Suspicious object detection and robbery event analysis

Chi Hung Chuang, Jun Wei Hsieh, Kao Chin Fan

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Scopus citations

Abstract

This paper proposes a novel method to detect suspicious objects from videos for robbery event analysis. First of all, a background subtraction using a minimum filter is used for detecting foreground objects from videos. Then, a novel kernel-based tracking method is proposed for tracking each moving object and obtaining its trajectory. Then, we propose a novel robbery event analysis system to analyze suspicious object transferring conditions between any two persons. Usually, when a robbery event happens, there should some suspicious object transferring conditions happening between the robbery and the victim. Since there is no prior knowledge about the object's property, it is difficult to automatically analyze the conditions without any manual efforts. To tackle this problem, a novel ratio histogram is then proposed for finding suspicious objects and then accurately analyzing their transferring conditions. After color re-projection, we use Gaussian mixture models to model the suspicious object's visual properties so that it can be very accurately segmented from videos. After analyzing its subsequent speed, different robbery events can be then effectively detected from videos. Experiment results have proved that the proposed method is robust, accurate, and powerful in robbery event detection.

Original languageEnglish
Title of host publicationProceedings of 16th International Conference on Computer Communications and Networks 2007, ICCCN 2007
Pages1189-1192
Number of pages4
DOIs
StatePublished - 2007
Event16th International Conference on Computer Communications and Networks 2007, ICCCN 2007 - Honolulu, HI, United States
Duration: 13 Aug 200716 Aug 2007

Publication series

NameProceedings - International Conference on Computer Communications and Networks, ICCCN
ISSN (Print)1095-2055

Conference

Conference16th International Conference on Computer Communications and Networks 2007, ICCCN 2007
Country/TerritoryUnited States
CityHonolulu, HI,
Period13/08/0716/08/07

Fingerprint

Dive into the research topics of 'Suspicious object detection and robbery event analysis'. Together they form a unique fingerprint.

Cite this