboratory Swiss Federal Institute of Technology Lausanne, CH 1015
Abstract
In this article we present an image processing based method for intrusion detection. The algorithm is characterized by a low computational cost, a high sensitivity to the presence of objects, robustness t o illumination changes and modest memory requirements. The suggested approach is t o separate the moving object edges from the background.
Introduction
Image processing offers the possibility to integrate surveillance of restricted areas and coding (compression and transmission) of frames containing intrusions. The intrusion detection algorithms should satisfy a set of criteria that may seem contradictory:
1. High sensitivity to the presence of intruding objects.
Lighting changes are the main cause of false alarms in image based intrusion detection. Edges are much more robust against lighting changes than luminance. An approach based on edge extraction was proposed by Bartolini and Cappellini [3] to design an intrusion detector dealing successfully with variations of light. Robustness of the algorithm is enhanced by selection of reference background contour segments using the Hough Transform. This property is achieved however at the expense of sensitivity, for the method becomes dependent on the location of the reference straight-line edges. The computational and memory costs imposed by the use of the two-dimensional Hough Transform may be critical for low-cost implementations. Our work conserves the edge-extracting approach] but tries to remedy the aforementioned drawbacks. In order to avoid the scene dependence, we base our detection on suppression of background edges and enhancement of moving edges, i.e. edges of the moving object. Beside robustness and sensitivity, the most important criterion to which we submitted was a non-expensive and efficient hardware implementation viability. Our algorithm is presented in full detail in this paper. In section 2 we present the extraction of moving edges. In section 3 we show our results compared to the Hough Transform based method [3]. Finally, the conclusion is given in section 4.
expensive. Methods based on adaptive extraction [2] of background are suitable for keeping track of slow changes of illumination] but their efficiency is impaired in the presence of abrupt changes [3], which often happen in indoor scenes (due to reflections, shadows etc.).
*This work was supported by CERS
grant 2456.1
in the background. The intrusion detection may then be performed by comparing the number of points in the extracted contours with a fixed threshold. As many other change detection algorithms, we simplify the problem by processing images issued from a fixed camera. The current input image is compared with the stored reference. If intrusion is detected, the image is transmitted. If the number of extracted
804
I I
other. The resulting bi-level image will consist of the full gradient edges of the moving object (if any), the sparsed remains of the background gradient edges, and of more noise than before. 3. A simple median fiiltering of window size 3x3 is performed in order to conserve the moving edges and to remove the background remains and noise. This is possible because the only dense regions in the binary difference image correspond to the edges of the moving object. 4. The above steps may suffice to detect the intrusion. Anyway, to make sure that the undesirable remains of the background edges and noise are removed, we extract the outline of the median filtered edges. The resulting contour should envelop the moving olbject. The outline points are obtained by taking the first and the last points in each row and each column. These points are then sequentially ordered. If some point or some small group of points is far away from the previous and the succeeding points, it is removed. 5 . In the basic algorithm of Figure 1, the remaining edge-points are counted up and their sum cornpared to a fixed threshold. In [4], it was chosen to detect large increases in the number of edgepoints in order to enhance the robustness when dealing with changing contrasts or very noisy images. Step 2 was used in a recent approach developed independently by Aranda et al. [5].
NO
Figure 1: the block-scheme of the intrusion detector points is below the threshold, the reference image is updated. We shall describe now each individual step of the algorithm of Figure 1.
1. For the sake of simplicity and robustness we do not pay much attention to the precision of kxtracted contours. This allows us to use the fastest way to extract the edges: the gradient. As a matter of fact our edge extraction consists of simple subtraction of consecutive rows and columns, and addition of the absolute values of thus obtained horizontal and vertical components. That is why we called this simplified procedure pseudogradient.
3 Results
Steps 1-5 of the described intrusion detection algorithm are applied to a 64 frame sequence which represents a human being trespassing a watched on area. Dimensions of images are 288x353 pels, luminance range is 0-255. The frame numbers 0 and 64 represent the reference images. The human enters the scene in the first frame and exits in the 63rd frame. Figure 3 shows the number of extracted moving-edge points for each frame. The method we used to test the robustness of the algorithm to illumination changes consists in adding (subtracting) a fixed amount of luminance to (from) each pixel, which gives brightening (darkening) effect [3]. The increment we used to generate brightened and darkened sequence is 50 grey-levels. It is larger than the one suggested in [3], which allowed US to olbserve the behaviour of the algorithm in the presence
Further simplification of gradient images is done as usually by thresholding. We used a low fixed threshold which produced bi-level images containing large (i.e. badly localised) edges and a high amount of noise. If the input image represents the background, the bi-level gradient image is stored in memory as the reference. This reduces the amount of memory needed to store a reference background
805
Figure 3: The signals extracted from brightened and darkened sequences deviate insignificantly with respect to the moving edge points sum of the original sequence.
of saturation due to limited range of luminance. In Figure 3, the number of moving edge-points extracted from brightened and darkened sequences is subtracted and divided by the corresponding number for the original sequence. Due to saturation, some edges disappear, so the obtained values are negative. These variations are very low, hence the algorithm is robust with respect to the applied lighting change model. In all cases, high sensitivity to intrusion is preserved, and the extracted signal is zero when no intruding object occurs. For more complex illumination change models, the change detection method described in [4] is preferred to the comparison with the fixed threshold. Figures 4,5 and 6 represent the bi-level images at different stages of the algorithm. For sake of comparison, we show on Figures 7 , 8 and 9 the results obtained by the reference edges method
0,
806
0.961
Figure 9: Reference edges detection in the brightened sequence. bustness [4]. Addition of new modules turn it into a preprocessor for object recognition or classification applications. The decision about the existence of intrusion was made here by comparin,g the extracted signal with a fixed threshold. This is justified by the fact that no moving edge point is extracted when no intrusion occurs, which holds for the illumination change model we used. In [4],we achieved robustness to various contrasts and high signetl-tcmoise ratios by detecting changes in the extracted signal.
References
[l] P.Bouthemy and P.Lalande. Motion detection in a n image sequence using Gibbs distributions. Proceedings ICASSP 89, 3:1651-1654, May 1989.
[2] Klaus-Peter Karmann, Achim von Brandt, and Rainer Gerl. Moving object segmentation based on adaptive reference images. Signal Processing V: Theories and Applications, pages 95:l-954, 1990.
[3]
[3]. Due to the spatial distribution of the reference edges, this method turns out to be less sensitive. Its robustness is impaired by extreme illumination variations. For the tested population of images, our method detected intrusion in 97% of frames versus 49% for the Hough Transform based method.
4
F.Bartollini and V.Caqpellini. Automatic detection of intrusions by image processing. Proceedings of the
International Conference on Digital Signal Processing,
2:468-471,
Conclusion
[4] A. Makarov.
Edge-extraction may be used in intrusion-detection methods in order to enhance their robustness against illumination changes. In this paper we presented an algorithm based on edge-extraction that is characterised by high robustness to illumination changes as well as high sensitivity to the presence of physical objects. Low computational cost and storage requirements are additional assets of this intrusion detector. The method is flexible: if some modules are omitted the detection is simpler and faster at the expense of ro-
July 1993. Change detection using Joint NLOS. Technical Report 94-07, Signal Processing Laboratory, Swiss Federal Institute of Technology, Lausanne, Switzerland, August 1!>94. [5] C. Le6n J. Aranda and M. Frigola. A multitracking system for trajectory analysis of people in a restricted area. In V. Cappellini, editor, Proceedings of the 4th
International Workshop on Time- Varying Image Processing and Moving Object Recognition, number 3, pitges 118-124, Florence,
807