2016
DOI: 10.1016/j.neucom.2015.03.120
|View full text |Cite
|
Sign up to set email alerts
|

An efficient image retrieval scheme for colour enhancement of embedded and distributed surveillance images

Abstract: a b s t r a c tFrom the past few years, the size of the data grows exponentially with respect to volume, velocity, and dimensionality due to wide spread use of embedded and distributed surveillance cameras for security reasons. In this paper, we have proposed an integrated approach for biometric-based image retrieval and processing which addresses the two issues. The first issue is related to the poor visibility of the images produced by the embedded and distributed surveillance cameras, and the second issue i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 18 publications
(6 citation statements)
references
References 57 publications
0
6
0
Order By: Relevance
“…Surveillance cameras are used to monitor traffic flow, threats, and suspicious activities in order to support government and law-enforcement agencies. They play a vital role in security issues, as they are widely deployed in public places to prevent or investigate crimes and to detect a suspicious person in order to make the environment more secure (Iqbal et al, 2015a, Iqbal et al, 2015b. Computational intelligence methods can help to classify physiological and behavioural traits to effectively identity suspicious and abnormal behaviour for various applications such as vehicle theft, crowd surveillance through monitoring and analysis of multiple real-time data streams.…”
Section: Biometrics and Surveillance For Smart Citiesmentioning
confidence: 99%
See 1 more Smart Citation
“…Surveillance cameras are used to monitor traffic flow, threats, and suspicious activities in order to support government and law-enforcement agencies. They play a vital role in security issues, as they are widely deployed in public places to prevent or investigate crimes and to detect a suspicious person in order to make the environment more secure (Iqbal et al, 2015a, Iqbal et al, 2015b. Computational intelligence methods can help to classify physiological and behavioural traits to effectively identity suspicious and abnormal behaviour for various applications such as vehicle theft, crowd surveillance through monitoring and analysis of multiple real-time data streams.…”
Section: Biometrics and Surveillance For Smart Citiesmentioning
confidence: 99%
“…In order to harvest the advantages of Big Data analytics in an increasingly knowledge driven society there is a need to develop solutions that reduce the complexity and cognitive burden on accessing and processing these large volumes of data in both embedded hardware and software based data analytics (Maniak et al, 2015;Iqbal et al, 2015a, Iqbal et al, 2015b. Big challenges stem from the utilization of Big Data in real world, since the implementation of real time applications is becoming increasingly complex.…”
Section: Introductionmentioning
confidence: 99%
“…Reference [10] proposed an image retrieval approach using a mixture of texture and shape features. Fuzzy C-means clustering and k-means clustering were employed to segment the images.…”
Section: Related Workmentioning
confidence: 99%
“…Furthermore, the distribution of high-level information between sensors also poses a problem, as objects may pass through the coverage areas of different sensors, which requires the existence of mechanisms that ensure the consistency of data. Also, the size of data managed by networked surveillance systems grows exponentially with respect to volume, velocity, and dimensionality, due to the widespread use of embedded surveillance cameras and sensors [41].…”
Section: Third Generation Systemsmentioning
confidence: 99%