Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
    • 指導教授
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 電機資訊學院
  3. 資訊工程學系
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/43231
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor洪一平
dc.contributor.authorSheng-Feng Hungen
dc.contributor.author洪晟峰zh_TW
dc.date.accessioned2021-06-15T01:44:01Z-
dc.date.available2016-09-14
dc.date.copyright2011-09-14
dc.date.issued2011
dc.date.submitted2011-08-15
dc.identifier.citation[1] K. Kim, T. H. Chalidabhongse, D. Harwood, and L. S. Davis, “Real-Time Foreground-Background Segmentation using Codebook Model”, Real-Time Imaging, pp. 172-185, 2005.
[2] C. Stauffer and W. E. L. Grimson, “Learning Patterns of Activity using Real-Time Tracking, ” IEEE Transactions on Pattern Analysis and Machine Intelligence, 22, 2000, pp. 747-757.
[3] P. Viola and M. Jones, “Robust Real-time Object Detection,” International Journal of Computer Vision, 57(2), 2002, pp. 137-154.
[4] M. S. Arulampalam, S. Maskell, N. Gordon, and T. Clapp, “A tutorial on particle filters for online nolinear/non-gaussian Bayesian tracking,” IEEE Transactions on Signal Processing, 50(2), 2002, pp. 174-188.
[5] M. Andriluka, S. Roth, and B. Schiele, “People-Tracking-by-Detection and People-Detection-by-Tracking,” in Proc. IEEE Conference on Computer Vision and Pattern Recognition, 2008.
[6] D. Comaniciu, V. Ramesh, and P. Meer, “Real-Time Tracking of Non-rigid Objects Using Mean Shift,” in Proc. IEEE Conference on Computer Vision and Pattern Recognition, 2000, pp. 142-149.
[7] A. Ess, B. Leibe, K. Schindler, and L. V. Gool, “A Mobile Vision System for Robust Multi-Person Tracking,” in Proc. IEEE Conference on Computer Vision and Pattern Recognition, 2008.
[8] P. N. Belhumeur, J. P. Hespanha, and D. J. Kriegman, “Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection,” IEEE Transactions on Pattern Analysis and Machine Intelligence, 19(7), 1997, pp. 711-720.
[9] M. Turk, and A. Pentland, “Eigenfaces for Recognition,” Journal of Cognitive Neurosicence, 3(1), 1991, pp. 71-86.
[10] W. Zhao, R. Chellappa, A. Rosenfeld, and P.J. Phillips, “Face Recognition: A Literature Survey,” ACM Computing Surveys, 2003, pp. 399-458.
[11] Christos-Nikolaos E. Anagnostopoulos, Ioannis E. Anagnostopoulos, Ioannis D. Psoroulas, Vassili Loumos, and Eleftherios Kayafas, 'License Plate Recognition From Still Images and Video Sequences: A Survey', IEEE Intelligent Transportation Systems Society, 2008.
[12] P. Gil-Jimenez, R. Lopez-Sastre, P. Siegmann, J. Acevedo-Rodriguez, and S. Maldonado-Bascon, 'Automatic Control ofVideo Surveillance Camera Sabotage', IWINAC 2007, 2007.
[13] E. Ribnick, S. Atev, O. Masoud, N. Papanikolopoulos, and R.Voyles, 'Real-Time Detection of Camera Tampering', IEEE International Conference on Video and Signal Based Survelliance,November 2006.
[14] Aksay, A. Temizel and A.E. Cetin, 'Camera Tamper Detection Using Wavelet Analysis for Video Survelliance', IEEE International Conference on Video and Signal Based Surveillance, September 2007.
[15] Ali Saglam and Alptekin Temizel, “Real-Time Adaptive Camera Tamper Detection for Video Surveillance”, IEEE International Conference on Advanced Video and Signal Based Surveillance,2009.
[16] Sobel, M. E. (1982). Asymptotic confidence intervals for indirect effects in structural equation models. Sociological Methodology, 13(1982), 290-312. American Sociological Association.
[17] Nobuyuki Otsu (1979). 'A threshold selection method from gray-level histograms'. IEEE Trans. Sys., Man., Cyber. 9 (1): 62–66.
[18] C.E. Shannon, 'A Mathematical Theory of Communication', Bell System Technical Journal, vol. 27, pp. 379–423, 623-656, July, October, 1948
[19] Hall D., Nascimento J., Ribeiro P., Andrade E., Moreno P., Pesnel S., List T., Emonet R., Fisher R.B., Victor J.S., Crowley, J.L.; “Comparison of target detection algorithms using adaptive background models”, Visual Surveillance and Performance Evaluation of Tracking and Surveillance, 2005. 2nd Joint IEEE International Workshop on
[20] I. Haritaoglu, D. Harwood, and L. S. Davis. W4: real-time surveillance of people and their activities. IEEE Transactions on Pattern Analysis and Machine Intelligence, 22(8):809–830, August 2000.
[21] T.E. Boult, R.J. Micheals, X. Gao, and M. Eckmann. Into the woods: Visual surveillance of noncooperative and camouflaged targets in complex outdoor settings. Proceedings of the IEEE, 89(10):1382–1402, October 2001.
[22] C. Wren, A. Azarbayejani, T. Darrell, and A. Pentland. Pfinder: Real-time tracking of the human body. IEEE Transactions on Pattern Analysis and Machine Intelligence, 19(7):780–785, July 1997.
[23] Chris Stauffer and W.E.L Grimson. Adaptive background mixture models for real-time tracking. In Computer Vision and Pattern Recognition, volume 2, pages 252–258, 1999.
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/43231-
dc.description.abstract當犯罪事件發生前,經常發現視訊監控攝影機遭到人為蓄意破壞,使得攝影機無法有效的錄下犯罪事件發生經過。本論文提出一個自動且即時的攝影機異常偵測方法,能在複雜的環境下,偵測出是否有人為蓄意破壞,並能有效降低環境變化產生的誤報機率。本方法採用二階式偵測,第一階段以取樣點方式代替整張影像作為差異比較與分析,可以明顯提升執行速度。並以適應性學習方式,使得取樣點能夠穩定且均勻分布於場景的邊緣上。藉由分析取樣點的灰階強度變化情形,判斷是否有異常事件發生。第二階段開發誤報事件偵測器,藉此過濾誤報事件,以降低誤報率。本研究針對實務上極易發生之開關燈誤報事件,提出一個有效的解決方法。此方法為利用影像結構相符程度來判斷該警報是否來自於光線變化所產生,而非真正的攝影機異常。由實驗結果,本方法能夠有效且即時偵測出攝影機遭到遮蔽、模糊和轉向等異常,且對於正常的環境光線變化、大型物件及大量人群經過等,皆比過去的方法不易產生誤報。zh_TW
dc.description.abstractWhen a crime event happens, criminals often tamper the camera to prevent their suspicious activities being captured. In this thesis, we propose a method to detect camera tampering, which can run in real-time and can be applied to a complicated environment. Our method includes a two-stage detection framework. In the first stage, we use edge intensity as the main cue to detect the event of camera tampering. Instead of using all the edge points in the image, we sample some edge points to speed up the system. In addition, we propose a learning method to determine the sampled points, and it guarantees the sampled points would be stable and uniformly distributed in the image. According to analyzing the variation of edge intensities of the sampled points, the event of camera tampering can be detected. To reduce false alarms, the second stage is trigger when the first stage detects the event. The second stage is to check whether the events come from false alarm or not. In this thesis, an illumination change detector is proposed to check and reduce false alarm. It matches the edge blocks to determinate whether the tampering event comes from the illumination change or not. In the experiments, we demonstrate the proposed method can detect the camera tampering well and can avoid triggering false alarm even when the illumination changes dramatically or large crowd passes the scene.en
dc.description.provenanceMade available in DSpace on 2021-06-15T01:44:01Z (GMT). No. of bitstreams: 1
ntu-100-R98922110-1.pdf: 4721123 bytes, checksum: ffe54250599741708a6b6892fce294a1 (MD5)
Previous issue date: 2011
en
dc.description.tableofcontents致謝 i
摘要 ii
Abstract iii
Contents iv
List of Figures vi
List of Tables ix
Chapter 1 Introduction 10
Chapter 2 Related Work 16
Chapter 3 System Architecture 21
Chapter 4 Camera Tampering Detection 23
4.1 Consistent Edge for Tampering Event Detection 23
4.1.1 Feature Points Sampling 23
4.1.2 Background Modeling 27
4.1.3 Analysis of Edge Consistency 29
4.2 Adaptive Updating 30
4.2.1 Unreliable Feature Points Condition 31
4.2.2 Feature Points Updating 33
Chapter 5 Illumination Change Detection 36
5.1 Image Quantization 36
5.1.1 Non-overlapping Block 37
5.1.2 Overlapping Block 38
5.2 Scene Structure Matching 38
5.2.1 Global Matching 39
5.2.2 Block-Based Matching 39
Chapter 6 Experiments 41
6.1 Evaluation of Illumination Change Detector 41
6.2 Evaluation of the System 46
Chapter 7 Conclusions and Future works 52
Bibliography 54
dc.language.isoen
dc.subject攝影機異常偵測zh_TW
dc.subject電腦視覺zh_TW
dc.subject智慧型監控zh_TW
dc.subjectCamera Tampering Detectionen
dc.subjectComputer Visionen
dc.subjectIntelligent Surveillanceen
dc.title於複雜環境下以適應性學習演算法進行攝影機異常之偵測zh_TW
dc.titleAn Adaptive Learning Method for Camera Tampering Detection in a Complicated Environmenten
dc.typeThesis
dc.date.schoolyear99-2
dc.description.degree碩士
dc.contributor.oralexamcommittee李明穗,徐繼聖,李秉翰
dc.subject.keyword電腦視覺,智慧型監控,攝影機異常偵測,zh_TW
dc.subject.keywordComputer Vision,Intelligent Surveillance,Camera Tampering Detection,en
dc.relation.page56
dc.rights.note有償授權
dc.date.accepted2011-08-16
dc.contributor.author-college電機資訊學院zh_TW
dc.contributor.author-dept資訊工程學研究所zh_TW
顯示於系所單位:資訊工程學系

文件中的檔案:
檔案 大小格式 
ntu-100-1.pdf
  未授權公開取用
4.61 MBAdobe PDF
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved