Human surveillance system for security application

Mohammad Mozammel Hoque Chowdhury, Junbin Gao, MD Rafiqul Islam

Research output: Book chapter/Published conference paperConference paperpeer-review

9 Citations (Scopus)

Abstract

Human surveillance is an important research activity for security concern. Due to the increasing demand of security in different domains, development of smart and efficient surveillance system has attracted immense interest in recent years. Most of the existing surveillance systems are based on monocular camera and limited by their fixed view angles and hence cannot provide sufficient three-dimensional depth information for person recognition and tracking. This paper proposes an efficient and cost-effective human surveillance system using stereo vision technique. The system uses a multi-view stereo camera pair for image capturing and analyzes the stereoscopic pictures to estimate the 3D depth information for accurate detection and tracking of the human objects. The system can provide automatic warning in case of unrecognized people and entrance in the restricted zones. Experimental results are arranged to demonstrate the robustness and efficiency of our proposed system. Our system is very inexpensive and computationally fast comparable to the existing state-of-the-art surveillance systems.
Original languageEnglish
Title of host publicationATCS2015
Subtitle of host publication10th International Conference on Security and Privacy in Communication Networks (SECURECOMM 2015)
Place of PublicationGermany
PublisherSpringer
Pages711-724
Number of pages14
Volume164
ISBN (Electronic)9783319288642
DOIs
Publication statusPublished - 2015
EventInternational Workshop on Applications and Techniques in Cyber Security - Dallas, USA, New Zealand
Duration: 26 Oct 201529 Oct 2015

Conference

ConferenceInternational Workshop on Applications and Techniques in Cyber Security
Country/TerritoryNew Zealand
Period26/10/1529/10/15

Fingerprint

Dive into the research topics of 'Human surveillance system for security application'. Together they form a unique fingerprint.

Cite this