Paper
15 July 2004 Shape-based human detection for threat assessment
Dah-Jye Lee, Pengcheng Zhan, Aaron Thomas, Robert B. Schoenberger
Author Affiliations +
Abstract
Detection of intrusions for early threat assessment requires the capability of distinguishing whether the intrusion is a human, an animal, or other objects. Most low-cost security systems use simple electronic motion detection sensors to monitor motion or the location of objects within the perimeter. Although cost effective, these systems suffer from high rates of false alarm, especially when monitoring open environments. Any moving objects including animals can falsely trigger the security system. Other security systems that utilize video equipment require human interpretation of the scene in order to make real-time threat assessment. Shape-based human detection technique has been developed for accurate early threat assessments for open and remote environment. Potential threats are isolated from the static background scene using differential motion analysis and contours of the intruding objects are extracted for shape analysis. Contour points are simplified by removing redundant points connecting short and straight line segments and preserving only those with shape significance. Contours are represented in tangent space for comparison with shapes stored in database. Power cepstrum technique has been developed to search for the best matched contour in database and to distinguish a human from other objects from different viewing angles and distances.
© (2004) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Dah-Jye Lee, Pengcheng Zhan, Aaron Thomas, and Robert B. Schoenberger "Shape-based human detection for threat assessment", Proc. SPIE 5438, Visual Information Processing XIII, (15 July 2004); https://doi.org/10.1117/12.542981
Lens.org Logo
CITATIONS
Cited by 15 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Computer intrusion detection

Databases

Motion analysis

Shape analysis

Cameras

Computing systems

Detection and tracking algorithms

Back to Top