Dual Camera-Based Supervised Foreground Detection for Low-End Video Surveillance Systems

被引:9
|
作者
Shahbaz, Ajmal [1 ]
Jo, Kang-Hyun [1 ]
机构
[1] Univ Ulsan, Sch Elect & Comp Engn, Ulsan 44610, South Korea
基金
新加坡国家研究基金会;
关键词
Video surveillance systems; convolutional neural network; security system; dual-camera sensors; NETWORK;
D O I
10.1109/JSEN.2021.3054940
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Deep learning-based algorithms showed promising prospects in the computer vision domain. However, their deployment in real-time systems is challenging due to their computational complexity, high-end hardware prerequisites, and the amount of annotated data for training. This paper proposes an efficient foreground detection (EFDNet) algorithm based on deep spatial features extracted from an RGB input image using VGG-16 convolutional neural networks (CNN). The VGG-16 CNN is modified by concatenated residual (CR) blocks to learn better global contextual features and recover lost feature information due to several convolution operations. A new upsampling network is designed using bilinear interpolation sandwiched between 3 x 3 convolutions to upsample and refine feature maps for pixel-wise prediction. This helps to propagate loss errors from the upsampling network during backpropagation. The experiments showed the effectiveness of the EFDNet in outperforming top-ranked foreground detection algorithms. EFDNet trains faster on low-end hardware and demonstrated promising results with a minimum of 50 training frames with binary ground-truth.
引用
收藏
页码:9359 / 9366
页数:8
相关论文
共 50 条
  • [31] FLAShadow: A Flash-based Shadow Stack for Low-end Embedded Systems
    Grisafi, Michele
    Ammar, Mahmoud
    Roveri, Marco
    Crispo, Bruno
    ACM TRANSACTIONS ON INTERNET OF THINGS, 2024, 5 (03):
  • [32] Submicrosecond Latency Video Compression in a Low-End FPGA-based System-on-Chip
    Alonso, Tobias
    Ruiz, Mario
    Lopez Garcia-Arias, Angel
    Sutter, Gustavo
    Lopez de Vergara, Jorge E.
    2018 28TH INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE LOGIC AND APPLICATIONS (FPL), 2018, : 355 - 359
  • [33] SPEEDUP MULTI-CAMERA VIDEO-SURVEILLANCE SYSTEMS FOR ELDER FALLING DETECTION
    Shieh, Wann-Yun
    Lin, Ting-Yu
    Huang, Ju-Chin
    FIRST INTERNATIONAL SYMPOSIUM ON BIOENGINEERING (ISOB 2011), PROCEEDINGS, 2011, : 188 - 195
  • [34] Performance characterization of a low-cost dual-channel camera-based microarray scanner
    Akhoundi, Farhad
    Ghobeh, Maryam
    Ghiasvand, Ehsan
    Akbari-Roshan, Kamyar
    Motahari, Seyed Abolfazl
    2016 24TH IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE), 2016, : 1534 - 1538
  • [35] AN EFFICIENT FOREGROUND-BASED SURVEILLANCE VIDEO CODING SCHEME IN LOW BIT-RATE COMPRESSION
    Zhang, Shanghang
    Wei, Kaijin
    Jia, Huizhu
    Xie, Xiaodong
    Gao, Wen
    2012 IEEE VISUAL COMMUNICATIONS AND IMAGE PROCESSING (VCIP), 2012,
  • [36] Low-Cost Camera-Based Smart Surveillance System for Detecting, Recognizing, and Tracking Masked Human Face
    Haryadi E.A.
    Jati G.
    Husodo A.Y.
    Jatmiko W.
    International Journal of Interactive Mobile Technologies, 2021, 15 (23) : 104 - 119
  • [37] Novel low-cost camera-based pulsed and modulated continuous wave laser detection
    Tipper, Sean
    Burgess, Christopher
    TECHNOLOGIES FOR OPTICAL COUNTERMEASURES XVI, 2019, 11161
  • [38] Three Ways to Improve the Performance of Real-Life Camera-Based Fall Detection Systems
    Debard, Glen
    Mertens, Marc
    Goedeme, Toon
    Tuytelaars, Tinne
    Vanrumste, Bart
    JOURNAL OF SENSORS, 2017, 2017
  • [39] Convolutional Neural Network-Based Cryptography Ransomware Detection for Low-End Embedded Processors
    Kim, Hyunji
    Park, Jaehoon
    Kwon, Hyeokdong
    Jang, Kyoungbae
    Seo, Hwajeong
    MATHEMATICS, 2021, 9 (07)
  • [40] Low-End Embedded Linux Platform for Network Security Application - Smurf Based Attack Detection
    Ahmed, N.
    Khalib, Z. I. A.
    Ahmad, R. B.
    Sudin, Suhizaz
    Asi, Salina
    Laalaoui, Yacine
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (11): : 1 - 7