Abstract

Intensive development of means of receiving and transmitting digital images creates the problem of processing huge amounts of video information flows. There is a wide range of tasks in which images are considered as a source of information on the basis of which it is necessary to make a decision. Important tasks to be solved by intelligent video surveillance systems are: identification of objects and determination of their trajectories; measuring the speed of objects; detection of alarming events in the tasks of object-territorial protection in real time. One of the main operations in intelligent video surveillance systems in image processing for further analysis is the selection of contours of images of objects, because the contour contains all the necessary information to recognize objects by their shape. This approach allows you to not consider the internal points of the image and, thus, significantly reduce the amount of information processed. This makes it possible to analyze images in real time. Contour analysis is a set of methods for selecting, describing and processing image contours that allows you to describe, store, compare and search for objects presented in the form of their external contours, as well as effectively solve the main problems of pattern recognition — transfer, rotate and zoom image of the object. In this case, the contour means a space-length gap, difference or abrupt change in brightness values. The purpose of the publication is to consider the algorithms for selecting the contours of images of objects in the problems of detecting alarming events by intelligent video surveillance systems. The problem of selection of contours of images of objects in problems of detection of disturbing events by intelligent systems of video surveillance is considered. In order to improve the basic characteristics of intelligent video surveillance systems, algorithms for contouring images of objects are proposed to ensure the detection of four types of alarming events: the appearance and presence of the object in the surveillance zone, moving the object in the forbidden direction, leaving the object and overturning the object.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call