Академический Документы
Профессиональный Документы
Культура Документы
1. Introduction
The increasing need for intelligent video surveillance in
public, commercial and family applications makes
automated video surveillance systems one of the main
current application domains in computer vision. Figure 1: Motion Detection method
Intelligent video surveillance systems deal with the real-
time monitoring of persistent and transient objects within
a specific environment. Intelligent surveillance system
has been evolution to third generation, known as 2.1 Background Template Construction
automated wide-area video surveillance system. Before the moving objects can be identified, a
Combined computer vision technology, the distributed background template must be built. The foreground
system is autonomic, which can also be controlled by cannot be removed so the ideal background image cannot
be retrieved. But the moving objects do not exist in the two images will be divided into 4 equal quadrants. First
same location in each image of a real-time video quadrant of the first image with the corresponding
sequence. The gray values of pixels which have the same quadrant of the second image is compared. The pixel
location in each frame of the video sequence are averaged values of these two quadrants are used to obtain the
to represent the gray value of the pixel which located in correlation value. Similarly the other three quadrants are
the same place in the approximate background. An compared and the formula is applied to get the remaining
average value of pixels in the same location of each frame three values. These four values are checked with the
in a video sequence is calculated. To simplify, the correlation value (r =1).If it is less than 1, depending upon
approximate background is also called “background the range, the type of the motion is detected. Among the
template”. four values obtained, the minimum value represents
In our prototype, the first 10 images are captured to maximum motion. This entire process is repeated for all
calculate the background template. remaining consecutive images and the value of “r” is
calculated for all cases.
2.2 Correlation Technique
In this technique, the captured images are Sub- divided
into four equal parts. A two dimensional cross correlation
is calculated using the formula given below between each
sub image with its corresponding part in the Background
template.
r = Correlation value
A = matrix representing pixel values of first image
B = matrix representing pixel values of second image
Such that
Size (A) = Size (B)
A = Average of (A)
B = Average of (B)
TextMessagetmsg=(TextMessage)mc.newMessage(Messa
3.1.1 Getting a Video Capture Player
geConnection.
8. Acknowledgements
We would like to thank the Authors Renzo Perfetti,
Figure 4: System Architecture Daniele Casali and our tutors Smitha H and Karthi R for
giving many helpful suggestions.
Correlation value, moving objects are considered to
appear. Then the handset will send out an alert MMS.
Since the device has good mobility, it can be put 9. References
anywhere including those area not covered by other
surveillance system. And it can be deployed rapidly in 1. An Efficient Moving Object Detection and
emergency. Description Tao Xia1, Chaoqiang Liu2, Hui Li2
Centre for Wavelets, Approximation and Information
5. System Requirements Processing, National University of Singapore
Temasek Laboratories and Centre for Wavelets,
Approximation and Information Processing, National
Java enabled Mobile phones with minimum 1.3 MP University of Singapore
Camera. 2. A J2ME-Based Wireless Intelligent Video
Mobile phone with Video capturing facility. Surveillance System Using Moving Object
All embedded platforms with camera equipped and Recognition Technology Lizhong Xu , Zhong
JSR135(MMAPI)/JSR120(WMA) supported can Wang , Huibin Wang , Aiye Shi , Chenming Li
install this system. College of Computer and Information Engineering
MMS functionality enabled SIM card. Hohai University Nanjing, P. R. China 210098
3. Detection of Moving Images Using Neural
6. Expected Results Network P. Latha, L. Ganesan, N. Ramaraj, and P.
The proposed system can be implemented in any java V. Hari Venkatesh
enabled phones using SUN JAVA Wireless Tool kit 4. Moving object detection Renzo Perfetti, Daniele
2.5 and JAVA ME (Micro Edition) SDK 3.0. The Java Casali, Giovanni Costantini
application created using the environment mentioned 5. Javed, O. and Shah, M., “Tracking and Object
above is installed in the mobile phone to be used for Classification for Automated Surveillance,” Proc
surveillance purpose. The owner has another mobile with European Conf. on Computer Vision (ECCV), 2002.
MMS activated network on the other hand. When a 6. M Valera, SA Velastin, Intelligent distributed
suspicious object is detected, the corresponding image is surveillance systems: a review. IEE Proceedings on
sent to the owner mobile through MMS. The owner’s Visual Image Signal Processing, April. 2005, vol.
mobile number is stored in the surveillance mobile. 152, vo.2, pp.192-204.
7. M. Piccardi, Background subtraction techniques: a
7. Conclusion review, IEEE International Conference on Systems,
The motion detection method using cross correlation Man and Cybernetics, Oct. 2004, vol. 4, pp. 3099–
led to the development of autonomous systems, which 3104.
also minimize the network traffic. With good mobile
ability, the system can be deployed rapidly in emergency.
And can be a useful supplement of traditional monitoring
system. With
the help of J2ME technology, the differences of various
hardware platforms are minimized. All embedded
platforms with camera equipped and JSR135/JSR120
Conference Proceedings RTCSP’09 90