2J. G. Choi, S. D. Kim. Multi-stage segmentation of optical filed [J]. Signal Processing, 1996 (54):109-118.
3Sage K and Young S,Security application of computer vision[J].IEEE Aerospace and Electronics Systems Magazine,1999,4:19-29.
4Toyama K,Krumm J and Brumitt.Wallflower:principles and practice of background maintenance[A].The Proceedings of the Seventh IEEE International Conference on Comput[C],2005.
5LI Y,XU C J,LIU J Z.Detecting Irregularity in Videos Using Kernel Estimation and K-D Trees[C]// Proceedings of the 14th annual ACM international conference on Multimedia.New York:ACM Press,2006:639-642.
6ZHOU H,KIMBER D.Unusual Event Detection via Multi-camera Video Mining[C]// Proceedings of the 18th International Conference on Pattern Recognition-Volume 03.Washington,DC:IEEE Computer Society,2006:1161-1166.
7ZHANG D,DANIEL G P,BENGIO S,et al.Semi-supervised Adapted HMMs for Unusual Event Detection[C]// Proceedings of the 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05)-Volume 1-Volume 01.Washington,DC:IEEE Computer Society,2005:611-618.
8WU X Y,OU Y S,QIAN H H,et al.A detection system for human Abnormal behavior[J].IEEE International Conference on Intelligent Robots and Systems,2005:1204-1208.
9RAO S,SASTRY P S.Abnormal activity Detection in video sequences using learnt probability densities[J].Conference on Convergent Technologies for Asia Pacific Region,2003,1:369-372.
10BOIMAN O,IRANI M.Detecting irregularities in images and in video[J].International Journal of Computer Vision,2005,74(1):17-31.