Surveillance using Video Analytics

Published on February 2017 | Categories: Documents | Downloads: 30 | Comments: 0 | Views: 289
of 7
Download PDF   Embed   Report

Comments

Content

 

Proc. of Int. Conf. on Computational Intelligence and Information Technology  

Surveillance using Video Analytics 1

2

3

B.Srilaya , L.Vinod Kumar  ,L N P Boggavarapu , R S Vaddi 1,2

4

IV/IV B.Tech.,Department of Information technology, V.R.Siddhartha College of Engineering, Vijayawada, A.P, India 3,4 Assistant Professor, Department of Information technology, V.R.Siddhartha College of Engineering, Vijayawada, A.P, India Email:{srilulaya93, vinodlingamsetty, mailtoblnp,syam.radhe}@gmail.com

 Abstract—Surveillance using the video is a bit sophisticated task, yet making use of technology things can be done perfect. Security has been so difficult in the past that it was overlooked or avoided by security installers unless absolutely necessary. The present focus of computer vision Technology aimed at automating the analysis of Closed Circuit Tele Vision (CCTV) footages. This includes automatic identification of objects in a raw video, following those objects over time and between cameras, and the interpretation of those object’s appearance and movements. Here achieving video analytics by implementing its segments, through Open CV with an e.g., Extracting the edges of a live video through web cam and finding the motion detection in Live video. In this paper we even discuss about the feature of 3-D sensors in video surveillance.  Key Terms— Surveillance, video analytics, contours, RGB image, binary image, threshold

I.  I NTRODUCTION  Video analytics is the effective use of computers for automatically identifying the things of interest without the requirement of an operator having to view the video. The most commonly used types of video analytics  professionally deployed are perime perimeter ter violatio violation, n, license plate recognition and people counting, object detection face detection. The commercial use of video analytics commenced in the year 2003. However, in the last few years, enthusiasm for video analytics has waned as numerous projects around the world. At the same time, only modest technological progress has been made in video analytics in the last 3 years. Video analytics is the computerized moldings like transformation or modification and analysis of video recording footages that are captured by surveillance systems and analysis of pre-recorded video for the  purpose of extracting minute detailed events, which i s called as fforensic orensic analysis. Automatica Automatically lly monitoring the cameras and generate alerts for any unwanted un wanted events. Video surveillance systems systems are typically installed to record video footage of areas of o f interest within a facility, around its perimeter or in outdoor areas which require observation, with a view to “catching” (allowing the user to be able to observe) and recording events related to security, safety, loss prevention, operational efficiency and even business intelligence intelligence.. Video Analytics Analytics enhances video surveillanc surveillancee systems by performing the tasks of real-time event detection detection as well as post-event analysis, while saving manpower costs and increasing the effectiveness of the surveillance system operation.  A.Video Analytics Analytics for Re Real-Time al-Time Ale Alerts: rts:

Through the implementation of various image processing algorithms, Video Analytics can detect a variety  DOI:03.LSCS.2013.6.537  DOI:03.LSCS.2013.6 .537 © Association of Computer Electronics and Electrical Engineers, 2013

 

 

of events, in real-time real-time,, such as: penetration of unauthorized people/vehicles into restricted areas, tailgating of  people through secure checkpoints, traffic obstacles, unattended objects, vehicles stopped in no-park no-parking ing zones, highways or roads, removal of assets. By defining the set of events that the sur veil veillance lance system operator wants to be alerted to, the Video Analytics Analytics software continuously analyses the video in real-time and provides an immediate alert upon detection of a relevant event.  B.Video Analytics Analytics for Inve Investigation: stigation:

In addition, Video Analytics algorithms may be implemented to analyze recorded video, a task that is challenging and time consuming for a human operator, especially in cases whereby a large amount of video must be reviewed. Through rapid analysis of recorded video, Video Analytics can perform the following task s: s:   Pinpoint an event in recorded video and retrieve the relevant video segment from the stored video   Perform analysis of motion patterns and detection of motion irregularities in defined areas   Perform a variety of statistical analysis tasks relating to people or vehicles over defined periods of time

  

II. STATE OF ART  Lee and Smeaton[1] describe a user interface to retrieve simple surveillance events like presence of person and objects. Real time palm tracking and Hand Gesture Estimation based on fore-arm contour [2] proposed an image processing system using a web camera. Differently from other hand recognition method, we are not trying to transfer the gesture to some certain instructions. We mark up the important features of hand: fingertips, palm center by computation geometry calculation, provide real-time interaction between gesture and the system. H.Arun et.al.[3]explores video parsing techniques which automatically extract index data from video, indexing which stores data in relational tables, retrieval which uses SQL queries to retrieve events of interest and the software architecture that integrates these technologies. Meesen et.al.[4] analyzed the instantaneous object properties in surveillance video key frames, and performed content-based retrieval using a generic dissimilarity measure which incorporated both global and local dissimilarities between the query and target video-key frames. Stringa and Regazzoni[5] proposed a content-based retrieval system for abandoned objects detected by subway station surveillance systems. We took this as keyword for our research and developed this paper. Situation Awareness, Early warning, Controlling access, Recording activity, Responsiveness are some of the main goals of the security provider. The hyper growth of the technology made our day to day life in light weight. Till date we rely on humans in providing the security, the day has come where computers are becoming more prompt than ordinary humans. So we thought of implementing the same in providing the security using the computer algorithms collaborated with Open CV. III.  IMPLEMENTATION

OF VIDEO A NALYTICS THROUGH

OPEN CV

Image is converted into binary image (having two bits 0’s and 1’s). This image is taken as input to analyze the quality of edges from the edge detection algorithms. For fast and ef ficient ficient processing of the images for localization, important hasonetoofbetheprocessed, identifying andimage locating sharp discontinuities,only and most the rest has to beinformation left out. It is basic and very important processing tasks. In general, edge detection methods may be grouped into two categories: Gradient (Sobel, Prewitt), Laplacian (Marr-Hildreth, Canny). The Gradient method detects the edges by looking for the maximum and minimum in the first derivative of the image. represented in matrix format. Edges in an i mage can be detected using a periodical convolution of the function with specific speci fic types of matrices. For Sobel and Prewitt methods there are separate and standard convolution matrices. The Laplacian method searches for zero crossings in the second derivative of the image to find edges.  edges.    Step1: smoothing to reduce errors   Step2: find second derivative by applyin applying g two dimensional laplacian laplacian..   Step3: Look for sign changes in each and every pixel in laplacian of smoothed image. 





 A. Detection Using Canny Detection of Edges Using

Algorithm used is Canny Edge Detection developed by John F. Canny in 1986. The criteria followed in 3 steps: 47

 

     

  

Low error rate, No responses to non- edges Edge points be well localized To have only one response to a single edge [6]

 B. Canny Edge Detection Algorithm Algorithm Stages: Stages: a. Noise Reduction: Canny edge detection is susceptible to noise present in unprocessed image data. So it uses a Gaussian filter for convolution which is which  is an ope operation ration o on n two ffunctions unctions f  and   and g, producing a third

function that is typically viewed as a modified version of one of the original functions, giving the area overlap between the two functions as a function of the amountthat one of the original functions is translated.  translated.  And the result is a blurred version of the original. The diagrammatic representation of convolution process is shown in Figure 1. b. Finding Gradient of an Image: It is to find the direction of an edge. It uses four filters to detect the directions i.e. horizontal, vertical and the two diagonals in blurred image.

Where Gxis horizontal and Gy is vertical direction.

Fig 1.:Convolution process

B22 = (a11*m11) + (a12*m12) + (a13*m13) + (a21*m21) + (a21*m21) + (a22* m22) + (a23*m23) + (a31*m31) + (a32*m32) + (a33*m33) c. N Non-Maxim on-Maxima a Suppression: The edge magnitude may contain wide ranges around local maxima, which are seen as thick edges,  preserving the connectivity connectivity of contours. d. Threshold with Hysteresis: There are two types of thresholds namely high threshold threshold and low threshold. Where the high threshold mark mark out the edges fairly sure or exact and the low threshold is used to trace the faint edges as long as we find a starting point. C. Requirements to perform edge detection: d etection: 1.  A computer system with a web camera connected to it / inbuilt 2.  Install Microsoft visual studio 2008 or upgraded which is an Integrated Development Environment (IDE) from Microsoft and is used to develop console and graphical user interface applications applications 3.  Install OpenCv (Open Source Computer Vision Library) which is a library of programming functions mainly aimed at real-time computer vision, developed by Intel Corporation Ltd. 4.  The libraries, include files and sources have to be added to the Visual C++ directories 5.  Create a win32 console application and add the project properties into it. The another method in this line to find the the accurate edges is Cellular Neural Networks (CNN). The CNN model is a class of Differential Equation that has been known to ha have ve many application areas and high operational speed and uses the synaptic weight & templates to detect the discontinuity.  D. Description of process:

The terms used in the paper are referred in [7]. Define the required terms to be used in the program. Instantiate the threshold values (high, low).The command cvCapture is used to capture the video from the webcam .In pre-processing we use cvCvtColor to convert the RGB image into grey scale.   48

 

We use cvQueryFrameto divide the video into frames and put them in query. Now we apply cvcannyto the each frame and find find the edges. Now we usec usecvWaitKey vWaitKey to control the frame flow, finally finally we use

Fig 2.Flow-chart of the live example

cvShowImageto to show the required output. Edge E dge detection is detection is helpful in the applications like Enhancement of cvShowImage noisy images – satellite images, x-rays, medical images like cat scans, Text detection, Mapping of roads , Video surveillance, surveillance, replace image by a cartoon in which objects and surface markings are outlined these are the most informative parts of the image, extracting details like size, shape, etc., of an image. Edge detection is massively important as it is in many cases the first step to object recognition. Thepseudo code of the motion detection is as follows: Initially we create a new movie capture object and storage for contours. We capture current frame from webcam. Convert the images that are from video to grayscale.Capturing Background for the first time and minus the current frame from the moving average.Blur the difference image. Apply threshold to discard small unwanted movements. Find contours of image and draw bounding  box around each contour. contour. Extract bo bounding unding box for cu current rrent contour. Drawing rectangle around around bounding box. Display color image with bounding box along with threshold image.

49

 

IV. TEST RESULTS/ OUTPUTS 

Fig 3.Live edge detection

Fig 4.Live Motion Detection

In figure 3, Edge detection is done with the live video which is being captured from web-cam. Good results are produced only when we have abundant light since we are capturing with the help of web-cam. The flow chart for this example is shown in Figure2. In figure 4, Motion detection is being carried out of live video from web-cam. The objects which are in motion are identified and surrounded with red boxes and only the objects which are in motion are detected and displayed. V. BENEFITS AND LIMITATIONS OF VIDEO ANALYTICS   A. Real-Time Effective management management of the monitoring monitoring system: system:

Video analytics allows us to better monitor our location with the smartest and latest security technology. It allows less time to be used up monitoring multiple video feeds and quicker response times. Any of the alerts can be notified using a voice call or SMS or any other means of communication[8].  B. Quality of Surveillance: Surveillance:

The quality of surveillance depends upon the video quality and effective way of using algorithm. Good results are observed when the surveillance is done offline rather online or real-time. In Figure 5(b). No Parking violation can be detected.

50

 

C. Accuracy

Video analytics maintain a wide range of accuracy. Accuracy even depends upon the ambience environment and light. In the presence of good light the results are more accurate compared to the low- light conditions. The low-light makes the image more noisy, which when being trying to cancel detail of the image will be lost.  D. License P Plate late Recognition

Deployment of the proposed system is placed at the required location gives us a facility where it catalogues the licence plate of each of the arriving and departing vehicles. After the recognition and extraction of the unique number from the registration plate, the same information is used to extract the information of the vehicle and the owner at same time. When the restricted vehicle is entering into the ambience, the control could be done at instance. Just as shown in Figure 5(a). Missing/Strange Object  E. Missing/Strange Object Recognition

Video analytics within a CCTV system also allow you to monitor for missing or unwanted objects. Video analytics can detect when an object has been left behind when the video from a CCTV camera displays an object not part of the normal video scene.[8] This causes it to trigger an alarm within your CCTV system. Video analytics can also do the reverse to watch for any missing objects. When a camera within your CCTV system has a change in the video scene that shows that an object is missing, the video analytics software is smart enough to trigger an alarm. Just as shown in Figure 5(c). F. Secured Access Points

Integration of video analytics into a CCTV system s ystem with security access points offers several se veral benefits. Using the Video analytics wetheir can determine of This people outside of loitering, an accessstudying point. The of the  people in an area and behaviou behaviourr the canbehaviour be tracked. can include of mood the security cameras or eventailgating. When using video analytics in your access point CCTV system, you allow the cameras to better monitor traffic around security access points. Alarms can be set that will trigger when  people within within the CCT CCTV V cameras vie view w are acting stra strangely ngely or entering an area they are not perm permitted. itted. G. Auto-Tracking

Cameras having the capability of pan, zoom, tilt features within them are much useful for surveillance  purpose. This allows for t he auto-tracking capability. The video analytics software will be able to move the PTZ camera to follow the motion within the video view. Some video analytics software can also zoom in on the target to provide a better view of the intruder. This kind of Auto-Tracking is much useful in finding the small objects which are lost. Implementation lementation  H. Ease of Imp

Implementation of the advanced surveillance kit is as simple as installing external web-cam for Desktop. We  just need to integrate integrate the C CCTV CTV o orr any other cam camera era to the softw software. are.   I. Reduced Labour Costs

With the ordinary CCTV surveillance camera someone have to be monitored for any unwanted action, the same here is done by the advanced system 24x7 and in case of occurring any un-wanted action or event, the alert message hits us. This makes us economically feasible in terms of labour cost.

(a)

(b)

51

 

(c) Fig 5.(a) Number plate recognition (b) No parking violation, (c) Missing object recognition

Using 3D sensors like Microsoft Kinect and Prime Sense with proprietary algorithms detects people, when they are in sensor reach. With the products line Microsoft Kinect for Windows, they can calculate the depth and distance of the object from the sensor and give us appropriate information. These types of sensors  provide us more informatio information n compared to the o ordinary rdinary RBG cameras. The analysis can be done in such a w way ay that the whole activity of the object can be recorded and analyzed [9][10]. For example let us assume the whole setup is set in the super market and the depth sensors are recording the information. We can analyze how many customers are looking for a particular product and after looking upon it are they purchasing the same or leaving it behind. We can also detect the number of customers present on the floor. VI. CONCLUSIONS AND FEATURE WORK   The revolution has just begun. Video content analysis has started making an impact. Digital media becomes far powerful, once it is paired with automated recognition. Outdoor security is finally practical and reliable. Cameras become intelligent detectors when combined to video analytics. Using 3D sensors like Microsoft Kinect and Prime Sense with proprietary algorithms detects people, when they are in sensor reach. With the  products line Microsoft Microsoft Kinect for Windows, they ccan an calculate the depth and distance distance of the object from the sensor and give us appropriate information. These types of sensors provide us more information compare compared d to the ordinary RBG cameras. The analysis can be done in such a way t hat the whole activity of the object can  be recorded and analyzed. analyzed. For example let let us assume the whol wholee setup is set in the sup super er market and the d depth epth sensors are recording the information. We can analyze how many customers are looking for a particular  product and after looking upon it are they purchasing the same or leaving it behind. We can also detect the number of customers present on the floor. The power of guards is multiplied with video analytics. Live video combined with recognition offers instant response and situational awareness from anywhere in the world, through sensors that never blink or sleep. Travelling from early stages of video analytics to advanced technologies, sophisticated behaviour recognition becomes easier. Today there are many practical applications that provide better protection with significant cost savings. This is just beginning of a change that will transform the whole world of security. R EFERENCES E FERENCES  [1]  H Lee, ASmeaton AS meaton,, N O’Conn O’Connor, or, N Murphy, User Interface for CCTV Search System, Imaging for Cr ime Detection and Prevention, 2005. ICDP 2005 [2]  Real-Time Palm Tracking and Hand Gesture Estimation Based on Force-Arm Contour, https://www.dropbox.com/sh/t22mblcu02xf7dt/4DaE2UEqD8/thesis_2011_0706.pdf [3]  H.Arun et.al “Searching Surveillance Video”, http://www-ee.ccny.cuny.edu/www/web/yltian/Publications/ TianAVSS07a.pdf [4]  J. Meessen, M. Coulanges, X. Desurmont and J.F. Delaigle,"Content-Based Retrieval of Video Surveillance Scenes,"Multimedia Content Representation, Classification andSecurity, 2006. [5]  E. Stringa and C.S. Regazzoni, "Content-Based Retrieval and Real Time Detection from Video Sequences Acquired  by Surveillance Surveillance Sys Systems", tems", IEEE ICIP, ICIP, 1998 [6]  JasmeetSingh,“Canny Algorithm For Edge Detection in Digital Images”, November 2009. [7]  G.Bradski and Adrian Kaebler, “Learning OpenCv: ComputerVision with Opencv Library” 1 st ed., 2008, USA [8]  Saxon Engineering and Information Systems, http://www.saxon.me/security-engineering/cctv/54-analytics [9]  Jaun I. Porta, http://www.shopperception.com/ [10] Dough Marman, How video analytics is changing the world of security, VIDEOIQ, August 2013.  

52

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close