Occlusion Detection for Highway Traffic Analysis with Vision-based Surveillance Systems

Akio Yoneyama*, Chia H. Yeh, C. C. Jay Kuo

*Corresponding author for this work

Research output: Contribution to journalConference articlepeer-review

2 Citations (Scopus)

Abstract

The vision-based traffic monitoring system provides an attractive solution in extracting various traffic parameters such as the count, speed, flow and concentration from the processing of video data captured by a camera system. The detection accuracy is however affected by various environment factors such as shadow, occlusion, and lighting. Among these, the occurrence of occlusion is one of the major problems. In this work, a new scheme is proposed to detect the occlusion and determine the exact location of each vehicle. The proposed algorithm is based on the matching of images from multiple cameras. In the proposed scheme, we do not need edge detection, region segmentation, and camera calibration operations, which often suffer from the variation of environmental conditions. Experimental results are given to verify that the proposed technique is effective for vision-based highway surveillance systems.

Original languageEnglish
Pages (from-to)251-262
Number of pages12
JournalProceedings of SPIE - The International Society for Optical Engineering
Volume5108
DOIs
Publication statusPublished - 2003
Externally publishedYes
EventPROCEEDINGS OF SPIE SPIE - The International Society for Optical Engineering: Visual Information Processing XII - Orlando, FL, United States
Duration: 2003 Apr 212003 Apr 21

Keywords

  • Background Subtraction
  • Computer Vision
  • Object Tracking
  • Occlusion
  • Projection
  • Traffic Monitoring

ASJC Scopus subject areas

  • Electronic, Optical and Magnetic Materials
  • Condensed Matter Physics
  • Computer Science Applications
  • Applied Mathematics
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Occlusion Detection for Highway Traffic Analysis with Vision-based Surveillance Systems'. Together they form a unique fingerprint.

Cite this