Classification of Abandoned and Unattended Objects, Identification of Their Owner with Threat Assessment for Visual Surveillance

Terrorism is on an ever-increasing rise and is one of the major threats the world is facing today. Terrorist attacks mostly take place in crowded areas such as railway stations and airports. They involve the use of explosives which are placed inside suspicious abandoned objects like bags, suitcases, etc. In this paper, we are proposing a model that can classify abandoned and unattended objects separately and backtrack to identify the owner as well as find the last known location of the owner in a social environment using visual surveillance feed in real time for rapid alert and action.

[1]  Surveillance Proceedings : 2nd joint IEEE International Workshop on Visual Surveillance and Performance Evaluation of Tracking and Surveillance (VS-PETS), October 15-16, 2005, Beijing, China , 2005 .

[2]  G LoweDavid,et al.  Distinctive Image Features from Scale-Invariant Keypoints , 2004 .

[3]  Liang-Gee Chen,et al.  A Localized Approach to Abandoned Luggage Detection with Foreground-Mask Sampling , 2008, 2008 IEEE Fifth International Conference on Advanced Video and Signal Based Surveillance.

[4]  David G. Lowe,et al.  Fast Approximate Nearest Neighbors with Automatic Algorithm Configuration , 2009, VISAPP.

[5]  Yuri Ivanov,et al.  Robust Abandoned Object Detection Using Dual Foregrounds , 2008, EURASIP J. Adv. Signal Process..

[6]  Greg Welch,et al.  An Introduction to Kalman Filter , 1995, SIGGRAPH 2001.

[7]  Alexei A. Efros,et al.  Statistics of 3D Object Locations in Images , 2008 .

[8]  Sharath Pankanti,et al.  Robust abandoned object detection using region-level analysis , 2011, 2011 18th IEEE International Conference on Image Processing.

[9]  Rubén Heras Evangelio,et al.  Detection of static objects for the task of video surveillance , 2011, 2011 IEEE Workshop on Applications of Computer Vision (WACV).

[10]  Bill Triggs,et al.  Histograms of oriented gradients for human detection , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).

[11]  Rogério Schmidt Feris,et al.  Robust Detection of Abandoned and Removed Objects in Complex Surveillance Videos , 2011, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[12]  Wei Liu,et al.  SSD: Single Shot MultiBox Detector , 2015, ECCV.

[13]  Ferdinand van der Heijden,et al.  Efficient adaptive density estimation per image pixel for the task of background subtraction , 2006, Pattern Recognit. Lett..