Parametric tracking across multiple cameras

Article


Sebastian, P., Voon, Y. and Comley, R. 2017. Parametric tracking across multiple cameras. Pertanika Journal of Science & Technology. 25 ((S)Jan), pp. 159-168.
TypeArticle
TitleParametric tracking across multiple cameras
AuthorsSebastian, P., Voon, Y. and Comley, R.
Abstract

This paper presents a tracking method based on parameters between colour blobs. The colour blobs are obtained from segmenting the overall target into multiple colour regions. The colour regions are segmented using EM method that determines the normal colour distributions from the overall colour pixel distribution. After segmenting into different regions on the different colour layers, parameters can be generated between colour regions of interest. In this instance, the colour regions of interest are the top and bottom colour regions. The parameters that are generated from these colour regions are the vector magnitude, vector angle and the value difference between colour regions. These parameters are used as a means for tracking targets of interest. These parameters are used for tracking the target of interest across an array of cameras which in this instance are three cameras. Three cameras have been set up with different background and foreground conditions. The summarised results of tracking targets across three cameras have shown that the consistency of colour regions across different cameras and different background settings provided sufficient parameters for targets to be tracked consistently. Example of tracking performance across three cameras were 0.88, 0.67 and 0.55. The remaining tracking performances across three cameras are shown in Table 2. The tracking performance indicate that the parameters between colour regions were able to be used for tracking a target across different cameras with different background scenarios. Based on results obtained, parameters between segmented colour regions have indicated robustness in tracking target of interest across three cameras.

KeywordsBlob tracking, parametric tracking, multiple camera, tracking
PublisherUPM Press
JournalPertanika Journal of Science & Technology
ISSN0128-7680
Electronic2231-8526
Publication dates
Print31 Jan 2017
Online09 May 2017
Publication process dates
Deposited18 Dec 2019
Accepted02 Dec 2016
Output statusPublished
Additional information

Pertanika Journal of Science & Technology (JST) is the official journal of Universiti Putra Malaysia. It is an open-access online scientific journal. Web link: http://www.pertanika.upm.edu.my/JST.php

Web address (URL)http://www.pertanika.upm.edu.my/pjst/browse/special-issue?article=JST-S0094-2016
LanguageEnglish
Permalink -

https://repository.mdx.ac.uk/item/88v2q

  • 13
    total views
  • 0
    total downloads
  • 0
    views this month
  • 0
    downloads this month

Export as

Related outputs

An enhanced deep learning architecture for classification of Tuberculosis types from CT lung images
Gao, X., Comley, R. and Khan, M. 2020. An enhanced deep learning architecture for classification of Tuberculosis types from CT lung images. ICIP 2020: 27th IEEE International Conference on Image Processing. Abu Dhabi, Unites Arab Emirates (Virtual Conference) 25 - 28 Oct 2020 IEEE. pp. 2486-2490 https://doi.org/10.1109/ICIP40778.2020.9190815
Design of a robotic sensorimotor system for phantom limb pain rehabilitation
Snow, P., Loureiro, R. and Comley, R. 2014. Design of a robotic sensorimotor system for phantom limb pain rehabilitation. 5th IEEE RAS & EMBS International Conference on Biomedical Robotics and Biomechatronics (BioRob). São Paulo, Brazil 12 - 15 Aug 2014 IEEE. pp. 120-125 https://doi.org/10.1109/BIOROB.2014.6913763
Optical flow estimation via steered-L1 norm
Zayouna, A., Comley, R. and Shi, D. 2016. Optical flow estimation via steered-L1 norm. Pan, Z. and Skala, V. (ed.) 24th International Conference in Central Europe on Computer Graphics, Visualization and Computer Vision. Plzen, Czech Republic 30 May - 03 Jun 2016 Digital Library University of West Bohemia. pp. 81-90
A review of hough transform and line segment detection approaches
Rahmdel, P., Comley, R., Shi, D. and McElduff, S. 2015. A review of hough transform and line segment detection approaches. 10th International Conference on Computer Vision Theory and Applications (VISAPP 2015). Berlin, Germany 11 - 14 Mar 2015 SCITEPRESS - Science and Technology Publications. pp. 411-418 https://doi.org/10.5220/0005268904110418
Comment on "collinear segment detection using HT neighborhoods"
Rahmdel, P., Shi, D. and Comley, R. 2013. Comment on "collinear segment detection using HT neighborhoods". IEEE Transactions on Image Processing. 23 (2), pp. 952-955. https://doi.org/10.1109/TIP.2013.2291329
Colour space effect on tracking in video surveillance
Sebastian, P., Voon, Y. and Comley, R. 2010. Colour space effect on tracking in video surveillance. International Journal on Electrical Engineering and Informatics. 2 (4), pp. 298-312.
Content-based petrieval of 3D medical images
Qian, Y., Gao, X., Loomes, M., Comley, R., Barn, B., Hui, R. and Tian, Z. 2011. Content-based petrieval of 3D medical images. in: Gemert-Pijnen, L., Ossebaard, H. and Hämäläinen, P. (ed.) eTELEMED 2011, The Third International Conference on eHealth, Telemedicine, and Social Medicine IARIA. pp. 7-12
Location privacy in mobile IPv6 distributed authentication protocol using mobile home agents
Georgiades, A., Luo, Y., Lasebae, A. and Comley, R. 2009. Location privacy in mobile IPv6 distributed authentication protocol using mobile home agents. Trilling, L., Perkins, D., Dionysios, D., Perlovsky, L., Davey, K., Landgrebe, D., Marino, M., Russell, D., Collicott, S., Ceccarelli, M. and Lund, J. (ed.) The 8th WSEAS International Conference on Electronics, Hardware, Wireless and Optical Communications (EHAC '09). Cambridge, UK 21 - 23 Feb 2009 WSEAS Press. pp. 51-56
The effect of colour space on tracking robustness
Sebastian, P., Voon, Y. and Comley, R. 2008. The effect of colour space on tracking robustness. in: 2008 3rd IEEE Conference on Industrial Electronics and Applications Institute of Electrical and Electronics Engineers (IEEE). pp. 2512-2516
Introducing mobile home agents into the distributed authentication protocol to achieve location privacy in mobile IPv6
Georgiades, A., Luo, Y., Lasebae, A. and Comley, R. 2008. Introducing mobile home agents into the distributed authentication protocol to achieve location privacy in mobile IPv6. International Journal of Communications. 2 (3), pp. 185-194.
Retrieval of 3D medical images via their texture features
Gao, X., Qian, Y., Loomes, M., Barn, B., Comley, R., Chapman, A., Rix, J., Hui, R. and Tian, Z. 2012. Retrieval of 3D medical images via their texture features. International Journal on Advances in Software. 4 (3&4), pp. 499-509.
Extended mobile WiMAX signal transmission over RoF via triple symmetrical dispersion system SMF, DCF and CFBG
Al Noor, M., Loo, J. and Comley, R. 2011. Extended mobile WiMAX signal transmission over RoF via triple symmetrical dispersion system SMF, DCF and CFBG. International Journal on Advances in Telecommunications. 4 (1&2), pp. 183-193.
Bridging the abridged – the diffusion of Telemedicine in Europe and China
Gao, X., Loomes, M. and Comley, R. 2012. Bridging the abridged – the diffusion of Telemedicine in Europe and China. in: Rodrigues, J., Díez, I. and Abajo, B. (ed.) Telemedicine and e-health services, policies, and applications: avancements and developments USA IGI Global. pp. 451-495
Local-global optical flow for image registration agents
Zayouna, A., Comley, R. and Shi, D. 2011. Local-global optical flow for image registration agents. iUBICOM ’11: The 6th International Workshop on Ubiquitous and Collaborative Computing. Northumbria University, Newcastle 04 Jul 2011
Wireless mesh network security: a traffic engineering management approach
Muogilim, O., Loo, J. and Comley, R. 2011. Wireless mesh network security: a traffic engineering management approach. Journal of Network and Computer Applications. 34 (2), pp. 478-491. https://doi.org/10.1016/j.jnca.2010.03.027
Towards healthcare based on ubiquitous computing
Shi, D. and Comley, R. 2010. Towards healthcare based on ubiquitous computing. IEEE Transactions on Systems, Man, and Cybernetics eNewsletter. 33.
Heuristic standards for universal design in the face of technological diversity.
Adams, R. and Comley, R. 2009. Heuristic standards for universal design in the face of technological diversity. 2009 IEEE Accessing the Future Conference. Boston: Northeastern University 20 - 21 Jul 2009
The potential of the BCI for accessible and smart e-learning
Adams, R., Comley, R. and Ghoreyshi, M. 2009. The potential of the BCI for accessible and smart e-learning. Lecture Notes in Computer Science. 5615, pp. 467-476. https://doi.org/10.1007/978-3-642-02710-9_51
Texture-based 3d image retrieval for medical applications
Gao, X., Qian, Y., Hui, R., Loomes, M., Comley, R., Barn, B., Chapman, A. and Rix, J. 2010. Texture-based 3d image retrieval for medical applications. Macedo, M. (ed.) IADIS International Conference e-Health 2010. Freiburg, Germany 29 - 31 Jul 2010 IADIS. pp. 101-108
Dual identity return routability for the security of mobile IPv6 binding updates within the distributed authentication protocol.
Luo, Y., Lasebae, A., Comley, R. and Georgiades, A. 2006. Dual identity return routability for the security of mobile IPv6 binding updates within the distributed authentication protocol. in: WSEAS Conferences: Elounda, Agios Nikolaos, Crete, Greece, August 18-20, 2006 Athens WSEAS.
Distributed authentication protocol utilizing dual identity return routability for the security of binding updates within mobile IPv6.
Luo, Y., Lasebae, A., Comley, R. and Georgiades, A. 2006. Distributed authentication protocol utilizing dual identity return routability for the security of binding updates within mobile IPv6. WSEAS transactions on communications. 5 (10), pp. 1109-2742.
Distributed authentication protocol for the security of binding updates in mobile IPv6.
Luo, Y., Lasebae, A., Comley, R. and Georgiades, A. 2005. Distributed authentication protocol for the security of binding updates in mobile IPv6. in: Proceedings of the 9th WSEAS international CSCC multiconference: circuits 05, systems 05, computers 05, communications 05. WSEAS.
Binding update security for mobile IPv6 using a distributed authentication protocol.
Luo, Y., Lasebae, A., Comley, R. and Georgiades, A. 2005. Binding update security for mobile IPv6 using a distributed authentication protocol. WSEAS transactions on communications. 4 (9), pp. 1109-2742.
Trinity protocol for authentication of binding updates in mobile IPv6.
Luo, Y., Comley, R., Lasebae, A. and Georgiades, A. 2004. Trinity protocol for authentication of binding updates in mobile IPv6. WSEAS transactions on communications. 3 (3), pp. 872-877.
Attacks on an ISO/IEC 11770-2 key establishment protocol
Comley, R. and Cheng, Z. 2005. Attacks on an ISO/IEC 11770-2 key establishment protocol. International Journal of Network Security. 3 (3), pp. 290-295.
Remove key escrow from the identity-based encryption system.
Comley, R., Vasiu, L. and Cheng, Z. 2004. Remove key escrow from the identity-based encryption system. IFIP Eighteenth World Computer Congress, Information Technology, TC1 3rd International Conference on Theoretical Computer Science in the Era of Network and Mobile Computing, IFIP TCS2004, Toulouse, France. Proceedings.. 3 (3), pp. 37-50.
Toward a robust system to monitor the head motions during PET based on facial landmarks detection: a new approach
Anishenko, S., Osimov, V., Shaposhnikov, D., Podladchikova, L., Comley, R. and Gao, X. 2008. Toward a robust system to monitor the head motions during PET based on facial landmarks detection: a new approach. Puuronen, S., Pechenizkiy, M., Tsymbal, A. and Lee, D. (ed.) 21st IEEE International Symposium on Computer-Based Medical Systems. Jyvaskyla, Finland 17 - 19 Jun 2008 IEEE Computer Society. pp. 50-52 https://doi.org/10.1109/CBMS.2008.19
General and efficient Certificateless Public Key Encryption constructions
Comley, R., Cheng, Z., Chen, L. and Ling, L. 2007. General and efficient Certificateless Public Key Encryption constructions. Takagi, T., Okamoto, T., Okamoto. E. and Okamoto, T. (ed.) Pairing-Based Cryptography - Pairing 2007. First International Conference. Tokyo, Japan 02 - 04 Jul 2007 Berlin, Heidelberg Springer. https://doi.org/10.1007/978-3-540-73489-5_6
Identity-based key agreement with unilateral identity privacy using pairings
Comley, R., Chen, L., Tang, Q. and Cheng, Z. 2006. Identity-based key agreement with unilateral identity privacy using pairings. Chen, K., Deng, R., Lai, X. and Zhou, J. (ed.) Information Security Practice and Experience: Second International Conference, ISPEC 2006. Hangzhou, China 11 - 14 Apr 2006 Berlin, Heidelberg Springer. https://doi.org/10.1007/11689522_19