Abstract: Due to increase in terrorism , there is a need for threat detection systems to increase the security and safety of public.Unattended objects are used in performing terrorist activities.In our approach, objects and people are observed in frames ,background subtraction is done and unattended objects are detected based on techniques mentioned.After detecting the unattended bag , the system analyzes its history and finds the owner.If the owner is is not present in the premises ,then system sounds the alarm.. Introduction: . Visual processing capability and attentiveness is required for effective monitoring of crowded scenes or multiple screens within a surveillance system is very difficult. Humans are not capable of tracking more …show more content…
Backtracking stage for searching the owner: The previous frames are searched for finding the owner after finding an abandoned object.When an abandoned object is detected, the system starts searching in the previous frames for the owner. Initially, the tracking is done by the size of the blob after in its location. If a same size of blob is present in the same location, it is assumed to be present.When a blob is not present at the location, it means that the baggage is moved.In case the blob is present then the system starts reverse tracking until the beginning of the video. 4.Continuous scene monitoring: It is used to monitor the arrival of the owner which is used to control the alarm.The certain time after which we decide that the object is abandoned, the system starts tallies the foreground image with the surrounding location where the object is abandoned.The system will check for the owner departure from the scene.For a predefined period of time the system monitors for the presence of the owner at the location.If he/she is absent for more than this time,the system sounds the alarm.For searching the candidate owner,each and every blob near the bag is cross-correlated with all the blobs near the