Object Extraction and Classification in Video Surveillance Applications

Muhsin Civelek, Adnan Yazici

Research output: Contribution to journalArticle

2 Citations (Scopus)

Abstract

In this paper we review a number of methods used in video surveillance applications in order to detect and classify threats. Moreover, the use of those methods in wireless surveillance networks contributes to decreasing the energy consumption of the devices because it reduces the amount of information transferred through the network. In this paper we focus on the most popular object extraction and classification methods that are used in both wired and wireless surveillance applications. We also develop an application for identification of objects from video data by implementing the selected methods and demonstrate the performance of these methods on pre-recorded videos using the outputs of this application.

Original languageEnglish
Pages (from-to)246-259
Number of pages14
JournalEuropean Review
Volume25
Issue number2
DOIs
Publication statusPublished - May 1 2017

Fingerprint

surveillance
video
energy consumption
method
threat
performance

ASJC Scopus subject areas

  • Geography, Planning and Development
  • Political Science and International Relations

Cite this

Object Extraction and Classification in Video Surveillance Applications. / Civelek, Muhsin; Yazici, Adnan.

In: European Review, Vol. 25, No. 2, 01.05.2017, p. 246-259.

Research output: Contribution to journalArticle

@article{e57ffaf827724a97b0dfde6d54cc8134,
title = "Object Extraction and Classification in Video Surveillance Applications",
abstract = "In this paper we review a number of methods used in video surveillance applications in order to detect and classify threats. Moreover, the use of those methods in wireless surveillance networks contributes to decreasing the energy consumption of the devices because it reduces the amount of information transferred through the network. In this paper we focus on the most popular object extraction and classification methods that are used in both wired and wireless surveillance applications. We also develop an application for identification of objects from video data by implementing the selected methods and demonstrate the performance of these methods on pre-recorded videos using the outputs of this application.",
author = "Muhsin Civelek and Adnan Yazici",
year = "2017",
month = "5",
day = "1",
doi = "10.1017/S1062798716000582",
language = "English",
volume = "25",
pages = "246--259",
journal = "European Review",
issn = "1062-7987",
publisher = "Cambridge University Press",
number = "2",

}

TY - JOUR

T1 - Object Extraction and Classification in Video Surveillance Applications

AU - Civelek, Muhsin

AU - Yazici, Adnan

PY - 2017/5/1

Y1 - 2017/5/1

N2 - In this paper we review a number of methods used in video surveillance applications in order to detect and classify threats. Moreover, the use of those methods in wireless surveillance networks contributes to decreasing the energy consumption of the devices because it reduces the amount of information transferred through the network. In this paper we focus on the most popular object extraction and classification methods that are used in both wired and wireless surveillance applications. We also develop an application for identification of objects from video data by implementing the selected methods and demonstrate the performance of these methods on pre-recorded videos using the outputs of this application.

AB - In this paper we review a number of methods used in video surveillance applications in order to detect and classify threats. Moreover, the use of those methods in wireless surveillance networks contributes to decreasing the energy consumption of the devices because it reduces the amount of information transferred through the network. In this paper we focus on the most popular object extraction and classification methods that are used in both wired and wireless surveillance applications. We also develop an application for identification of objects from video data by implementing the selected methods and demonstrate the performance of these methods on pre-recorded videos using the outputs of this application.

UR - http://www.scopus.com/inward/record.url?scp=85006251758&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85006251758&partnerID=8YFLogxK

U2 - 10.1017/S1062798716000582

DO - 10.1017/S1062798716000582

M3 - Article

AN - SCOPUS:85006251758

VL - 25

SP - 246

EP - 259

JO - European Review

JF - European Review

SN - 1062-7987

IS - 2

ER -