Font Size: a A A

The Study On Video Controllers Electronics Figures Identification

Posted on:2013-04-20Degree:MasterType:Thesis
Country:ChinaCandidate:X CaiFull Text:PDF
GTID:2246330395488134Subject:Investigation
Abstract/Summary:PDF Full Text Request
In recent years, more and more cases occurred in public places,such as murder,robbery, theft.and other public places, to the mobility of the population, it is difficult to needto find witnesses, difficult to obtain valuable evidence, which brings great difficulty to thecase. But with the development of computer technology, many city in safety construction inpublic places for video surveillance equipment, the equipment is usually a full-time job, in theshooting range record person activity process, the crime, so to make full use of videomonitoring case investigation, crime. However, due to the video monitoring shooting range,angle of shooting, shooting distance, shooting light and other factors, monitor image qualityuneven, often appear character fuzzy, deformation and other problems, hence the need for aportrait of technical processing and identification. In this article the author to the traditionalportrait identification method as the core, combined with video surveillance in the portrait ofevidence electronic properties to study, with period through the above research can providethe beneficial reference on portrait identification monitoring.This paper is divided into five parts:The first part of the video monitoring portrait identification overview. Introduced videomonitoring electronic portrait identification of the concepts covered in the electronic evidence,under the framework of the analysis of video monitoring portrait types of evidence attribute,analyses the appraisal content data, identification of the content bearing means diversity,identification of difficulty major characteristic and the identification of the necessity.The second part is mainly on the domestic and foreign electronic portrait identificationevidence development present situation, introduced the first foreign electronic evidencetheory and the development of Anglo-American countries electronic evidence identificationsystem process, then to our country electronic evidence identification theory and processanalysis system. Through the above analysis, the author thinks China video monitoringelectronic portrait identification also lacks the related evidence, norms to guide and constrain.The third part of the video monitoring portrait identification work encountered majordifficulties are analyzed. The first analysis of the video monitoring image fuzziness leads tothe dilemma, including focus blur, motion blur radial blur, blur, exposure. Followed by theanalysis of video monitoring portrait of forensics difficulties, including the signal transfer, deposit, deposit copy shot three unreasonable extraction method. The final analysis of videomonitoring system on face tracking positioning dilemma.The fourth part of the video monitoring image authenticity identification analysis. Thefirst of the respective control several image forgery is presented by using the scene, imagequality, image changes, time changes, temperature changes, is processed, the video format,depth of field knowledge marks, saturation and contrast investigation knowledge, meteringmethod of judgement, and introduced our country computer field was proposed according tothe image area duplicate detection, using the expectation-maximization algorithm to detectimage authenticity identification method.The fifth part focuses on the video monitor portrait of the same sex identification. Thecombination of static portrait identification theory knowledge of human head featurerecognition, feature recognition, shape special mark recognition, behavior recognition of fourmethods, and the feature point and identification of point undertake an analysis, discussed theapplication of video monitoring portrait identification on.
Keywords/Search Tags:Video monitoring portrait identification, Authenticity identification, Identity identification, Fuzzy
PDF Full Text Request
Related items