Behavior Analysis Midterm Report Lipov Irina Ravid Dan Kotek Tommer.

Slides:



Advertisements
Similar presentations
ARTIFICIAL PASSENGER.
Advertisements

Xiaoyong Ye Franz Alexander Van Horenbeke David Abbott
1 RTL Example: Video Compression – Sum of Absolute Differences Video is a series of frames (e.g., 30 per second) Most frames similar to previous frame.
Video Game Design Lesson 1. Game Designer Person involved in the development of a video game Person involved in the development of a video game Usually.
Computational Biology, Part 23 Biological Imaging II Robert F. Murphy Copyright  1996, 1999, All rights reserved.
Multiple Frame Motion Inference Using Belief Propagation Jiang Gao Jianbo Shi Presented By: Gilad Kapelushnik Visual Recognition, Spring 2005, Technion.
Simple Face Detection system Ali Arab Sharif university of tech. Fall 2012.
1 Video Processing Lecture on the image part (8+9) Automatic Perception Volker Krüger Aalborg Media Lab Aalborg University Copenhagen
Computer graphics & visualization HDRI. computer graphics & visualization Image Synthesis – WS 07/08 Dr. Jens Krüger – Computer Graphics and Visualization.
COLORCOLOR A SET OF CODES GENERATED BY THE BRAİN How do you quantify? How do you use?
ICIP 2000, Vancouver, Canada IVML, ECE, NTUA Face Detection: Is it only for Face Recognition?  A few years earlier  Face Detection Face Recognition 
Efficient Moving Object Segmentation Algorithm Using Background Registration Technique Shao-Yi Chien, Shyh-Yih Ma, and Liang-Gee Chen, Fellow, IEEE Hsin-Hua.
Ensemble Tracking Shai Avidan IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE February 2007.
Gaze Awareness for Videoconferencing: A Software Approach Nicolas Werro.
Cindy Song Sharena Paripatyadar. Use vision for HCI Determine steps necessary to incorporate vision in HCI applications Examine concerns & implications.
Computer Vision Basics Image Terminology Binary Operations Filtering Edge Operators.
Smart Traveller with Visual Translator. What is Smart Traveller? Mobile Device which is convenience for a traveller to carry Mobile Device which is convenience.
Binary Image Analysis. YOU HAVE TO READ THE BOOK! reminder.
Visual Screen: Transforming an Ordinary Screen into a Touch Screen Zhengyou Zhang & Ying Shan Vision Technology Group Microsoft Research
Real-Time Face Detection and Tracking Using Multiple Cameras RIT Computer Engineering Senior Design Project John RuppertJustin HnatowJared Holsopple This.
Milestone #1 – Project Design Chris Thomas CS 2310 – Software Engineering.
ICBV Course Final Project Arik Krol Aviad Pinkovezky.
Augmented Reality and 3D modelling Done by Stafford Joemat Supervised by Mr James Connan and Mr Mehrdad Ghaziasgar.
CS 376b Introduction to Computer Vision 04 / 02 / 2008 Instructor: Michael Eckmann.
Information Extraction from Cricket Videos Syed Ahsan Ishtiaque Kumar Srijan.
Machine Vision for Robots
M ULTIFRAME P OINT C ORRESPONDENCE By Naseem Mahajna & Muhammad Zoabi.
Presented by : Maya Oren & Chen Feigin Supervisor : Moshe Porian Lab: High Speed Digital System One Semester project – Spring
SUPERVISOR: MR. J. CONNAN.  The main purpose of system is to track an object across multiple frames using fixed input source.
Developing the Game User Interface (UI) Lesson 5.
Department of Computer Science & Engineering Background Subtraction Algorithm for the Intelligent Scarecrow System Francisco Blanquicet, Mentor: Dr. Dmitry.
WEBCAS (WEBCAM BASED CLASSROOM ATTENDANCE SYSTEM)
September 5, 2013Computer Vision Lecture 2: Digital Images 1 Computer Vision A simple two-stage model of computer vision: Image processing Scene analysis.
HARDWARE INPUT DEVICES GETTING DATA INTO THE COMPUTER.
Monitoring Human Behavior in an Office Environment Douglas Ayers and Mubarak Shah * Research Conducted at the University of Central Florida *Now at Harris.
Graphics: Conceptual Model Real Object Human Eye Display Device Graphics System Synthetic Model Synthetic Camera Real Light Synthetic Light Source.
Expectation-Maximization (EM) Case Studies
Figure ground segregation in video via averaging and color distribution Introduction to Computational and Biological Vision 2013 Dror Zenati.
Computational Biology, Part 22 Biological Imaging II Robert F. Murphy Copyright  1996, 1999, All rights reserved.
Student: Ibraheem Frieslaar Supervisor: Mehrdad Ghaziasgar.
Image-Pro Premier Basic Training Course Part 5 - Automated Counting.
By: David Gelbendorf, Hila Ben-Moshe Supervisor : Alon Zvirin
Final Year Project Vision based biometric authentication system By Padraic ó hIarnain.
Motion Detection and Processing Performance Analysis Thomas Eggers, Mark Rosenberg Department of Electrical and Systems Engineering Abstract Histograms.
Application of Facial Recognition in Biometric Security Kyle Ferris.
Image Segmentation Image segmentation (segmentace obrazu)
CS 376b Introduction to Computer Vision 03 / 31 / 2008 Instructor: Michael Eckmann.
EE368: Digital Image Processing Bernd Girod Leahy, p.1/15 Face Detection on Similar Color Images Scott Leahy EE368, Stanford University May 30, 2003.
Computer Vision Computer Vision based Hole Filling Chad Hantak COMP December 9, 2003.
RoboCup KSL Design and implementation of vision and image processing core Academic Supervisor: Dr. Kolberg Eli Mentors: Dr. Abramov Benjamin & Mr.
1 Berger Jean-Baptiste
Augmented Reality and 3D modelling Done by Stafford Joemat Supervised by Mr James Connan and Mehrdad Ghaziasgar.
0 Assignment 1 (Due: 10/2) Input/Output an image: (i) Design a program to input and output a color image. (ii) Transform the output color image C(R,G,B)
 Many people like the flexibility of digital images. For example:  They can be shared by attaching to /uploading to Internet  Sent via mobiles.
Over the recent years, computer vision has started to play a significant role in the Human Computer Interaction (HCI). With efficient object tracking.
SPACE MOUSE. INTRODUCTION  It is a human computer interaction technology  Helps in movement of manipulator in 6 degree of freedom * 3 translation degree.
Content Based Coding of Face Images
Computer Vision. Overview of the field  Image / Video => Data  Compare to graphics (the reverse)  Sample applications  Video Camera feed => ID room.
Histograms CSE 6363 – Machine Learning Vassilis Athitsos
Shane Bric and Kevin Paprocki
CS201 Lecture 02 Computer Vision: Image Formation and Basic Techniques
Scott Tan Boonping Lau Chun Hui Weng
Application of Facial Recognition in Biometric Security
David Harwin Adviser: Petros Faloutsos
CS654: Digital Image Analysis
A Novel Smoke Detection Method Using Support Vector Machine
The Image The pixels in the image The mask The resulting image 255 X
Application of Facial Recognition in Biometric Security
 Is a machine that is able to take information (input), do some work on (process), and to make new information (output) COMPUTER.
Sign Language Recognition With Unsupervised Feature Learning
Presentation transcript:

Behavior Analysis Midterm Report Lipov Irina Ravid Dan Kotek Tommer

Main Goal Analyzing the people’s behavior in an office environment using streams from 3 video cameras and objects identified by a tracker as input. Analyzing the people’s behavior in an office environment using streams from 3 video cameras and objects identified by a tracker as input.

Main Goal (cont.) Initialization: Mapping the background objects (such as a computer, a phone, etc.) Initialization: Mapping the background objects (such as a computer, a phone, etc.) For each object, decide whether it is a person For each object, decide whether it is a person For each person, decide whether they are using a background object For each person, decide whether they are using a background object

Current State Manual Mapping Manual Mapping  For one camera Skin Detection Skin Detection Face Detection Face Detection Naïve Behavior Analysis Naïve Behavior Analysis  For one frame

Manual Mapping The function objects performs the manual mapping. The function objects performs the manual mapping.  Displays the input background image.  For each object, the user selects a polygon using the mouse and names it.  The polygon represents the object and/or it’s relevant surroundings.  Outputs A list of masks, one for each object, a list of object names, and the number of objects

Manual Mapping (cont.) michael001.jpg Objects

Skin Detection Builds a histogram of the colors in a file containing skin samples. Builds a histogram of the colors in a file containing skin samples. Skin samples Skin color histogram

Skin Detection (cont.) Remove background by subtraction. Remove background by subtraction. RemoveBG

Skin Detection (cont.) For each pixel in the subtracted image, the probability of it being skin is computed according to the histogram and a grayscale probability image is generated. For each pixel in the subtracted image, the probability of it being skin is computed according to the histogram and a grayscale probability image is generated.

Skin Detection (cont.) The image is thresholded to create a skin mask. The image is thresholded to create a skin mask.

Face Detection Assumption: A connected component in the skin mask image representing a face must contain at least one hole (eyes, nostrils, eyebrows, mouth, etc. will not have skin color.) Assumption: A connected component in the skin mask image representing a face must contain at least one hole (eyes, nostrils, eyebrows, mouth, etc. will not have skin color.) Small holes are removed by blurring the image. Small holes are removed by blurring the image. All connected components containing a hole are stored in a list of masks. All connected components containing a hole are stored in a list of masks. Each such mask represents a single face. Each such mask represents a single face.

Face Detection (cont.)

Naïve Behavior Analysis For each person (from the person list) and each background object (from the object list), checks whether their mask intersect. If so, the person is using the object. For each person (from the person list) and each background object (from the object list), checks whether their mask intersect. If so, the person is using the object.

What’s next Improvements Improvements  Mapping – generalize to 3 cameras (generate 3 lists of corresponding masks)  Skin detection – improve run times  Face detection – Find a more accurate criteria What’s really next What’s really next  Decide whether a tracker object is a person based on the images from all cameras by relating each face to the relevant object  Analyze the person’s actions  Choose the analysis perspective, i.e. whether to run state machines describing each person’s behavior or describing each object’s use  Write and implement the state machines as chosen