suspicious activity detection
DESCRIPTION
Student: Dane Brown Supervisor: James Connan. SUSPICIOUS ACTIVITY DETECTION. OVERVIEW. INTRODUCTION USER REQUIREMENTS USER INTERFACE SPECIFICATION HIGH LEVEL DESIGN LOW LEVEL DESIGN DEMO REFERENCES QUESTIONS & ANSWERS. INTRODUCTION . What does the system regard as normal activity - PowerPoint PPT PresentationTRANSCRIPT
SUSPICIOUS ACTIVITY DETECTION
Student: Dane Brown
Supervisor: James Connan
OVERVIEW INTRODUCTION
USER REQUIREMENTS
USER INTERFACE SPECIFICATION
HIGH LEVEL DESIGN
LOW LEVEL DESIGN
DEMO
REFERENCES
QUESTIONS & ANSWERS
INTRODUCTION What does the system regard as normal activity
Park car, get out, walk away, get back in, drive away
What does the system regard as suspicious?
Loitering next to a vehicle is suspicious
USER REQUIREMENTS
Video Camera
Capture the parking lot
Server
Runs the c++ code.
USER INTERFACE SPECIFICATION
HIGH LEVEL DESIGN
Haar-feature
extraction
Canny Edge
Detection
GrayscaleVideo
Manipulation
Extract Frames
Gaussian Smoothing
Output
LOW LEVEL DESIGN
Haar-feature
extraction
Car Detection
Human Detection
Car classifier
Salient points are matched
Contours detected
Human classifier
Salient points are matchedContours
detected
Demo
REFERENCES http://library.wolfram.com/examples/edgedete
ction/
http://homepages.inf.ed.ac.uk/rbf/CVonline/L
OCAL_COPIES/RAJA/CV.html
http://opencv.willowgarage.com/wiki/
http://www.owlnet.rice.edu/~elec539/Projects
97/morphjrks/laplacian.html
http://www.pages.drexel.edu/~weg22/can_tut
.html
QUESTIONS AND ANSWERSThank You!