Advertisement

Abandoned Object Detection and Tracking Using CCTV Camera

  • Parakh Agarwal
  • Sanaj Singh Kahlon
  • Nikhil Bisht
  • Pritam Dash
  • Sanjay Ahuja
  • Ayush Goyal
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 10)

Abstract

With the increase in crime and terror rate globally, automated video surveillance, is the need of the hour. Surveillance along with the detection and tracking has become extremely important. Human detection and tracking is ideal, but the random nature of human movement makes it extremely difficult to track and classify as suspicious activities. The primary objective of this is to detect the suspiciously abandoned object recorded by the closed-circuit television cameras (CCTV). The main aim of this project is to ease the load on the controller at the main CCTV station by generating and alarm, whenever there is a detection of an abandoned object. To solve the problem, we first proceeded by the background subtraction such that we obtain the foreground image. Further, we calculated the inter-pixel distance and used area-based thresholding so as to differentiate between the person and the object. The object will further be tracked for a previously set time, which will help the system to decide whether or not the object is abandoned or not. Such a system that can ease the load on single CCTV controller can be deployed in places which require high discipline and security and are more prone to suspicious activities like Airports, Metro station, Railway Stations, entrances and exits of buildings, ATMs, and similar public places.

Keywords

Object detection Video surveillance Tracking Image processing Algorithm Security alarm system 

References

  1. 1.
    Sandesh Patil and Kiran Talele, “Suspicious Movement Detection and Tracking Based on Color Histogram”, International Conference on Communication, Information and Computing Technology, ICCICT-2015, 15–17 January, 2015, pp. 1–6.Google Scholar
  2. 2.
    Mohannad Elhamod, and Martin D. Levine, Real-Time Semantics-Based Detection of Suspicious Activities in Public Spaces, Proc. 9th Conf. CRV, Toronto, ON, Canada, 2012, pp. 268–275.Google Scholar
  3. 3.
    H. Weiming, T. Tieniu, W. Liang and S. Maybank, “A survey on visual surveillance of object motion and behaviors”, IEEE Trans. Syst., Man, Cybern. C, Appl. Rev., vol. 34, no. 3, pp. 334–352, 2004.Google Scholar
  4. 4.
    Qian Zhang and King Ngi Ngan; Segmentation and Tracking Multiple Objects Under Occlusion From Multiview Video, IEEE Transactions On Image Processing, Vol. 20, No. 11, November 2011.Google Scholar
  5. 5.
    PETS-ECCV. (2004). [Online]. Available: http://wwwprima.imag.fr/PETS04/caviardata.html.
  6. 6.
    L. M. Fuentes and S. A. Velastin, “Tracking-based event detection for CCTV systems”, Pattern Anal. Appl., vol. 7, no. 4, pp. 356–364, 2004.Google Scholar
  7. 7.
    M. Elhamod and M. D. Levine, “A real time semantics-based detection of suspicious activities in public scenes”, Proc. 9th Conf. CRV, pp. 268–275, 2012.Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  • Parakh Agarwal
    • 1
  • Sanaj Singh Kahlon
    • 1
  • Nikhil Bisht
    • 1
  • Pritam Dash
    • 1
  • Sanjay Ahuja
    • 1
  • Ayush Goyal
    • 1
  1. 1.Amity University Uttar PradeshNoidaIndia

Personalised recommendations