Searched for: author:"Burghouts, G.J."
(1 - 20 of 53)

Pages

document
Burghouts, G.J. (author), Hillerström, F.H.J. (author)
Current object recognition techniques are based on deep learning and require substantial training samples in order to achieve a good performance. Nonetheless, there are many applications in which no (or only a few) training images of the targets are available, whilst they are well-known by domain experts. Zero-shot learning is used in use cases...
conference paper 2021
document
Bouma, H. (author), Schutte, K. (author), ten Hove, R.J.M. (author), Burghouts, G.J. (author), Baan, J. (author)
Surveillance systems are essential for the protection of military compounds and critical infrastructures. Automatic recognition of suspicious activities can augment human operators to find relevant threats. Common solutions for behavior analysis or action recognition require large amounts of training data. However, suspicious activities and...
conference paper 2018
document
Neumann, N.M.P. (author), Knegjens, R. (author), Den Hollander, R. (author), Oggero, S. (author), Burghouts, G.J. (author), Van Den Broek, S.P. (author)
Algorithms for the detection and tracking of objects can be combined into a system that automatically extracts relevant events from a large amount of video data. Such a system , can be particularly useful in video surveillance applications, notably to support analysts in retrieving information from hours of video while working under strict time...
conference paper 2018
document
den Hollander, R.J.M. (author), Bouma, H. (author), van Rest, J.H.C. (author), ten Hove, J.M. (author), ter Haar, F.B. (author), Burghouts, G.J. (author)
Video analytics is essential for managing large quantities of raw data that are produced by video surveillance systems (VSS) for the prevention, repression and investigation of crime and terrorism. Analytics is highly sensitive to changes in the scene, and for changes in the optical chain so a VSS with analytics needs careful configuration and...
conference paper 2017
document
Lefter, I. (author), Burghouts, G.J. (author), Rothkrantz, L.J.M. (author)
This paper investigates how speech and gestures convey stress, and how they can be used for automatic stress recognition. As a first step, we look into how humans use speech and gestures to convey stress. In particular, for both speech and gestures, we distinguish between stress conveyed by the intended semantic message (e.g. spoken words for...
article 2016
document
Bouma, H. (author), Burghouts, G.J. (author), den Hollander, R.J.M. (author), van der Zee, S. (author), Baan, J. (author), ten Hove, R.J.M. (author), van Diepen, C.J. (author), van den Haak, W.P. (author), van Rest, J. (author)
Deception detection is valuable in the security domain to distinguish truth from lies. It is desirable in many security applications, such as suspect and witness interviews and airport passenger screening. Interviewers are constantly trying to assess the credibility of a statement, usually based on intuition without objective technical support....
conference paper 2016
document
Bouma, H. (author), Eendebak, P.T. (author), Schutte, K. (author), Azzopardi, G. (author), Burghouts, G.J. (author)
Object recognition and localization are important to automatically interpret video and allow better querying on its content. We propose a method for object localization that learns incrementally and addresses four key aspects. Firstly, we show that for certain applications, recognition is feasible with only a few training samples. Secondly, we...
conference paper 2015
document
Bouma, H. (author), Baan, J. (author), ter Haar, F.B. (author), Eendebak, P.T. (author), den Hollander, R.J.M. (author), Burghouts, G.J. (author), Wijn, R. (author), van den Broek, S.P. (author), van Rest, J.H.C. (author)
In the security domain, cameras are important to assess critical situations. Apart from fixed surveillance cameras we observe an increasing number of sensors on mobile platforms, such as drones, vehicles and persons. Mobile cameras allow rapid and local deployment, enabling many novel applications and effects, such as the reduction of violence...
conference paper 2015
document
van Huis, J.R. (author), Bouma, H. (author), Baan, J. (author), Burghouts, G.J. (author), Eendebak, P.T. (author), Hollander, R.J.M. (author), Dijk, J. (author), van Rest, J.H.C. (author)
Automatic detection of abnormal behavior in CCTV cameras is important to improve the security in crowded environments, such as shopping malls, airports and railway stations. This behavior can be characterized at different time scales, e.g., by small-scale subtle and obvious actions or by large-scale walking patterns and interactions between...
conference paper 2014
document
Bouma, H. (author), Baan, J. (author), Burghouts, G.J. (author), Eendebak, P.T. (author), van Huis, J.R. (author), Dijk, J. (author), van Rest, J.H.C. (author)
Proactive detection of incidents is required to decrease the cost of security incidents. This paper focusses on the automatic early detection of suspicious behavior of pickpockets with track-based features in a crowded shopping mall. Our method consists of several steps: pedestrian tracking, feature computation and pickpocket recognition. This...
conference paper 2014
document
Burghouts, G.J. (author), Schutte, K (author), ten Hove, R.J.M. (author), van den Broek, S.P. (author), Baan, J. (author), Rajadell, O. (author), van Huis, J.R. (author), van Rest, J.H.C. (author), Hanckmann, P. (author), Bouma, H. (author), Sanroma, G. (author), Evans, M. (author), Ferryman, J. (author)
Threat detection is a challenging problem, because threats appear in many variations and differences to normal behaviour can be very subtle. In this paper, we consider threats on a parking lot, where theft of a truck’s cargo occurs. The theft takes place in very different forms, in the midst of many people who pose no threat. The threats range...
article 2014
document
Lefter, I. (author), Burghouts, G.J. (author), Rothkrantz, L.J.M. (author)
Stressful situations are likely to occur at human operated service desks, as well as at human-computer interfaces used in public domain. Automatic surveillance can help notifying when extra assistance is needed. Human communication is inherently multimodal e.g. speech, gestures, facial expressions. It is expected that automatic surveillance...
article 2014
document
Burghouts, G.J. (author), Eendebak, P.T. (author), Bouma, H. (author), Hove, R.J.M. (author)
In this paper, we summarize how the action recognition can be improved when multiple views are available. The novelty is that we explore various combination schemes within the robust and simple bag-of-words (BoW) framework, from early fusion of features to late fusion of multiple classifiers. In new experiments on the publicly available IXMAS...
conference paper 2014
document
Bouma, H. (author), van Rest, J.H.C. (author), Burghouts, G.J. (author), Schutte, K. (author), Baan, J. (author)
To improve security in crowded environments, such as airports, shopping malls and railway stations, the number of surveillance cameras (CCTV) is rapidly increasing. However, the number of human operators remains limited and only a selection of the video streams can be observed. This makes it hard for an operator to be proactive. This paper gives...
article 2014
document
Burghouts, G.J. (author), van Eekeren, A.W.M. (author), Dijk, J. (author)
This paper presents a system to extract metadata about human activities from full-motion video recorded from a UAV. The pipeline consists of these components: tracking, motion features, representation of the tracks in terms of their motion features, and classification of each track as one of the human activities of interest. We consider these...
conference paper 2014
document
Sanromà, G. (author), Patino, L. (author), Burghouts, G.J. (author), Schutte, K. (author), Ferryman, J. (author)
We present a method for the recognition of complex actions. Our method combines automatic learning of simple actions and manual definition of complex actions in a single grammar. Contrary to the general trend in complex action recognition, that consists in dividing recognition into two stages, our method performs recognition of simple and...
article 2014
document
Tangelder, J.W.H. (author), Lebert, E. (author), Burghouts, G.J. (author), van Zon, K. (author), Den Uyl, M.J. (author)
This paper presents a novel approach to detect persons in video by combining optical flow based motion analysis and silhouette based recognition. A new fast optical flow computation method is described, and its application in a motion based analysis framework unifying human tracking and detection is outlined. Our optical flow algorithm...
conference paper 2014
document
Burghouts, G.J. (author), van Slingerland, P. (author), ten Hove, R.J.M. (author), den Hollander, R.J.M. (author), Schutte, K. (author)
Theft of cargo from a truck or attacks against the driver are threats hindering the day to day operations of trucking companies. In this work we consider a system, which is using surveillance cameras mounted on the truck to provide an early warning for such evolving threats. Low-level processing involves tracking people and calculating motion...
conference paper 2014
document
Dijk, J. (author), van Eekeren, A.W.M. (author), Rajadell Rojas, O. (author), Burghouts, G.J. (author), Schutte, K. (author)
Surveillance and reconnaissance tasks are currently often performed using an airborne platform such as a UAV. The airborne platform can carry different sensors. EO/IR cameras can be used to view a certain area from above. To support the task from the sensor analyst, different image processing techniques can be applied on the data, both in real...
conference paper 2013
document
Burghouts, G.J. (author), Eendebak, P.T. (author), Bouma, H. (author), ten Hove, R.J.M. (author)
This paper describes the TNO action recognition system that was used to generate the results for our submission to the competition track of the THUMOS ’13 challenge at ICCV ’13. This system deploys only the STIP features that were provided on the website of the challenge. A bag-of-features model is extended with three novelties
conference paper 2013
Searched for: author:"Burghouts, G.J."
(1 - 20 of 53)

Pages