Path Analysis in Multiple-Target Video Sequences

  • Brais Cancela
  • Marcos Ortega
  • Alba Fernández
  • Manuel G. Penedo
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6979)


Path analysis becomes a powerful tool when dealing with behavior analysis, i. e., detecting abnormal movements. In a multiple target scenario it is complicated to obtain each object path because of collision events, such as grouping and splitting targets, and occlusions, both total or partial. In this work, a method to obtain the similarity between different trajectories is presented, based in register techniques. In addition, an hierarchical architecture is used to obtain the corresponding paths of the objects in a scene, to cope with collision events. Experimental results show promising results in path analysis, enabling it to establish thresholds to abnormal path detection.


Path Analysis Register Technique Partial Occlusion Collision Event Hierarchical Architecture 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Owens, J., Hunter, A.: Application of the self-organising map to trajectory classification. In: Proceedings of Third IEEE International Workshop on Visual Surveillance (2000)Google Scholar
  2. 2.
    Jiang, F., Wu, Y., Katsaggelos, A.K.: Abnormal event detection from surveillance video by dynamic hierarchical clustering. In: IEEE International Conference on Image Processing, ICIP 2007, vol. 16 (2007)Google Scholar
  3. 3.
    Rao, S., Sastry, P.S.: Abnormal activity detection in video sequences using learnt probability densities. In: TENCON 2003, Conference on Convergent Technologies for Asia-Pacific Region, vol. 1, pp. 369–372 (2003)Google Scholar
  4. 4.
    Calderara, S., Cucchiara, R., Prati, A.: Detection of abnormal behaviors using a mixture of von mises distributions. In: IEEE Conference on Advanced Video and Signal Based Surveillance, AVSS 2007, pp. 141–146 (2007)Google Scholar
  5. 5.
    Mariño, C., Penedo, M.G., Penas, M., Carreira, M.J., González, F.: Personal authentication using digital retinal images. Pattern Analysis and Applications 9, 21–33 (2006)MathSciNetCrossRefGoogle Scholar
  6. 6.
    Mariño, C., Ortego, M., Barreira, N., Penodo, M.G., Carreira, M.J., González, F.: Algorithm for registration of full scanning laser ophtalmoscope video sequences. Computer Methods and Programs in Biomedicine 102(1), 1–16 (2011)CrossRefGoogle Scholar
  7. 7.
    Rowe, D., Reid, I., Gonzàlez, J., Villanueva, J.J.: Unconstrained multiple-people tracking. In: Franke, K., Müller, K.-R., Nickolay, B., Schäfer, R. (eds.) DAGM 2006. LNCS, vol. 4174, pp. 505–514. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  8. 8.
    Stauffer, C., Grimson, W.E.L.: Adaptive background mixture models for real-time tracking. In: IEEE Computer Society Conference on Computer Vision and Pattern Recognition, vol. 2, pp. 246–252 (1999)Google Scholar
  9. 9.
    Vaswani, N., Chowdhury, A.R., Chellappa, R.: ”shape activity”: A continuous state hmm for moving/deforming shapes with application to abnormal activity detection. IEEE Transactions on Image Processing 14(10), 1603–1616 (2005)CrossRefGoogle Scholar
  10. 10.
    Grimson, W., Lee, L., Romano, R., Stauffer, C.: Using adaptive tracking to classify and monitor activities in a site. In: Proc. IEEE Conf. Computer Vision and Pattern Recognition, Santa Barbara, CA, pp. 22–31 (1998)Google Scholar
  11. 11.
    CANDELA: content analysis and networked delivery architectures,

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Brais Cancela
    • 1
  • Marcos Ortega
    • 1
  • Alba Fernández
    • 1
  • Manuel G. Penedo
    • 1
  1. 1.Varpa Group, Department of Computer ScienceUniversity of A CoruñaSpain

Personalised recommendations