請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/43231完整後設資料紀錄
| DC 欄位 | 值 | 語言 |
|---|---|---|
| dc.contributor.advisor | 洪一平 | |
| dc.contributor.author | Sheng-Feng Hung | en |
| dc.contributor.author | 洪晟峰 | zh_TW |
| dc.date.accessioned | 2021-06-15T01:44:01Z | - |
| dc.date.available | 2016-09-14 | |
| dc.date.copyright | 2011-09-14 | |
| dc.date.issued | 2011 | |
| dc.date.submitted | 2011-08-15 | |
| dc.identifier.citation | [1] K. Kim, T. H. Chalidabhongse, D. Harwood, and L. S. Davis, “Real-Time Foreground-Background Segmentation using Codebook Model”, Real-Time Imaging, pp. 172-185, 2005.
[2] C. Stauffer and W. E. L. Grimson, “Learning Patterns of Activity using Real-Time Tracking, ” IEEE Transactions on Pattern Analysis and Machine Intelligence, 22, 2000, pp. 747-757. [3] P. Viola and M. Jones, “Robust Real-time Object Detection,” International Journal of Computer Vision, 57(2), 2002, pp. 137-154. [4] M. S. Arulampalam, S. Maskell, N. Gordon, and T. Clapp, “A tutorial on particle filters for online nolinear/non-gaussian Bayesian tracking,” IEEE Transactions on Signal Processing, 50(2), 2002, pp. 174-188. [5] M. Andriluka, S. Roth, and B. Schiele, “People-Tracking-by-Detection and People-Detection-by-Tracking,” in Proc. IEEE Conference on Computer Vision and Pattern Recognition, 2008. [6] D. Comaniciu, V. Ramesh, and P. Meer, “Real-Time Tracking of Non-rigid Objects Using Mean Shift,” in Proc. IEEE Conference on Computer Vision and Pattern Recognition, 2000, pp. 142-149. [7] A. Ess, B. Leibe, K. Schindler, and L. V. Gool, “A Mobile Vision System for Robust Multi-Person Tracking,” in Proc. IEEE Conference on Computer Vision and Pattern Recognition, 2008. [8] P. N. Belhumeur, J. P. Hespanha, and D. J. Kriegman, “Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection,” IEEE Transactions on Pattern Analysis and Machine Intelligence, 19(7), 1997, pp. 711-720. [9] M. Turk, and A. Pentland, “Eigenfaces for Recognition,” Journal of Cognitive Neurosicence, 3(1), 1991, pp. 71-86. [10] W. Zhao, R. Chellappa, A. Rosenfeld, and P.J. Phillips, “Face Recognition: A Literature Survey,” ACM Computing Surveys, 2003, pp. 399-458. [11] Christos-Nikolaos E. Anagnostopoulos, Ioannis E. Anagnostopoulos, Ioannis D. Psoroulas, Vassili Loumos, and Eleftherios Kayafas, 'License Plate Recognition From Still Images and Video Sequences: A Survey', IEEE Intelligent Transportation Systems Society, 2008. [12] P. Gil-Jimenez, R. Lopez-Sastre, P. Siegmann, J. Acevedo-Rodriguez, and S. Maldonado-Bascon, 'Automatic Control ofVideo Surveillance Camera Sabotage', IWINAC 2007, 2007. [13] E. Ribnick, S. Atev, O. Masoud, N. Papanikolopoulos, and R.Voyles, 'Real-Time Detection of Camera Tampering', IEEE International Conference on Video and Signal Based Survelliance,November 2006. [14] Aksay, A. Temizel and A.E. Cetin, 'Camera Tamper Detection Using Wavelet Analysis for Video Survelliance', IEEE International Conference on Video and Signal Based Surveillance, September 2007. [15] Ali Saglam and Alptekin Temizel, “Real-Time Adaptive Camera Tamper Detection for Video Surveillance”, IEEE International Conference on Advanced Video and Signal Based Surveillance,2009. [16] Sobel, M. E. (1982). Asymptotic confidence intervals for indirect effects in structural equation models. Sociological Methodology, 13(1982), 290-312. American Sociological Association. [17] Nobuyuki Otsu (1979). 'A threshold selection method from gray-level histograms'. IEEE Trans. Sys., Man., Cyber. 9 (1): 62–66. [18] C.E. Shannon, 'A Mathematical Theory of Communication', Bell System Technical Journal, vol. 27, pp. 379–423, 623-656, July, October, 1948 [19] Hall D., Nascimento J., Ribeiro P., Andrade E., Moreno P., Pesnel S., List T., Emonet R., Fisher R.B., Victor J.S., Crowley, J.L.; “Comparison of target detection algorithms using adaptive background models”, Visual Surveillance and Performance Evaluation of Tracking and Surveillance, 2005. 2nd Joint IEEE International Workshop on [20] I. Haritaoglu, D. Harwood, and L. S. Davis. W4: real-time surveillance of people and their activities. IEEE Transactions on Pattern Analysis and Machine Intelligence, 22(8):809–830, August 2000. [21] T.E. Boult, R.J. Micheals, X. Gao, and M. Eckmann. Into the woods: Visual surveillance of noncooperative and camouflaged targets in complex outdoor settings. Proceedings of the IEEE, 89(10):1382–1402, October 2001. [22] C. Wren, A. Azarbayejani, T. Darrell, and A. Pentland. Pfinder: Real-time tracking of the human body. IEEE Transactions on Pattern Analysis and Machine Intelligence, 19(7):780–785, July 1997. [23] Chris Stauffer and W.E.L Grimson. Adaptive background mixture models for real-time tracking. In Computer Vision and Pattern Recognition, volume 2, pages 252–258, 1999. | |
| dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/43231 | - |
| dc.description.abstract | 當犯罪事件發生前,經常發現視訊監控攝影機遭到人為蓄意破壞,使得攝影機無法有效的錄下犯罪事件發生經過。本論文提出一個自動且即時的攝影機異常偵測方法,能在複雜的環境下,偵測出是否有人為蓄意破壞,並能有效降低環境變化產生的誤報機率。本方法採用二階式偵測,第一階段以取樣點方式代替整張影像作為差異比較與分析,可以明顯提升執行速度。並以適應性學習方式,使得取樣點能夠穩定且均勻分布於場景的邊緣上。藉由分析取樣點的灰階強度變化情形,判斷是否有異常事件發生。第二階段開發誤報事件偵測器,藉此過濾誤報事件,以降低誤報率。本研究針對實務上極易發生之開關燈誤報事件,提出一個有效的解決方法。此方法為利用影像結構相符程度來判斷該警報是否來自於光線變化所產生,而非真正的攝影機異常。由實驗結果,本方法能夠有效且即時偵測出攝影機遭到遮蔽、模糊和轉向等異常,且對於正常的環境光線變化、大型物件及大量人群經過等,皆比過去的方法不易產生誤報。 | zh_TW |
| dc.description.abstract | When a crime event happens, criminals often tamper the camera to prevent their suspicious activities being captured. In this thesis, we propose a method to detect camera tampering, which can run in real-time and can be applied to a complicated environment. Our method includes a two-stage detection framework. In the first stage, we use edge intensity as the main cue to detect the event of camera tampering. Instead of using all the edge points in the image, we sample some edge points to speed up the system. In addition, we propose a learning method to determine the sampled points, and it guarantees the sampled points would be stable and uniformly distributed in the image. According to analyzing the variation of edge intensities of the sampled points, the event of camera tampering can be detected. To reduce false alarms, the second stage is trigger when the first stage detects the event. The second stage is to check whether the events come from false alarm or not. In this thesis, an illumination change detector is proposed to check and reduce false alarm. It matches the edge blocks to determinate whether the tampering event comes from the illumination change or not. In the experiments, we demonstrate the proposed method can detect the camera tampering well and can avoid triggering false alarm even when the illumination changes dramatically or large crowd passes the scene. | en |
| dc.description.provenance | Made available in DSpace on 2021-06-15T01:44:01Z (GMT). No. of bitstreams: 1 ntu-100-R98922110-1.pdf: 4721123 bytes, checksum: ffe54250599741708a6b6892fce294a1 (MD5) Previous issue date: 2011 | en |
| dc.description.tableofcontents | 致謝 i
摘要 ii Abstract iii Contents iv List of Figures vi List of Tables ix Chapter 1 Introduction 10 Chapter 2 Related Work 16 Chapter 3 System Architecture 21 Chapter 4 Camera Tampering Detection 23 4.1 Consistent Edge for Tampering Event Detection 23 4.1.1 Feature Points Sampling 23 4.1.2 Background Modeling 27 4.1.3 Analysis of Edge Consistency 29 4.2 Adaptive Updating 30 4.2.1 Unreliable Feature Points Condition 31 4.2.2 Feature Points Updating 33 Chapter 5 Illumination Change Detection 36 5.1 Image Quantization 36 5.1.1 Non-overlapping Block 37 5.1.2 Overlapping Block 38 5.2 Scene Structure Matching 38 5.2.1 Global Matching 39 5.2.2 Block-Based Matching 39 Chapter 6 Experiments 41 6.1 Evaluation of Illumination Change Detector 41 6.2 Evaluation of the System 46 Chapter 7 Conclusions and Future works 52 Bibliography 54 | |
| dc.language.iso | en | |
| dc.subject | 攝影機異常偵測 | zh_TW |
| dc.subject | 電腦視覺 | zh_TW |
| dc.subject | 智慧型監控 | zh_TW |
| dc.subject | Camera Tampering Detection | en |
| dc.subject | Computer Vision | en |
| dc.subject | Intelligent Surveillance | en |
| dc.title | 於複雜環境下以適應性學習演算法進行攝影機異常之偵測 | zh_TW |
| dc.title | An Adaptive Learning Method for Camera Tampering Detection in a Complicated Environment | en |
| dc.type | Thesis | |
| dc.date.schoolyear | 99-2 | |
| dc.description.degree | 碩士 | |
| dc.contributor.oralexamcommittee | 李明穗,徐繼聖,李秉翰 | |
| dc.subject.keyword | 電腦視覺,智慧型監控,攝影機異常偵測, | zh_TW |
| dc.subject.keyword | Computer Vision,Intelligent Surveillance,Camera Tampering Detection, | en |
| dc.relation.page | 56 | |
| dc.rights.note | 有償授權 | |
| dc.date.accepted | 2011-08-16 | |
| dc.contributor.author-college | 電機資訊學院 | zh_TW |
| dc.contributor.author-dept | 資訊工程學研究所 | zh_TW |
| 顯示於系所單位: | 資訊工程學系 | |
文件中的檔案:
| 檔案 | 大小 | 格式 | |
|---|---|---|---|
| ntu-100-1.pdf 未授權公開取用 | 4.61 MB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。
