JOURNAL ARTICLE

Dual Temporal Differencing for Real-Time Abandoned Object Detection

Abstract

In recent years, ensuring safety in the public domain has posed significant challenges, prompting extensive research into developing intelligent surveillance cameras capable of detecting suspicious items before emergencies arise. Also, it is imperative to mitigate the loss of life and property resulting from terrorist attacks within the public sphere, necessitating effective safety measures. We propose Dual Temporal Buffer Differencing (DTBD) and a Single Short Deep Convolutional Neural Network (SSDCNT) object detector to address these challenges. We built two buffers to model the background independently and uniquely segment the static foreground region. The approach can detect the candidate stationary object using contour methodology with the single shot deep convolutional neural network object detector. The candidate object is validated and identified as abandoned and attended. Our approach is unique because it is robust to various illumination changes without affecting the foreground element, and it can detect suspicious objects in any crowd or complex scenario. Its application will mitigate the risk of a potential terrorist attack in the public domain by sensing and alerting the security expert before a situation becomes an emergency. The performance of our proposed approach, the benefits, and the implementation challenges were evaluated through a publicly available dataset ABODA and PEET 2006. The result demonstrates that our proposed approach outperformed other state-of-the-art algorithms in detecting suspicious items. As a result, the approach can facilitate safety in the public domain. It will enable the security personnel to respond proactively to the suspicious item and de-escalate it before the situation becomes an emergency.

Keywords:
Dual (grammatical number) Computer science Object (grammar) Object detection Artificial intelligence Real-time computing Pattern recognition (psychology) Art

Metrics

1
Cited By
0.18
FWCI (Field Weighted Citation Impact)
19
Refs
0.48
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Video Surveillance and Tracking Methods
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition
Anomaly Detection Techniques and Applications
Physical Sciences →  Computer Science →  Artificial Intelligence

Related Documents

JOURNAL ARTICLE

Abandoned Object Detection using Frame Differencing and Background Subtraction

Mohiu DinAneela BashirAbdul BasitSadia Lakho

Journal:   International Journal of Advanced Computer Science and Applications Year: 2020 Vol: 11 (7)
BOOK-CHAPTER

Real-Time Permanent Change Proposals for Abandoned Object Detection

Aafaq InamdarMukesh A. Zaveri

Lecture notes in networks and systems Year: 2024 Pages: 131-146
JOURNAL ARTICLE

Real-time abandoned and stolen object detection based on spatio-temporal features in crowded scenes

Yunyoung Nam

Journal:   Multimedia Tools and Applications Year: 2015 Vol: 75 (12)Pages: 7003-7028
© 2026 ScienceGate Book Chapters — All rights reserved.