I A I Infrared Security System and Method US Patent 7,738,008 June 15 2010 How Does It Work? June 2010 I A I = Infrared Applications Inc.

Slides:



Advertisements
Similar presentations
2.3.3 MAD SAMBA (Multicamera and distributed Surveillance and multisensor-based surveillance) Contact: Alessandro ZANASI zanasi-alessandro.eu.
Advertisements

How Pixims Digital Pixel System® Technology Helps Mitigate Airport Security Threats July 2008.
ETISEO Project Corpus data - Video sequences contents - Silogic provider.
RGB-D object recognition and localization with clutter and occlusions Federico Tombari, Samuele Salti, Luigi Di Stefano Computer Vision Lab – University.
Change Detection C. Stauffer and W.E.L. Grimson, “Learning patterns of activity using real time tracking,” IEEE Trans. On PAMI, 22(8): , Aug 2000.
Face Recognition. Introduction Why we are interested in face recognition? Why we are interested in face recognition? Passport control at terminals in.
Your Customer Deserves the Best Copy Number ______.
ISec Next Generation Physical Security System. Physical Security Systems Achilles Heel: False Alarms – Disruptions & incurred costs are prohibitive Present.
NSRL MCR-Free Access for NSRL A.Rusek P.Ingrassia J.Reich.
MOTOROLA and the Stylized M Logo are registered in the US Patent and Trademark Office. All other product or service names are the property of their respective.
By : Adham Suwan Mohammed Zaza Ahmed Mafarjeh. Achieving Security through Kinect using Skeleton Analysis (ASKSA)
Vision Based Control Motion Matt Baker Kevin VanDyke.
The Free Safety Problem Using Gaze Estimation as a Meaningful Input to a Homing Task Albert Goldfain CSE 668: Animate Vision Principles Final Project Presentation.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
A Bayesian algorithm for tracking multiple moving objects in outdoor surveillance video Department of Electrical Engineering and Computer Science The University.
UPM, Faculty of Computer Science & IT, A robust automated attendance system using face recognition techniques PhD proposal; May 2009 Gawed Nagi.
Object Detection and Tracking Mike Knowles 11 th January 2005
A Smart Sensor to Detect the Falls of the Elderly.
Video- and Audio-based Biometric Person Authentication Motivation: Applications. Modalities and their characteristics. Characterization of a biometric.
A Novel 2D To 3D Image Technique Based On Object- Oriented Conversion.
December 2, 2014Computer Vision Lecture 21: Image Understanding 1 Today’s topic is.. Image Understanding.
AKSHAY UTTAMANI( ) DIVYAM JAISWAL( ) SAURABH KHANDELWAL( )
1 Video Surveillance systems for Traffic Monitoring Simeon Indupalli.
- TECHLEAD SOFTWARE ENGINEERING PVT. LTD. Video Analytics.
Presenter: Stefan Zickler
Facial Recognition CSE 391 Kris Lord.
Next Generation Physical Security System Infrared Applications Inc. USA Subsidiary HarmAlarm Trading Co. Ltd. Hong Kong Private Co.
A Brief Overview of Computer Vision Jinxiang Chai.
THE CLEANTECH INVESTOR FORUM 2011 Infrared Applications Inc. Session 1 The Four Seasons Hotel Palo Alto, California March 7 & 8, 2011.
SuperSleuth Wise. Marketing and Sales Presentation/Training.  Complete video surveillance system in the palm of your hand.  Proven video motion Detection.
Radar Video Surveillance
Venture Plan HarmAlarm Gary E. Ball. 21 Century: The Security Age Personnel (Automatic) Physical (Manual) Cyberspace (Automatic)
Intelligent Vision Systems ENT 496 Object Shape Identification and Representation Hema C.R. Lecture 7.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Forward-Scan Sonar Tomographic Reconstruction PHD Filter Multiple Target Tracking Bayesian Multiple Target Tracking in Forward Scan Sonar.
Features-based Object Recognition P. Moreels, P. Perona California Institute of Technology.
The A.M.Prokhorov General Physics Institute (GPI) of the Russian Academy of Sciences was founded in 1983 by Nobel Prize winner Academician A.M.Prokhorov.
Vision-based human motion analysis: An overview Computer Vision and Image Understanding(2007)
Tracking CSE 6367 – Computer Vision Vassilis Athitsos University of Texas at Arlington.
PSEUDO-RELEVANCE FEEDBACK FOR MULTIMEDIA RETRIEVAL Seo Seok Jun.
Name ___________________________________________Date ____________ What did they do wrong? Directions: Read the following crime scene scenarios. On the.
Vehicle Segmentation and Tracking From a Low-Angle Off-Axis Camera Neeraj K. Kanhere Committee members Dr. Stanley Birchfield Dr. Robert Schalkoff Dr.
Doc.: IEEE /0834r0 Submission July 2015 Thomas Handte, SonySlide 1 Further Use Cases for Next Generation Positioning Date: 2015/07/13 Authors:
Crowd Analysis at Mass Transit Sites Prahlad Kilambi, Osama Masound, and Nikolaos Papanikolopoulos University of Minnesota Proceedings of IEEE ITSC 2006.
Expectation-Maximization (EM) Case Studies
1 Iris Recognition Ying Sun AICIP Group Meeting November 3, 2006.
ECE 4007 L01 DK6 1 FAST: Fully Autonomous Sentry Turret Patrick Croom, Kevin Neas, Anthony Ogidi, Joleon Pettway ECE 4007 Dr. David Keezer.
BVisionBVision Dedicated for the Morris water maze test study of effect of different compounds on spatial orientation and memory of experimental animals.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Computer Vision UNR George Bebis Computer Vision Laboratory (CVL) Department of Computer Science and Engineering University of Nevada, Reno,
Using Adaptive Tracking To Classify And Monitor Activities In A Site W.E.L. Grimson, C. Stauffer, R. Romano, L. Lee.
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
CSSE463: Image Recognition Day 29 This week This week Today: Surveillance and finding motion vectors Today: Surveillance and finding motion vectors Tomorrow:
Copyright 2007 by Rombix. R CyClops is a computer vision solution which could integrate most of the Real World Computer Vision Application. Available.
Video Analytics Integration and Analytics. Introduction The functions of video analytics. The architecture of video analytics. The applications of video.
Portable Camera-Based Assistive Text and Product Label Reading From Hand-Held Objects for Blind Persons.
Presentation of equipment.
Excuber ' Product introduction.
Process Control Charts
SmartCatch Systems Putting Intelligence into Surveillance
System Management Issues for the Future Real-Time University Environment Tom Board September 22, 2004 Northwestern University Information Technology.
A Forest of Sensors: Using adaptive tracking to classify and monitor activities in a site Eric Grimson AI Lab, Massachusetts Institute of Technology
Motion Detection And Analysis
A Forest of Sensors: Tracking
Vehicle Segmentation and Tracking in the Presence of Occlusions
Eric Grimson, Chris Stauffer,
CSSE463: Image Recognition Day 29
Quality Control Lecture 3
Information Systems Development MIS331
Multi-UAV to UAV Tracking
Presentation transcript:

I A I Infrared Security System and Method US Patent 7,738,008 June How Does It Work? June 2010 I A I = Infrared Applications Inc.

Test Set-up: Visual Orientation Two cameras with a common surveillance field of view. Camera B can be seen in Camera A’s FOV. Camera A is positioned in Camera B’s FOV Angles between cameras & targets are as shown The Cameras are 105 feet apart.

Camera A Target Camera B Location Camera A Angle

Camera B Camera A Location Target Camera B angle

ISS Geometry Location Camera A Location Camera B Target Planter Location Distance Between Cameras (105 feet) R2 R1 Set up value, distance between Cameras Cameras & target Actual Positions Range computations, R1 & R2

Real time calculation of Target Size Cameras are IR calibrated and balanced Gain & Level using common objects Each IR camera employs convention 2 dimensional processing. Target segmentation Threshold Two dimensional information is processed in real time into 3 dimensional information Precise object location (x,y,z, coordinates) Precise physical size (sq. ft)

Threat Determination Targets are defined by size –(eg: truck, car, large animal, human, small animal/child, very small animal) A threat is defined as a specific target in a defined location The Location –All or part of surveillance field –Or a specific threat area: No fly zone

Target Upgrade & Tracking Target was defined by actual size. Once classified as a threat –Actual the actual target size is stored. –Actual Inherent Thermal Contrast is stored. Threat is continuously tracked by: –Both cameras or one camera if either camera becomes obscured. (2 D tracking using Actual target size for ranging and Inherent contrast for improved discrimination) Continuously tracking: –Allows higher order threat determinations

Intruder Example Series of snap shots of an intruder The initial detection is by Camera A. Then, Intruder enters Camera B FOV The intruder enters the yard. The intruder is continuously tracked through partial and total camera obscurations. Snap shots are 1/40 the actual number of independent samples at video frame rates.

Camera B, initial detection

Camera A Camera B

Camera A Camera B Almost fully obscured

Camera A Camera B

Camera A Camera B Partially Obscured Mostly Obscured

Intruder The target alarm sounded approximately 0.5 seconds after Camera B detection. The highly cluttered scene caused each camera to lose the target because of complete or partially obscurations. The “arc” path of the intruder causes an aspect change with small changes in computed size. With more than 300 independent sampled image pairs, the confidence level is extremely high. The Intruder was observed to be carrying a tool or a weapon.

Object in Hand

Advance Discrimination Techniques Target Refinement: –ITC & Size of each target allows discrimination between targets in a multi-target environment. Target Image Dropout – “Inherent thermal contrast” and actual size are used to re-acquire and separate new targets from old target. Multiple targets: –Can merge together and then separate, where ITC and physical size assigned to each target are used to maintain the identity of each target. Behavioral traits –Movement over time against a preset criteria are associated with a certain kinds of threat. Redundant information – ITC and physical size provides redundant data that support the application of best estimate theory.

Advance Discrimination Techniques Designed for multiple targets, each target having a separate threat definition, and threat response. (examples one or more) –“People-size” targets in specific areas at defined times –People congregating (crowd recognition) –Loitering (excessive time) –Stalking, (time history relationship between two targets) –Lying in wait, (serious home evasion threat) –A unattended child entering a swimming pool –Animals entering controlled areas –People exhibiting threatening behavioral –“Man down” recognition –Cars, time and location criteria –Trucks, time and location criteria –People count, matching entering with exits, tagging size –Verification, matching size with independent data, e.g. RFID data

Summary Field tests have demonstrated the attributes of the Infrared Security System. ISS provides reliable target detection and threat classification. High level of confidence that all false alarms have been rejected or minimized. ISS has the capability to be the first fully automatic physical security system ISS minimizes or eliminates the costly dedicated control rooms of TV monitors and security analysts. ISS provides the real time information needed by a first responder, or Information needed by the occupants of the home to avoid the threat.

ISS Applications Major Business Sectors –Home Security (adjunct to existing home security) –Factories (upgrade from forensic to threat negation) –24/7 High Value (integrated threat assessment) Power Plants Refineries Farms (man and environmental threats, seasonal threat) Military Installations & portable field operations Shopping Malls, parking lot security (host of threats) Airports: intrusion, unattended luggage, & threat tracking Green Applications –Automobile Sales lots –Correctional Institutions –Transportation Depots/shipyards/docks Other forms employing the core patented principle of 3D processing