SlideShare una empresa de Scribd logo
1 de 6
Descargar para leer sin conexión
The International Journal Of Engineering And Science (IJES)
|| Volume || 3 || Issue || 5 || Pages || 01-06 || 2014 ||
ISSN (e): 2319 – 1813 ISSN (p): 2319 – 1805
www.theijes.com The IJES Page 1
Background Subraction in a Video System Using Morphology
Technique
C.Venkata Subba Reddy. A.Karunakar,
1,
S.S.I.T.S,Rayachoti.
2,
Assistant Professor,S.S.I.T.S,Rayachoti.
------------------------------------------------------ABSTRACT----------------------------------------------------
The capability of extracting moving objects from a video sequence captured using a static camera is a typical
first step in visual surveillance. The idea of background subtraction is to subtract or difference the current
image from a reference background model. This paper proposes a new method to detect moving object based on
background subtraction. First of all, we establish a reliable background updating model based on statistical and
use a dynamic optimization threshold method to obtain a more complete moving object. Here we have written
the core processor Microblaze is designed in VHDL (VHSIC hardware description language), implemented
using XILINX ISE 8.1 Design suite the algorithm is written in system C Language and tested in SPARTAN-3
FPGA kit by interfacing a test circuit with the PC using the RS232 cable. The test results are seen to be
satisfactory. The area taken and the speed of the algorithm are also evaluated.
KEYWORDS- UART; VHDL; Softcore; Microblaze; Morphological Image Filtering, Segmentation.
---------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: 21 April 2014 Date of Publication: 10 May 2014
------------------------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
Image segmentation is one of the most important categories of image processing. The purpose of image
segmentation is to divide an original image into homogeneous regions. It can be applied as a pre-processing
stage for other image processing methods. There exist several approaches for image segmentation methods for
image processing. The after sheds transformation is studied in this thesis as a particular method of a region-
based approach to the segmentation of an image. The complete transformation incorporates a pre-processing and
post-processing stage that deals with embedded problems such as edge ambiguity and the output of a large
number of regions. Multiscale Morphological Gradient (MMG) and Region Adjacency Graph (RAG) are two
methods that are pre-processing and post-processing stages, respectively. RAG incorporates dissimilarity criteria
to merge adjacent homogeneous regions.
In this thesis, the proposed system has been applied to a set of co-aligned images, which include a pair
of intensity and range images. It is expected that the hidden edges within the intensity image can be detected by
observing range data or vice versa. Also it is expected that the contribution of the range image in region merging
can compensate for the dominance of shadows within the intensity image regardless of the original intensity of
the object.
Image processing and analysis is an important area in the field of robotics. This is particularly true for
the operation of autonomous vehicles. The operation of an autonomous vehicle is based on first acquiring data
that describe its environment. Indeed, the motion planning and control of a fully autonomous vehicle requires an
intelligent controller to be able to make decisions to allow the autonomous vehicle to maneuver in an unknown
field based on these data. These data sets include range data, 2D images, and position measurements. This data
is used to identify and avoid obstacles and to map the surrounding terrain.
The elements of an image analysis system are shown in Figure 1. Image analysis usually starts with a
pre-processing stage, which includes operations such as noise reduction. For the actual recognition stage,
segmentation should be done before it to extract out only the part that has useful information. Image
segmentation is a primary and critical component of image analysis. The quality of the final results of an image
analysis could depend on the segmentation step. On the other hand, segmentation is one of the most difficult
tasks in image processing, especially automatic image segmentation.
The goal of the segmentation process is to define areas within the image that have some properties that make them
homogeneous. The definition of those properties should satisfy the general condition that the union of neighboring regions
should not be homogeneous if we consider the same set of properties. After segmentation, we can usually establish that the
discontinuities in the image correspond to boundaries between regions.
Background Subraction in a Video System Using Morphology Technique
www.theijes.com The IJES Page 2
Elements of Image Analysis
The methods most commonly used for image segmentation can be categorized into four classes.
II. MATHEMATICAL MORPHOLOGY
The term morphology refers to the study of shapes and structures from a general scientific perspective. Also, it can
be interpreted as shape study using mathematical set theory. In image processing, morphology is the name of a specific
methodology for analyzing the geometric structure inherent within an image. The morphological filter, which can be
constructed on the basis of the underlying morphological operations, are more suitable for shape analysis than the standard
linear filters since the latter sometimes distort the underlying geometric form of the image.
Some of the salient points regarding the morphological approach are as follows:
1. Morphological operations provide for the systematic alteration of the geometric content of an image while maintaining
the stability of the important geometric characteristics.
2. There exists a well-developed morphological algebra that can be employed for representation and optimization.
3. It is possible to express digital algorithms in terms of a very small class of primitive morphological operations.
4. There exist rigorous representations theorems by means of which one can obtain the expression of morphological filters in
terms of the primitive morphological operations.
In general, morphological operators transform the original image into another image through the interaction with
the other image of a certain shape and size, which is known as the structuring element. Geometric features of the images that
are similar in shape and size to the structuring element are preserved, while other features are suppressed. Therefore,
morphological operations can simplify the image data, preserving their shape characteristics and eliminate irrelevancies. In
view of applications, morphological operations can be employed for many purposes, including edge detection, segmentation,
and enhancement of images.
This chapter begins with binary morphology that is based on the set theory. Then, grayscale morphology can be
regarded as the extension of binary morphology to a three-dimensional space since a grayscale image can be considered as a
set of points in 3D space. The basic geometric characteristics of the primitive morphology operators are introduced in this
chapter. A systematic introduction of theoretical foundations of mathematical morphology, its main image operations, and
their applications can be found in and.
Mathematical morphology defined in a Euclidean setting is called Euclidean morphology and that defined in a digital setting
is called digital morphology. In general, their relationship is akin to that between continuous signal processing and digital
signal processing. The actual implementation of morphological operators will be in the digital setting, so in this thesis
focusing on digital image, we only consider the digital morphological setting.
Binary Dilation
Definition: Binary Dilation
With A and B as sets in Z2, the dilation of A by B (usually A is an image and B is the structuring element),
denoted by A⊕B, is defined as
It can be shown that dilation is equivalent to a union of translation of the original image with respect to the
structuring element:
Background Subraction in a Video System Using Morphology Technique
www.theijes.com The IJES Page 3
Dilation is found by placing the center of the template over each of the foreground pixels of the original
image and then taking the union of all the resulting copies of the structuring element, produced by using the
translation. From Figure 2.3, it is clear how dilation modifies the original image with respect to the shape of the
structuring element.
Dilation generally has an effect of expanding an image; so consequently, small holes inside foreground
can be filled.
In another sense, dilation can be a morphological operation on a binary image defined as:
This equation is based on obtaining the reflection of B about its origin and shifting this reflection by z. The
dilation of A by B is the set of all displacements, z, such that B and A overlap by at least one element. Based on
this interpretation, the equation above may be written as
Although dilation is based on set operations, whereas convolution is based on arithmetic operations, the basic
process -- “flipping” B about its origin and successively “displacing” it so that it slides over set (image) A -- is
analogous to the convolution process. Even though dilation of an image A by structuring element B can be
defined in several ways, all definitions have the same meaning and results in the same output. Figure 2.4
illustrates the dilation operation using a binary image. The original image is dilated with an 11x11 „disk‟ type
structuring element.
Binary Erosion
Definitions: Binary Erosion
Erosion of a binary image A by structuring element B, denoted by AΘB, is defined
Whereas dilation can be represented as a union of translates, erosion can be represented as an intersection of the
negative translates. So, the given definition of erosion above can be redefined as
The erosion of the original image by the structuring element can be described intuitively by template translation
as seen in the dilation process. Erosion shrinks the original image and eliminates small enough peaks (Note: the
terms „expand‟ for dilation and „shrink‟ for erosion refer to the effects on the foreground). Figure 2.6 clearly
illustrates these effects. The original image is eroded with 7x7 disk-shape structuring element.
Binary opening
Background Subraction in a Video System Using Morphology Technique
www.theijes.com The IJES Page 4
Definition: Binary Opening
The opening of a binary image A by the structuring element B, denoted by A�B, is defined as
From the definition, the original image A is first eroded and then dilated by the same structuring element B. In
terms of set theory, this opening process can also be defined as
The whole procedure of opening can be interpreted as “rolling the structuring element about the inside boundary
of the image”.
The effects of the opening process on the original image are smoothing, reducing noise from
quantization or the sensor and pruning extraneous structures. These effects result from the fact that the
structuring element cannot fit into the regions. Therefore, it can be said that the result of the opening process
heavily depends on the shape of structuring elements. Figure 2.8 presents an example of the opening process.
The effects of the opening mentioned before are clearly shown in the Figure 2.8. The vortices of the triangle
foreground have been cut out because the image is “opened” with „square‟ type structuring element, whereas
those of the square are preserved.
Binary closing
Definitions: Binary Closing
Closing of a binary image A by a structuring element B, denoted by A•B, is defined as
In the closing operation, dilation and erosion are applied successively in that order. Note that this order is
reversed for the opening process.
In another aspect, the closing process on a binary image can be defined as:
The closing operation can be described as in Figure 2.9 as “rolling the structuring element on the outer boundary
of the image.”
The closing process has the effect of filling small holes in the original image, smoothing as the opening
process does, and filling up the bay in the foreground. Sometimes, it is said that the closing has an effect of
clustering each spatial point to be
Background Subraction in a Video System Using Morphology Technique
www.theijes.com The IJES Page 5
III. EXPERIMENTAL SETUP
A. Xilinx Platform Studio
The Xilinx Platform Studio (XPS) is the development environment or GUI used for designing the
hardware portion of your embedded processor system. B. Embedded Development Kit Xilinx Embedded
Development Kit (EDK) is an integrated software tool suite for developing embedded systems with Xilinx
MicroBlaze and PowerPC CPUs. EDK includes a variety of tools and applications to assist the designer to
develop an embedded system right from the hardware creation to final implementation of the system on an
FPGA. System design consists of the creation of the hardware and software components of the embedded
processor system and the creation of a verification component is optional. A typical embedded system design
project involves: hardware platform creation, hardware platform verification (simulation), software platform
creation, software application creation, and software verification. Base System Builder is the wizard that is used
to automatically generate a hardware platform according to the user specifications that is defmed by the MHS
(Microprocessor Hardware Specification) file. The MHS file defines the system architecture, peripherals and
embedded processors]. The Platform Generation tool creates the hardware platform using the MHS file as input.
The software platform is defmed by MSS (Microprocessor Software Specification) file which defines driver and
library customization parameters for peripherals, processor customization parameters, standard 110 devices,
interrupt handler routines, and other software related routines. The MSS file is an input to the Library Generator
tool for customization of drivers, libraries and interrupts handlers.
Figure4: Embedded Development Kit Design Flow
The creation of the verification platform is optional and is based on the hardware platform. The MHS
file is taken as an input by the Simgen tool to create simulation files for a specific simulator. Three types of
simulation models can be generated by the Simgen tool: behavioral, structural and timing models. Some other
useful tools available in EDK are Platform Studio which provides the GUI for creating the MHS and MSS files.
Create / Import IP Wizard which allows the creation of the designer's own peripheral and import them into EDK
projects. Platform Generator customizes and generates the processor system in the form of hardware netlists.
Library Generator tool configures libraries, device drivers, file systems and interrupt handlers for embedded
processor system. Bitstream Initializer tool initializes the instruction memory of processors on the FPGA shown
in figure2. GNU Compiler tools are used for compiling and linking application executables for each processor in
the system [6]. There are two options available for debugging the application created using EDK namely: Xilinx
Microprocessor Debug (XMD) for debugging the application software using a Microprocessor Debug Module
(MDM) in the embedded processor system, and Software Debugger that invokes the software debugger
corresponding to the compiler being used for the processor. C. Software Development Kit Xilinx Platform
Studio Software Development Kit (SDK) is an integrated development environment, complimentary to XPS,
that is used for C/C++ embedded software application creation and verification. SDK is built on the Eclipse
opensource framework. Soft Development Kit (SDK) is a suite of tools that enables you to design a software
application for selected Soft IP Cores in the Xilinx Embedded Development Kit (EDK).The software application
can be written in a "C or C++" then the complete embedded processor system for user application will be
completed, else debug & download the bit file into FPGA. Then FPGA behaves like processor implemented on
it in a Xilinx Field Programmable Gate Array (FPGA) device.
Background Subraction in a Video System Using Morphology Technique
www.theijes.com The IJES Page 6
Tabulation Result
The Algorithm is implemented in Micro blaze Processor and the results are furnished in the tabulation below
CONCLUSION
The proposed method is inherently parallel, since computations for each pixel of each sequence frame
can be done concurrently with no need for communications. This can help in lowering execution times for high-
resolution sequences. Moreover, the approach is suitable to be adopted in a layered framework, where, operating
at region-level, it can improve detection results allowing to more efficiently tackle the camouflage problem and to
distinguish morphological Image by the morphological operator. This is a very desirable operative mode,
considering that a very actual visual segmentation with high accuracy is achieved.
REFERENCES
[1] K. Toyama, J. Krumm, B. Brumitt, and B. Meyers, “Wallflower: principles and practice of background maintenance,” in Proc. 7th
IEEE Conf. Computer Vision, 1999, vol. 1, pp. 255–261.
[2] G. Backer, B. Mertsching, and M. Bollmann, “Data- and model-driven gaze control for an active-vision system,” IEEE Trans.
Pattern Anal
[3] G.L.Foresti,”A Real Time System for Video Surveillance of Unattended Outdoor Environments”.
[4] J. M. Ferryman, Ed., in Proc. 9th IEEE Int. Workshop on Performance Evaluation of Tracking and Surveillance, 2006.
[5] R. T. Collins, A. J. Lipton, T. Kanade, H. Fujiyoshi, D. Duggins, Y. Tsin, D. Tolliver, N. Enomoto, O. Hasegawa, P. Burt, and L.
Wixson, “A system for video surveillance and monitoring,” Tech. Rep. CMU-RI-TR-00-12, The Robotics Inst., Carnegie Mellon
Univ., Pittsburgh, PA, 2000.
[6] J. L. Barron, D. J. Fleet, and S. S. Beauchemin, “Performance of optical flow techniques,” Int. J. Comput. Vis., vol. 12, no. 1, pp. 42–
77, 1994.
[7] L. Maddalena and A. Petrosino, “A self-organizing approach to detection of moving patterns for real-time applications,” in Proc. 2nd
Int. Symp. Brain, Vision, and Artificial Intelligence, 2007, pp. 181–190, Lecture Notes Comput. Sci. 4729.
[8] S.-C. Cheung and C. Kamath, “Robust techniques for background subtraction in urban traffic video,” in Proc. EI-VCIP, 2004, pp.
881–892.
[9] M. Piccardi, “Background subtraction techniques: areview,” in Proc.IEEE Int. Conf. Systems, Man, Cybernetics, 2004, pp. 3099–
3104.
[10] B. P. L. Lo and S. A. Velastin, “Automatic congestion detection system for underground platforms,” in Proc. ISIMP, 2001, pp. 158–
161.
[11] R. J. Radke, S. Andra, O. Al-Kofahi, and B. Roysam, “Image change detection algorithms: a systematic survey,” IEEE Trans.
Image Process., vol. 14, no. 3, pp. 294–307, Mar. 2005.
[12] C. Wren, A. Azarbayejani, T. Darrell, and A. Pentland, “Pfinder: Realtime tracking of the human body,” IEEE Trans. Pattern Anal.
Mach. Intell., vol. 19, no. 7, pp. 780–785, May 1997.
[13] A. Elgammal, D. Hanvood, and L. S. Davis, “Nonparametric model for background subtraction,” in Proc. ECCV, 2000, pp. 751–767
[14] K. Kim, T. H. Chalidabhongse, D. Harwood, and L. S. Davis, “Real-time foreground-background segmentation using codebook
Model,” Real-Time Imag., vol. 11, pp. 172–185, 2005.
[15] C. Stauffer and W. E. L. Grimson, “Adaptive background mixture models for real-time tracking,” in Proc. IEEE Conf. Computer
Vision and Pattern Recognition, 1999, pp. 246–252.
[16] R. Cucchiara, M. Piccardi, and A. Prati, “Detecting moving objects, ghosts, and shadows in video streams,” IEEE Trans. Pattern
Anal. Mach. Intell., vol. 25, no. 10, pp. 1–6, Oct. 2003.

Más contenido relacionado

La actualidad más candente

Content Based Image Retrieval using Color Boosted Salient Points and Shape fe...
Content Based Image Retrieval using Color Boosted Salient Points and Shape fe...Content Based Image Retrieval using Color Boosted Salient Points and Shape fe...
Content Based Image Retrieval using Color Boosted Salient Points and Shape fe...
CSCJournals
 
Ijiir journal of vib and control paper
Ijiir journal of vib and control paperIjiir journal of vib and control paper
Ijiir journal of vib and control paper
karhtikeyanvv
 

La actualidad más candente (16)

Image restoration based on morphological operations
Image restoration based on morphological operationsImage restoration based on morphological operations
Image restoration based on morphological operations
 
Image Segmentation Using Pairwise Correlation Clustering
Image Segmentation Using Pairwise Correlation ClusteringImage Segmentation Using Pairwise Correlation Clustering
Image Segmentation Using Pairwise Correlation Clustering
 
Property based fusion for multifocus images
Property based fusion for multifocus imagesProperty based fusion for multifocus images
Property based fusion for multifocus images
 
A Review on Image Segmentation using Clustering and Swarm Optimization Techni...
A Review on Image Segmentation using Clustering and Swarm Optimization Techni...A Review on Image Segmentation using Clustering and Swarm Optimization Techni...
A Review on Image Segmentation using Clustering and Swarm Optimization Techni...
 
Content Based Image Retrieval Approach Based on Top-Hat Transform And Modifie...
Content Based Image Retrieval Approach Based on Top-Hat Transform And Modifie...Content Based Image Retrieval Approach Based on Top-Hat Transform And Modifie...
Content Based Image Retrieval Approach Based on Top-Hat Transform And Modifie...
 
Content Based Image Retrieval using Color Boosted Salient Points and Shape fe...
Content Based Image Retrieval using Color Boosted Salient Points and Shape fe...Content Based Image Retrieval using Color Boosted Salient Points and Shape fe...
Content Based Image Retrieval using Color Boosted Salient Points and Shape fe...
 
IRJET- Multi Image Morphing: A Review
IRJET- Multi Image Morphing: A ReviewIRJET- Multi Image Morphing: A Review
IRJET- Multi Image Morphing: A Review
 
Ijiir journal of vib and control paper
Ijiir journal of vib and control paperIjiir journal of vib and control paper
Ijiir journal of vib and control paper
 
a survey of morphing techniques
a survey of morphing techniquesa survey of morphing techniques
a survey of morphing techniques
 
CONTRAST ENHANCEMENT TECHNIQUES USING HISTOGRAM EQUALIZATION METHODS ON COLOR...
CONTRAST ENHANCEMENT TECHNIQUES USING HISTOGRAM EQUALIZATION METHODS ON COLOR...CONTRAST ENHANCEMENT TECHNIQUES USING HISTOGRAM EQUALIZATION METHODS ON COLOR...
CONTRAST ENHANCEMENT TECHNIQUES USING HISTOGRAM EQUALIZATION METHODS ON COLOR...
 
Paper id 27201451
Paper id 27201451Paper id 27201451
Paper id 27201451
 
A Novel Feature Extraction Scheme for Medical X-Ray Images
A Novel Feature Extraction Scheme for Medical X-Ray ImagesA Novel Feature Extraction Scheme for Medical X-Ray Images
A Novel Feature Extraction Scheme for Medical X-Ray Images
 
OBJECT SEGMENTATION USING MULTISCALE MORPHOLOGICAL OPERATIONS
OBJECT SEGMENTATION USING MULTISCALE MORPHOLOGICAL OPERATIONSOBJECT SEGMENTATION USING MULTISCALE MORPHOLOGICAL OPERATIONS
OBJECT SEGMENTATION USING MULTISCALE MORPHOLOGICAL OPERATIONS
 
Medical image fusion based on NSCT and wavelet transform
Medical image fusion based on NSCT and wavelet transformMedical image fusion based on NSCT and wavelet transform
Medical image fusion based on NSCT and wavelet transform
 
Image Morphing: A Literature Study
Image Morphing: A Literature StudyImage Morphing: A Literature Study
Image Morphing: A Literature Study
 
Segmentation of medical images using metric topology – a region growing approach
Segmentation of medical images using metric topology – a region growing approachSegmentation of medical images using metric topology – a region growing approach
Segmentation of medical images using metric topology – a region growing approach
 

Destacado

Destacado (19)

E0363040045
E0363040045E0363040045
E0363040045
 
B036407011
B036407011B036407011
B036407011
 
B0363010015
B0363010015B0363010015
B0363010015
 
I0362058068
I0362058068I0362058068
I0362058068
 
L03502062069
L03502062069L03502062069
L03502062069
 
Performance Evaluation of Domestic Refrigerator Using Hc-12a Refrigerant as a...
Performance Evaluation of Domestic Refrigerator Using Hc-12a Refrigerant as a...Performance Evaluation of Domestic Refrigerator Using Hc-12a Refrigerant as a...
Performance Evaluation of Domestic Refrigerator Using Hc-12a Refrigerant as a...
 
A Comparative Study on the Properties of Al-7% Si-Rice Husk Ash and Al-7% Si-...
A Comparative Study on the Properties of Al-7% Si-Rice Husk Ash and Al-7% Si-...A Comparative Study on the Properties of Al-7% Si-Rice Husk Ash and Al-7% Si-...
A Comparative Study on the Properties of Al-7% Si-Rice Husk Ash and Al-7% Si-...
 
J0363075081
J0363075081J0363075081
J0363075081
 
D03601023026
D03601023026D03601023026
D03601023026
 
J0366068078
J0366068078J0366068078
J0366068078
 
Experimental Study On Rice Husk As Fine Aggregates In Concrete
Experimental Study On Rice Husk As Fine Aggregates In ConcreteExperimental Study On Rice Husk As Fine Aggregates In Concrete
Experimental Study On Rice Husk As Fine Aggregates In Concrete
 
K0364062067
K0364062067K0364062067
K0364062067
 
C0363016021
C0363016021C0363016021
C0363016021
 
A model for power losses reduction in low voltage distribution network of re...
	A model for power losses reduction in low voltage distribution network of re...	A model for power losses reduction in low voltage distribution network of re...
A model for power losses reduction in low voltage distribution network of re...
 
H0363059067
H0363059067H0363059067
H0363059067
 
G0363052058
G0363052058G0363052058
G0363052058
 
Geotechnical Investigation for Design and Construction of Civil Infrastructur...
Geotechnical Investigation for Design and Construction of Civil Infrastructur...Geotechnical Investigation for Design and Construction of Civil Infrastructur...
Geotechnical Investigation for Design and Construction of Civil Infrastructur...
 
Behavior pattern crosscheck in the revival of cultural environment identity ...
	Behavior pattern crosscheck in the revival of cultural environment identity ...	Behavior pattern crosscheck in the revival of cultural environment identity ...
Behavior pattern crosscheck in the revival of cultural environment identity ...
 
An Efficient Queuing Model for Resource Sharing in Cloud Computing
	An Efficient Queuing Model for Resource Sharing in Cloud Computing	An Efficient Queuing Model for Resource Sharing in Cloud Computing
An Efficient Queuing Model for Resource Sharing in Cloud Computing
 

Similar a A03501001006

Image Registration
Image RegistrationImage Registration
Image Registration
Angu Ramesh
 
An application of morphological
An application of morphologicalAn application of morphological
An application of morphological
Naresh Chilamakuri
 

Similar a A03501001006 (20)

V.KARTHIKEYAN PUBLISHED ARTICLE 1
V.KARTHIKEYAN PUBLISHED ARTICLE 1V.KARTHIKEYAN PUBLISHED ARTICLE 1
V.KARTHIKEYAN PUBLISHED ARTICLE 1
 
I010634450
I010634450I010634450
I010634450
 
Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
Performance of Efficient Closed-Form Solution to Comprehensive Frontier ExposurePerformance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
 
Automatic rectification of perspective distortion from a single image using p...
Automatic rectification of perspective distortion from a single image using p...Automatic rectification of perspective distortion from a single image using p...
Automatic rectification of perspective distortion from a single image using p...
 
Medical Image Segmentation Based on Level Set Method
Medical Image Segmentation Based on Level Set MethodMedical Image Segmentation Based on Level Set Method
Medical Image Segmentation Based on Level Set Method
 
F43053237
F43053237F43053237
F43053237
 
Probabilistic model based image segmentation
Probabilistic model based image segmentationProbabilistic model based image segmentation
Probabilistic model based image segmentation
 
An efficient image segmentation approach through enhanced watershed algorithm
An efficient image segmentation approach through enhanced watershed algorithmAn efficient image segmentation approach through enhanced watershed algorithm
An efficient image segmentation approach through enhanced watershed algorithm
 
A Combined Method with automatic parameter optimization for Multi-class Image...
A Combined Method with automatic parameter optimization for Multi-class Image...A Combined Method with automatic parameter optimization for Multi-class Image...
A Combined Method with automatic parameter optimization for Multi-class Image...
 
Image restoration model with wavelet based fusion
Image restoration model with wavelet based fusionImage restoration model with wavelet based fusion
Image restoration model with wavelet based fusion
 
Medial Axis Transformation based Skeletonzation of Image Patterns using Image...
Medial Axis Transformation based Skeletonzation of Image Patterns using Image...Medial Axis Transformation based Skeletonzation of Image Patterns using Image...
Medial Axis Transformation based Skeletonzation of Image Patterns using Image...
 
V.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLEV.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLE
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Image Registration
Image RegistrationImage Registration
Image Registration
 
MRI Image Segmentation Using Level Set Method and Implement an Medical Diagno...
MRI Image Segmentation Using Level Set Method and Implement an Medical Diagno...MRI Image Segmentation Using Level Set Method and Implement an Medical Diagno...
MRI Image Segmentation Using Level Set Method and Implement an Medical Diagno...
 
MRIIMAGE SEGMENTATION USING LEVEL SET METHOD AND IMPLEMENT AN MEDICAL DIAGNOS...
MRIIMAGE SEGMENTATION USING LEVEL SET METHOD AND IMPLEMENT AN MEDICAL DIAGNOS...MRIIMAGE SEGMENTATION USING LEVEL SET METHOD AND IMPLEMENT AN MEDICAL DIAGNOS...
MRIIMAGE SEGMENTATION USING LEVEL SET METHOD AND IMPLEMENT AN MEDICAL DIAGNOS...
 
Statistical Feature based Blind Classifier for JPEG Image Splice Detection
Statistical Feature based Blind Classifier for JPEG Image Splice DetectionStatistical Feature based Blind Classifier for JPEG Image Splice Detection
Statistical Feature based Blind Classifier for JPEG Image Splice Detection
 
Comparative Study and Analysis of Image Inpainting Techniques
Comparative Study and Analysis of Image Inpainting TechniquesComparative Study and Analysis of Image Inpainting Techniques
Comparative Study and Analysis of Image Inpainting Techniques
 
An application of morphological
An application of morphologicalAn application of morphological
An application of morphological
 
Vol2no2 17
Vol2no2 17Vol2no2 17
Vol2no2 17
 

Último

VIP Call Girls Vapi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Vapi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Vapi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Vapi 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 

Último (20)

VVIP Pune Call Girls Narayangaon WhatSapp Number 8005736733 With Elite Staff ...
VVIP Pune Call Girls Narayangaon WhatSapp Number 8005736733 With Elite Staff ...VVIP Pune Call Girls Narayangaon WhatSapp Number 8005736733 With Elite Staff ...
VVIP Pune Call Girls Narayangaon WhatSapp Number 8005736733 With Elite Staff ...
 
Get Premium Austin Town Call Girls (8005736733) 24x7 Rate 15999 with A/c Room...
Get Premium Austin Town Call Girls (8005736733) 24x7 Rate 15999 with A/c Room...Get Premium Austin Town Call Girls (8005736733) 24x7 Rate 15999 with A/c Room...
Get Premium Austin Town Call Girls (8005736733) 24x7 Rate 15999 with A/c Room...
 
Call Girls Uruli Kanchan Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Uruli Kanchan Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Uruli Kanchan Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Uruli Kanchan Call Me 7737669865 Budget Friendly No Advance Booking
 
Top Rated Pune Call Girls Yashwant Nagar ⟟ 6297143586 ⟟ Call Me For Genuine ...
Top Rated  Pune Call Girls Yashwant Nagar ⟟ 6297143586 ⟟ Call Me For Genuine ...Top Rated  Pune Call Girls Yashwant Nagar ⟟ 6297143586 ⟟ Call Me For Genuine ...
Top Rated Pune Call Girls Yashwant Nagar ⟟ 6297143586 ⟟ Call Me For Genuine ...
 
Viman Nagar $ Call Girl in Pune | Starting ₹,5K To @25k with A/C 8005736733 E...
Viman Nagar $ Call Girl in Pune | Starting ₹,5K To @25k with A/C 8005736733 E...Viman Nagar $ Call Girl in Pune | Starting ₹,5K To @25k with A/C 8005736733 E...
Viman Nagar $ Call Girl in Pune | Starting ₹,5K To @25k with A/C 8005736733 E...
 
VIP Model Call Girls Swargate ( Pune ) Call ON 8005736733 Starting From 5K to...
VIP Model Call Girls Swargate ( Pune ) Call ON 8005736733 Starting From 5K to...VIP Model Call Girls Swargate ( Pune ) Call ON 8005736733 Starting From 5K to...
VIP Model Call Girls Swargate ( Pune ) Call ON 8005736733 Starting From 5K to...
 
Get Premium Alandi Road Call Girls (8005736733) 24x7 Rate 15999 with A/c Room...
Get Premium Alandi Road Call Girls (8005736733) 24x7 Rate 15999 with A/c Room...Get Premium Alandi Road Call Girls (8005736733) 24x7 Rate 15999 with A/c Room...
Get Premium Alandi Road Call Girls (8005736733) 24x7 Rate 15999 with A/c Room...
 
Dighi ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For Se...
Dighi ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For Se...Dighi ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For Se...
Dighi ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For Se...
 
Hinjewadi ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready Fo...
Hinjewadi ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready Fo...Hinjewadi ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready Fo...
Hinjewadi ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready Fo...
 
Top Rated Pune Call Girls JM road ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated  Pune Call Girls JM road ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...Top Rated  Pune Call Girls JM road ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated Pune Call Girls JM road ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
 
best call girls in Pune | Whatsapp No 8005736733 VIP Escorts Service Availabl...
best call girls in Pune | Whatsapp No 8005736733 VIP Escorts Service Availabl...best call girls in Pune | Whatsapp No 8005736733 VIP Escorts Service Availabl...
best call girls in Pune | Whatsapp No 8005736733 VIP Escorts Service Availabl...
 
Top Rated Pune Call Girls Dehu road ⟟ 6297143586 ⟟ Call Me For Genuine Sex S...
Top Rated  Pune Call Girls Dehu road ⟟ 6297143586 ⟟ Call Me For Genuine Sex S...Top Rated  Pune Call Girls Dehu road ⟟ 6297143586 ⟟ Call Me For Genuine Sex S...
Top Rated Pune Call Girls Dehu road ⟟ 6297143586 ⟟ Call Me For Genuine Sex S...
 
Baner Pashan Link Road [ Escorts in Pune ₹7.5k Pick Up & Drop With Cash Payme...
Baner Pashan Link Road [ Escorts in Pune ₹7.5k Pick Up & Drop With Cash Payme...Baner Pashan Link Road [ Escorts in Pune ₹7.5k Pick Up & Drop With Cash Payme...
Baner Pashan Link Road [ Escorts in Pune ₹7.5k Pick Up & Drop With Cash Payme...
 
Call Girls Katraj Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Katraj Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Katraj Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Katraj Call Me 7737669865 Budget Friendly No Advance Booking
 
VIP Model Call Girls Shivane ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Shivane ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Shivane ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Shivane ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
VIP Call Girls Vapi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Vapi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Vapi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Vapi 7001035870 Whatsapp Number, 24/07 Booking
 
Hadapsar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For...
Hadapsar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For...Hadapsar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For...
Hadapsar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For...
 
contact "+971)558539980" to buy abortion pills in Dubai, Abu Dhabi
contact "+971)558539980" to buy abortion pills in Dubai, Abu Dhabicontact "+971)558539980" to buy abortion pills in Dubai, Abu Dhabi
contact "+971)558539980" to buy abortion pills in Dubai, Abu Dhabi
 
The Most Attractive Pune Call Girls Tingre Nagar 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Tingre Nagar 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Tingre Nagar 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Tingre Nagar 8250192130 Will You Miss Thi...
 
WhatsApp Chat: 📞 8617697112 Call Girl Reasi is experienced
WhatsApp Chat: 📞 8617697112 Call Girl Reasi is experiencedWhatsApp Chat: 📞 8617697112 Call Girl Reasi is experienced
WhatsApp Chat: 📞 8617697112 Call Girl Reasi is experienced
 

A03501001006

  • 1. The International Journal Of Engineering And Science (IJES) || Volume || 3 || Issue || 5 || Pages || 01-06 || 2014 || ISSN (e): 2319 – 1813 ISSN (p): 2319 – 1805 www.theijes.com The IJES Page 1 Background Subraction in a Video System Using Morphology Technique C.Venkata Subba Reddy. A.Karunakar, 1, S.S.I.T.S,Rayachoti. 2, Assistant Professor,S.S.I.T.S,Rayachoti. ------------------------------------------------------ABSTRACT---------------------------------------------------- The capability of extracting moving objects from a video sequence captured using a static camera is a typical first step in visual surveillance. The idea of background subtraction is to subtract or difference the current image from a reference background model. This paper proposes a new method to detect moving object based on background subtraction. First of all, we establish a reliable background updating model based on statistical and use a dynamic optimization threshold method to obtain a more complete moving object. Here we have written the core processor Microblaze is designed in VHDL (VHSIC hardware description language), implemented using XILINX ISE 8.1 Design suite the algorithm is written in system C Language and tested in SPARTAN-3 FPGA kit by interfacing a test circuit with the PC using the RS232 cable. The test results are seen to be satisfactory. The area taken and the speed of the algorithm are also evaluated. KEYWORDS- UART; VHDL; Softcore; Microblaze; Morphological Image Filtering, Segmentation. --------------------------------------------------------------------------------------------------------------------------------------- Date of Submission: 21 April 2014 Date of Publication: 10 May 2014 ------------------------------------------------------------------------------------------------------------------------------------------------------ I. INTRODUCTION Image segmentation is one of the most important categories of image processing. The purpose of image segmentation is to divide an original image into homogeneous regions. It can be applied as a pre-processing stage for other image processing methods. There exist several approaches for image segmentation methods for image processing. The after sheds transformation is studied in this thesis as a particular method of a region- based approach to the segmentation of an image. The complete transformation incorporates a pre-processing and post-processing stage that deals with embedded problems such as edge ambiguity and the output of a large number of regions. Multiscale Morphological Gradient (MMG) and Region Adjacency Graph (RAG) are two methods that are pre-processing and post-processing stages, respectively. RAG incorporates dissimilarity criteria to merge adjacent homogeneous regions. In this thesis, the proposed system has been applied to a set of co-aligned images, which include a pair of intensity and range images. It is expected that the hidden edges within the intensity image can be detected by observing range data or vice versa. Also it is expected that the contribution of the range image in region merging can compensate for the dominance of shadows within the intensity image regardless of the original intensity of the object. Image processing and analysis is an important area in the field of robotics. This is particularly true for the operation of autonomous vehicles. The operation of an autonomous vehicle is based on first acquiring data that describe its environment. Indeed, the motion planning and control of a fully autonomous vehicle requires an intelligent controller to be able to make decisions to allow the autonomous vehicle to maneuver in an unknown field based on these data. These data sets include range data, 2D images, and position measurements. This data is used to identify and avoid obstacles and to map the surrounding terrain. The elements of an image analysis system are shown in Figure 1. Image analysis usually starts with a pre-processing stage, which includes operations such as noise reduction. For the actual recognition stage, segmentation should be done before it to extract out only the part that has useful information. Image segmentation is a primary and critical component of image analysis. The quality of the final results of an image analysis could depend on the segmentation step. On the other hand, segmentation is one of the most difficult tasks in image processing, especially automatic image segmentation. The goal of the segmentation process is to define areas within the image that have some properties that make them homogeneous. The definition of those properties should satisfy the general condition that the union of neighboring regions should not be homogeneous if we consider the same set of properties. After segmentation, we can usually establish that the discontinuities in the image correspond to boundaries between regions.
  • 2. Background Subraction in a Video System Using Morphology Technique www.theijes.com The IJES Page 2 Elements of Image Analysis The methods most commonly used for image segmentation can be categorized into four classes. II. MATHEMATICAL MORPHOLOGY The term morphology refers to the study of shapes and structures from a general scientific perspective. Also, it can be interpreted as shape study using mathematical set theory. In image processing, morphology is the name of a specific methodology for analyzing the geometric structure inherent within an image. The morphological filter, which can be constructed on the basis of the underlying morphological operations, are more suitable for shape analysis than the standard linear filters since the latter sometimes distort the underlying geometric form of the image. Some of the salient points regarding the morphological approach are as follows: 1. Morphological operations provide for the systematic alteration of the geometric content of an image while maintaining the stability of the important geometric characteristics. 2. There exists a well-developed morphological algebra that can be employed for representation and optimization. 3. It is possible to express digital algorithms in terms of a very small class of primitive morphological operations. 4. There exist rigorous representations theorems by means of which one can obtain the expression of morphological filters in terms of the primitive morphological operations. In general, morphological operators transform the original image into another image through the interaction with the other image of a certain shape and size, which is known as the structuring element. Geometric features of the images that are similar in shape and size to the structuring element are preserved, while other features are suppressed. Therefore, morphological operations can simplify the image data, preserving their shape characteristics and eliminate irrelevancies. In view of applications, morphological operations can be employed for many purposes, including edge detection, segmentation, and enhancement of images. This chapter begins with binary morphology that is based on the set theory. Then, grayscale morphology can be regarded as the extension of binary morphology to a three-dimensional space since a grayscale image can be considered as a set of points in 3D space. The basic geometric characteristics of the primitive morphology operators are introduced in this chapter. A systematic introduction of theoretical foundations of mathematical morphology, its main image operations, and their applications can be found in and. Mathematical morphology defined in a Euclidean setting is called Euclidean morphology and that defined in a digital setting is called digital morphology. In general, their relationship is akin to that between continuous signal processing and digital signal processing. The actual implementation of morphological operators will be in the digital setting, so in this thesis focusing on digital image, we only consider the digital morphological setting. Binary Dilation Definition: Binary Dilation With A and B as sets in Z2, the dilation of A by B (usually A is an image and B is the structuring element), denoted by A⊕B, is defined as It can be shown that dilation is equivalent to a union of translation of the original image with respect to the structuring element:
  • 3. Background Subraction in a Video System Using Morphology Technique www.theijes.com The IJES Page 3 Dilation is found by placing the center of the template over each of the foreground pixels of the original image and then taking the union of all the resulting copies of the structuring element, produced by using the translation. From Figure 2.3, it is clear how dilation modifies the original image with respect to the shape of the structuring element. Dilation generally has an effect of expanding an image; so consequently, small holes inside foreground can be filled. In another sense, dilation can be a morphological operation on a binary image defined as: This equation is based on obtaining the reflection of B about its origin and shifting this reflection by z. The dilation of A by B is the set of all displacements, z, such that B and A overlap by at least one element. Based on this interpretation, the equation above may be written as Although dilation is based on set operations, whereas convolution is based on arithmetic operations, the basic process -- “flipping” B about its origin and successively “displacing” it so that it slides over set (image) A -- is analogous to the convolution process. Even though dilation of an image A by structuring element B can be defined in several ways, all definitions have the same meaning and results in the same output. Figure 2.4 illustrates the dilation operation using a binary image. The original image is dilated with an 11x11 „disk‟ type structuring element. Binary Erosion Definitions: Binary Erosion Erosion of a binary image A by structuring element B, denoted by AΘB, is defined Whereas dilation can be represented as a union of translates, erosion can be represented as an intersection of the negative translates. So, the given definition of erosion above can be redefined as The erosion of the original image by the structuring element can be described intuitively by template translation as seen in the dilation process. Erosion shrinks the original image and eliminates small enough peaks (Note: the terms „expand‟ for dilation and „shrink‟ for erosion refer to the effects on the foreground). Figure 2.6 clearly illustrates these effects. The original image is eroded with 7x7 disk-shape structuring element. Binary opening
  • 4. Background Subraction in a Video System Using Morphology Technique www.theijes.com The IJES Page 4 Definition: Binary Opening The opening of a binary image A by the structuring element B, denoted by A�B, is defined as From the definition, the original image A is first eroded and then dilated by the same structuring element B. In terms of set theory, this opening process can also be defined as The whole procedure of opening can be interpreted as “rolling the structuring element about the inside boundary of the image”. The effects of the opening process on the original image are smoothing, reducing noise from quantization or the sensor and pruning extraneous structures. These effects result from the fact that the structuring element cannot fit into the regions. Therefore, it can be said that the result of the opening process heavily depends on the shape of structuring elements. Figure 2.8 presents an example of the opening process. The effects of the opening mentioned before are clearly shown in the Figure 2.8. The vortices of the triangle foreground have been cut out because the image is “opened” with „square‟ type structuring element, whereas those of the square are preserved. Binary closing Definitions: Binary Closing Closing of a binary image A by a structuring element B, denoted by A•B, is defined as In the closing operation, dilation and erosion are applied successively in that order. Note that this order is reversed for the opening process. In another aspect, the closing process on a binary image can be defined as: The closing operation can be described as in Figure 2.9 as “rolling the structuring element on the outer boundary of the image.” The closing process has the effect of filling small holes in the original image, smoothing as the opening process does, and filling up the bay in the foreground. Sometimes, it is said that the closing has an effect of clustering each spatial point to be
  • 5. Background Subraction in a Video System Using Morphology Technique www.theijes.com The IJES Page 5 III. EXPERIMENTAL SETUP A. Xilinx Platform Studio The Xilinx Platform Studio (XPS) is the development environment or GUI used for designing the hardware portion of your embedded processor system. B. Embedded Development Kit Xilinx Embedded Development Kit (EDK) is an integrated software tool suite for developing embedded systems with Xilinx MicroBlaze and PowerPC CPUs. EDK includes a variety of tools and applications to assist the designer to develop an embedded system right from the hardware creation to final implementation of the system on an FPGA. System design consists of the creation of the hardware and software components of the embedded processor system and the creation of a verification component is optional. A typical embedded system design project involves: hardware platform creation, hardware platform verification (simulation), software platform creation, software application creation, and software verification. Base System Builder is the wizard that is used to automatically generate a hardware platform according to the user specifications that is defmed by the MHS (Microprocessor Hardware Specification) file. The MHS file defines the system architecture, peripherals and embedded processors]. The Platform Generation tool creates the hardware platform using the MHS file as input. The software platform is defmed by MSS (Microprocessor Software Specification) file which defines driver and library customization parameters for peripherals, processor customization parameters, standard 110 devices, interrupt handler routines, and other software related routines. The MSS file is an input to the Library Generator tool for customization of drivers, libraries and interrupts handlers. Figure4: Embedded Development Kit Design Flow The creation of the verification platform is optional and is based on the hardware platform. The MHS file is taken as an input by the Simgen tool to create simulation files for a specific simulator. Three types of simulation models can be generated by the Simgen tool: behavioral, structural and timing models. Some other useful tools available in EDK are Platform Studio which provides the GUI for creating the MHS and MSS files. Create / Import IP Wizard which allows the creation of the designer's own peripheral and import them into EDK projects. Platform Generator customizes and generates the processor system in the form of hardware netlists. Library Generator tool configures libraries, device drivers, file systems and interrupt handlers for embedded processor system. Bitstream Initializer tool initializes the instruction memory of processors on the FPGA shown in figure2. GNU Compiler tools are used for compiling and linking application executables for each processor in the system [6]. There are two options available for debugging the application created using EDK namely: Xilinx Microprocessor Debug (XMD) for debugging the application software using a Microprocessor Debug Module (MDM) in the embedded processor system, and Software Debugger that invokes the software debugger corresponding to the compiler being used for the processor. C. Software Development Kit Xilinx Platform Studio Software Development Kit (SDK) is an integrated development environment, complimentary to XPS, that is used for C/C++ embedded software application creation and verification. SDK is built on the Eclipse opensource framework. Soft Development Kit (SDK) is a suite of tools that enables you to design a software application for selected Soft IP Cores in the Xilinx Embedded Development Kit (EDK).The software application can be written in a "C or C++" then the complete embedded processor system for user application will be completed, else debug & download the bit file into FPGA. Then FPGA behaves like processor implemented on it in a Xilinx Field Programmable Gate Array (FPGA) device.
  • 6. Background Subraction in a Video System Using Morphology Technique www.theijes.com The IJES Page 6 Tabulation Result The Algorithm is implemented in Micro blaze Processor and the results are furnished in the tabulation below CONCLUSION The proposed method is inherently parallel, since computations for each pixel of each sequence frame can be done concurrently with no need for communications. This can help in lowering execution times for high- resolution sequences. Moreover, the approach is suitable to be adopted in a layered framework, where, operating at region-level, it can improve detection results allowing to more efficiently tackle the camouflage problem and to distinguish morphological Image by the morphological operator. This is a very desirable operative mode, considering that a very actual visual segmentation with high accuracy is achieved. REFERENCES [1] K. Toyama, J. Krumm, B. Brumitt, and B. Meyers, “Wallflower: principles and practice of background maintenance,” in Proc. 7th IEEE Conf. Computer Vision, 1999, vol. 1, pp. 255–261. [2] G. Backer, B. Mertsching, and M. Bollmann, “Data- and model-driven gaze control for an active-vision system,” IEEE Trans. Pattern Anal [3] G.L.Foresti,”A Real Time System for Video Surveillance of Unattended Outdoor Environments”. [4] J. M. Ferryman, Ed., in Proc. 9th IEEE Int. Workshop on Performance Evaluation of Tracking and Surveillance, 2006. [5] R. T. Collins, A. J. Lipton, T. Kanade, H. Fujiyoshi, D. Duggins, Y. Tsin, D. Tolliver, N. Enomoto, O. Hasegawa, P. Burt, and L. Wixson, “A system for video surveillance and monitoring,” Tech. Rep. CMU-RI-TR-00-12, The Robotics Inst., Carnegie Mellon Univ., Pittsburgh, PA, 2000. [6] J. L. Barron, D. J. Fleet, and S. S. Beauchemin, “Performance of optical flow techniques,” Int. J. Comput. Vis., vol. 12, no. 1, pp. 42– 77, 1994. [7] L. Maddalena and A. Petrosino, “A self-organizing approach to detection of moving patterns for real-time applications,” in Proc. 2nd Int. Symp. Brain, Vision, and Artificial Intelligence, 2007, pp. 181–190, Lecture Notes Comput. Sci. 4729. [8] S.-C. Cheung and C. Kamath, “Robust techniques for background subtraction in urban traffic video,” in Proc. EI-VCIP, 2004, pp. 881–892. [9] M. Piccardi, “Background subtraction techniques: areview,” in Proc.IEEE Int. Conf. Systems, Man, Cybernetics, 2004, pp. 3099– 3104. [10] B. P. L. Lo and S. A. Velastin, “Automatic congestion detection system for underground platforms,” in Proc. ISIMP, 2001, pp. 158– 161. [11] R. J. Radke, S. Andra, O. Al-Kofahi, and B. Roysam, “Image change detection algorithms: a systematic survey,” IEEE Trans. Image Process., vol. 14, no. 3, pp. 294–307, Mar. 2005. [12] C. Wren, A. Azarbayejani, T. Darrell, and A. Pentland, “Pfinder: Realtime tracking of the human body,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 19, no. 7, pp. 780–785, May 1997. [13] A. Elgammal, D. Hanvood, and L. S. Davis, “Nonparametric model for background subtraction,” in Proc. ECCV, 2000, pp. 751–767 [14] K. Kim, T. H. Chalidabhongse, D. Harwood, and L. S. Davis, “Real-time foreground-background segmentation using codebook Model,” Real-Time Imag., vol. 11, pp. 172–185, 2005. [15] C. Stauffer and W. E. L. Grimson, “Adaptive background mixture models for real-time tracking,” in Proc. IEEE Conf. Computer Vision and Pattern Recognition, 1999, pp. 246–252. [16] R. Cucchiara, M. Piccardi, and A. Prati, “Detecting moving objects, ghosts, and shadows in video streams,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 25, no. 10, pp. 1–6, Oct. 2003.