<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1405-5546</journal-id>
<journal-title><![CDATA[Computación y Sistemas]]></journal-title>
<abbrev-journal-title><![CDATA[Comp. y Sist.]]></abbrev-journal-title>
<issn>1405-5546</issn>
<publisher>
<publisher-name><![CDATA[Instituto Politécnico Nacional, Centro de Investigación en Computación]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1405-55462018000300917</article-id>
<article-id pub-id-type="doi">10.13053/cys-22-3-2554</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[A Statistical Background Modeling Algorithm for Real-Time Pixel Classification]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Acevedo-Ávila]]></surname>
<given-names><![CDATA[Ricardo]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[González-Mendoza]]></surname>
<given-names><![CDATA[Miguel]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[García-García]]></surname>
<given-names><![CDATA[Andrés]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Instituto Tecnológico y de Estudios Superiores de Monterrey  Department of Postgraduate Studies]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Mexico</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>09</month>
<year>2018</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>09</month>
<year>2018</year>
</pub-date>
<volume>22</volume>
<numero>3</numero>
<fpage>917</fpage>
<lpage>927</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1405-55462018000300917&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1405-55462018000300917&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1405-55462018000300917&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract: This paper introduces a statistical background pixel classifier intended for real-time and low-resource implementation. The algorithm works within a smart video surveillance application aimed to detect unattended objects in images with fixed backgrounds. The algorithm receives an input image and builds an initial background model based on image statistics. Using this information, the algorithm identifies new objects that do not belong to the original image. The algorithm categorizes image pixels in four possible classes: shadows, midtones, highlights and foreground pixels. The classification stage produces a binary mask where only objects of interest are shown. The pixel classifier processes Quarter VGA (320 x 240) gray-scale images at a nomial processing rate of 30 frames per second. Higher resolutions such as VGA (640 x 480) have been also tested. We compare results with traditional statistical background modeling methods. Our experiments demonstrate that our approach achieves successful background segmentation at a minimal resource consumption while maintaining real-time execution.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Background modeling]]></kwd>
<kwd lng="en"><![CDATA[embedded computer vision]]></kwd>
<kwd lng="en"><![CDATA[statistical pixel modeling]]></kwd>
<kwd lng="en"><![CDATA[image processing]]></kwd>
<kwd lng="en"><![CDATA[object detection]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<label>1</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Toyama]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Krumm]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Brumitt]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Meyers]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<source><![CDATA[Wallflower: Principles and practice of background maintenance]]></source>
<year>1999</year>
<conf-name><![CDATA[ International Conference on Computer Vision (ICCV)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>255-61</page-range></nlm-citation>
</ref>
<ref id="B2">
<label>2</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Peng]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Spatio-temporal context for codebook-based dynamic background subtraction]]></article-title>
<source><![CDATA[AEU-International Journal of Electronics and Communications]]></source>
<year>2010</year>
<volume>64</volume>
<numero>8</numero>
<issue>8</issue>
<page-range>739-47</page-range></nlm-citation>
</ref>
<ref id="B3">
<label>3</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gangodkar]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Kumar]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Mittal]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Robust segmentation of moving vehicles under complex outdoor conditions]]></article-title>
<source><![CDATA[IEEE Transactions on Intelligent Transportation Systems]]></source>
<year>2013</year>
<volume>13</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>1738-52</page-range></nlm-citation>
</ref>
<ref id="B4">
<label>4</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cheung]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Kamath]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Robust techniques for background subtraction in urban traffic video]]></article-title>
<source><![CDATA[Proceedings of Video Communications and Image Processing, SPIE Electronic Imaging]]></source>
<year>2004</year>
<volume>5308</volume>
<page-range>881-92</page-range></nlm-citation>
</ref>
<ref id="B5">
<label>5</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Acevedo-Avila]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Gonzalez-Mendoza]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Garcia-Garcia]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Linked List-Based Algorithm for Blob Detection on Embedded Vision-Based]]></article-title>
<source><![CDATA[]]></source>
<year>2016</year>
<volume>16</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>782</page-range></nlm-citation>
</ref>
<ref id="B6">
<label>6</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mao]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Mould]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Subramanian]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Background subtraction for realtime tracking of a tennis ball]]></source>
<year>2007</year>
<conf-name><![CDATA[ Second International Conference on Computer Vision Theory and Applications]]></conf-name>
<conf-loc> </conf-loc>
<page-range>427-34</page-range></nlm-citation>
</ref>
<ref id="B7">
<label>7</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[El-Baf]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Bouwmans]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Vachon]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<source><![CDATA[Fuzzy statistical modeling of dynamic backgrounds for moving object detection in infrared videos]]></source>
<year>2009</year>
<conf-name><![CDATA[ IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops]]></conf-name>
<conf-loc> </conf-loc>
<page-range>60-5</page-range></nlm-citation>
</ref>
<ref id="B8">
<label>8</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[El-Baf]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Bouwmans]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Vachon]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<source><![CDATA[Type-2 fuzzy mixture of gaussians model: Application to background modeling]]></source>
<year>2008</year>
<conf-name><![CDATA[ International Symposium on Visual Computing, (ISVC`08)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>772-81</page-range></nlm-citation>
</ref>
<ref id="B9">
<label>9</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Karaman]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Goldmann]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Yu]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Sikora]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Comparison of static background segmentation methods]]></article-title>
<source><![CDATA[Visual Communications and Image Processing]]></source>
<year>2005</year>
<volume>5960</volume>
</nlm-citation>
</ref>
<ref id="B10">
<label>10</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bouwmans]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Subspace Learning for Background Modeling: A Survey]]></article-title>
<source><![CDATA[Recent Patents on Computer Science]]></source>
<year>2009</year>
<volume>2</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>223-34</page-range></nlm-citation>
</ref>
<ref id="B11">
<label>11</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Piccardi]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<source><![CDATA[Background subtraction techniques: a review]]></source>
<year>2004</year>
<conf-name><![CDATA[ IEEE International Conference on Systems, Man and Cybernetics]]></conf-name>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B12">
<label>12</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hassanpour]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Sedighi]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Manashty]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Video frame&#8217;s background modeling: Reviewing the techniques]]></article-title>
<source><![CDATA[Journal of Signal and Information Processing]]></source>
<year>2011</year>
<volume>2</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>72-8</page-range></nlm-citation>
</ref>
<ref id="B13">
<label>13</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Huang]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Yu-Hua]]></surname>
<given-names><![CDATA[G. I.]]></given-names>
</name>
<name>
<surname><![CDATA[Tian]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Statistical Modeling of Complex Backgrounds for Foreground Object Detection]]></article-title>
<source><![CDATA[IEEE Transactions on Image Processing]]></source>
<year>2004</year>
<volume>13</volume>
<numero>11</numero>
<issue>11</issue>
<page-range>1459-72</page-range></nlm-citation>
</ref>
<ref id="B14">
<label>14</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Juvonen]]></surname>
<given-names><![CDATA[M. P. T.]]></given-names>
</name>
<name>
<surname><![CDATA[Coutinho]]></surname>
<given-names><![CDATA[J. G. F.]]></given-names>
</name>
<name>
<surname><![CDATA[Luk]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
</person-group>
<source><![CDATA[Hardware architectures for adaptive background modelling]]></source>
<year>2007</year>
<conf-name><![CDATA[ 3rd Southern Conference on Programmable Logic, (SPL &#8217;07)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>149-54</page-range></nlm-citation>
</ref>
<ref id="B15">
<label>15</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Appiah]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Hunter]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[A single-chip fpga implementation of real-time adaptive background model]]></source>
<year>2005</year>
<page-range>5-102</page-range><publisher-name><![CDATA[FPT]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B16">
<label>16</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Stauffer]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Grimson]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Adaptive Background Mixture Models for Real-Time Tracking]]></article-title>
<source><![CDATA[Computer Vision and Pattern Recognition]]></source>
<year>1999</year>
<volume>2</volume>
<page-range>2246-52</page-range></nlm-citation>
</ref>
<ref id="B17">
<label>17</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wei]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Yue]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<source><![CDATA[A Foreground-Background Segmentation Algorithm for Video Sequences]]></source>
<year>2015</year>
<conf-name><![CDATA[ International Symposium on Distributed Computing and Applications for Business Engineering and Science (DCABES)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>340-3</page-range></nlm-citation>
</ref>
<ref id="B18">
<label>18</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Makarov]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<source><![CDATA[Comparison of background extraction based intrusion detection algorithms]]></source>
<year>1996</year>
<conf-name><![CDATA[ International Conference on Image Processing]]></conf-name>
<conf-loc> </conf-loc>
<page-range>521-4</page-range></nlm-citation>
</ref>
<ref id="B19">
<label>19</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Horprasert]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Harwood]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Davis]]></surname>
<given-names><![CDATA[L. S.]]></given-names>
</name>
</person-group>
<source><![CDATA[A statistical approach for real-time robust background subtraction and shadow detection]]></source>
<year>1999</year>
<conf-name><![CDATA[ IEEE Frame-Rate Applications Workshop]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1-19</page-range></nlm-citation>
</ref>
<ref id="B20">
<label>20</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Montgomery]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Runger]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<source><![CDATA[Applied Statistics and Probability for Engineers]]></source>
<year>2006</year>
<publisher-name><![CDATA[John Wiley &amp; Sons]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B21">
<label>21</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Moore]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[McCabe]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<source><![CDATA[The Introduction to the Practice of Statistics]]></source>
<year>2002</year>
<publisher-name><![CDATA[Freeman]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B22">
<label>22</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Power]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Schoonees]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Understanding background mixture models for foreground segmentation]]></source>
<year>2002</year>
<volume>267</volume>
</nlm-citation>
</ref>
<ref id="B23">
<label>23</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wegner]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
</person-group>
<source><![CDATA[Applied Business Statistics: Methods and Excel-based Applications]]></source>
<year>2012</year>
</nlm-citation>
</ref>
<ref id="B24">
<label>24</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Triola]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<source><![CDATA[Statistics for describing, exploring, and comparing data. Elementary Statistics Technology Update]]></source>
<year>2012</year>
<publisher-name><![CDATA[Pearson, Addison-Wesley]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B25">
<label>25</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[De Jesus]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<source><![CDATA[Robust background subtraction and shadow detection]]></source>
<year>2012</year>
</nlm-citation>
</ref>
<ref id="B26">
<label>26</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Acevedo]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<source><![CDATA[Smart Surveillance Video Database]]></source>
<year>2013</year>
</nlm-citation>
</ref>
<ref id="B27">
<label>27</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Performance Evaluation of Tracking and Surveillance (PETS)]]></surname>
<given-names><![CDATA[BORR]]></given-names>
</name>
</person-group>
<source><![CDATA[]]></source>
<year>2001</year>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
