Reference Hub1
Security Applications Using Computer Vision

Security Applications Using Computer Vision

Sreela Sasi
ISBN13: 9781466626720|ISBN10: 1466626720|EISBN13: 9781466627031
DOI: 10.4018/978-1-4666-2672-0.ch004
Cite Chapter Cite Chapter

MLA

Sasi, Sreela. "Security Applications Using Computer Vision." Robotic Vision: Technologies for Machine Learning and Vision Applications, edited by Jose Garcia-Rodriguez and Miguel A. Cazorla Quevedo, IGI Global, 2013, pp. 60-77. https://doi.org/10.4018/978-1-4666-2672-0.ch004

APA

Sasi, S. (2013). Security Applications Using Computer Vision. In J. Garcia-Rodriguez & M. Cazorla Quevedo (Eds.), Robotic Vision: Technologies for Machine Learning and Vision Applications (pp. 60-77). IGI Global. https://doi.org/10.4018/978-1-4666-2672-0.ch004

Chicago

Sasi, Sreela. "Security Applications Using Computer Vision." In Robotic Vision: Technologies for Machine Learning and Vision Applications, edited by Jose Garcia-Rodriguez and Miguel A. Cazorla Quevedo, 60-77. Hershey, PA: IGI Global, 2013. https://doi.org/10.4018/978-1-4666-2672-0.ch004

Export Reference

Mendeley
Favorite

Abstract

Computer vision plays a significant role in a wide range of homeland security applications. The homeland security applications include: port security (cargo inspection), facility security (embassy, power plant, bank), and surveillance (military or civilian), et cetera. Video surveillance cameras are placed in offices, hospitals, banks, ports, parking lots, parks, stadiums, malls, train stations, airports, et cetera. The challenge is not for acquiring surveillance data from these video cameras, but for identifying what is valuable, what can be ignored, and what demands immediate attention. Computer vision systems attempt to construct meaningful and explicit descriptions of the environment or scene captured in an image. A few Computer Vision based security applications are presented here for securing building facility, railroad (Objects on railroad, and red signal detection), and roads.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.