Memory Based Human Region Detection

نویسندگان

  • Ayaka Yamamoto
  • Yoshio Iwai
  • Hiroshi Ishiguro
چکیده

Background subtraction is widely used for detecting moving objects; however, color similarity between a background and a moving object is still an important problem. In this paper, we present an exemplar based approach to efficiently detect walking persons that are similar in color to the background. Exemplar database is constructed from couples of degraded and complete human silhouette patterns; the missing parts in an input image obtained by background subtraction are detected by using degraded patterns in the database, and then are compensated by using complete patterns in the database. In our approach, the relationship between the degraded pattern and the complete human silhouette patterns is formulated and compensation of degraded area is performed by optimization in a block-based manner. The experimental results and evaluations of our system are demonstrated.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Reduced-Reference Image Quality Assessment based on saliency region extraction

In this paper, a novel saliency theory based RR-IQA metric is introduced. As the human visual system is sensitive to the salient region, evaluating the image quality based on the salient region could increase the accuracy of the algorithm. In order to extract the salient regions, we use blob decomposition (BD) tool as a texture component descriptor. A new method for blob decomposition is propos...

متن کامل

F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management

Distributed Denial of Service (DDoS) is a common attack in recent years that can deplete the bandwidth of victim nodes by flooding packets. Based on the type and quantity of traffic used for the attack and the exploited vulnerability of the target, DDoS attacks are grouped into three categories as Volumetric attacks, Protocol attacks and Application attacks. The volumetric attack, which the pro...

متن کامل

A New Method for Sperm Detection in Human Semen: Combination of Hypothesis Testing and Local Mapping of Wavelet Sub-Bands

Introduction Automated methods for sperm characterization in microscopic videos have some limitations such as: low contrast of the video frames and possibility of neighboring sperms to touch each other. In this paper a new method is introduced for detection of sperms in microscopic videos. Materials and Methods In this work, first microscopic videos are captured from specimens of human semen. S...

متن کامل

A limited memory adaptive trust-region approach for large-scale unconstrained optimization

This study concerns with a trust-region-based method for solving unconstrained optimization problems. The approach takes the advantages of the compact limited memory BFGS updating formula together with an appropriate adaptive radius strategy. In our approach, the adaptive technique leads us to decrease the number of subproblems solving, while utilizing the structure of limited memory quasi-Newt...

متن کامل

Securing Cluster-heads in Wireless Sensor Networks by a Hybrid Intrusion Detection System Based on Data Mining

Cluster-based Wireless Sensor Network (CWSN) is a kind of WSNs that because of avoiding long distance communications, preserve the energy of nodes and so is attractive for related applications. The criticality of most applications of WSNs and also their unattended nature, makes sensor nodes often susceptible to many types of attacks. Based on this fact, it is clear that cluster heads (CHs) are ...

متن کامل

Detection of Target and Implemented By Using Seismic and Pir Sensors

To monitor human activities, such as pedestrian motion and detection of intruders in a secure region we are widely using the Unattended ground sensors (UGS). The efficiency of UGSsystems is often limited by high false alarm rates, possibly dueto inadequacies of the underlying algorithms and limitationsof onboard computation. In this regard, this paper presents awavelet-based method for target d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011