Design and Analysis of an Efficient Object Tracking System using Modified Mean Shift Tracking
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 8
Abstract
Object tracking is the process of locating a moving object (or multiple objects) over time using a camera. It has a variety of uses, some of which are: human-computer interaction, security and surveillance, video communication and compression, augmented reality, traffic control, medical imaging and video editing. Video tracking can be a time consuming process due to the amount of data that is contained in video. A lot of object tracking algorithms have been reported in literatures, but the area is still lacking with an efficient algorithm which can, not only track the objects but at the same time able to recognize the orientation and movement of object. In this paper an analysis of previously developed efficient object tracking system is based on Modified mean shift tracking (MMST) algorithm is present. This work basically deals with how to address the problem to estimate the scale and orientation changes of the target under the mean shift tracking framework. In the original mean shift tracking algorithm, the position of the target can be well estimated, while the scale and orientation changes cannot be adaptively estimated. This paper presents an Analysis of efficient modification on available mean shift tracking technique, that the weight image derived from the target model and the candidate model can represent the possibility that a pixel belongs to the target, in this work by statistical analysis, it will be shown that the original mean shift tracking algorithm can be derived using the zeroth and the first order moments of the weight image.
Authors and Affiliations
Abhishek Kesharwani, Preeti Tuli
Reliable Algorithm for Extracting Web Data
Web usage mining is a process of extracting useful information from server logs i.e. users history. Web usage mining is the process of finding out what users are looking for on the Internet. Some users might be look...
Pattern-Based Text Mining Method For Classification of Research Proposals
Research proposal classification is an important task for private research funding agencies. When a large number of research proposals are received, it is common to group them according to their similarities in resear...
A Reliable implementation of Security-Enabled Architecture with area optimized symmetric Cryptography
My project specifies a symmetric Cryptography technique which provides same keys to Cipher and Decipher to transfer the information for reducing the design complexity and AES (Advanced Encryption Standard) which prov...
A Survey on Distributed Network Services Using SSO for Secure Mechanism
Methodologies presently use in single sign-on (SSO) for enable a legal user with a single credential to be authenticated by a multiple service providers in a distributed computer network. The earlier techniques cause...
Homomorphic Token and Distributed Erasure-Code for cloud
Cloud users store their data in the cloud environment which is privileged by the service provider. Cloud users can access their cloud storage. Here we propose a flexible distributed storage integrity auditing mechani...