Skip to main content

Machine Vision Application to Automatic Intruder Detection Using CCTV

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 5712))

Abstract

The work presented in this paper addresses the application of new technologies to the task of intruder monitoring. It presents an innovative Machine Vision application to detect and track a person in a Closed Circuit Television System (CCTV) identifying suspicious activity. Neural Network techniques are applied to identify suspicious activities from the trajectory path, speed, direction and risk areas for a person in a scene, as well as human posture. Results correlate well with operator determining suspicious activity. The automated system presented assists an operator to increase reliability and to monitor large numbers of surveillance cameras.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Freer, J.A., Beggs, B.,, Fernandez-Canque, H.L., Chevrier, F., Goryashko, A.: Automatic Recognition of Suspicious Activity for Camera Based Security Systems. In: IEE proceeding of European Convention on Security and Detection, Brighton, vol. (408), pp. 54–58 (1995)

    Google Scholar 

  2. Saarinen, J., Julesz, B.: The Speed of Attentional Shifts in the Visual-field. Proceeding Academy of Sciences of the United States of America 88(5), 1812–1814 (1991)

    Google Scholar 

  3. Eriksen, C.W., Hoffman, J.E.: Temporal and spatial characteristics of selective encoding from visual displays. Perception & Psychophysics 12, 201–204 (1972)

    Article  Google Scholar 

  4. Cucchiara, R., Prati, A., Vezzani, R.: posture classification in a multi-camera environment. In: Proceeding of International Conference on Image Processing, pp. 725–728 (2005)

    Google Scholar 

  5. Agarwal, A., Triggs, B.: Recovering 3D Human Pose from Monocular Images. IEEE Transactions on Pattern Analysis and Machine Intelligence, 44–58 (2006)

    Google Scholar 

  6. Kellokumpu, V., Pietikainen, M., Heikkila, J.: Human Activity Recognition Using Sequence of Postures. In: IAPR Conference on Machine Vision Application, pp. 570–573 (2005)

    Google Scholar 

  7. Fernandez-Canque, H., Hintea, S., Csipkes, G., Pellow, A., Smith, H.: Machine Vision Application to the Detection of Micro-organism in Drinking Water. In: Lovrek, I., Howlett, R.J., Jain, L.C. (eds.) KES 2008, Part III. LNCS, vol. 5179, pp. 302–309. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Fernandez-Canque, H., Hintea, S., Freer, J., Ahmadinia, A. (2009). Machine Vision Application to Automatic Intruder Detection Using CCTV. In: Velásquez, J.D., Ríos, S.A., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based and Intelligent Information and Engineering Systems. KES 2009. Lecture Notes in Computer Science(), vol 5712. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04592-9_62

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-04592-9_62

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-04591-2

  • Online ISBN: 978-3-642-04592-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics