# Introduction to Video Background Subtraction

Introduction to Video Background Subtraction 1 2 Motivation In video action analysis, there are many popular applications like surveillance for security, home care and athletes action analysis to predict and develop the strategy. The first step is to capture the human or moving parts which we call foreground. And then use the information to recognize the actions. In this presentation, I will introduce the methods to extract

the foreground. 3 Overall structure 3D model Estimation Human Joints Estimation Background Subtraction Feature

points Model learning Activity Recognition 4 Methods of Background Subtraction At early time, the widely used method is the Gaussian Mixture

Model (GMM) [1] and statistics [2]. The main advantage of GMM is that the it can reach real time processing. But it is sensitive to small noise like changing the luminance. In recent years, robust principle component analysis (RPCA) model [3][4][5] is found good performance than other state-ofthe-art means. But instead, it costs more iterative time. 5 GMM (Method 1) GMM uses 3~5 Gaussian functions to each color channel pixel of the video frame. New input pixels the algorithm would check whether the value is smaller than the deviation of Gaussian which is determined

by the past pixel values of the same pixel location to determine this pixel is foreground or not. 6 GMM (contd) Traffic sequence This picture is result showed in [1] Left is original frame, and the right is the overlapped frames 7

GMM (contd) We use the code provided by [1]. And the clip was shot by ourselves There are holes and noise in the left image 8 GMM (contd) We use closing morphology to do post processing in order to get more clean images.

9 Foreground classification & Statistics (Method 2) The work [2] tears foreground into 4 parts, including moving visual object (MVO), ghost due to deinterlacing of TV, moving visual object shadow (MVO shadow), and ghost shadow. Judge whether the pixel belongs to foreground. If not, use several previous frames to estimate the current value. Examples from [6] to show the effect of

ghost 10 Foreground classification & Statistics : moving visual object : ghost : ghost shadow : moving visual object shadow The result from [2]

11 RPCA (Method 3) The method is to transform video frames to vectors. And then combine the vectors into a big matrix. It follows the conditions that B is background matrix which is low rank and F represent foreground matrix which is sparse. And the combination of the two matrix is the original frames. arg min ( )+ 1 ,

s.t. : : D B F : original frame matrix : norm : constant

12 RPCA (contd) The objective function in P.9 is an ill-posed problem, so the solution is to iteratively optimize B and F This is captured from [3]. 13 RPCA (contd) We also run the code provided by [3] with our own video clips.

Use the code from [3] by our clips Comparing with GMM, obviously RPCA is more robust. Generalized Fused Lasso (GFL) (Method 14 4) The latest research about background subtraction is [4]. With the same low-ranked objective function. The zero norm term is modeled by generalized fused lasso function. min B , F rank ( B) F gfl

s.t. D B F : : original frame matrix : : h ( )

, : constant : weighting : spatial neighborhood pixels 15 Generalized Fused Lasso (GFL) (contd)

Results comparison of GFL and RCPA from [4] Result from [4] Original image, ground truth, GFL 16 Conclusion GMM only cost 0.03 second per frame, but it always cause holes in the foreground parts. Also the low-ranked matrix is fancy, but the cost time is high.

(Almost 30 seconds for 10 frames) Also the shadow parts of images are not considered as foreground. There may need some constraints to remove the shadow. All of the methods discussed above are only applied in static cameras. 17 References [1] Zoran Zivkovic Improved Adaptive Gaussian Mixture Model for Background Subtraction In Proc. ICPR, 2004 [2] Rita Cucchiara, Costantino Grana, Massimo Piccardi, Andrea Prati Detecting Moving Objects, Ghosts, and Shadows in Video Streams IEEE

TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 25, NO. 10, OCTOBER 2003 [3] John Wright , Yigang Peng, Yi Ma, Arvind Ganesh, Shankar Rao Robust Principal Component Analysis: Exact Recovery of Corrupted Low-Rank Matrices by Convex Optimization NIPS 2009 [4] Xiaowei Zhou, Can Yang and Weichuan Yu Moving Object Detection by Detecting Contiguous Outliers in the Low-Rank Representation Pattern Analysis and Machine Intelligence, IEEE Transactions 2012 [5] Bo Xin Yuan Tian Yizhou Wang Wen Gao Background Subtraction via Generalized Fused Lasso Foreground Modeling CVPR 2015 [6] https://en.wikipedia.org/wiki/Interlaced_video

## Recently Viewed Presentations

• Multiplication Rule: Many Statistics methods require an . Independence Assumption, but . assuming. independence doesn't make it true. Always . Think. about whether that assumption is reasonable before using the Multiplication Rule. Formal Probability Rules (cont.)
• Cornwall & Isles of Scilly - Wider Issues. Reducing crime and harm. Social and economic impact. Aligning people to calls for service. Longer-term problem-solving in partnerships
• WhyDeveloper Express XtraReports? ... Medium Trust Support. Since many web hosts do not grant Full Trust permission to their clients, reports can be viewed and work at a Medium Trust permission level. Report Caching for Faster Navigation and Export Operations.
• Number of the NMOS transistors (PMOS transistors) equals to the number of the inputs. Output load is capacitive * NAND Gates Transistors in Parallel 1/Rcheff = (1/Rch1) + (1/Rch2) Transistors in Series Rcheff = Rch1 + Rch2 * CMOS NAND...
• Learning unit 4-II. e-Commerce versus e-Business. ... Ecommerce. Buying and selling of goods and services over the Internet. Ebusiness. Includes e-commerce along with other activities related to internal and external business operations on the Internet.
• There are two basic methods for funding self-insurance programsâ€¦ Cash Flow Funding - Charges premiums to cover the cost of claims paid in a given fiscal year. Ultimate Cost Funding - Charges premiums to cover the ultimate cost of claims...
• Defense Security Service (DSS) Mission. ... carry out a pilot program to develop and incorporate technology protection features in a designated system during the R&D phase of such system." ... (PO-FL) Department of the Air Force. Foreign Disclosure and Technology...
• Examples of Waste Reduction Projects in Sustainable Maryland Municipalities. Sustainable Maryland is a program of the Environmental Finance Center at UMD-College Park. 70 of 157 municipalities are registered (40%) 39. towns and cities certified as of 2017.