skip to main content
10.1145/3340997.3340999acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicmltConference Proceedingsconference-collections
research-article

Vision-Based Mobile People Counting System

Authors Info & Claims
Published:21 June 2019Publication History

ABSTRACT

People detection and counting systems are highly valuable in multiple situations including managing emergency situations and efficiently allocating resources. However, most people counting systems are based on fixed sensors or fixed cameras, which lack flexibility and convenience. In this paper, we have developed a vision-based mobile people counting system which uses Android smartphones to capture images, and state-of-the-art person detectors, based on artificial intelligence, to count the number of people in a designated area. The embedded devices in smartphones such as camera, clock, GPS, are utilized to provide additional information for data collection. Several person detection frameworks such as You Only Look Once v2 (YOLO2), Aggregate Channel Features (ACF) and Multi-Task cascade Convolutional Neural Network (MTCNN) were evaluated to determine the best performing algorithm capable of offering accurate counting results across different scenarios. The experiments results show that YOLO2 outperforms ACF and MTCNN detection algorithms in different scenarios. However, YOLO2 has its own limitations as it often outputs redundant detections, requiring an additional Non-Maxima Suppression (NMS) algorithm to output a single bounding box per detection. The NMS threshold has to be carefully pre-fixed to provide top detection and counting performance across different scenarios.

References

  1. C. Raghavachari, V. Aparna, S. Chithira, and V. Balasubramanian, "A Comparative Study of Vision Based Human Detection Techniques in People Counting Applications," Procedia Comput. Sci., vol. 58, pp. 461--469, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  2. K. Y. Yam, W. C. Siu, N. F. Law, and C. K. Chan, "Effective bi-directional people flow counting for real time surveillance system," in Digest of Technical Papers - IEEE International Conference on Consumer Electronics, 2011, pp. 863--864.Google ScholarGoogle Scholar
  3. A. B. Chan and N. Vasconcelos, "Counting people with low-level features and bayesian regression," IEEE Trans. Image Process., vol. 21, no. 4, pp. 2160--2177, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Y. Sun, X. Wang, and X. Tang, "Deep Learning Face Representation From Predicting 10 000 Classes," Cvpr, pp. 1891--1898, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. P. Dollar, R. Appel, S. Belongie, and P. Perona, "Fast feature pyramids for object detection," IEEE Trans. Pattern Anal. Mach. Intell., vol. 36, no. 8, pp. 1532--1545, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. J. Redmon and A. Farhadi, "YOLO9000: Better, Faster, Stronger," 2016.Google ScholarGoogle Scholar
  7. F. Devernay, "A non-maxima suppression method for edge detection with sub-pixel accuracy." INRIA, 1995.Google ScholarGoogle Scholar
  8. J. Hosang, R. Benenson, and B. Schiele, "A convnet for non-maximum suppression," Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 9796 LNCS, pp. 192--204, 2016.Google ScholarGoogle Scholar
  9. A. Milan, L. Leal-Taixé, K. Schindler, and I. Reid, "Joint tracking and segmentation of multiple targets," Proc. IEEE Comput. Soc. Conf. Comput. Vis. Pattern Recognit., vol. 07-12-June, no. June, pp. 5397--5406, 2015.Google ScholarGoogle Scholar

Index Terms

  1. Vision-Based Mobile People Counting System

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICMLT '19: Proceedings of the 2019 4th International Conference on Machine Learning Technologies
      June 2019
      110 pages
      ISBN:9781450363235
      DOI:10.1145/3340997

      Copyright © 2019 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 21 June 2019

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader