[go: up one dir, main page]

WO2011005074A1 - Surveillance system and method - Google Patents

Surveillance system and method Download PDF

Info

Publication number
WO2011005074A1
WO2011005074A1 PCT/MY2010/000116 MY2010000116W WO2011005074A1 WO 2011005074 A1 WO2011005074 A1 WO 2011005074A1 MY 2010000116 W MY2010000116 W MY 2010000116W WO 2011005074 A1 WO2011005074 A1 WO 2011005074A1
Authority
WO
WIPO (PCT)
Prior art keywords
surveillance
secured zone
secured
zone
area
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/MY2010/000116
Other languages
French (fr)
Inventor
Weng Kin Lai
Ee Lee Ng
Arichandran K
Anuar Abdul Wahid Shamsul
Woon Wee Chen
Yee Jiun Yap
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Mimos Bhd
Original Assignee
Mimos Bhd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mimos Bhd filed Critical Mimos Bhd
Publication of WO2011005074A1 publication Critical patent/WO2011005074A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/183Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a single remote source
    • H04N7/185Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a single remote source from a mobile camera, e.g. for remote control
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction
    • G08B13/19613Recognition of a predetermined image pattern or behaviour pattern indicating theft or intrusion

Definitions

  • the invention relates generally to image processing method and system applicable for video surveillance applications. BACKGROUND OF THE INVENTION
  • An intelligent video surveillance system can monitor an area under surveillance for any trespass or intrusion into pre- defined security zones. Nevertheless, it tends to be limited in its capacity to function when only single secured zone can be selected for such monitoring purposes. Furthermore by having only a single secure zone, a surveillance system is limited in the responses that it provides when a secured zone is trespassed. Multiple segments that support multiple security levels within a secured zone not only provides more flexibility in having multi-threshold alarm triggering but can also be utilized to optimize the performance of a surveillance system.
  • a system for surveillance comprising one or more video cameras capturing surveillance scene images of a surveillance area, a control console having a display unit, wherein said control console receives video signal of video images sent by said video camera in order to display said surveillance scene images on said display unit, and a programmed instruction operating on board said control console, wherein said programmed instruction having a first function to define one or more secured zone within said surveillance scene, said secured zone is an enclosed area within a user- specified boundary and a security index, and said programmed instruction computes a response based on said security index when a non-permitted object is within said secured zone.
  • a method for surveillance comprising the steps of acquiring video images, defining one or more secured zones within the surveillance area, segmenting the secured zone into plurality of secured zone segments, assigning security index to each of said secured zone segment
  • a method for surveillance further comprising the steps of detecting motion of objects, analyzing the movement of each moving object, tracking a non-permitted moving object within the secured zone, retrieving the security index at the location of the non-permitted object, computing a response based on the retrieved security index and triggering a security alert according to said computed response.
  • Figure 1 is a block diagram illustrating the invented system for surveillance comprising its major hardware and software components.
  • Figure 2 is a flow chart illustrating the overall flow for executing steps for surveillance according to the invention.
  • Figure 3 is a flow chart illustrating a detail flow for executing steps for surveillance according to the invention.
  • Figures 4A and 4B illustrates a video image display through a display unit of the surveillance system control console and a secured zone defined and superimposed on the same image respectively.
  • Figure 5 illustrates the screen shot of the graphical user interface of a programmed instruction and its functional tools for executing surveillance according to the steps taught by the invention.
  • Figures 6A and 6B both illustrate yet another preferred embodiment for defining a secured zone according to the invention.
  • Figure 7A and 7B respectively illustrate preferred embodiments for creating a secured zone with varying security index or different levels of security index.
  • the invention is a computer vision-based motion detection and object tracking video surveillance system and method that can be applied for intrusion or trespass detection. It performs computer vision-based permitted-objects screening and automatic alarm threshold.
  • the software for executing preferred embodiments of the invention has freeform area selection function in addition to polygonal area selection so that only selected areas would trigger the alarm.
  • Another preferred embodiment of the invention employs means for segmenting a defined secured zone within a surveillance scene and assigning security index to the segments. Assignment of different security levels also gives a more precise control over the surveillance activity to prevent false alarm triggering and allows severity of
  • FIG. 1 illustrates a preferred embodiment of the invention which is a system (100) comprising one or more closed circuit television (CCTV) camera (102), knowledge database (104), a programmed instruction (106) capable of segmenting multiple surveillance area of video images and a control console (108) which can be a purpose built monitoring and control console or a workstation dedicated for this purpose.
  • the CCTV cameras (102) are electrically connected to the control console (108) so that video images captured by it can be displayed through the display unit of the control console.
  • the control console (108) communicates with the knowledge database (104) which can be on or off the site through state of the art networking during the operation of the system.
  • the software (106) which is running on the control console (108) can be an existing video surveillance software upgraded with the multiple surveillance area segmentation function or a new video surveillance software having the function.
  • the invented surveillance system (100) as illustrated in Figure 1 functions according to the overall process outlined in Figure 2.
  • the system first acquires video images of the surveillance area (202) through the CCTV camera (102) and the images are displayed on the display unit of the control console. Secured zones within the surveillance area that needs to be monitored are identified (204) through the software (106) as to be further disclosed herein.
  • the invented system and method are also capable of assigning trigger levels within the secured zone. Following that, the system will monitor the surveillance area (206) according to the identified secured zones and assigned triggering.
  • the surveillance system will initiate and execute defined security actions accordingly (208). After executing the security actions, the system can continue or discontinue monitoring (210) according to predefined rules. The system will either continue monitoring (206) and repeats steps 206 to 210 or stop monitoring the surveillance area (212).
  • Figure 3 illustrates in further detail the flow for monitoring the surveillance area according to the invention.
  • the monitoring process generally comprises a first section that includes selecting one or more areas of interest i.e. one or more secured zones, segmenting and assigning security index and a second section that includes detecting object, tracking object motion and triggering alarm.
  • the process for monitoring a surveillance area starts by acquiring video images (302) through the CCTV camera and defining one or more secured zones within the surveillance area.
  • the system communicates with the knowledge base (304) to retrieve information concerning the area under surveillance.
  • the knowledge base stores secured zone information which includes its segments with its security level that may exist for the area under surveillance. Otherwise, defining the secured zone is carried out (306) to set up the surveillance criteria for an area of interest within the surveillance area. Once the secured zone has been identified, the number of segments within the secured zone is also defined (308) and the secured zone is segmented (310) according the number of defined segments. This is followed by assigning security index (312) to each of the segment.
  • Means and method for defining the secure zone (306), specifying the number of segments within a secure zone (308), defining the segments (310) and assigning the security index of each secure zone segment (312) is further disclosed herein.
  • Figure 4A and 4B both illustrates the same video images of a possible surveillance scenario which is exemplified by not limited to platform and rail track area in a train station.
  • Figure 4A shows the view of the part of the platform area (402), a rail track area (404) and a train (406) captured by a CCTV camera.
  • Figure 4B shows that the secured zone or area of interest (306a) in this surveillance now includes the no standing area (403) on the platform and the rail track area (404). The selected area is superimposed on top of the surveillance image to facilitate accurate selection of the area of interest.
  • the system begins the actual surveillance (314). During surveillance, the system detects motion of objects (316), analyzes the movement of each moving object (318) and determines whether the moving object is an object permitted within the secured zone (320). The system continues to track the movement of the object if the moving object is a non-permitted object (322) and determines position of non-permitted object relative to secured zone (324). The system retrieves the security index of the secured zone (326) when the non- permitted object is within the secured zone. It will compute the response (328) based on the retrieved security index and triggers the security alert (330) according to computed response.
  • the train (406) is an object permitted in the secured zone (306a) while people are objects not permitted within the secured zone.
  • the means and method for defining the secured zone, the number of secured zone segment and assigning the security index for each of the segment is a programmed instruction operating on the control console (108) providing shape tool functions for drawing areas having polygonal or freeform shape.
  • Figure 5 shows one embodiment of a representation of the graphic user interface (GUI) of the software (501) and its shape tool functions (502) as it appears on the display unit of the control console.
  • GUI graphic user interface
  • the system allows drawing multiple secured zones and its selection via a suitable human interface device such as mouse or trackball. Areas selected will be automatically labelled as 'Unsafe' or labels bearing similar meaning.
  • Figures 6A and 6B illustrate another preferred embodiment of the method for identifying the area-of-interest using the software means.
  • the software will also have line tools (502) to draw boundary (306b) using lines, curves which can be free-form to define the boundary between 'Safe' and 'Unsafe' area within a surveillance scene. After the boundary is drawn, the user can then specify the 'Unsafe' area (306c) by simply dragging and dropping the 'Unsafe' tag onto the area. The undefined area (306d) will automatically be labelled as 'Safe'.
  • Figures 7A and 7B illustrates another embodiment of the invention which allows more flexibility in surveillance by another preferred method executed through the software means to provide for secured zones of varying security index. This allows the user to have different responses which cannot be provided when a secured zone has only single homogenous zone of security index.
  • Figure 7A shows an enclosed area where the security level is reflected by the colour of a location in the secured zone, i.e., a darker colour area in the secured zone has a higher security level than a light colour area in the security zone (or vice versa, depending on the user preference).
  • the enclosed secured zone is filled with varying shades of colour or a single colour with intensity gradient from one location to another. In this situation, the range of security index is incremented from the starting point (where the area-selection begins) towards the ending point (where the area-selection ends).
  • Figure 7B illustrates creating secured zone with various security indexes by dividing the 'Unsafe' area (306c) into a number of segments (306cl, 306c2, 306c3, 306c4) for a perimeter-bounded surveillance scene.
  • Each of the segment boundary (702, 704, 706, 708) is a curve composed of many control points connected to one after another which allows the trace of the curve to be further adjusted by adjusting the positions of the control points on the video image.
  • Figure 7B illustrates that perimeter-bounded area usually have segments with increasing security index disposed one after another from the 'Safe' area (306d) towards the 'Unsafe' area (306c).
  • Different levels of the security index are represented by integers 1 to 10 to indicate the severity of deviation (distance deviation) of any 'Unsafe' segments from the 'Safe' area.
  • Each segment's colour intensity is proportional to the value of the Security Index.
  • a motion detection module After setting up the secured zone, a motion detection module will detect the motion in the surveillance scene. Subsequently, the motion analysis module will analyze the cause of motion, whether it is caused by a permitted object or otherwise. Using the example cited before, the motion analysis module will analyze whether a detected motion is caused by a human or an incoming train. In the train station scenario, only a train is permitted to occupy the area-of-interest. A human, however, is not permitted to trespass the area. Therefore, the motion tracking module will track only human in the scene.
  • the output of the motion tracker is a series of XY-coordinates representing moment to moment positions corresponding to the movement of the object under tracking within the surveillance scene.
  • the position of the object that is being tracked is repeatedly compared to the boundary of the secured zone. If the object's position is on or beyond the boundary of the secured zone, the object is intruding the secure zone.
  • the system will retrieve the security index corresponding to the position of the object under tracking. Corresponding alarm will be raised after computing the response based on the security index.

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Closed-Circuit Television Systems (AREA)

Abstract

A surveillance system ( 100) comprising one or more video camera (102) capturing surveillance scene images of a surveillance area, a control console (108) having a display unit, wherein said control console (108) receives video signal of video images sent by said video camera (102) in order to display said surveillance scene images on said display unit, and a programmed instruction operating on board said control console, wherein said programmed instruction ( 106) having a first function to define one or more secured zone within said surveillance scene, said secured zone is an enclosed area having curve boundary and a security index, and said programmed instruction (106) computes a response based on said security index when a non-permitted object is within said secured zone.

Description

SURVEILLANCE SYSTEM AND METHOD
FIELD OF INVENTION
The invention relates generally to image processing method and system applicable for video surveillance applications. BACKGROUND OF THE INVENTION
An intelligent video surveillance system can monitor an area under surveillance for any trespass or intrusion into pre- defined security zones. Nevertheless, it tends to be limited in its capacity to function when only single secured zone can be selected for such monitoring purposes. Furthermore by having only a single secure zone, a surveillance system is limited in the responses that it provides when a secured zone is trespassed. Multiple segments that support multiple security levels within a secured zone not only provides more flexibility in having multi-threshold alarm triggering but can also be utilized to optimize the performance of a surveillance system.
It is therefore the objective of the invention to provide a means for multi area selection within an area of interest that is under surveillance.
It is also the objective of the invention to provide segmentation of a secured zone within a surveillance scene and assign security level for each of the secured zones. It is a further objective of the invention to provide multi-threshold triggering within a surveillance scene. It is a general objective of the invention to solve detection abnormalities encountered in a surveillance application by employing the preferred embodiments of the invention.
SUMMARY OF THE INVENTION A system for surveillance comprising one or more video cameras capturing surveillance scene images of a surveillance area, a control console having a display unit, wherein said control console receives video signal of video images sent by said video camera in order to display said surveillance scene images on said display unit, and a programmed instruction operating on board said control console, wherein said programmed instruction having a first function to define one or more secured zone within said surveillance scene, said secured zone is an enclosed area within a user- specified boundary and a security index, and said programmed instruction computes a response based on said security index when a non-permitted object is within said secured zone. A method for surveillance comprising the steps of acquiring video images, defining one or more secured zones within the surveillance area, segmenting the secured zone into plurality of secured zone segments, assigning security index to each of said secured zone segment
A method for surveillance further comprising the steps of detecting motion of objects, analyzing the movement of each moving object, tracking a non-permitted moving object within the secured zone, retrieving the security index at the location of the non-permitted object, computing a response based on the retrieved security index and triggering a security alert according to said computed response. BRIEF DESCRIPTION OF THE DRAWINGS
Figure 1 is a block diagram illustrating the invented system for surveillance comprising its major hardware and software components.
Figure 2 is a flow chart illustrating the overall flow for executing steps for surveillance according to the invention.
Figure 3 is a flow chart illustrating a detail flow for executing steps for surveillance according to the invention.
Figures 4A and 4B illustrates a video image display through a display unit of the surveillance system control console and a secured zone defined and superimposed on the same image respectively.
Figure 5 illustrates the screen shot of the graphical user interface of a programmed instruction and its functional tools for executing surveillance according to the steps taught by the invention.
Figures 6A and 6B both illustrate yet another preferred embodiment for defining a secured zone according to the invention.
Figure 7A and 7B respectively illustrate preferred embodiments for creating a secured zone with varying security index or different levels of security index. DETAILED DESCRIPTION OF THE INVENTION
The invention is a computer vision-based motion detection and object tracking video surveillance system and method that can be applied for intrusion or trespass detection. It performs computer vision-based permitted-objects screening and automatic alarm threshold. The software for executing preferred embodiments of the invention has freeform area selection function in addition to polygonal area selection so that only selected areas would trigger the alarm. Another preferred embodiment of the invention employs means for segmenting a defined secured zone within a surveillance scene and assigning security index to the segments. Assignment of different security levels also gives a more precise control over the surveillance activity to prevent false alarm triggering and allows severity of
~ intrusion to be measured. The following descriptions which apply to all the figures briefly described in the section of the brief description of the invention and not limited only to the particular figure in reference demonstrate these essential features and other salient points of the invention.
Figure 1 illustrates a preferred embodiment of the invention which is a system (100) comprising one or more closed circuit television (CCTV) camera (102), knowledge database (104), a programmed instruction (106) capable of segmenting multiple surveillance area of video images and a control console (108) which can be a purpose built monitoring and control console or a workstation dedicated for this purpose. The CCTV cameras (102) are electrically connected to the control console (108) so that video images captured by it can be displayed through the display unit of the control console. The control console (108) communicates with the knowledge database (104) which can be on or off the site through state of the art networking during the operation of the system. The software (106) which is running on the control console (108) can be an existing video surveillance software upgraded with the multiple surveillance area segmentation function or a new video surveillance software having the function. The invented surveillance system (100) as illustrated in Figure 1 functions according to the overall process outlined in Figure 2. The system first acquires video images of the surveillance area (202) through the CCTV camera (102) and the images are displayed on the display unit of the control console. Secured zones within the surveillance area that needs to be monitored are identified (204) through the software (106) as to be further disclosed herein. In addition to the identifying the secured zones, the invented system and method are also capable of assigning trigger levels within the secured zone. Following that, the system will monitor the surveillance area (206) according to the identified secured zones and assigned triggering. In the event of any triggering within the secured zones, the surveillance system will initiate and execute defined security actions accordingly (208). After executing the security actions, the system can continue or discontinue monitoring (210) according to predefined rules. The system will either continue monitoring (206) and repeats steps 206 to 210 or stop monitoring the surveillance area (212). Figure 3 illustrates in further detail the flow for monitoring the surveillance area according to the invention. The monitoring process generally comprises a first section that includes selecting one or more areas of interest i.e. one or more secured zones, segmenting and assigning security index and a second section that includes detecting object, tracking object motion and triggering alarm. The process for monitoring a surveillance area starts by acquiring video images (302) through the CCTV camera and defining one or more secured zones within the surveillance area. The system communicates with the knowledge base (304) to retrieve information concerning the area under surveillance. The knowledge base stores secured zone information which includes its segments with its security level that may exist for the area under surveillance. Otherwise, defining the secured zone is carried out (306) to set up the surveillance criteria for an area of interest within the surveillance area. Once the secured zone has been identified, the number of segments within the secured zone is also defined (308) and the secured zone is segmented (310) according the number of defined segments. This is followed by assigning security index (312) to each of the segment. Means and method for defining the secure zone (306), specifying the number of segments within a secure zone (308), defining the segments (310) and assigning the security index of each secure zone segment (312) is further disclosed herein.
Figure 4A and 4B both illustrates the same video images of a possible surveillance scenario which is exemplified by not limited to platform and rail track area in a train station. Figure 4A shows the view of the part of the platform area (402), a rail track area (404) and a train (406) captured by a CCTV camera. Figure 4B shows that the secured zone or area of interest (306a) in this surveillance now includes the no standing area (403) on the platform and the rail track area (404). The selected area is superimposed on top of the surveillance image to facilitate accurate selection of the area of interest.
After carrying out the foregoing steps, the system begins the actual surveillance (314). During surveillance, the system detects motion of objects (316), analyzes the movement of each moving object (318) and determines whether the moving object is an object permitted within the secured zone (320). The system continues to track the movement of the object if the moving object is a non-permitted object (322) and determines position of non-permitted object relative to secured zone (324). The system retrieves the security index of the secured zone (326) when the non- permitted object is within the secured zone. It will compute the response (328) based on the retrieved security index and triggers the security alert (330) according to computed response.
Continuing from the non-limiting example of the train station, the train (406) is an object permitted in the secured zone (306a) while people are objects not permitted within the secured zone. The means and method for defining the secured zone, the number of secured zone segment and assigning the security index for each of the segment is a programmed instruction operating on the control console (108) providing shape tool functions for drawing areas having polygonal or freeform shape. Figure 5 shows one embodiment of a representation of the graphic user interface (GUI) of the software (501) and its shape tool functions (502) as it appears on the display unit of the control console. The system allows drawing multiple secured zones and its selection via a suitable human interface device such as mouse or trackball. Areas selected will be automatically labelled as 'Unsafe' or labels bearing similar meaning.
Figures 6A and 6B illustrate another preferred embodiment of the method for identifying the area-of-interest using the software means. The software will also have line tools (502) to draw boundary (306b) using lines, curves which can be free-form to define the boundary between 'Safe' and 'Unsafe' area within a surveillance scene. After the boundary is drawn, the user can then specify the 'Unsafe' area (306c) by simply dragging and dropping the 'Unsafe' tag onto the area. The undefined area (306d) will automatically be labelled as 'Safe'.
Figures 7A and 7B illustrates another embodiment of the invention which allows more flexibility in surveillance by another preferred method executed through the software means to provide for secured zones of varying security index. This allows the user to have different responses which cannot be provided when a secured zone has only single homogenous zone of security index.
Figure 7A shows an enclosed area where the security level is reflected by the colour of a location in the secured zone, i.e., a darker colour area in the secured zone has a higher security level than a light colour area in the security zone (or vice versa, depending on the user preference). The enclosed secured zone is filled with varying shades of colour or a single colour with intensity gradient from one location to another. In this situation, the range of security index is incremented from the starting point (where the area-selection begins) towards the ending point (where the area-selection ends).
Figure 7B illustrates creating secured zone with various security indexes by dividing the 'Unsafe' area (306c) into a number of segments (306cl, 306c2, 306c3, 306c4) for a perimeter-bounded surveillance scene. Each of the segment boundary (702, 704, 706, 708) is a curve composed of many control points connected to one after another which allows the trace of the curve to be further adjusted by adjusting the positions of the control points on the video image. Figure 7B illustrates that perimeter-bounded area usually have segments with increasing security index disposed one after another from the 'Safe' area (306d) towards the 'Unsafe' area (306c). Different levels of the security index are represented by integers 1 to 10 to indicate the severity of deviation (distance deviation) of any 'Unsafe' segments from the 'Safe' area. Each segment's colour intensity is proportional to the value of the Security Index.
After setting up the secured zone, a motion detection module will detect the motion in the surveillance scene. Subsequently, the motion analysis module will analyze the cause of motion, whether it is caused by a permitted object or otherwise. Using the example cited before, the motion analysis module will analyze whether a detected motion is caused by a human or an incoming train. In the train station scenario, only a train is permitted to occupy the area-of-interest. A human, however, is not permitted to trespass the area. Therefore, the motion tracking module will track only human in the scene. The output of the motion tracker is a series of XY-coordinates representing moment to moment positions corresponding to the movement of the object under tracking within the surveillance scene. The position of the object that is being tracked is repeatedly compared to the boundary of the secured zone. If the object's position is on or beyond the boundary of the secured zone, the object is intruding the secure zone. The system will retrieve the security index corresponding to the position of the object under tracking. Corresponding alarm will be raised after computing the response based on the security index.
It is therefore apparent to anyone skilful in the art as to the practicality and usefulness of such a storage and dispensing system which may also be converted into a storage and disposal system. Therefore, the above description is descriptive and is by no means limitation of the essence of the invention itself in which the scope and embodiment is claimed as below.

Claims

1. A system (100) for surveillance comprising:
one or more video camera (102) capturing surveillance scene images of a surveillance area;
a control console (108) having a display unit, wherein said control console (108) receives video signal of video images sent by said video camera (102) in order to display said surveillance scene images on said display unit; and
a programmed instruction (106) operating on board said control console (108), wherein said programmed instruction (106) having a first function to define one or more secured zone within said surveillance scene, said secured zone is an enclosed area having curve boundary and a security index, and said programmed instruction (106) computes a response based on said security index when a non- permitted object is within said secured zone.
2. A system (100) for surveillance as claimed in claim 1, further comprising a second function to define one or more secured zone within said surveillance scene, wherein said secured zone is an enclosed polygonal area.
3. A system (100) for surveillance as claimed in claim 1, further comprising a third function to define one or more secured zone within said surveillance scene by drawing a least one non-connecting boundary from any edge of said surveillance scene images.
4. A system (100) for surveillance as claimed in claim 1, further comprising a fourth function to segmentize said secured zone into plurality of secure zone segments, each said secured zone assigned with its security index
5. A system for surveillance as claimed in claim 1, further comprising a first function to assign said secured zone, wherein security index changes from one end to the other end of the secured zone.
6. A method for surveillance comprising the steps of:
acquiring video images;
defining one or more secured zones within the surveillance area;
segmenting the secured zone into plurality of secured zone segments; and assigning security index to each of said secured zone segment.
7. A method for surveillance as claim in claim 6, further comprising the step of retrieving information concerning the area under surveillance, wherein said information includes said secured zone segments with its security level.
8. A method for surveillance as claim in claim 6, further comprising the steps of detecting motion of objects, analyzing the movement of each moving object, tracking a non-permitted moving object within the secured zone, retrieving the security index at the location of the non-permitted object, computing a response based on the retrieved security index and triggering a security alert according to said computed response.
PCT/MY2010/000116 2009-07-07 2010-07-06 Surveillance system and method Ceased WO2011005074A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
MYPI20092844 2009-07-07
MYPI20092844 2009-07-07

Publications (1)

Publication Number Publication Date
WO2011005074A1 true WO2011005074A1 (en) 2011-01-13

Family

ID=43429371

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/MY2010/000116 Ceased WO2011005074A1 (en) 2009-07-07 2010-07-06 Surveillance system and method

Country Status (1)

Country Link
WO (1) WO2011005074A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
ITBO20120299A1 (en) * 2012-05-31 2013-12-01 Filippo Guerzoni DEVICE, SYSTEM AND METHOD OF SURVEILLANCE OF A VOLUME DEBT.
FR3055455A1 (en) * 2016-09-01 2018-03-02 Freebox AUTONOMOUS INSPECTION AREA SURVEILLANCE BY INFRARED PASSIVE SENSOR MULTIZONE

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7023469B1 (en) * 1998-04-30 2006-04-04 Texas Instruments Incorporated Automatic video monitoring system which selectively saves information
US7088846B2 (en) * 2003-11-17 2006-08-08 Vidient Systems, Inc. Video surveillance system that detects predefined behaviors based on predetermined patterns of movement through zones
US20070257986A1 (en) * 2006-05-05 2007-11-08 Ivanov Yuri A Method for processing queries for surveillance tasks

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7023469B1 (en) * 1998-04-30 2006-04-04 Texas Instruments Incorporated Automatic video monitoring system which selectively saves information
US7088846B2 (en) * 2003-11-17 2006-08-08 Vidient Systems, Inc. Video surveillance system that detects predefined behaviors based on predetermined patterns of movement through zones
US20070257986A1 (en) * 2006-05-05 2007-11-08 Ivanov Yuri A Method for processing queries for surveillance tasks

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
ITBO20120299A1 (en) * 2012-05-31 2013-12-01 Filippo Guerzoni DEVICE, SYSTEM AND METHOD OF SURVEILLANCE OF A VOLUME DEBT.
WO2013179201A1 (en) * 2012-05-31 2013-12-05 Guerzoni Filippo Device, system and method for monitoring a predetermined space
US9881469B2 (en) 2012-05-31 2018-01-30 Filippo Guerzoni Device, system and method for monitoring a predetermined space
FR3055455A1 (en) * 2016-09-01 2018-03-02 Freebox AUTONOMOUS INSPECTION AREA SURVEILLANCE BY INFRARED PASSIVE SENSOR MULTIZONE
EP3293715A1 (en) * 2016-09-01 2018-03-14 Freebox Self-contained system for monitoring an area using a multi-zone passive infrared sensor
US9972180B2 (en) 2016-09-01 2018-05-15 Freebox Autonomous area monitoring device using a multi-area passive infrared sensor

Similar Documents

Publication Publication Date Title
US7606425B2 (en) Unsupervised learning of events in a video sequence
JP5121258B2 (en) Suspicious behavior detection system and method
KR102195706B1 (en) Method and Apparatus for Detecting Intruder
JP4705090B2 (en) Smoke sensing device and method
JP6488083B2 (en) Hybrid method and system of video and vision based access control for parking space occupancy determination
US20130208123A1 (en) Method and System for Collecting Evidence in a Security System
JP2021515919A (en) Domain identification method, device, storage medium and processor
WO2001069931A1 (en) Method and apparatus for video surveillance with defined zones
US20070052807A1 (en) System and method for user monitoring interface of 3-D video streams from multiple cameras
US20080186191A1 (en) Smoke detecting method and device
US20070052858A1 (en) System and method for analyzing and monitoring 3-D video streams from multiple cameras
US9858486B2 (en) Device and method for detecting circumventing behavior and device and method for processing cause of circumvention
EP1811457A1 (en) Video signal analysis
JP2017033554A (en) Video data analysis method, apparatus, and parking lot monitoring system
KR101933153B1 (en) Control Image Relocation Method and Apparatus according to the direction of movement of the Object of Interest
JP7125843B2 (en) Fault detection system
KR20160093253A (en) Video based abnormal flow detection method and system
US20200280683A1 (en) Information processing apparatus for performing setting of monitoring camera and method of the same
KR101454644B1 (en) Loitering Detection Using a Pedestrian Tracker
EP2000952A2 (en) Smoke detecting method and device
CN114663479B (en) An intelligent monitoring and early warning method and system based on computer vision
JP2012185684A (en) Object detection device and object detection method
KR20210096754A (en) Safety management method and system using image learning model for digital Safety, Health, Environment industry specialization
WO2011005074A1 (en) Surveillance system and method
KR102101445B1 (en) Method for automatic update of candidate surveillance areas by image recording device or server using smart-rotation surveillance technology

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10797346

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 10797346

Country of ref document: EP

Kind code of ref document: A1