1
|
Sabha A, Selwal A. CoSumNet: A video summarization-based framework for COVID-19 monitoring in crowded scenes. Artif Intell Med 2023; 139:102544. [PMID: 37100512 PMCID: PMC10079598 DOI: 10.1016/j.artmed.2023.102544] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/29/2022] [Revised: 03/28/2023] [Accepted: 04/02/2023] [Indexed: 04/28/2023]
Abstract
The outbreak of COVID-19 pandemic poses new challenges to research community to investigate novel mechanisms for monitoring as well as controlling its further spread via crowded scenes. Moreover, the contemporary methods of COVID-19 preventions are enforcing strict protocols in the public places. The emergence of robust computer vision-enabled applications leverages intelligent frameworks for monitoring of the pandemic deterrence in public places. The employment of COVID-19 protocols via wearing face masks by human is an effective procedure that is implemented in several countries across the world. It is a challenging task for authorities to manually monitor these protocols particularly in densely crowded public gatherings such as, shopping malls, railway stations, airports, religious places etc. Thus, to overcome these issues, the proposed research aims to design an operative method that automatically detects the violation of face mask regulation for COVID-19 pandemic. In this research work, we expound a novel technique for COVID-19 protocol desecration via video summarization in the crowded scenes (CoSumNet). Our approach automatically yields short summaries from crowded video scenes (i.e., with and without mask human). Besides, the CoSumNet can be deployed in crowded places that may assist the controlling agencies to take appropriate actions to enforce the penalty to the protocol violators. To evaluate the efficacy of the approach, the CoSumNet is trained on a benchmark "Face Mask Detection ∼12K Images Dataset" and validated through various real-time CCTV videos. The CoSumNet demonstrates superior performance of 99.98 % and 99.92 % detection accuracy in the seen and unseen scenarios respectively. Our method offers promising performance in cross-datasets environments as well as on a variety of face masks. Furthermore, the model can convert the longer videos to short summaries in nearly 5-20 s approximately.
Collapse
Affiliation(s)
- Ambreen Sabha
- Department of Computer Science and Information Technology, Central University of Jammu, Samba, Jammu and Kashmir 181143, India.
| | - Arvind Selwal
- Department of Computer Science and Information Technology, Central University of Jammu, Samba, Jammu and Kashmir 181143, India
| |
Collapse
|
2
|
Lohani D, Crispim-Junior C, Barthélemy Q, Bertrand S, Robinault L, Tougne Rodet L. Perimeter Intrusion Detection by Video Surveillance: A Survey. SENSORS 2022; 22:s22093601. [PMID: 35591289 PMCID: PMC9104546 DOI: 10.3390/s22093601] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 03/18/2022] [Revised: 04/26/2022] [Accepted: 04/30/2022] [Indexed: 12/10/2022]
Abstract
In recent times, we have seen a massive rise in vision-based applications, such as video anomaly detection, motion detection, object tracking, people counting, etc. Most of these tasks are well defined, with a clear idea of the goal, along with proper datasets and evaluation procedures. However, perimeter intrusion detection (PID), which is one of the major tasks in visual surveillance, still needs to be formally defined. A perimeter intrusion detection system (PIDS) aims to detect the presence of an unauthorized object in a protected outdoor site during a certain time. Existing works vaguely define a PIDS, and this has a direct impact on the evaluation of methods. In this paper, we mathematically define it. We review the existing methods, datasets and evaluation protocols based on this definition. Furthermore, we provide a suitable evaluation protocol for real-life application. Finally, we evaluate the existing systems on available datasets using different evaluation schemes and metrics.
Collapse
Affiliation(s)
- Devashish Lohani
- Univ Lyon, Univ Lyon 2, CNRS, INSA Lyon, UCBL, LIRIS, UMR5205, F-69676 Bron, France; (C.C.-J.); (L.R.); (L.T.R.)
- Foxstream, F-69120 Vaulx-en-Velin, France; (Q.B.); (S.B.)
- Correspondence:
| | - Carlos Crispim-Junior
- Univ Lyon, Univ Lyon 2, CNRS, INSA Lyon, UCBL, LIRIS, UMR5205, F-69676 Bron, France; (C.C.-J.); (L.R.); (L.T.R.)
| | | | - Sarah Bertrand
- Foxstream, F-69120 Vaulx-en-Velin, France; (Q.B.); (S.B.)
| | - Lionel Robinault
- Univ Lyon, Univ Lyon 2, CNRS, INSA Lyon, UCBL, LIRIS, UMR5205, F-69676 Bron, France; (C.C.-J.); (L.R.); (L.T.R.)
- Foxstream, F-69120 Vaulx-en-Velin, France; (Q.B.); (S.B.)
| | - Laure Tougne Rodet
- Univ Lyon, Univ Lyon 2, CNRS, INSA Lyon, UCBL, LIRIS, UMR5205, F-69676 Bron, France; (C.C.-J.); (L.R.); (L.T.R.)
| |
Collapse
|
3
|
Detecting Apples in the Wild: Potential for Harvest Quantity Estimation. SUSTAINABILITY 2021. [DOI: 10.3390/su13148054] [Citation(s) in RCA: 7] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/13/2022]
Abstract
Knowing the exact number of fruits and trees helps farmers to make better decisions in their orchard production management. The current practice of crop estimation practice often involves manual counting of fruits (before harvesting), which is an extremely time-consuming and costly process. Additionally, this is not practicable for large orchards. Thanks to the changes that have taken place in recent years in the field of image analysis methods and computational performance, it is possible to create solutions for automatic fruit counting based on registered digital images. The pilot study aims to confirm the state of knowledge in the use of three methods (You Only Look Once—YOLO, Viola–Jones—a method based on the synergy of morphological operations of digital imagesand Hough transformation) of image recognition for apple detecting and counting. The study compared the results of three image analysis methods that can be used for counting apple fruits. They were validated, and their results allowed the recommendation of a method based on the YOLO algorithm for the proposed solution. It was based on the use of mass accessible devices (smartphones equipped with a camera with the required accuracy of image acquisition and accurate Global Navigation Satellite System (GNSS) positioning) for orchard owners to count growing apples. In our pilot study, three methods of counting apples were tested to create an automatic system for estimating apple yields in orchards. The test orchard is located at the University of Warmia and Mazury in Olsztyn. The tests were carried out on four trees located in different parts of the orchard. For the tests used, the dataset contained 1102 apple images and 3800 background images without fruits.
Collapse
|
4
|
Park H, Park S, Joo Y. Robust Detection of Abandoned Object for Smart Video Surveillance in Illumination Changes. SENSORS 2019; 19:s19235114. [PMID: 31766683 PMCID: PMC6928649 DOI: 10.3390/s19235114] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 10/31/2019] [Revised: 11/19/2019] [Accepted: 11/20/2019] [Indexed: 11/16/2022]
Abstract
Most existing abandoned object detection algorithms use foreground information generated from background models. Detection using the background subtraction technique performs well under normal circumstances. However, it has a significant problem where the foreground information is gradually absorbed into the background as time passes and disappears, making it very vulnerable to sudden illumination changes that increase the false alarm rate. This paper presents an algorithm for detecting abandoned objects using a dual background model, which is robust even in illumination changes as well as other complex circumstances like occlusion, long-term abandonment, and owner re-attendance. The proposed algorithm can adapt quickly to various illumination changes. And also, it can precisely track the target objects to determine whether it is abandoned regardless of the existence of foreground information and the effect from the illumination changes, thanks to the largest-contour-based presence authentication mechanism proposed in this paper. For performance evaluation, we trialed the algorithm with the PETS2006, ABODA datasets as well as our dataset, especially to demonstrate its robustness in various illumination changes.
Collapse
|