Computer vision for security applications

被引:1
|
作者
Sage, K [1 ]
Young, S [1 ]
机构
[1] Police Sci Dev Branch, Horsham RH12 4WX, W Sussex, England
关键词
D O I
10.1109/CCST.1998.723792
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In an age which bears witness to a proliferation of Closed Circuit Television (CCTV) cameras for security and surveillance monitoring, the use of image processing and computer vision techniques which were provided as top end bespoke solutions can now be realised using desktop PC processing. Commercial Video Motion Detection (VMD) and Intelligent Scene Monitoring (ISM) systems are becoming increasingly sophisticated, aided, in no small way, by a technology transfer from previously exclusively military research sectors. Image processing is traditionally concerned with preprocessing operations such as Fourier filtering, edge detection and morphological operations. Computer vision extends the image processing paradigm to include understanding of scene content, tracking and object classification. Examples of computer vision applications include Automatic Number Plate Recognition (ANPR), people and vehicle tracking, crowd analysis and model based vision. Often image processing and computer vision techniques are developed with highly specific applications in mind and the goal of a more global understanding computer vision system remains, at least for now, outside the bounds of present technology. This paper will review some of the most recent developments in computer vision and image processing for challenging outdoor perimeter security applications. It also describes the efforts of development teams to integrate some of these advanced ideas into coherent prototype development systems.
引用
收藏
页码:210 / 215
页数:6
相关论文
共 50 条
  • [1] Security applications of computer vision
    Sage, K
    Young, S
    [J]. IEEE AEROSPACE AND ELECTRONIC SYSTEMS MAGAZINE, 1999, 14 (04) : 19 - 24
  • [2] Computer vision and pattern recognition in homeland security applications
    Garibotto, Giovanni B.
    [J]. Applications of Fuzzy Sets Theory, 2007, 4578 : 335 - 341
  • [3] COMPUTER VISION APPLICATIONS
    GRIMSON, WEL
    MUNDY, JL
    [J]. COMMUNICATIONS OF THE ACM, 1994, 37 (03) : 45 - 51
  • [4] Multimedia applications of computer vision
    Asmuth, J
    Dixon, D
    Hanna, K
    Hsu, SC
    Kumar, R
    Paragano, V
    Pope, A
    Samarasekera, S
    Sawhney, H
    [J]. FOURTH IEEE WORKSHOP ON APPLICATIONS OF COMPUTER VISION - WACV'98, PROCEEDINGS, 1998, : 290 - 291
  • [5] COMPUTER VISION FOR INDUSTRIAL APPLICATIONS
    LOSTY, JA
    WATKINS, PR
    [J]. GEC JOURNAL OF RESEARCH, 1983, 1 (01): : 24 - 34
  • [6] THE COMPLEXITY OF APPLICATIONS IN COMPUTER VISION
    KLETTE, R
    [J]. COMPUTER ANALYSIS OF IMAGES AND PATTERNS, 1989, : 16 - 19
  • [7] Computer Vision in Healthcare Applications
    Gao, Junfeng
    Yang, Yong
    Lin, Pan
    Park, Dong Sun
    [J]. JOURNAL OF HEALTHCARE ENGINEERING, 2018, 2018
  • [8] A Review of Computer Vision Methods in Network Security
    Zhao, Jiawei
    Masood, Rahat
    Seneviratne, Suranga
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2021, 23 (03): : 1838 - 1878
  • [9] Privacy-preserving federated learning with various computer-vision tasks for security applications
    van Rooij, Sabina B.
    van der Spek, Muriel
    van Rooijen, Arthur
    Bouma, Henri
    [J]. ARTIFICIAL INTELLIGENCE FOR SECURITY AND DEFENCE APPLICATIONS, 2023, 12742
  • [10] Computer Vision on X-Ray Data in Industrial Production and Security Applications: A Comprehensive Survey
    Rafiei, Mehdi
    Raitoharju, Jenni
    Iosifidis, Alexandros
    [J]. IEEE ACCESS, 2023, 11 : 2445 - 2477