SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
International Journal of Electronics and Communication Engineering & TechnologyAND
             INTERNATIONAL JOURNAL OF ELECTRONICS (IJECET), ISSN
  0976COMMUNICATION ENGINEERING &3, October- December (2012), © IAEME
       – 6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue TECHNOLOGY (IJECET)


ISSN 0976 – 6464(Print)
ISSN 0976 – 6472(Online)
Volume 3, Issue 3, October- December (2012), pp. 139-146
                                                                          IJECET
© IAEME: www.iaeme.com/ijecet.asp
Journal Impact Factor (2012): 3.5930 (Calculated by GISI)               ©IAEME
www.jifactor.com



   TRACKING AND COUNTING HUMAN IN VISUAL SURVEILLANCE
                        SYSTEM
                             Ms. Kavita P. Mahajan1, Prof. S. V. Patil2
       1
         (Research Scholar, ME E&TC, JTMCOE, Faizpur, kavitamahajan85@gmail.com)
              2
                (Asst. Prof, E&TC Dept, JTMCOE, Faizpur, svpatil67@yahoo.co.in)

  ABSTRACT
  The moving object detection is one of the challenging problems in the visual surveillance
  system, especially when illumination changes and shadow exists. The proposed system first
  separates the frames in a video. Then background subtraction method is used for moving
  object detection. This method can be used on gray scale image format as well as on binary
  image format. Human detection process is carried out on both the formats and the format with
  best result is carried further for tracking and counting the humans present in a video. After
  detection of objects, the feature extraction is performed to get more knowledge about the
  objects. Then tracking of objects is performed according to their size. Finally counting of
  humans is performed to get the total number of people in a video. The accuracy of detection
  obtained with this system is up to 100%. Further this system requires very less time to track
  and count the objects in the video.
  Keywords: Background subtraction, binary, blobs, counting, RGB.

  1.     INTRODUCTION
  Video surveillance has been in used from long ago to monitor the security sensitive areas
  such as banks, department stores, highways, crowded public places and borders. Many
  algorithms and different methods have been proposed for this purpose. But the complexity
  increases with the problems encountered in the video.
  Chih-Chang Chen et al. [1] used a dynamic background subtraction module to model light
  variations and to determine pedestrian objects from a static scene. The background model has
  been built adaptively using pixel gray level values. Yanling Wang et al. [2] used the
  background subtraction method to separate background and foreground objects. A new self-
  adaptive background approximating and updating algorithm is proposed. The background
  model is updated using a temporal low-pass filter. Osama Masoud et al. [3] developed a new
  method for tracking and counting pedestrians in real time system using a single camera. The
  background subtraction method and thresholding is used to produce the differential image.
  The threshold value is obtained by examining an empty background and measuring the
  maximum fluctuation of pixel values during this training period. J. L. Raheja et al. [4]
  proposed a bidirectional people counting algorithm. The Gaussian mixture model is used to
  describe a pixel of background. Multimodal background is used to provide robust adaptation

                                              139
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN
0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October December (2012), © IAEME
                                                                October-

against repetitive motion of scene elements, slow moving objects and introducing or
removing objects from the scene. These methods have many computational problems which
require large processing time. Some methods have less computational activities but the
results obtained are not perfect. These results contain some errors in the output.
Thus a simple method is proposed to track and count human in visual surveillance system.
Foreground segmentation is the first important step in tracking [5]. This method detects the
moving objects by using background subtraction method which detects objects robustly and
accurately [6]. Then tracking is performed by extracting some features of blobs. Finally
counting is done by using appropriate variables. The Fig.1 below shows the architecture of
the proposed system.




                            Figure 1: Proposed s
                                               system architecture


2.      PROPOSED SYSTEM
The moving object detection is the main task in any visual surveillance system. There are
different object detection techniques like background subtraction, frame difference, optical
flow etc. In this work, the background subtraction method is used to detect the foreground
objects because it is simple to im
                                implement and gives high accuracy [7].




                                              140
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN
0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October- December (2012), © IAEME

2.1.   Background Subtraction Method
In this method, every frame from the video clip is subtracted from the background frame.
Thus differential image is generated. Then threshold is applied to this differential image to
obtain the foreground objects. This method can be applied to gray level image as well as
binary image. Thus we performed this method on both the image formats to compare the
results. The format with the best output is selected to track and count the people.
First the color image is converted into the gray level format. Then the background model is
built by adding first few frames and taking average of that addition [1]. Hence each
background pixel can be updated by:
                                                     ଵ
                                 Bm (x, y) =             ∑௠ ‫)ݕ ,ݔ( ݅ܨ‬
                                                          ௜ୀ଴                             (1)
                                                  ௠

where m is the index of current frame, Fi (x,y) denotes the pixel gray level value on (x,y) and
Bm(x,y) denotes the background pixel gray level value calculated from previous frames[1].
Here we get the background image.
Then a differential image is generated by subtracting the background image from the current
frame. The threshold value for detecting the foreground regions need to be determined
accurately. Thus an initial threshold is set by averaging the pixel values of the differential
image. Then means of pixels belonging to the foreground and background regions are
separately calculated and denoted as µ o and µ B respectively as:


                                 ∑(೔,ೕ)∈೚್ೕ೐೎೟ೞ	 ி(௜,௝)
                          µo =                                                             (2)
                                   #	௢௕௝௘௖௧	௣௜௫௘௟௦

                                 ∑(೔,ೕ)∈್ೌ೎ೖ೒ೝ೚ೠ೙೏	 ி(௜,௝)
                          µB =                                                             (3)
                                  #	௕௔௖௞௚௥௢௨௡ௗ	௣௜௫௘௟௦




Then a threshold T is calculated by:
                                             ఓ௢ା	ఓ஻
                                       T=                                                  (4)
                                                 ଶ

This threshold T is used to detect the foreground objects from the differential image.
The background subtraction can be applied to binary image format. In this method, the
background is assumed to be static, so it does not change with the number of frames. Thus
the third frame is considered as a background image. Then remaining frames are checked if
their RGB components are same as the background image or not. If they are same then that
frame is treated as the background frame. Then a differential image is generated by
subtracting the binary background image from the current frame. Simultaneously a threshold
is applied to the differential image to detect foreground objects [8].
The difference equation is given by:
                                 Dk(x,y) = |fk (x,y) - bk (x,y)|                            (5)




                                                         141
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN
0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October- December (2012), © IAEME

Then this difference is thresholded as:
                                             1,			‫ܶ > )ݕ ,ݔ(݇ܦ‬
                              Rk (x,y) = ൜
                                             0,			‫ܶ		 < )ݕ ,ݔ( ݇ܦ‬
                                                                                             (6)



Here Rk (x,y) is the detected foreground object. The threshold used for this detection should
be accurate because accuracy of T has directly impact on the quality of thresholding [9][10].

2.2.     Post Processing
By comparing the results obtained from both the approaches, it is clear that the binary image
format gives the more accurate results. Thus the results obtained with this approach are taken
for tracking and counting of people [11].
It is possible that the image will contain some noise in it even though the human is detected
in foreground. This noise should be removed to get the correct output. Thus the
morphological operation i.e. dilation operation is performed on the detected objects. Thus the
foreground objects eventually become bigger and the holes in the object due to noise will
become smaller or disappear.

2.3.     Feature Extraction
The group of cells that pertain to a single target is called as a blob. This group of cells can be
find out by connected component labeling. The different features related to thus blob are
derived to get more information about the detected foreground object [12].
These features includes,
2.3.1.    Number of blobs: It indicates the number of objects present in that particular frame.
2.3.2. Size of blob: Size of blob means the total nember of pixels for the foreground
objects. Only objects having size above a certain threshold (e.g. 200 pixels) are kept for
tracking to eliminate small objects.
2.3.3. Centroid of blob: It is equal to the mean of all the foreground pixels composing the
whole object [13].
2.3.4.    Average color of blob: The average color of a blob can be calculate as:


                        	∑ ோି஼௢௠௣௢௡௘௡௧௦        ∑ ீି஼௢௠௣௢௡௘௡௧௦       ∑ ஻ି஼௢௠௣௢௡௘௡௧௦
          Avg Color =    ௅௘௡௚௧௛	௢௙	௢௕௝௘௖௧
                                             + ௅௘௡௚௧௛	௢௙	௢௕௝௘௖௧ +   ௅௘௡௚௧௛	௢௙	௢௕௝௘௖௧
                                                                                            (7)



By observing these features, we can get idea about the objects in a video clip. These features
are very useful in tracking and counting the human in a video scene.




                                                   142
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN
0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October- December (2012), © IAEME

2.4.     Tracking and Counting Human
After detecting the foreground objects, the main task is to track these objects in a video scene.
The goal of this algorithm is to track the entire deformable object successfully in the video
[14]. These objects should be tracked in a complete video without any disturbance.
The main difficulty in tracking is the discontinuity in the detected objects. Due to movement
of human in the video, it is possible that some parts of the human will appear separate. Also
during background subtraction process, some errors can occurs. Thus legs or hands could
appear as the separate objects from the body. It can be also caused by any noise or shadows
present in the video. Due to this, the parts of body of a single object could be get tracked
separately in a video. Thus error will occur in counting also.
To improve the results in such situation, a separate rectangle has been plotted with object
detection. This is done by using the subplot function in matlab. Thus one rectangle will cover
whole body of an object detected in background subtraction method. This is performed by
initializing two separate variables as sp (starting point) and ep (ending point). Then if-else
and while loops are applied to these variables with necessary conditions. Thus each object
will get tracked completely in a video clip.
First the non-zero element of the detected objects is found out which indicates the object is
present. Then the locations of this non-zero element are estimated. Thus four points
indicating minimum and maximum x and y co-ordinates of the object are obtained. Then the
condition to locate human object is as given below:
                      ((ymax-ymin)<(xmax-xmin))                                         (8)

where,     ymax = max coordinate of the object in y-axis
           ymin = min coordinate of the object in y-axis
           xmax = max coordinate of the object in x-axis
           xmin = min coordinate of the object in x-axis
If this condition gets satisfied then a white rectangle around the object is drawn by converting
color pixels to white. This rectangle or bounding box of human will remain throughout the
video.
Then counting of people is performed by using necessary variables and conditions. These
conditions find out the previous and current value of pixel in the detected image. If human
object is present that pixels will be represented by 1. Other pixels are represented by 0. Thus
a condition such as, if pre = 0 and cur = 1, is used in processing and counting can be
performed.

3.       EXPERIMENTAL RESULTS

In order to analyze robustness and effectiveness of the implemented system, some
experimental results under different conditions are carried out on this system. These videos
are captured with a Sony cyber shot digital camera with 12 Megapixel resolutions. The size
of a frame in the video is 180 X 320.
In first video, three people are present in a single frame. Generally, it is difficult to track the
multiple people in a single frame. But this system shows the accurate results and successfully
tracks the three people in video. The counting of people is also performed correctly. The total
time taken to perform this analysis is 50sec.


                                               143
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN
0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October- December (2012), © IAEME




           (a)                              (b)                              (c)

                           Figure 2: Results obtained for first video

The second video contains multiple people but shadows are also present in the video. Also
illumination appears at the background due to reflection of light. Due to these disturbances in
the video, the error could be appeared in background subtraction process. In figure 3, the
image shows the result of this process. The object in a frame is appeared broken in three
parts. Thus tracking and counting of people also could be wrong. But this system shows good
results with background subtraction process. The tracking is also carried out successfully.
The video contains nine numbers of people, but this system shows total count as ten. The
total time required to perform this experiment is 60sec. Thus this system shows good results
in case of shadows and illumination.




            (a)                               (b)                            (c)

                          Figure 3: Results obtained with second video
In third video, shadows and illumination are present. But at the same time occlusion of two
people is also present. Again due to occlusion and other disturbances, it is possible that an
error will occur. During experiment, this system successfully carried out the moving object
detection. Then tracking is also performed nearly accurate. While counting it shows some
error, but it is near to the perfection. The video contains two people while the result shows
the count as three. The total time required for this experiment is 50sec.




              (a)                          (b)                             (c)
                          Figure 4: Results obtained with third video


                                              144
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN
0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October- December (2012), © IAEME

There experiments results are tabulated to show the processing time, accuracy of the system
and detection error. The results are shown for the three videos shot under different conditions.
              Table 1: Accuracy of detection and detection error for different videos

     Videos          Actual Objects      Detected Objects       Accuracy of         Detection
                                                                 detection           Ratio
     Video-1                3                      3              100%                  0
     Video-2                9                     10               90%                0.11
     Video-3                2                      3               70%                 0.5


The first table shows the actual number of objects, number of detected objects, accuracy of
detection and detection ratio. The results show that this system is accurate and detection ratio
is also small.
The detection ratio is given by D as:
                                           ்ି஼
                                      D=    ்
                                                                                        (9)

where T= ground truth (actual number of people)
       C= Number of detected people
                    Table 2: Time required for processing of different videos


               Videos           Time for object     Time for tracking     Time for
                                  detection              (Sec)            Counting
                                    (Sec)                                  (Sec)
               Video-1                55                   65               70
               Video-2                70                   85               89
               Video-3                28                   35               37

The second table shows the total time required for the analysis of this system. The total time
has been divided into time required for people detection, time taken for tracking and time
taken for counting of people. These results have shows that this system requires very less
time for counting people.
4.     CONCLUSION

Moving object detection, tracking of detected objects and counting of these objects are
difficult procedures in the presence of shadows and illumination. The proposed system
performs well in these scenarios. This system uses background subtraction method to detect
the foreground objects. These results are processed for further use. Then different features
related to the objects are extracted. Then tracking is performed according to the size of each
object and finally total count of objects is shown.
The experimental results show that this method is simple to implement. It is robust and very
effective. The tracking and counting is successfully performed in the presence of shadows,
illumination and occlusion. This system can achieve 100% result in absence of shadows. Also


                                                  145
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN
0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October- December (2012), © IAEME

it can count multiple numbers of people present in a video. It requires very less time for all
the processing. This system can be efficiently used to monitor people in public places like
banks, hospitals, government offices, shopping malls etc.


REFERENCES

[1] Chih-Chang Chen, Hsing-Hao Lin and Oscal Chen, “Tracking and Counting People in
Visual Surveillance Systems”, IEEE 2011, 978-1-4577-0539-7/11.
[2] Guanglun Li, Yanling Wang and Weiqun Shu, “Real-Time Moving Object Detection for
Video Monitoring Systems”, IEEE 2008, 978-0-7695-3497-8/08.
[3] Osama Masoud, Nikolaos Papanikolopoulus, “A Novel Method for tracking and Counting
Pedestrians in Real-Time Using a Single Camera”, IEEE 2001, 0018-9545/01, Vol. 50, No. 5.
[4] J. L. Raheja, Sishir Kalita, Pallab Dutta and Solanki Lovendra, “A Robust Real Time
People Tracking and Counting Incorporating Shadow Detection and Removal”, International
Journal of Computer Applications, May-2012, 0975-8887, Vol. 46, No. 4.
[5] Yigithan Dedeoglu, “Moving Object Detection, Tracking and Classification for Smart
Video Surveillance’, August 2004.
[6] Mohamed Hammami, Salma Jarraya, Hanene Ben, “A Comparative Study of Moving
Object Detection Methods”, Journal of Next Generation Information Technology, Vol. 2, No.
2, May 2011.
[4] M. A. Ali, S. Indupalli and B. Boufama, “Tracking Multiple People for Visual
Surveillance”, School of Computer Science, University of Windsor, Canada.
[7] Anil Cheriyadat, Richard Radke, “Detecting Dominant Motions in dense Crowds”, IEEE
2008, 1932-4553, Vol. 2, No. 4.
[8] Liang Xiao, Tong-Qiang Li, “Research on Moving Object Detection and Tracking”, IEEE
2010, 978-1-4244-5934-6/10.
[9] Bahadir Karasulu, “Review and Evaluation of Well Known Methods for Moving Object
Detection and Tracking in Videos”, Journal of Aeronautics and Space Technologies, Vol. 4,
No. 4, PP-11-22, 2010.
[10] Yongquan Xia, Weili Li and Shaohui Ning, “Moving Object Detection Algorithm Based
on Variance Analysis”, IEEE 2009, 978-0-7695-3881-5/09.
[11] Ya-Li Hou, Grantham Pang, “People Counting and Human Detection in a Challenging
Situation”, IEEE 2010, 1083-4427, Vol. 41, No. 1.
[12] Debmalya Sinha and Gautam Sanyal, “Development of Human Tacking Systems for
Visual Surveillance”, David Bracewell, AIAA 2011, CS&IT 03, PP.187-195, 2011.
[13] Damien Lefloch, Faouzi Cheikh, Jon Hardeberg, Pierre Gouton and Romain Clemente,
“Real-Time People Counting System Using a Single Video Camera”, Real Time Image
Processing, 2008, SPIE-IS&T Vol. 6811, 681109-1.
[14] Qian Zhang, King Ngan,”Segmentation and Tracking Multiple Objects Under Occlusion
from Multiview Video”, IEEE 2011, 1057-7149, Vol. 20, No. 11.




                                              146

Weitere ähnliche Inhalte

Was ist angesagt?

A proposed accelerated image copy-move forgery detection-vcip2014
A proposed accelerated image copy-move forgery detection-vcip2014A proposed accelerated image copy-move forgery detection-vcip2014
A proposed accelerated image copy-move forgery detection-vcip2014SondosFadl
 
Improvement of the Recognition Rate by Random Forest
Improvement of the Recognition Rate by Random ForestImprovement of the Recognition Rate by Random Forest
Improvement of the Recognition Rate by Random ForestIJERA Editor
 
Improvement oh the recognition rate by random forest
Improvement oh the recognition rate by random forestImprovement oh the recognition rate by random forest
Improvement oh the recognition rate by random forestYoussef Rachidi
 
Image compression using sand algorithm
Image compression using sand algorithmImage compression using sand algorithm
Image compression using sand algorithmIAEME Publication
 
Brain tumor segmentation using asymmetry based histogram thresholding and k m...
Brain tumor segmentation using asymmetry based histogram thresholding and k m...Brain tumor segmentation using asymmetry based histogram thresholding and k m...
Brain tumor segmentation using asymmetry based histogram thresholding and k m...eSAT Publishing House
 
Multi Resolution features of Content Based Image Retrieval
Multi Resolution features of Content Based Image RetrievalMulti Resolution features of Content Based Image Retrieval
Multi Resolution features of Content Based Image RetrievalIDES Editor
 
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODFORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODeditorijcres
 
Copy-Rotate-Move Forgery Detection Based on Spatial Domain
Copy-Rotate-Move Forgery Detection Based on Spatial DomainCopy-Rotate-Move Forgery Detection Based on Spatial Domain
Copy-Rotate-Move Forgery Detection Based on Spatial DomainSondosFadl
 
GRAY SCALE IMAGE SEGMENTATION USING OTSU THRESHOLDING OPTIMAL APPROACH
GRAY SCALE IMAGE SEGMENTATION USING OTSU THRESHOLDING OPTIMAL APPROACHGRAY SCALE IMAGE SEGMENTATION USING OTSU THRESHOLDING OPTIMAL APPROACH
GRAY SCALE IMAGE SEGMENTATION USING OTSU THRESHOLDING OPTIMAL APPROACHJournal For Research
 
IMAGE SEGMENTATION BY USING THRESHOLDING TECHNIQUES FOR MEDICAL IMAGES
IMAGE SEGMENTATION BY USING THRESHOLDING TECHNIQUES FOR MEDICAL IMAGESIMAGE SEGMENTATION BY USING THRESHOLDING TECHNIQUES FOR MEDICAL IMAGES
IMAGE SEGMENTATION BY USING THRESHOLDING TECHNIQUES FOR MEDICAL IMAGEScseij
 
Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...
Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...
Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...IOSR Journals
 
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...CSCJournals
 
A novel embedded hybrid thinning algorithm for
A novel embedded hybrid thinning algorithm forA novel embedded hybrid thinning algorithm for
A novel embedded hybrid thinning algorithm forprjpublications
 
Object Shape Representation by Kernel Density Feature Points Estimator
Object Shape Representation by Kernel Density Feature Points Estimator Object Shape Representation by Kernel Density Feature Points Estimator
Object Shape Representation by Kernel Density Feature Points Estimator cscpconf
 
Analysis of combined approaches of CBIR systems by clustering at varying prec...
Analysis of combined approaches of CBIR systems by clustering at varying prec...Analysis of combined approaches of CBIR systems by clustering at varying prec...
Analysis of combined approaches of CBIR systems by clustering at varying prec...IJECEIAES
 

Was ist angesagt? (18)

A proposed accelerated image copy-move forgery detection-vcip2014
A proposed accelerated image copy-move forgery detection-vcip2014A proposed accelerated image copy-move forgery detection-vcip2014
A proposed accelerated image copy-move forgery detection-vcip2014
 
Improvement of the Recognition Rate by Random Forest
Improvement of the Recognition Rate by Random ForestImprovement of the Recognition Rate by Random Forest
Improvement of the Recognition Rate by Random Forest
 
Improvement oh the recognition rate by random forest
Improvement oh the recognition rate by random forestImprovement oh the recognition rate by random forest
Improvement oh the recognition rate by random forest
 
Image compression using sand algorithm
Image compression using sand algorithmImage compression using sand algorithm
Image compression using sand algorithm
 
Brain tumor segmentation using asymmetry based histogram thresholding and k m...
Brain tumor segmentation using asymmetry based histogram thresholding and k m...Brain tumor segmentation using asymmetry based histogram thresholding and k m...
Brain tumor segmentation using asymmetry based histogram thresholding and k m...
 
Multi Resolution features of Content Based Image Retrieval
Multi Resolution features of Content Based Image RetrievalMulti Resolution features of Content Based Image Retrieval
Multi Resolution features of Content Based Image Retrieval
 
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODFORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
 
Copy-Rotate-Move Forgery Detection Based on Spatial Domain
Copy-Rotate-Move Forgery Detection Based on Spatial DomainCopy-Rotate-Move Forgery Detection Based on Spatial Domain
Copy-Rotate-Move Forgery Detection Based on Spatial Domain
 
GRAY SCALE IMAGE SEGMENTATION USING OTSU THRESHOLDING OPTIMAL APPROACH
GRAY SCALE IMAGE SEGMENTATION USING OTSU THRESHOLDING OPTIMAL APPROACHGRAY SCALE IMAGE SEGMENTATION USING OTSU THRESHOLDING OPTIMAL APPROACH
GRAY SCALE IMAGE SEGMENTATION USING OTSU THRESHOLDING OPTIMAL APPROACH
 
I017417176
I017417176I017417176
I017417176
 
IMAGE SEGMENTATION BY USING THRESHOLDING TECHNIQUES FOR MEDICAL IMAGES
IMAGE SEGMENTATION BY USING THRESHOLDING TECHNIQUES FOR MEDICAL IMAGESIMAGE SEGMENTATION BY USING THRESHOLDING TECHNIQUES FOR MEDICAL IMAGES
IMAGE SEGMENTATION BY USING THRESHOLDING TECHNIQUES FOR MEDICAL IMAGES
 
Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...
Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...
Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...
 
By4301435440
By4301435440By4301435440
By4301435440
 
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...
 
IMAGE RETRIEVAL USING QUADRATIC DISTANCE BASED ON COLOR FEATURE AND PYRAMID S...
IMAGE RETRIEVAL USING QUADRATIC DISTANCE BASED ON COLOR FEATURE AND PYRAMID S...IMAGE RETRIEVAL USING QUADRATIC DISTANCE BASED ON COLOR FEATURE AND PYRAMID S...
IMAGE RETRIEVAL USING QUADRATIC DISTANCE BASED ON COLOR FEATURE AND PYRAMID S...
 
A novel embedded hybrid thinning algorithm for
A novel embedded hybrid thinning algorithm forA novel embedded hybrid thinning algorithm for
A novel embedded hybrid thinning algorithm for
 
Object Shape Representation by Kernel Density Feature Points Estimator
Object Shape Representation by Kernel Density Feature Points Estimator Object Shape Representation by Kernel Density Feature Points Estimator
Object Shape Representation by Kernel Density Feature Points Estimator
 
Analysis of combined approaches of CBIR systems by clustering at varying prec...
Analysis of combined approaches of CBIR systems by clustering at varying prec...Analysis of combined approaches of CBIR systems by clustering at varying prec...
Analysis of combined approaches of CBIR systems by clustering at varying prec...
 

Andere mochten auch

Resumo do artigo de antónio josé almeida
Resumo do artigo de antónio josé almeidaResumo do artigo de antónio josé almeida
Resumo do artigo de antónio josé almeidaisabepaiva
 
Motivations of Baby Boomer Entrepreneurs in the Hospitality Industry
Motivations of Baby Boomer Entrepreneurs in the Hospitality IndustryMotivations of Baby Boomer Entrepreneurs in the Hospitality Industry
Motivations of Baby Boomer Entrepreneurs in the Hospitality IndustryEcole Hôtelière de Lausanne
 
There is no such person as an entrepreneur, just a
There is no such person as an entrepreneur, just aThere is no such person as an entrepreneur, just a
There is no such person as an entrepreneur, just aMurray Hunter
 

Andere mochten auch (7)

Resumo do artigo de antónio josé almeida
Resumo do artigo de antónio josé almeidaResumo do artigo de antónio josé almeida
Resumo do artigo de antónio josé almeida
 
Digital Marketing First
Digital Marketing FirstDigital Marketing First
Digital Marketing First
 
Motivations of Baby Boomer Entrepreneurs in the Hospitality Industry
Motivations of Baby Boomer Entrepreneurs in the Hospitality IndustryMotivations of Baby Boomer Entrepreneurs in the Hospitality Industry
Motivations of Baby Boomer Entrepreneurs in the Hospitality Industry
 
There is no such person as an entrepreneur, just a
There is no such person as an entrepreneur, just aThere is no such person as an entrepreneur, just a
There is no such person as an entrepreneur, just a
 
Portfolio Lola Costa
Portfolio Lola CostaPortfolio Lola Costa
Portfolio Lola Costa
 
Alimen Animal1 Stt
Alimen Animal1 SttAlimen Animal1 Stt
Alimen Animal1 Stt
 
19 Critique
19 Critique19 Critique
19 Critique
 

Ähnlich wie Tracking and counting human in visual surveillance system

New Approach of Preprocessing For Numeral Recognition
New Approach of Preprocessing For Numeral RecognitionNew Approach of Preprocessing For Numeral Recognition
New Approach of Preprocessing For Numeral RecognitionIJERA Editor
 
Implementation and performance evaluation of
Implementation and performance evaluation ofImplementation and performance evaluation of
Implementation and performance evaluation ofijcsa
 
Application of gaussian filter with principal component analysis
Application of gaussian filter with principal component analysisApplication of gaussian filter with principal component analysis
Application of gaussian filter with principal component analysisIAEME Publication
 
Application of gaussian filter with principal component analysis
Application of gaussian filter with principal component analysisApplication of gaussian filter with principal component analysis
Application of gaussian filter with principal component analysisIAEME Publication
 
Keyframe Selection of Frame Similarity to Generate Scene Segmentation Based o...
Keyframe Selection of Frame Similarity to Generate Scene Segmentation Based o...Keyframe Selection of Frame Similarity to Generate Scene Segmentation Based o...
Keyframe Selection of Frame Similarity to Generate Scene Segmentation Based o...IJECEIAES
 
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...IJAAS Team
 
Threshold adaptation and XOR accumulation algorithm for objects detection
Threshold adaptation and XOR accumulation algorithm for  objects detectionThreshold adaptation and XOR accumulation algorithm for  objects detection
Threshold adaptation and XOR accumulation algorithm for objects detectionIJECEIAES
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
A Robust Method for Moving Object Detection Using Modified Statistical Mean M...
A Robust Method for Moving Object Detection Using Modified Statistical Mean M...A Robust Method for Moving Object Detection Using Modified Statistical Mean M...
A Robust Method for Moving Object Detection Using Modified Statistical Mean M...ijait
 
Research Paper v2.0
Research Paper v2.0Research Paper v2.0
Research Paper v2.0Kapil Tiwari
 
Feature extraction based retrieval of
Feature extraction based retrieval ofFeature extraction based retrieval of
Feature extraction based retrieval ofijcsity
 
Design and implementation of video tracking system based on camera field of view
Design and implementation of video tracking system based on camera field of viewDesign and implementation of video tracking system based on camera field of view
Design and implementation of video tracking system based on camera field of viewsipij
 
Integration of poses to enhance the shape of the object tracking from a singl...
Integration of poses to enhance the shape of the object tracking from a singl...Integration of poses to enhance the shape of the object tracking from a singl...
Integration of poses to enhance the shape of the object tracking from a singl...eSAT Journals
 

Ähnlich wie Tracking and counting human in visual surveillance system (20)

New Approach of Preprocessing For Numeral Recognition
New Approach of Preprocessing For Numeral RecognitionNew Approach of Preprocessing For Numeral Recognition
New Approach of Preprocessing For Numeral Recognition
 
Implementation and performance evaluation of
Implementation and performance evaluation ofImplementation and performance evaluation of
Implementation and performance evaluation of
 
Application of gaussian filter with principal component analysis
Application of gaussian filter with principal component analysisApplication of gaussian filter with principal component analysis
Application of gaussian filter with principal component analysis
 
Application of gaussian filter with principal component analysis
Application of gaussian filter with principal component analysisApplication of gaussian filter with principal component analysis
Application of gaussian filter with principal component analysis
 
Keyframe Selection of Frame Similarity to Generate Scene Segmentation Based o...
Keyframe Selection of Frame Similarity to Generate Scene Segmentation Based o...Keyframe Selection of Frame Similarity to Generate Scene Segmentation Based o...
Keyframe Selection of Frame Similarity to Generate Scene Segmentation Based o...
 
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...
 
Threshold adaptation and XOR accumulation algorithm for objects detection
Threshold adaptation and XOR accumulation algorithm for  objects detectionThreshold adaptation and XOR accumulation algorithm for  objects detection
Threshold adaptation and XOR accumulation algorithm for objects detection
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
F045033337
F045033337F045033337
F045033337
 
A Robust Method for Moving Object Detection Using Modified Statistical Mean M...
A Robust Method for Moving Object Detection Using Modified Statistical Mean M...A Robust Method for Moving Object Detection Using Modified Statistical Mean M...
A Robust Method for Moving Object Detection Using Modified Statistical Mean M...
 
mini prjt
mini prjtmini prjt
mini prjt
 
I0343065072
I0343065072I0343065072
I0343065072
 
Research Paper v2.0
Research Paper v2.0Research Paper v2.0
Research Paper v2.0
 
Medial axis transformation based skeletonzation of image patterns using image...
Medial axis transformation based skeletonzation of image patterns using image...Medial axis transformation based skeletonzation of image patterns using image...
Medial axis transformation based skeletonzation of image patterns using image...
 
Az33298300
Az33298300Az33298300
Az33298300
 
Az33298300
Az33298300Az33298300
Az33298300
 
Feature extraction based retrieval of
Feature extraction based retrieval ofFeature extraction based retrieval of
Feature extraction based retrieval of
 
Design and implementation of video tracking system based on camera field of view
Design and implementation of video tracking system based on camera field of viewDesign and implementation of video tracking system based on camera field of view
Design and implementation of video tracking system based on camera field of view
 
Background Subtraction Algorithm for Moving Object Detection Using Denoising ...
Background Subtraction Algorithm for Moving Object Detection Using Denoising ...Background Subtraction Algorithm for Moving Object Detection Using Denoising ...
Background Subtraction Algorithm for Moving Object Detection Using Denoising ...
 
Integration of poses to enhance the shape of the object tracking from a singl...
Integration of poses to enhance the shape of the object tracking from a singl...Integration of poses to enhance the shape of the object tracking from a singl...
Integration of poses to enhance the shape of the object tracking from a singl...
 

Mehr von iaemedu

Tech transfer making it as a risk free approach in pharmaceutical and biotech in
Tech transfer making it as a risk free approach in pharmaceutical and biotech inTech transfer making it as a risk free approach in pharmaceutical and biotech in
Tech transfer making it as a risk free approach in pharmaceutical and biotech iniaemedu
 
Integration of feature sets with machine learning techniques
Integration of feature sets with machine learning techniquesIntegration of feature sets with machine learning techniques
Integration of feature sets with machine learning techniquesiaemedu
 
Effective broadcasting in mobile ad hoc networks using grid
Effective broadcasting in mobile ad hoc networks using gridEffective broadcasting in mobile ad hoc networks using grid
Effective broadcasting in mobile ad hoc networks using gridiaemedu
 
Effect of scenario environment on the performance of mane ts routing
Effect of scenario environment on the performance of mane ts routingEffect of scenario environment on the performance of mane ts routing
Effect of scenario environment on the performance of mane ts routingiaemedu
 
Adaptive job scheduling with load balancing for workflow application
Adaptive job scheduling with load balancing for workflow applicationAdaptive job scheduling with load balancing for workflow application
Adaptive job scheduling with load balancing for workflow applicationiaemedu
 
Survey on transaction reordering
Survey on transaction reorderingSurvey on transaction reordering
Survey on transaction reorderingiaemedu
 
Semantic web services and its challenges
Semantic web services and its challengesSemantic web services and its challenges
Semantic web services and its challengesiaemedu
 
Website based patent information searching mechanism
Website based patent information searching mechanismWebsite based patent information searching mechanism
Website based patent information searching mechanismiaemedu
 
Revisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modificationRevisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modificationiaemedu
 
Prediction of customer behavior using cma
Prediction of customer behavior using cmaPrediction of customer behavior using cma
Prediction of customer behavior using cmaiaemedu
 
Performance analysis of manet routing protocol in presence
Performance analysis of manet routing protocol in presencePerformance analysis of manet routing protocol in presence
Performance analysis of manet routing protocol in presenceiaemedu
 
Performance measurement of different requirements engineering
Performance measurement of different requirements engineeringPerformance measurement of different requirements engineering
Performance measurement of different requirements engineeringiaemedu
 
Mobile safety systems for automobiles
Mobile safety systems for automobilesMobile safety systems for automobiles
Mobile safety systems for automobilesiaemedu
 
Efficient text compression using special character replacement
Efficient text compression using special character replacementEfficient text compression using special character replacement
Efficient text compression using special character replacementiaemedu
 
Agile programming a new approach
Agile programming a new approachAgile programming a new approach
Agile programming a new approachiaemedu
 
Adaptive load balancing techniques in global scale grid environment
Adaptive load balancing techniques in global scale grid environmentAdaptive load balancing techniques in global scale grid environment
Adaptive load balancing techniques in global scale grid environmentiaemedu
 
A survey on the performance of job scheduling in workflow application
A survey on the performance of job scheduling in workflow applicationA survey on the performance of job scheduling in workflow application
A survey on the performance of job scheduling in workflow applicationiaemedu
 
A survey of mitigating routing misbehavior in mobile ad hoc networks
A survey of mitigating routing misbehavior in mobile ad hoc networksA survey of mitigating routing misbehavior in mobile ad hoc networks
A survey of mitigating routing misbehavior in mobile ad hoc networksiaemedu
 
A novel approach for satellite imagery storage by classify
A novel approach for satellite imagery storage by classifyA novel approach for satellite imagery storage by classify
A novel approach for satellite imagery storage by classifyiaemedu
 
A self recovery approach using halftone images for medical imagery
A self recovery approach using halftone images for medical imageryA self recovery approach using halftone images for medical imagery
A self recovery approach using halftone images for medical imageryiaemedu
 

Mehr von iaemedu (20)

Tech transfer making it as a risk free approach in pharmaceutical and biotech in
Tech transfer making it as a risk free approach in pharmaceutical and biotech inTech transfer making it as a risk free approach in pharmaceutical and biotech in
Tech transfer making it as a risk free approach in pharmaceutical and biotech in
 
Integration of feature sets with machine learning techniques
Integration of feature sets with machine learning techniquesIntegration of feature sets with machine learning techniques
Integration of feature sets with machine learning techniques
 
Effective broadcasting in mobile ad hoc networks using grid
Effective broadcasting in mobile ad hoc networks using gridEffective broadcasting in mobile ad hoc networks using grid
Effective broadcasting in mobile ad hoc networks using grid
 
Effect of scenario environment on the performance of mane ts routing
Effect of scenario environment on the performance of mane ts routingEffect of scenario environment on the performance of mane ts routing
Effect of scenario environment on the performance of mane ts routing
 
Adaptive job scheduling with load balancing for workflow application
Adaptive job scheduling with load balancing for workflow applicationAdaptive job scheduling with load balancing for workflow application
Adaptive job scheduling with load balancing for workflow application
 
Survey on transaction reordering
Survey on transaction reorderingSurvey on transaction reordering
Survey on transaction reordering
 
Semantic web services and its challenges
Semantic web services and its challengesSemantic web services and its challenges
Semantic web services and its challenges
 
Website based patent information searching mechanism
Website based patent information searching mechanismWebsite based patent information searching mechanism
Website based patent information searching mechanism
 
Revisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modificationRevisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modification
 
Prediction of customer behavior using cma
Prediction of customer behavior using cmaPrediction of customer behavior using cma
Prediction of customer behavior using cma
 
Performance analysis of manet routing protocol in presence
Performance analysis of manet routing protocol in presencePerformance analysis of manet routing protocol in presence
Performance analysis of manet routing protocol in presence
 
Performance measurement of different requirements engineering
Performance measurement of different requirements engineeringPerformance measurement of different requirements engineering
Performance measurement of different requirements engineering
 
Mobile safety systems for automobiles
Mobile safety systems for automobilesMobile safety systems for automobiles
Mobile safety systems for automobiles
 
Efficient text compression using special character replacement
Efficient text compression using special character replacementEfficient text compression using special character replacement
Efficient text compression using special character replacement
 
Agile programming a new approach
Agile programming a new approachAgile programming a new approach
Agile programming a new approach
 
Adaptive load balancing techniques in global scale grid environment
Adaptive load balancing techniques in global scale grid environmentAdaptive load balancing techniques in global scale grid environment
Adaptive load balancing techniques in global scale grid environment
 
A survey on the performance of job scheduling in workflow application
A survey on the performance of job scheduling in workflow applicationA survey on the performance of job scheduling in workflow application
A survey on the performance of job scheduling in workflow application
 
A survey of mitigating routing misbehavior in mobile ad hoc networks
A survey of mitigating routing misbehavior in mobile ad hoc networksA survey of mitigating routing misbehavior in mobile ad hoc networks
A survey of mitigating routing misbehavior in mobile ad hoc networks
 
A novel approach for satellite imagery storage by classify
A novel approach for satellite imagery storage by classifyA novel approach for satellite imagery storage by classify
A novel approach for satellite imagery storage by classify
 
A self recovery approach using halftone images for medical imagery
A self recovery approach using halftone images for medical imageryA self recovery approach using halftone images for medical imagery
A self recovery approach using halftone images for medical imagery
 

Tracking and counting human in visual surveillance system

  • 1. International Journal of Electronics and Communication Engineering & TechnologyAND INTERNATIONAL JOURNAL OF ELECTRONICS (IJECET), ISSN 0976COMMUNICATION ENGINEERING &3, October- December (2012), © IAEME – 6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue TECHNOLOGY (IJECET) ISSN 0976 – 6464(Print) ISSN 0976 – 6472(Online) Volume 3, Issue 3, October- December (2012), pp. 139-146 IJECET © IAEME: www.iaeme.com/ijecet.asp Journal Impact Factor (2012): 3.5930 (Calculated by GISI) ©IAEME www.jifactor.com TRACKING AND COUNTING HUMAN IN VISUAL SURVEILLANCE SYSTEM Ms. Kavita P. Mahajan1, Prof. S. V. Patil2 1 (Research Scholar, ME E&TC, JTMCOE, Faizpur, kavitamahajan85@gmail.com) 2 (Asst. Prof, E&TC Dept, JTMCOE, Faizpur, svpatil67@yahoo.co.in) ABSTRACT The moving object detection is one of the challenging problems in the visual surveillance system, especially when illumination changes and shadow exists. The proposed system first separates the frames in a video. Then background subtraction method is used for moving object detection. This method can be used on gray scale image format as well as on binary image format. Human detection process is carried out on both the formats and the format with best result is carried further for tracking and counting the humans present in a video. After detection of objects, the feature extraction is performed to get more knowledge about the objects. Then tracking of objects is performed according to their size. Finally counting of humans is performed to get the total number of people in a video. The accuracy of detection obtained with this system is up to 100%. Further this system requires very less time to track and count the objects in the video. Keywords: Background subtraction, binary, blobs, counting, RGB. 1. INTRODUCTION Video surveillance has been in used from long ago to monitor the security sensitive areas such as banks, department stores, highways, crowded public places and borders. Many algorithms and different methods have been proposed for this purpose. But the complexity increases with the problems encountered in the video. Chih-Chang Chen et al. [1] used a dynamic background subtraction module to model light variations and to determine pedestrian objects from a static scene. The background model has been built adaptively using pixel gray level values. Yanling Wang et al. [2] used the background subtraction method to separate background and foreground objects. A new self- adaptive background approximating and updating algorithm is proposed. The background model is updated using a temporal low-pass filter. Osama Masoud et al. [3] developed a new method for tracking and counting pedestrians in real time system using a single camera. The background subtraction method and thresholding is used to produce the differential image. The threshold value is obtained by examining an empty background and measuring the maximum fluctuation of pixel values during this training period. J. L. Raheja et al. [4] proposed a bidirectional people counting algorithm. The Gaussian mixture model is used to describe a pixel of background. Multimodal background is used to provide robust adaptation 139
  • 2. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October December (2012), © IAEME October- against repetitive motion of scene elements, slow moving objects and introducing or removing objects from the scene. These methods have many computational problems which require large processing time. Some methods have less computational activities but the results obtained are not perfect. These results contain some errors in the output. Thus a simple method is proposed to track and count human in visual surveillance system. Foreground segmentation is the first important step in tracking [5]. This method detects the moving objects by using background subtraction method which detects objects robustly and accurately [6]. Then tracking is performed by extracting some features of blobs. Finally counting is done by using appropriate variables. The Fig.1 below shows the architecture of the proposed system. Figure 1: Proposed s system architecture 2. PROPOSED SYSTEM The moving object detection is the main task in any visual surveillance system. There are different object detection techniques like background subtraction, frame difference, optical flow etc. In this work, the background subtraction method is used to detect the foreground objects because it is simple to im implement and gives high accuracy [7]. 140
  • 3. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October- December (2012), © IAEME 2.1. Background Subtraction Method In this method, every frame from the video clip is subtracted from the background frame. Thus differential image is generated. Then threshold is applied to this differential image to obtain the foreground objects. This method can be applied to gray level image as well as binary image. Thus we performed this method on both the image formats to compare the results. The format with the best output is selected to track and count the people. First the color image is converted into the gray level format. Then the background model is built by adding first few frames and taking average of that addition [1]. Hence each background pixel can be updated by: ଵ Bm (x, y) = ∑௠ ‫)ݕ ,ݔ( ݅ܨ‬ ௜ୀ଴ (1) ௠ where m is the index of current frame, Fi (x,y) denotes the pixel gray level value on (x,y) and Bm(x,y) denotes the background pixel gray level value calculated from previous frames[1]. Here we get the background image. Then a differential image is generated by subtracting the background image from the current frame. The threshold value for detecting the foreground regions need to be determined accurately. Thus an initial threshold is set by averaging the pixel values of the differential image. Then means of pixels belonging to the foreground and background regions are separately calculated and denoted as µ o and µ B respectively as: ∑(೔,ೕ)∈೚್ೕ೐೎೟ೞ ி(௜,௝) µo = (2) # ௢௕௝௘௖௧ ௣௜௫௘௟௦ ∑(೔,ೕ)∈್ೌ೎ೖ೒ೝ೚ೠ೙೏ ி(௜,௝) µB = (3) # ௕௔௖௞௚௥௢௨௡ௗ ௣௜௫௘௟௦ Then a threshold T is calculated by: ఓ௢ା ఓ஻ T= (4) ଶ This threshold T is used to detect the foreground objects from the differential image. The background subtraction can be applied to binary image format. In this method, the background is assumed to be static, so it does not change with the number of frames. Thus the third frame is considered as a background image. Then remaining frames are checked if their RGB components are same as the background image or not. If they are same then that frame is treated as the background frame. Then a differential image is generated by subtracting the binary background image from the current frame. Simultaneously a threshold is applied to the differential image to detect foreground objects [8]. The difference equation is given by: Dk(x,y) = |fk (x,y) - bk (x,y)| (5) 141
  • 4. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October- December (2012), © IAEME Then this difference is thresholded as: 1, ‫ܶ > )ݕ ,ݔ(݇ܦ‬ Rk (x,y) = ൜ 0, ‫ܶ < )ݕ ,ݔ( ݇ܦ‬ (6) Here Rk (x,y) is the detected foreground object. The threshold used for this detection should be accurate because accuracy of T has directly impact on the quality of thresholding [9][10]. 2.2. Post Processing By comparing the results obtained from both the approaches, it is clear that the binary image format gives the more accurate results. Thus the results obtained with this approach are taken for tracking and counting of people [11]. It is possible that the image will contain some noise in it even though the human is detected in foreground. This noise should be removed to get the correct output. Thus the morphological operation i.e. dilation operation is performed on the detected objects. Thus the foreground objects eventually become bigger and the holes in the object due to noise will become smaller or disappear. 2.3. Feature Extraction The group of cells that pertain to a single target is called as a blob. This group of cells can be find out by connected component labeling. The different features related to thus blob are derived to get more information about the detected foreground object [12]. These features includes, 2.3.1. Number of blobs: It indicates the number of objects present in that particular frame. 2.3.2. Size of blob: Size of blob means the total nember of pixels for the foreground objects. Only objects having size above a certain threshold (e.g. 200 pixels) are kept for tracking to eliminate small objects. 2.3.3. Centroid of blob: It is equal to the mean of all the foreground pixels composing the whole object [13]. 2.3.4. Average color of blob: The average color of a blob can be calculate as: ∑ ோି஼௢௠௣௢௡௘௡௧௦ ∑ ீି஼௢௠௣௢௡௘௡௧௦ ∑ ஻ି஼௢௠௣௢௡௘௡௧௦ Avg Color = ௅௘௡௚௧௛ ௢௙ ௢௕௝௘௖௧ + ௅௘௡௚௧௛ ௢௙ ௢௕௝௘௖௧ + ௅௘௡௚௧௛ ௢௙ ௢௕௝௘௖௧ (7) By observing these features, we can get idea about the objects in a video clip. These features are very useful in tracking and counting the human in a video scene. 142
  • 5. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October- December (2012), © IAEME 2.4. Tracking and Counting Human After detecting the foreground objects, the main task is to track these objects in a video scene. The goal of this algorithm is to track the entire deformable object successfully in the video [14]. These objects should be tracked in a complete video without any disturbance. The main difficulty in tracking is the discontinuity in the detected objects. Due to movement of human in the video, it is possible that some parts of the human will appear separate. Also during background subtraction process, some errors can occurs. Thus legs or hands could appear as the separate objects from the body. It can be also caused by any noise or shadows present in the video. Due to this, the parts of body of a single object could be get tracked separately in a video. Thus error will occur in counting also. To improve the results in such situation, a separate rectangle has been plotted with object detection. This is done by using the subplot function in matlab. Thus one rectangle will cover whole body of an object detected in background subtraction method. This is performed by initializing two separate variables as sp (starting point) and ep (ending point). Then if-else and while loops are applied to these variables with necessary conditions. Thus each object will get tracked completely in a video clip. First the non-zero element of the detected objects is found out which indicates the object is present. Then the locations of this non-zero element are estimated. Thus four points indicating minimum and maximum x and y co-ordinates of the object are obtained. Then the condition to locate human object is as given below: ((ymax-ymin)<(xmax-xmin)) (8) where, ymax = max coordinate of the object in y-axis ymin = min coordinate of the object in y-axis xmax = max coordinate of the object in x-axis xmin = min coordinate of the object in x-axis If this condition gets satisfied then a white rectangle around the object is drawn by converting color pixels to white. This rectangle or bounding box of human will remain throughout the video. Then counting of people is performed by using necessary variables and conditions. These conditions find out the previous and current value of pixel in the detected image. If human object is present that pixels will be represented by 1. Other pixels are represented by 0. Thus a condition such as, if pre = 0 and cur = 1, is used in processing and counting can be performed. 3. EXPERIMENTAL RESULTS In order to analyze robustness and effectiveness of the implemented system, some experimental results under different conditions are carried out on this system. These videos are captured with a Sony cyber shot digital camera with 12 Megapixel resolutions. The size of a frame in the video is 180 X 320. In first video, three people are present in a single frame. Generally, it is difficult to track the multiple people in a single frame. But this system shows the accurate results and successfully tracks the three people in video. The counting of people is also performed correctly. The total time taken to perform this analysis is 50sec. 143
  • 6. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October- December (2012), © IAEME (a) (b) (c) Figure 2: Results obtained for first video The second video contains multiple people but shadows are also present in the video. Also illumination appears at the background due to reflection of light. Due to these disturbances in the video, the error could be appeared in background subtraction process. In figure 3, the image shows the result of this process. The object in a frame is appeared broken in three parts. Thus tracking and counting of people also could be wrong. But this system shows good results with background subtraction process. The tracking is also carried out successfully. The video contains nine numbers of people, but this system shows total count as ten. The total time required to perform this experiment is 60sec. Thus this system shows good results in case of shadows and illumination. (a) (b) (c) Figure 3: Results obtained with second video In third video, shadows and illumination are present. But at the same time occlusion of two people is also present. Again due to occlusion and other disturbances, it is possible that an error will occur. During experiment, this system successfully carried out the moving object detection. Then tracking is also performed nearly accurate. While counting it shows some error, but it is near to the perfection. The video contains two people while the result shows the count as three. The total time required for this experiment is 50sec. (a) (b) (c) Figure 4: Results obtained with third video 144
  • 7. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October- December (2012), © IAEME There experiments results are tabulated to show the processing time, accuracy of the system and detection error. The results are shown for the three videos shot under different conditions. Table 1: Accuracy of detection and detection error for different videos Videos Actual Objects Detected Objects Accuracy of Detection detection Ratio Video-1 3 3 100% 0 Video-2 9 10 90% 0.11 Video-3 2 3 70% 0.5 The first table shows the actual number of objects, number of detected objects, accuracy of detection and detection ratio. The results show that this system is accurate and detection ratio is also small. The detection ratio is given by D as: ்ି஼ D= ் (9) where T= ground truth (actual number of people) C= Number of detected people Table 2: Time required for processing of different videos Videos Time for object Time for tracking Time for detection (Sec) Counting (Sec) (Sec) Video-1 55 65 70 Video-2 70 85 89 Video-3 28 35 37 The second table shows the total time required for the analysis of this system. The total time has been divided into time required for people detection, time taken for tracking and time taken for counting of people. These results have shows that this system requires very less time for counting people. 4. CONCLUSION Moving object detection, tracking of detected objects and counting of these objects are difficult procedures in the presence of shadows and illumination. The proposed system performs well in these scenarios. This system uses background subtraction method to detect the foreground objects. These results are processed for further use. Then different features related to the objects are extracted. Then tracking is performed according to the size of each object and finally total count of objects is shown. The experimental results show that this method is simple to implement. It is robust and very effective. The tracking and counting is successfully performed in the presence of shadows, illumination and occlusion. This system can achieve 100% result in absence of shadows. Also 145
  • 8. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October- December (2012), © IAEME it can count multiple numbers of people present in a video. It requires very less time for all the processing. This system can be efficiently used to monitor people in public places like banks, hospitals, government offices, shopping malls etc. REFERENCES [1] Chih-Chang Chen, Hsing-Hao Lin and Oscal Chen, “Tracking and Counting People in Visual Surveillance Systems”, IEEE 2011, 978-1-4577-0539-7/11. [2] Guanglun Li, Yanling Wang and Weiqun Shu, “Real-Time Moving Object Detection for Video Monitoring Systems”, IEEE 2008, 978-0-7695-3497-8/08. [3] Osama Masoud, Nikolaos Papanikolopoulus, “A Novel Method for tracking and Counting Pedestrians in Real-Time Using a Single Camera”, IEEE 2001, 0018-9545/01, Vol. 50, No. 5. [4] J. L. Raheja, Sishir Kalita, Pallab Dutta and Solanki Lovendra, “A Robust Real Time People Tracking and Counting Incorporating Shadow Detection and Removal”, International Journal of Computer Applications, May-2012, 0975-8887, Vol. 46, No. 4. [5] Yigithan Dedeoglu, “Moving Object Detection, Tracking and Classification for Smart Video Surveillance’, August 2004. [6] Mohamed Hammami, Salma Jarraya, Hanene Ben, “A Comparative Study of Moving Object Detection Methods”, Journal of Next Generation Information Technology, Vol. 2, No. 2, May 2011. [4] M. A. Ali, S. Indupalli and B. Boufama, “Tracking Multiple People for Visual Surveillance”, School of Computer Science, University of Windsor, Canada. [7] Anil Cheriyadat, Richard Radke, “Detecting Dominant Motions in dense Crowds”, IEEE 2008, 1932-4553, Vol. 2, No. 4. [8] Liang Xiao, Tong-Qiang Li, “Research on Moving Object Detection and Tracking”, IEEE 2010, 978-1-4244-5934-6/10. [9] Bahadir Karasulu, “Review and Evaluation of Well Known Methods for Moving Object Detection and Tracking in Videos”, Journal of Aeronautics and Space Technologies, Vol. 4, No. 4, PP-11-22, 2010. [10] Yongquan Xia, Weili Li and Shaohui Ning, “Moving Object Detection Algorithm Based on Variance Analysis”, IEEE 2009, 978-0-7695-3881-5/09. [11] Ya-Li Hou, Grantham Pang, “People Counting and Human Detection in a Challenging Situation”, IEEE 2010, 1083-4427, Vol. 41, No. 1. [12] Debmalya Sinha and Gautam Sanyal, “Development of Human Tacking Systems for Visual Surveillance”, David Bracewell, AIAA 2011, CS&IT 03, PP.187-195, 2011. [13] Damien Lefloch, Faouzi Cheikh, Jon Hardeberg, Pierre Gouton and Romain Clemente, “Real-Time People Counting System Using a Single Video Camera”, Real Time Image Processing, 2008, SPIE-IS&T Vol. 6811, 681109-1. [14] Qian Zhang, King Ngan,”Segmentation and Tracking Multiple Objects Under Occlusion from Multiview Video”, IEEE 2011, 1057-7149, Vol. 20, No. 11. 146