[1]王欣宇. 视频监控中特定区域入侵检测算法设计与实现[J].计算机技术与发展,2014,24(10):159-162.
 WANG Xin-yu. Design and Implementation of Intrusion Detection Algorithm of a Specific Area in Video Surveillance[J].,2014,24(10):159-162.
点击复制

 视频监控中特定区域入侵检测算法设计与实现()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
24
期数:
2014年10期
页码:
159-162
栏目:
安全与防范
出版日期:
2014-10-10

文章信息/Info

Title:
 Design and Implementation of Intrusion Detection Algorithm of a Specific Area in Video Surveillance
文章编号:
1673-629X(2014)10-0159-04
作者:
 王欣宇
 南京邮电大学 计算机学院
Author(s):
 WANG Xin-yu
关键词:
 自适应高斯混合模型背景建模运动检测阴影检测
Keywords:
 adaptive Gaussian mixture modelbackground modelingmotion detectionshadow detection
分类号:
TP391.41
文献标志码:
A
摘要:
 在视频监控中,需要对特定区域进行实时监控。为了克服传统的视频监控系统存在的数据量大、响应时间长和人类自身固有的弱点等缺陷导致的监控效率低下等问题,文中实现了一种智能区域入侵的检测算法。该算法是基于一种三层高斯背景建模的方法,在提取前景图像后,对前景图像进行阴影检测、全局灰度检测、目标完整性检测,同时在提取更加精确的前景目标后,分析运动目标轮廓,对目标的轮廓信息进行统计,计算出特定区域中入侵的人数。最后通过一段实际的监控视频验证了文中提出算法的有效性。
Abstract:
 In video surveillance,a specific area needs real-time monitoring. In order to overcome the problems of low monitoring efficien-cy caused by the defects including large amount of data,long response time,and intrinsic weaks of humans in the traditional video surveil-lance system,propose an intelligent regional intrusion detection algorithm. The algorithm is based on a three-Gaussian background model-ing method,after extracting the foreground images,carry on the shadow detection,global grayscale detection and object integrity detection to them. Then statistically analyze the more precise foreground extraction,contour information can be used to calculate the number of in-vasion in the specific area. Finally,the effectiveness of the proposed algorithm is verified through a piece of actual surveillance video.

相似文献/References:

[1]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(10):1.
[2]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(10):5.
[3]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(10):13.
[4]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(10):21.
[5]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(10):25.
[6]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(10):29.
[7]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(10):34.
[8]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(10):38.
[9]叶偲,李良福,肖樟树. 一种去除运动目标重影的图像镶嵌方法研究[J].计算机技术与发展,2014,24(07):43.
 YE Si,LI Liang-fu,XIAO Zhang-shu. Research of an Image Mosaic Method for Removing Ghost of Moving Targets[J].,2014,24(10):43.
[10]余松平[][],蔡志平[],吴建进[],等. GSM-R信令监测选择录音系统设计与实现[J].计算机技术与发展,2014,24(07):47.
 YU Song-ping[][],CAI Zhi-ping[] WU Jian-jin[],GU Feng-zhi[]. Design and Implementation of an Optional Voice Recording System Based on GSM-R Signaling Monitoring[J].,2014,24(10):47.

更新日期/Last Update: 2015-04-03