Cryptography Reference
In-Depth Information
however, that all the elements that form the vector of a check-point on a
trajectory are positive and their magnitudes are accumulated from the begin-
ning. Therefore, if we choose an intermediate check point, Q
k ,inQ
and its
corresponding check point, D
k ,inD
, we can be sure that
Dist Q ,D
i,j
Dist Q ,D
i,k
Dist Q ,D
k,j
+
.
(9.12)
Eq. (9.12) shows that a coarse-to-fine search strategy is appropriate for
a trajectory-based query. In the first step of the comparison between Q
and
Dist Q ,D
1,N
D
, we simply check the value of
. This step only needs to consider
four check points Q
N . Since the value of TDist(Q, D) must
be equal to or larger than that of, we can quickly determine that trajectory
D is not similar to Q if the returned value of
1 , D
1 , Q
N ,andD
Dist Q ,D
1,N
is greater than a
predefined threshold δ.
Once the value of
Dist Q ,D
1,N
<δ, we seek the second check points on
Q and D , respectively, by checking Q 2 and D 2 .IfQ 2 is chosen as Q
2 ,we
can insert D
2 into the right position between D 1 and D 2 and vice versa.
Furthermore, Q
and D
can be divided into four sub-trajectories by Q
2 and
Dist Q ,D
1,2
D
2 . Under these circumstances, we only compute the sum of
Dist Q ,D
2,N
and
as the distance between the sub-trajectories. If the distance
between two distinct sub-trajectories is still larger than a predefined threshold
δ, D will be filtered out. Otherwise, we insert Q
3
and D
3
to further compute
Dist Q ,D
2,3
Dist Q ,D
3,N
and
. The above newly computed distances replace
Dist Q ,D
2,N
the value of
, and the process is executed repeatedly until the
computed distance is larger than δ, or there are no more intermediate check
points within each sub-trajectory. Since most of the trajectories would be
filtered out by checking the first few control points, our proposed algorithm
is very e cient.
9.2.4 Experiment Results
In order to test the effectiveness and e ciency of our real-time event detec-
tion method, we tested our algorithm on the proposed surveillance systems
with monitors placed at eight different locations. These indoor/outdoor en-
vironments included a parking lot, the area in front of an elevator, and a
stairway. The corresponding background views taken at these locations are
shown in Fig. 9.5. To demonstrate the performance of the proposed color-
based blob tracking algorithm, the tracking results of the outdoor and indoor
environments are demonstrated in Figs. 9.6(a)(b) and Fig. 9.6(c), respec-
tively. Moving objects in Figs. 9.6(a)(b) were successfully tracked because
adaptive mixture Gaussian model is advantageous under changing illumina-
tions. In addition, the color histograms provide e cient computation and
Search WWH ::




Custom Search