Security Applications Using Computer Vision

Security Applications Using Computer Vision

Sreela Sasi
ISBN13: 9781466639942|ISBN10: 1466639946|EISBN13: 9781466639959
DOI: 10.4018/978-1-4666-3994-2.ch055
Cite Chapter Cite Chapter

MLA

Sasi, Sreela. "Security Applications Using Computer Vision." Image Processing: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2013, pp. 1093-1110. https://doi.org/10.4018/978-1-4666-3994-2.ch055

APA

Sasi, S. (2013). Security Applications Using Computer Vision. In I. Management Association (Ed.), Image Processing: Concepts, Methodologies, Tools, and Applications (pp. 1093-1110). IGI Global. https://doi.org/10.4018/978-1-4666-3994-2.ch055

Chicago

Sasi, Sreela. "Security Applications Using Computer Vision." In Image Processing: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 1093-1110. Hershey, PA: IGI Global, 2013. https://doi.org/10.4018/978-1-4666-3994-2.ch055

Export Reference

Mendeley
Favorite

Abstract

Computer vision plays a significant role in a wide range of homeland security applications. The homeland security applications include: port security (cargo inspection), facility security (embassy, power plant, bank), and surveillance (military or civilian), et cetera. Video surveillance cameras are placed in offices, hospitals, banks, ports, parking lots, parks, stadiums, malls, train stations, airports, et cetera. The challenge is not for acquiring surveillance data from these video cameras, but for identifying what is valuable, what can be ignored, and what demands immediate attention. Computer vision systems attempt to construct meaningful and explicit descriptions of the environment or scene captured in an image. A few Computer Vision based security applications are presented here for securing building facility, railroad (Objects on railroad, and red signal detection), and roads.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.