Video abstract system based on spatial-temporal neighborhood trajectory analysis algorithm

In this paper, a video abstract system based on spatial-temporal neighborhood trajectory analysis algorithm which is mainly used to process surveillance videos is proposed. The algorithm uses the spatial adjacency of foreground targets and tracks the spatial-temporal neighboring moving targets to get their whole trajectories in order to meet the requirement of processing speed and accuracy. The indicators consist of trajectory detection rate, trajectory tracking average continuity and video abstract processing speed are used to evaluate the effectiveness of the system. We compare the algorithm with the other three algorithms, and the results show that spatial-temporal neighborhood trajectory analysis algorithm has sufficient trajectory detection rate and processing speed for surveillance video abstraction.

[1]  Jianzhong Li,et al.  Color image watermarking scheme based on quaternion Hadamard transform and Schur decomposition , 2017, Multimedia Tools and Applications.

[2]  Xuan Li,et al.  Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram , 2017, Multimedia Tools and Applications.

[3]  Kai-Kuang Ma,et al.  A switching median filter with boundary discriminative noise detection for extremely corrupted images , 2006, IEEE Trans. Image Process..

[4]  Hefeng Wu,et al.  Hierarchical Ensemble of Background Models for PTZ-Based Video Surveillance , 2015, IEEE Transactions on Cybernetics.

[5]  Huiyu Zhou,et al.  Region-based Mixture of Gaussians modelling for foreground detection in dynamic scenes , 2015, Pattern Recognit..

[6]  Manoel Alonso Gan,et al.  Energetics of wave propagation leading to cold event in tropical latitudes of South America , 2015, Climate Dynamics.

[7]  Pascal Fua,et al.  Tracking Interacting Objects Optimally Using Integer Programming , 2014, ECCV.

[8]  Xianliang Zhang,et al.  A new statistical precipitation downscaling method with Bayesian model averaging: a case study in China , 2015, Climate Dynamics.

[9]  Haibin Ling,et al.  Multi-target Tracking by Rank-1 Tensor Approximation , 2013, 2013 IEEE Conference on Computer Vision and Pattern Recognition.

[10]  Basit Shafiq,et al.  Differentially Private Naive Bayes Classification , 2013, 2013 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT).

[11]  Yaser Jararweh,et al.  Automated wireless video surveillance: an evaluation framework , 2017, Journal of Real-Time Image Processing.

[12]  Yihong Gong,et al.  Multi-target tracking by learning local-to-global trajectory models , 2015, Pattern Recognit..

[13]  Jin Li,et al.  Privacy-preserving outsourced classification in cloud computing , 2017, Cluster Computing.

[14]  Konrad Schindler,et al.  Discrete-continuous optimization for multi-target tracking , 2012, 2012 IEEE Conference on Computer Vision and Pattern Recognition.

[15]  David Zhang,et al.  A novel line scan clustering algorithm for identifying connected components in digital images , 2003, Image Vis. Comput..

[16]  Adam Lipowski,et al.  Roulette-wheel selection via stochastic acceptance , 2011, ArXiv.

[17]  Stefan Roth,et al.  MOT16: A Benchmark for Multi-Object Tracking , 2016, ArXiv.

[18]  Alan Hanjalic,et al.  An integrated scheme for automated video abstraction based on unsupervised cluster-validity analysis , 1999, IEEE Trans. Circuits Syst. Video Technol..

[19]  Ivan Laptev,et al.  On pairwise costs for network flow multi-object tracking , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[20]  Dharma P. Agrawal,et al.  Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security , 2016 .

[21]  Seung-Hwan Bae,et al.  Confidence-Based Data Association and Discriminative Deep Appearance Learning for Robust Online Multi-Object Tracking , 2018, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[22]  Ba Tu Truong,et al.  Video abstraction: A systematic review and classification , 2007, TOMCCAP.

[23]  G. Lakpathi,et al.  Identity-Based Encryption with Outsourced Revocation in Cloud Computing , 2016 .

[24]  Jin Li,et al.  Secure attribute-based data sharing for resource-limited users in cloud computing , 2018, Comput. Secur..

[25]  Mahmoud Al-Ayyoub,et al.  Accelerating 3D medical volume segmentation using GPUs , 2016, Multimedia Tools and Applications.

[26]  Liang Lin,et al.  Integrating Graph Partitioning and Matching for Trajectory Analysis in Video Surveillance , 2012, IEEE Transactions on Image Processing.

[27]  P. Pérez,et al.  Tracking multiple objects with particle filtering , 2002 .