Volume 3, Issue 1 (9-2014)                   SCJ 2014, 3(1): 62-81 | Back to browse issues page

XML Persian Abstract Print

Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

Sebti A, Hassanpour H. People re-identification in video surveillance systems. SCJ. 2014; 3 (1) :62-81
URL: http://scj.kashanu.ac.ir/article-1-164-en.html
1- PHD Student Shahrood University, Shahrood University: Iran - Shahrood - P.O. Box 3619995161 - Phone: +982332392204-9 , ali.sebti@shahroodut.ac.ir
2- Professor Shahrood University, Shahrood University: Iran - Shahrood - P.O. Box 3619995161 - Phone: +982332392204-9
Abstract:   (1724 Views)
People re-identification is one of the most important and fundamental processes in video surveillance systems. The accuracy and efficiency of this task influence the effectiveness of the subsequent processes. Event detection and behavior analysis are instances of such subsequent processes that are classified in semantic levels. In people re-identification, having an image or video of an individual in a specific camera, we want to infer whether the person has been seen previously in the other cameras. Various changes in people’s appearance, recorded by different cameras, can lead to many difficulties in people re-identification. These changes may occur due to hardware limitations such as low-resolution, different color responses of cameras, lighting changes in different camera locations and person’s angle relative to the camera. In this paper we will present a review on the existing approaches in people re-identification, then, a new classification of these works based on their functionalities is provided. Our studies shows that the problem of changing the camera angles has not been seriously considered in the existing approaches and future research could provide models that able to resolve these problems.
Full-Text [PDF 6435 kb]   (1158 Downloads)    
Type of Study: Research | Subject: Special
Received: 2014/07/4 | Accepted: 2014/11/30 | Published: 2015/03/7

Add your comments about this article : Your username or Email:
Write the security code in the box

Send email to the article author

© 2018 All Rights Reserved | Soft Computing Journal

Designed & Developed by : Yektaweb