• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

视频监控的周界入侵检测:综述。

Perimeter Intrusion Detection by Video Surveillance: A Survey.

机构信息

Univ Lyon, Univ Lyon 2, CNRS, INSA Lyon, UCBL, LIRIS, UMR5205, F-69676 Bron, France.

Foxstream, F-69120 Vaulx-en-Velin, France.

出版信息

Sensors (Basel). 2022 May 9;22(9):3601. doi: 10.3390/s22093601.

DOI:10.3390/s22093601
PMID:35591289
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC9104546/
Abstract

In recent times, we have seen a massive rise in vision-based applications, such as video anomaly detection, motion detection, object tracking, people counting, etc. Most of these tasks are well defined, with a clear idea of the goal, along with proper datasets and evaluation procedures. However, perimeter intrusion detection (PID), which is one of the major tasks in visual surveillance, still needs to be formally defined. A perimeter intrusion detection system (PIDS) aims to detect the presence of an unauthorized object in a protected outdoor site during a certain time. Existing works vaguely define a PIDS, and this has a direct impact on the evaluation of methods. In this paper, we mathematically define it. We review the existing methods, datasets and evaluation protocols based on this definition. Furthermore, we provide a suitable evaluation protocol for real-life application. Finally, we evaluate the existing systems on available datasets using different evaluation schemes and metrics.

摘要

近年来,基于视觉的应用程序如视频异常检测、运动检测、目标跟踪、人数统计等得到了广泛的应用。这些任务大多定义明确,目标清晰,同时还有适当的数据集和评估程序。然而,作为视觉监控的主要任务之一的周界入侵检测(PID)仍然需要正式定义。周界入侵检测系统(PIDS)旨在检测在特定时间段内受保护的室外场地是否存在未经授权的物体。现有的工作只是模糊地定义了 PIDS,这直接影响了方法的评估。在本文中,我们对其进行了数学定义。我们基于这个定义来回顾现有的方法、数据集和评估协议。此外,我们还提供了一个适合实际应用的评估协议。最后,我们使用不同的评估方案和指标在现有的数据集上评估现有的系统。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/62d9/9104546/5893b5e8394a/sensors-22-03601-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/62d9/9104546/cf17c66e1d3b/sensors-22-03601-g0A1.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/62d9/9104546/3d070323bad2/sensors-22-03601-g0A2.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/62d9/9104546/14ea9faddf2b/sensors-22-03601-g0A3.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/62d9/9104546/68e74209e3ad/sensors-22-03601-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/62d9/9104546/6dda2d86b603/sensors-22-03601-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/62d9/9104546/a9f974d679f7/sensors-22-03601-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/62d9/9104546/e9a6d4296106/sensors-22-03601-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/62d9/9104546/edafed4ef24b/sensors-22-03601-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/62d9/9104546/b80f6557e94c/sensors-22-03601-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/62d9/9104546/9e25e12336f5/sensors-22-03601-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/62d9/9104546/6f72f253edb2/sensors-22-03601-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/62d9/9104546/f49a12279ee4/sensors-22-03601-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/62d9/9104546/6ba88665e88d/sensors-22-03601-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/62d9/9104546/8afdb70f3c81/sensors-22-03601-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/62d9/9104546/ba2405c6cacd/sensors-22-03601-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/62d9/9104546/898943ad0c5d/sensors-22-03601-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/62d9/9104546/5893b5e8394a/sensors-22-03601-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/62d9/9104546/cf17c66e1d3b/sensors-22-03601-g0A1.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/62d9/9104546/3d070323bad2/sensors-22-03601-g0A2.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/62d9/9104546/14ea9faddf2b/sensors-22-03601-g0A3.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/62d9/9104546/68e74209e3ad/sensors-22-03601-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/62d9/9104546/6dda2d86b603/sensors-22-03601-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/62d9/9104546/a9f974d679f7/sensors-22-03601-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/62d9/9104546/e9a6d4296106/sensors-22-03601-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/62d9/9104546/edafed4ef24b/sensors-22-03601-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/62d9/9104546/b80f6557e94c/sensors-22-03601-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/62d9/9104546/9e25e12336f5/sensors-22-03601-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/62d9/9104546/6f72f253edb2/sensors-22-03601-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/62d9/9104546/f49a12279ee4/sensors-22-03601-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/62d9/9104546/6ba88665e88d/sensors-22-03601-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/62d9/9104546/8afdb70f3c81/sensors-22-03601-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/62d9/9104546/ba2405c6cacd/sensors-22-03601-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/62d9/9104546/898943ad0c5d/sensors-22-03601-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/62d9/9104546/5893b5e8394a/sensors-22-03601-g014.jpg

相似文献

1
Perimeter Intrusion Detection by Video Surveillance: A Survey.视频监控的周界入侵检测:综述。
Sensors (Basel). 2022 May 9;22(9):3601. doi: 10.3390/s22093601.
2
Secured Perimeter with Electromagnetic Detection and Tracking with Drone Embedded and Static Cameras.带嵌入式无人机和静态摄像机的电磁探测和跟踪的安全防护系统。
Sensors (Basel). 2021 Nov 6;21(21):7379. doi: 10.3390/s21217379.
3
Small Object Detection and Tracking: A Comprehensive Review.小目标检测与跟踪:全面综述
Sensors (Basel). 2023 Aug 3;23(15):6887. doi: 10.3390/s23156887.
4
A Survey on Multi-Sensor Fusion Perimeter Intrusion Detection in High-Speed Railways.高速铁路中多传感器融合周界入侵检测的调查
Sensors (Basel). 2024 Aug 23;24(17):5463. doi: 10.3390/s24175463.
5
Anomaly detection using edge computing in video surveillance system: review.视频监控系统中基于边缘计算的异常检测:综述
Int J Multimed Inf Retr. 2022;11(2):85-110. doi: 10.1007/s13735-022-00227-8. Epub 2022 Mar 29.
6
Enhanced Network Intrusion Detection System.增强型网络入侵检测系统。
Sensors (Basel). 2021 Nov 25;21(23):7835. doi: 10.3390/s21237835.
7
Online Video Anomaly Detection.在线视频异常检测
Sensors (Basel). 2023 Aug 26;23(17):7442. doi: 10.3390/s23177442.
8
A Smart Context-Aware Hazard Attention System to Help People with Peripheral Vision Loss.一种智能上下文感知危险注意系统,帮助有周边视觉损失的人。
Sensors (Basel). 2019 Apr 5;19(7):1630. doi: 10.3390/s19071630.
9
Application of Crowd Simulations in the Evaluation of Tracking Algorithms.人群模拟在跟踪算法评估中的应用。
Sensors (Basel). 2020 Sep 2;20(17):4960. doi: 10.3390/s20174960.
10
New Generation Deep Learning for Video Object Detection: A Survey.用于视频目标检测的新一代深度学习:综述
IEEE Trans Neural Netw Learn Syst. 2022 Aug;33(8):3195-3215. doi: 10.1109/TNNLS.2021.3053249. Epub 2022 Aug 3.

引用本文的文献

1
Real-time object detection, tracking, and monitoring framework for security surveillance systems.用于安全监控系统的实时目标检测、跟踪和监测框架。
Heliyon. 2024 Jul 20;10(15):e34922. doi: 10.1016/j.heliyon.2024.e34922. eCollection 2024 Aug 15.
2
Intrusion Detection Quantum Sensor Networks.入侵检测量子传感器网络
Sensors (Basel). 2022 Oct 22;22(21):8092. doi: 10.3390/s22218092.

本文引用的文献

1
New Generation Deep Learning for Video Object Detection: A Survey.用于视频目标检测的新一代深度学习:综述
IEEE Trans Neural Netw Learn Syst. 2022 Aug;33(8):3195-3215. doi: 10.1109/TNNLS.2021.3053249. Epub 2022 Aug 3.
2
Event-Based Vision: A Survey.基于事件的视觉:综述。
IEEE Trans Pattern Anal Mach Intell. 2022 Jan;44(1):154-180. doi: 10.1109/TPAMI.2020.3008413. Epub 2021 Dec 7.
3
The Riemannian Potato Field: A Tool for Online Signal Quality Index of EEG.黎曼土豆田:一种 EEG 在线信号质量指数的工具。
IEEE Trans Neural Syst Rehabil Eng. 2019 Feb;27(2):244-255. doi: 10.1109/TNSRE.2019.2893113. Epub 2019 Jan 15.
4
Abandoned Object Detection in Video-Surveillance: Survey and Comparison.视频监控中遗弃物检测:调查与比较。
Sensors (Basel). 2018 Dec 5;18(12):4290. doi: 10.3390/s18124290.
5
Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks.更快的 R-CNN:基于区域建议网络的实时目标检测。
IEEE Trans Pattern Anal Mach Intell. 2017 Jun;39(6):1137-1149. doi: 10.1109/TPAMI.2016.2577031. Epub 2016 Jun 6.
6
The precision-recall plot is more informative than the ROC plot when evaluating binary classifiers on imbalanced datasets.在不平衡数据集上评估二元分类器时,精确率-召回率曲线比ROC曲线更具信息性。
PLoS One. 2015 Mar 4;10(3):e0118432. doi: 10.1371/journal.pone.0118432. eCollection 2015.
7
Evaluating color descriptors for object and scene recognition.评估用于目标和场景识别的颜色描述符。
IEEE Trans Pattern Anal Mach Intell. 2010 Sep;32(9):1582-96. doi: 10.1109/TPAMI.2009.154.
8
Distributed visual-target-surveillance system in wireless sensor networks.无线传感器网络中的分布式视觉目标监测系统
IEEE Trans Syst Man Cybern B Cybern. 2009 Oct;39(5):1134-46. doi: 10.1109/TSMCB.2009.2013196. Epub 2009 Mar 24.
9
Transform coefficient histogram-based image enhancement algorithms using contrast entropy.基于对比度熵的变换系数直方图图像增强算法。
IEEE Trans Image Process. 2007 Mar;16(3):741-58. doi: 10.1109/tip.2006.888338.