Saketh et al., 2023 - Google Patents
Intelligent surveillance support systemSaketh et al., 2023
View HTML- Document ID
- 13768639693698470243
- Author
- Saketh M
- Nandal N
- Tanwar R
- Reddy B
- Publication year
- Publication venue
- Discover Internet of Things
External Links
Snippet
Abstract The Intelligent Surveillance Support System (ISSS) is an innovative software solution that enables real-time monitoring and analysis of security footage to detect and identify potential threats. This system incorporates advanced features such as face …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
- G06K9/00288—Classification, e.g. identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00624—Recognising scenes, i.e. recognition of a whole field of perception; recognising scene-specific objects
- G06K9/00771—Recognising scenes under surveillance, e.g. with Markovian modelling of scene activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/20—Image acquisition
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T7/00—Image analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Tsakanikas et al. | Video surveillance systems-current status and future trends | |
Goyal et al. | Face detection and tracking: Using OpenCV | |
Gomes et al. | A vision-based approach to fire detection | |
Erdélyi et al. | Privacy protection vs. utility in visual data: An objective evaluation framework | |
Singh et al. | A novel face liveness detection algorithm with multiple liveness indicators | |
Sah et al. | Video redaction: a survey and comparison of enabling technologies | |
Nakashima et al. | Intended human object detection for automatically protecting privacy in mobile video surveillance | |
Maheswaran et al. | A Perspective way of designing Intelligent systems with Face Detection and Recognition using Artificial Intelligence for Authentication | |
Saketh et al. | Intelligent surveillance support system | |
Imran et al. | FaceEngine: A Tracking-Based Framework for Real-Time Face Recognition in Video Surveillance System | |
Ratthi et al. | Human height estimation using AI-assisted computer vision for intelligent video surveillance system | |
Frejlichowski et al. | Application of foreground object patterns analysis for event detection in an innovative video surveillance system | |
Saketh et al. | Discover Internet of Things | |
Chaitanya et al. | Study on real-time face recognition and tracking for criminal revealing | |
Chan et al. | Extracting foreground ensemble features to detect abnormal crowd behavior in intelligent video-surveillance systems | |
Chandramouli et al. | An Advanced Framework for Critical Infrastructure Protection Using Computer Vision Technologies | |
Mendez et al. | Facial recognition system for security access control | |
Krishnaveni et al. | Design of a Real-Time Crime Monitoring System using Machine Learning | |
Singh et al. | Development of accurate face recognition process flow for authentication | |
Becker et al. | The effects of camera jitter for background subtraction algorithms on fused infrared-visible video streams | |
Uke et al. | Comprehensive Real-Time Intrusion Detection System Using IoT, Computer Vision (OpenCV), and Machine Learning (YOLO) Algorithms | |
Mohamed Yaseen et al. | Intrusion Detection from Surveillance Video Using Frame Based Image Processing Techniques | |
Kalanandhini et al. | Application-Specific Image and Video Processing Techniques for Security and Surveillance | |
Akash et al. | Motion Detection and Alert System | |
Shaju et al. | Lightweight, privacy-compliant motion detection system for constrained devices |