2008 IEEE Fifth International Conference on Advanced Video and Signal Based Surveillance 2008
DOI: 10.1109/avss.2008.16
|View full text |Cite
|
Sign up to set email alerts
|

Robust Unattended and Stolen Object Detection by Fusing Simple Algorithms

Abstract: Esta es la versión de autor de la comunicación de congreso publicada en: This is an author produced version of a paper published in:

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
25
0

Year Published

2011
2011
2024
2024

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 38 publications
(25 citation statements)
references
References 21 publications
0
25
0
Order By: Relevance
“…Table 6: Recognition results for the analysis of controlled environments (Key: ABA: Abandoned-object, STO:Stolenobject, CSM2: rule-based approach [32]). Event detection examples for uncontrolled environments.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Table 6: Recognition results for the analysis of controlled environments (Key: ABA: Abandoned-object, STO:Stolenobject, CSM2: rule-based approach [32]). Event detection examples for uncontrolled environments.…”
Section: Resultsmentioning
confidence: 99%
“…For comparison purposes, we have selected the widely used CSM approach [3][23] [31][22] [32]. It de nes rules for each component of the event description that provide a binary decision on whether these components happened or not.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…It is composed of a sequential combination of the following stages: foreground detection, noise removal, blob extraction, blob tracking, static object detection, people recognition and event detection. Further details of the techniques implemented for each stage are provided in [32].…”
Section: Setupmentioning
confidence: 99%
“…For comparison purposes, we have selected a stateof-art approach for detecting abandoned objects in video surveillance [32] (from now on xed workow). It represents the related literature that is manually designed based on the expert knowledge of the task.…”
Section: Setupmentioning
confidence: 99%