4.7 Article

Thresholds Based Image Extraction Schemes in Big Data Environment in Intelligent Traffic Management

期刊

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TITS.2020.2994386

关键词

Image extraction; threshold; intelligent traffic management; big data

资金

  1. National Natural Science Foundation [61571360]
  2. Youth Innovation Team of Shaanxi Universities
  3. Innovation Project of Shaanxi Provincial Department of Education [17JF023]
  4. Project of Xi'an Technology Bureau [GXYD14.12, GXYD14.13]
  5. Ministry of Science and Technology [MOST 107-2221-E259-007]
  6. Ministry of Science and Technology (MOST) through Pervasive Artificial Intelligence Research (PAIR) Labs, Taiwan [108-2634-F-259-001]

向作者/读者索取更多资源

The study introduces a threshold-based image extraction solution for intelligent transportation systems, which can extract images containing key traffic information based on importance levels and roles to protect privacy and anonymity.
Video traffic monitoring is an inexpensive and convenient source of traffic data. Traffic images processing are widely used to check traffic conditions and they can determine traffic control strategies in intelligent transportation systems (ITS). However, these traffic images always contain privacy-related data, such as vehicles registration numbers, human faces. Misuse of such data is a threat to the privacy of vehicles divers, passengers, pedestrians, etc. This paper proposes a thresholds-based images extraction solution for ITS. At first, a Faster Region Convolutional Neural Networks (RCNN) model is used to segment a traffic image into multi-regions with different importance levels; then, multi-threshold image extraction schemes are designed based on progressive secret image sharing schemes to extract images contain key traffic information, such as reg number, human faces, in which the region with higher importance level requires higher threshold for extraction. For different roles in ITS, they can extract images with different details, which can protect privacy and anonymity. The proposed methods provide a safe and intelligent way to extract images that can be used for further analysis in ITS.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据