90 likes | 174 Views
Honours Project Security Tracker. University of the Western Cape Computer Science Department Project Supervisor Mr. J. Connan. Created by Jered Michael Olckers 2539965. Introduction. Project Overview - Security Tracker System How it works Camera 1 Camera2
E N D
Honours Project Security Tracker University of the Western Cape Computer Science Department Project Supervisor Mr. J. Connan Created by Jered Michael Olckers 2539965
Introduction • Project Overview • -Security Tracker System • How it works • Camera 1Camera2 • Detects, identifies and tracks Detects, recognize and tracks commun-ication
Requirements • 2 Or more Cameras • Provide Video sources • Moving Object • -Person walking a) After 10 frames b)After 20 frames c)After 30 frames d)After 40 frames
Methology • Input • - Surveillance footage • Processing such as • - Movement detection • - Object identification • - Tracking object across cameras • Output • -Track object across cameras • -Display tracking time
Graphical Representation Tracking Movement detection Object identification Output Output Processing Input
Testing • With Pictures • Same background different people • Aim object identification • With Camera • Identify and track object • Using one, then two cameras Selecting an object for identification (Person) Object Selected No match Match found
Conclusion • Ample application market • Costly • Aim • -Develop inexpensive Surveillance Tracker • -Cost-effective hardware • -Real time processing JTV-Tracker
References • Rafael C. Gonzalez, Richard E. Woods • Digital image processing Second Edition • Mei Han Wei Xu Hai Taoz Yihong Gong • Multi-Object Trajectory Tracking • Fatih Porikli • Achieving Real-Time Object Detection and • Tracking Under Extreme Conditions • Alper Yilmaz,Ohio State University, Omar Javed • Object Tracking: A Survey
Thank you! Questions?