A survey on visual surveillance of object motion and behaviors

被引:1298
作者
Hu, WM [1 ]
Tan, TN
Wang, L
Maybank, S
机构
[1] Chinese Acad Sci, Inst Automat, Natl Lab Pattern Recognit, Beijing 100080, Peoples R China
[2] Univ London Birkbeck Coll, Sch Comp Sci & Informat Syst, London WC1E 7HX, England
来源
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS | 2004年 / 34卷 / 03期
基金
中国国家自然科学基金;
关键词
behavior understanding and description; fusion of data from multiple cameras; motion detection; personal identification; tracking; visual surveillance;
D O I
10.1109/TSMCC.2004.829274
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Visual surveillance in dynamic scenes, especially for humans and vehicles, is currently one of the most active research topics in computer vision. It has a wide spectrum of promising applications, including access control in special areas, human identification at a distance, crowd flux statistics And congestion analysis, detection of anomalous behaviors, and interactive surveillance using multiple cameras, etc. In general, the processing framework of visual surveillance in dynamic scenes includes the following stages: modeling of environments, detection of motion, classification of moving objects, tracking, understanding and description of behaviors, human identification, and fusion of data from multiple cameras. We review recent developments and general strategies of all these stages. Finally, we analyze possible research directions, e.g., occlusion handling, a combination of two-and three-dimensional tracking, a. combination of motion analysis and biometrics, anomaly detection and behavior prediction, content-based retrieval of surveillance videos, behavior understanding and natural language description, fusion of information from multiple sensors, and remote surveillance.
引用
收藏
页码:334 / 352
页数:19
相关论文
共 182 条
[1]   Nonrigid motion analysis: Articulated and elastic motion [J].
Aggarwal, JK ;
Cai, Q ;
Liao, W ;
Sabata, B .
COMPUTER VISION AND IMAGE UNDERSTANDING, 1998, 70 (02) :142-156
[2]  
[Anonymous], P IEEE INT C AUT FAC
[3]  
[Anonymous], P INT C COMP VIS WOR
[4]  
[Anonymous], P 5 AS C COMP VIS
[5]  
[Anonymous], P EUR C COMP VIS
[6]  
[Anonymous], 1996, MARKOV CHAIN MONTE C
[7]   PERFORMANCE OF OPTICAL-FLOW TECHNIQUES [J].
BARRON, JL ;
FLEET, DJ ;
BEAUCHEMIN, SS .
INTERNATIONAL JOURNAL OF COMPUTER VISION, 1994, 12 (01) :43-77
[8]   Image authentication techniques for surveillance applications [J].
Bartolini, F ;
Tefas, A ;
Barni, M ;
Pitas, I .
PROCEEDINGS OF THE IEEE, 2001, 89 (10) :1403-1418
[9]  
BASU A, 1995, 1995 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-5, P3107, DOI 10.1109/ICSMC.1995.538259
[10]  
BAUMBERG A, 1996, MOTION BASED RECOGNI, P39