Method and System for Detecting and Recognizing Floating Garbage Moving Targets on Water Surface with Big Data Based on Blockchain Technology

,


Introduction
Environmental issues have never needed to be addressed as they are today.Since the mid-20th century, environmental problems have gradually evolved into a global problem.One of the most important sources of marine pollution is litter, which demonstrates the destructive impact on the marine environment caused by inappropriate human activities and economic production methods.Although the international community has been working hard to develop effective marine pollution control mechanisms in the past two decades, such as market, social management, administrative orders, and other means.However, the problem of marine litter pollution has not improved, and it is still getting worse.
Manual driving can overcome the shortcomings of manpower salvage, but the technology is not perfect, and there are still some unsolved problems.And different from large waters are small waters such as ecological landscape waters and artificial breeding waters, which have their unique distribution characteristics, usually shallow depth, small area, and not concentrated.For the needs of beautiful design, some landscape waters are specially planned into irregular shapes.In these small waters, it is difficult for large automated cleaning ships to move and steer flexibly, reducing work efficiency.
erefore, in view of the characteristics of small waters, it will become very important to study surface garbage cleaning technology.Marine environmental pollution is a global problem, and it is the main object of international environmental law regulation in recent years.One of the most important sources of marine pollution is litter, which demonstrates the destructive impact on the marine environment caused by inappropriate human activities and economic production methods.
Regarding the field of target detection, related scientists have done a lot of research.Hu et al. discussed important issues related to the balance between the quality of target monitoring and the lifespan of network sensors and introduced two target monitoring programs.One solution is to use the Objective Recognition Frequency K (TDSFK) which defines real-time detection as a small fraction of total detection time. is means that it increases from 1 to K. Another solution is the Adjustable Frequency Detection Target (TDASF), which adjusts the frequency of these nodes with the residual energy.e simulation results show that the TDASF system can increase the network life by more than 17.4% and reduce the loading delay by less than 101.6% [1].Li et al. highlighted the latest developments in PCI multimedia (also known as PCI hybrids), which provide possible solutions to these problems.In particular, target detection can be developed by creating multiple BCI models that use multiple brain types, multicellular signals, or different stimuli.It is also possible to achieve a number of changes by creating multiple modification signatures from different brain types or connection types.Here, we identify different types of BCI presentation systems by analyzing samples, cognitive methods, control, and test scores.To emphasize their importance, Li et al. cite a number of previous IMC procedures, including follow-up/detection (DOC) of patients with cognitive impairments [2].Li et al. proposed a ship detection and recognition method based on a multilevel hybrid network and designed a noise reduction and smooth image enhancement algorithm based on a multilevel two-dimensional template filter and a three-layer pyramid structure.is work constructs an adaptive segmentation detection and ultralightweight object classification network model that combines global and local image grayscale statistics.Combining traditional image processing and deep learning methods, the demand for computing and storage resources is greatly reduced.e method can quickly detect and identify ship targets near sea level and has been verified by real flying camera data, with an accuracy rate of over 90%.Compared with the TinyYOLOV3 network, the accuracy is reduced by 5%, but the computational efficiency is increased by 50 times and the parameters are reduced by 550 times [3].Yang and Shi developed a new visual recognition algorithm that predicts a unique amount of knowledge and the developed algorithm maintains the popularity of the television space or the level of identification resources.At the same time, constraints are used to control the pressure on the target spectral material.e last identification method was the amplification method used to test two false images and two hyperspectral real images.e test results show that the proposed algorithm is superior to other algorithms in the test data set.Even if the target is only one pixel, a planned algorithm can yield good results.Because in this case, the backbone is always smooth, but at the same time, the algorithm allows you to get sharp edges in the manufacturing industry [4].Goudail et al. studied the properties of the objective definition of static milliliter thermal imaging, which provides stable light and analyzes the state of polarization.In the highest way, the best tetrahedron of the Poincaré sphere can be found with the best side images, and in this case, the difference between the lens and the background is simple.en, using the common lower limit of channel contrast to fully adapt to the best image channel, the page aspect ratio is limited and always 1/9 large.In practice, is is important because it is easier to create and use images.e results show that the final difference does not require improvement [5].Borisova et al. consider the problem of automatic target tracking in a complex natural background.By comparing with the elements of the reference image, target detection is performed in each frame of the video sequence.e method he proposed is based on representing each pixel in the direction of the nearby brightness gradient.e neighboring areas are divided into several categories according to their directions.In addition to the category of anisotropic neighborhoods, a neighborhood category with an isotropic structure is also introduced.He numbered the categories and used the numbers of nearby categories as features of points of interest, referring to the special rules of image coverage, the socalled dynamic proximity metric, to achieve stable tracking.
e test results show that compared with the use of normalized correlation, the method of object tracking is more stable [6].Objective detection is to identify ten specific targets based on specific radiological characteristics, which can be classified as binary classification in principle.Random forest is effectively used to classify HSI data.Dong et al. designed an effective matrix learning tool based on the random forest learning matrix (RFML) and semirandom forest table of the random forest and cinnamon algorithm to better distinguish the target task from the required task.Experimental results show that the proposed method is superior to the most advanced object recognition algorithms and other classic blackboard methods [7].ese methods have provided some references for our research, but due to the short time and small sample size of the relevant research, the research has not been recognized by the public.e innovation of this article is the introduction of blockchain technology and big data, using the frame difference method to obtain a series of video frames, then using the AND function to compare the different results between two adjacent frames and process the two adjacent frames, and using the difference that can be effectively obtained by moving objects.

Methods for Detection and Recognition of
Floating Garbage Moving Targets on Water Surface Big Data 2.1.Blockchain Technology.Blockchain traceability includes the following components: One is the identity authentication certificate.Fabric-ca is the default certificate management component.e CA issues a root certificate for each member, a registration certificate for each authorized user, and a large number of transaction certificates for each registration certificate to confirm identity and transaction signature.e second is to establish various types of nodes in the P2P network, including ordering nodes and related participant nodes, to actually operate the blockchain [8].ird, the SDK (client) represents the end user entity.It must connect to a peer node in order to interact with the blockchain.e client can choose to connect to any peer node.e client creates and invokes transactions.Figure 1 shows the deployment architecture diagram of the blockchain traceability system.
ere are 3 types of blockchains: public chains, personal chains, and consortium chains [9].( [10].Table 1 shows the comparison of the above three types of blockchains.
A blockchain kernel is a decentralized distributed database based on a consensus mechanism consisting of blockchain blocks.Blockchain application that allows each node in the blockchain network to build trust relationships in an insecure network environment and store blocks in the P2P network at different times.e principle of operation of the blockchain includes the following three points: (1) e node receiving the transaction confirms that the transaction fits, adds a timestamp, and saves it to a local block.(2) Each node must account for the legal constraints of the will order, and the execution of the limitation usually involves the calculation of complex mathematical problems.e first block counter node may be preferred (for example, Bitcoin, Ethereum).Once the valid control is implemented, the node sends a computer block to the network.(3) After the block is accepted, some nodes check whether it is valid.If the test is correct, place the block in the network chain, and all the nodes will start the next blocking step [11,12].
Blockchain uses cryptography technology to ensure the security of transaction data and customer privacy. is is a necessary condition for blockchain to get everyone's attention and develop rapidly.
ere are many kinds of cryptographic techniques used in blockchain, such as Merkle hash tree, digital signature, ECC elliptic curve encryption, and so on.In essence, cryptography is a technology that transforms the original plaintext information into another incomprehensible ciphertext information through certain measures, and then restores the original plaintext information after decryption processing.e process is shown in Figure 2.
According to whether the keys K1 and K2 are the same, cryptography is divided into symmetric and asymmetric encryption algorithms.When K1 ≠ K2, it is an asymmetric encryption algorithm.ECC encryption, hashing, and other algorithms are widely used to lock data in the blockchain and mathematical problems are used to increase the risk of attack and prevent data theft altogether.
e ECC Elliptic Curve Equation is a figure, a flat line, commonly referred to as the letter Q.
e encryption process of the elliptic curve uses a special equation, which is a curve defined on the finite field Ep. α, m, x, y ∈ Ep and α < p, m < p.

Advances in Multimedia
Define set where each element n i in the set is a random variable.For any element n j in set S, 0 < j ≤ N of them.Because each element satisfies a uniform distribution, then, It can be assumed that e core capabilities of blockchain technology: (1) e ability to store data: e data in the block is continuously accumulated and stored (for example, the Fabric platform has its own level database).With the accumulation of time, the size of the blockchain continues to increase.It is possible to store a large amount of the same data among multiple subjects at the same time; (2) e ability to share data: each subject participating in the blockchain automatically reaches a consensus through the agreed decision-making mechanism and can share the same trusted data ledger.(3) Ability to prevent tampering and protect privacy: Due to the use of identity authentication and cryptography, the privacy of each subject's identity and the security of shared information are protected through cryptographic tools such as public and private keys and hash algorithms.Blockchain has the following properties: (1) Autonomy: e blockchain is based on a P2P network.e nodes on the chain are all peer-to-peer, and the data is stored in each participating node in a distributed manner.e chain can be called to run and synchronize data.It is a decentralized (or weakly centralized) and autonomous trading system.(2) Reliability: e blockchain system is that all participants share a chain on the P2P network, and all transactions are confirmed through a consensus mechanism.Except for 51% of attacks, it can effectively prevent system failures and ensure the reliability of the system; (3) Information transparency: any participant on the network can (or within the specified authorization scope) view the information on the ledger with high transparency; (4) Immutability: After each transaction is completed, the information is recorded in the block header, and the subsequent blocks are accumulated on the previous block to form a data chain.Once formed, the data cannot be tampered with.

Big Data.
Information security refers to the use of technical and management security protection methods to protect software, hardware, and data from damage, modification, and exposure due to some reasons (such as accidental or malicious).In the era of big data, there have been huge breakthroughs and extensions in the connotation and extension of traditional private data.e results

Decryption key K2
Encryption key K1 Decryptor E Information M Encryptor E Plaintext information M   [13].With the in-depth understanding and research on big data, the main challenges facing big data security are as follows: (1) Security in the era of big data has become more complicated: massive data collections, such as records about personal privacy and behavioral details, etc., if these massive amounts of data are stored centrally, the risk of data leakage will be greatly increased; the integrity, availability, and secrecy of data all pose great challenges to big data analysis.(2) e use and analysis of big data face more challenges: when using data mining technology and data analysis technology to obtain the commercial value of big data, hackers can collect valuable data to the greatest extent so as to use big data analysis technology to launch attacks on enterprises.For areas that require high big data analysis, such as e-commerce, finance, and complex network computing, malicious attacks can cause quite serious consequences.(3) Major challenges based on the characteristics of big data: Big data has the characteristics of diverse data types and dynamic data changes.In the process of analyzing and processing big data, it will face real-time dynamic changes and the integration of multiple types of data. is requires new methods and technologies to make the protection of big data face major challenges [14].e Kalman filtering algorithm uses recursion to filter, recursively derive the current state based on the current state and the previous state, and usually remove redundant information in a dynamic environment to achieve data fusion.In the Kalman filter algorithm, the discrete control process system and measured values are first introduced: α, β-System parameters.M k , Y k -It is the state variable and control quantity of the system at k moment.e time update formula of the Kalman filter can be derived, and the time recursive state variable and the error covariance of the previous moment can be calculated separately [15].
Using the measured value at the current moment and the estimated value at the previous moment, the state equation of the Kalman filter can be derived, including the updated estimated observations, the Kalman gain, and the new error covariance [16].
M k,k−1 : e predicted value of state one step forward,  M k : e best estimate of the state at the last moment,  P k,k−1 : Covariance of the state one step forward Sorting the data and calculating the parameters of the distribution diagram method.Among them, β is a coefficient, which can be set as a constant.
A M : e median of the data series.N: Number of data series.e above formula is used to calculate the ω 1 and ω 2 parameters of the judgment interval.If the data in the data sequence is outside this interval, the data is regarded as abnormal data and excluded from the data sequence.
When the abnormal data is eliminated, the dimensionality of the data will change.In order to keep the data dimension unchanged, the estimated value calculated in Table 2 is used to replace the abnormal data [17].
e original definition of big data: large-scale data collection beyond the capabilities of traditional database software tools in terms of collection, storage, management, and analysis.ere are four features: large data volume, fast data flow, different data types, and low density [18].

Moving Target Detection.
e essence of moving object detection is the process of segmenting the moving objects of interest in the video image.In digital video image processing, techniques such as moving target segmentation, tracking, and behavior understanding are all aimed at the target moving area of interest in the image, so the detection of this area is the basis for realizing the above technology.Because natural scenes are dynamic and changeable, they often interfere with target detection, which brings certain difficulties to moving target detection and therefore arouses the interest of more researchers.Moving target detection can be divided into two types of detection methods, static Advances in Multimedia background, and dynamic background, according to the fixed situation of the camera.Because most cameras in real life are fixed, the detection based on the static background is more favored by researchers [19].
Moving target detection based on the frame difference method is a commonly used static background detection method.Its basic principle is to detect the changes in the pixel intensity of adjacent frames of video images and use the pixel time domain difference method to extract the moving area of interest in the image.In a fixed scene, it is determined whether the point belongs to the background pixel or the foreground pixel by judging the threshold value of the pixel characteristic value of the adjacent frame image so as to realize the detection of the moving target.
e advantage of the frame difference method is that the algorithm is low in complexity, simple to implement, and has good real-time performance.Because the time interval between two adjacent frames of images is very small, the background changes little, and the error caused by the background changes can be avoided under the difference cancellation, so it has better adaptability to dynamic scenes.
e most typical application is in the VSAM (Visula Surveillance and Monitoring) system.Researchers propose a method based on the combination of frame difference method and background difference method to achieve fast and effective moving target detection [20].
e disadvantage of the frame difference method is that it is more sensitive to environmental noise, and the choice of the threshold is also critical.Choosing a threshold that is too low will not be able to suppress the noise in the image while choosing too high a threshold will easily ignore the change of the target in the image.In addition, when the moving object moves slowly, a hole phenomenon will occur, which will affect the subsequent processing, such as the analysis and recognition of the target image, and miss the detection of the slowly moving or stopping target.

Marine Litter.
Marine Litter is the direct or indirect, intentional or unintentional disposal of persistent solid matter by humans into the marine environment.Marine debris is one of the marine pollutants, and it is one of the marine environmental pollution problems that most troubles people's production and development.
e adverse effects of marine debris on humans, natural organisms, and the marine ecological environment are great, mainly in the following aspects: (1) It causes visual pollution to the marine landscape, affects the aesthetic value of the coastal landscape, and causes tourism damage.Decrease in income; (2) Damage to marine animals, plants, and marine ecological environment, entanglement, and suffocation caused by garbage being eaten by marine animals, and direct or indirect damage to marine life caused by garbage transporting alien species.According to the findings of "Greenpeace," at least 267 species of marine animals suffer from eating or being entangled in marine debris, and cause death.For example, birds sometimes mistakenly eat plastic waste as food, which hinders the digestive system and eats plastic waste by mistake.Of these, birds end up starving to death, and large numbers of seals, sea lions, and dolphins are entangled in discarded fishing nets every year.

Experiment on Detection and Recognition of Floating Garbage Moving Targets on Water Surface with Big Data
e performance of the consensus mechanism of the blockchain is tested.e nodes in the system complete the consensus and storage operations of 100 data as a test round.In each test round, the time it takes for the system to complete the corresponding operation is recorded.Figure 3 shows the test results.
Based on the blockchain platform's node architecture, combined with BcRCACDAM, the topology of the CBcP network node is designed.e nodes and functions of CBcP used in this model are described in detail below: (1) Client: e RCA of each trust domain is responsible.As a client of CBcP, submit and query transactions to nonverified nodes; (2) Nonverification node: it is assumed by the server provided by each trust domain.e unverified node receives the transaction sent by the client, verifies the signature of the transaction sent by the client, and sends the transaction, sorted by timestamp, to the verification node for further processing.Unverified sites synchronize registry data to help you find clients faster.(3) Verification node: considers the server assigned to each trusted domain.e verification node compliance algorithm is included in the authorization process.e verification node is divided into master and child nodes.e master node collects transaction blocks that are passed to the nonverification node, initiates a block proposal, and shares common block transactions through the EDA consensus algorithm.Reach a consensus.Connect the other authentication nodes and the new blockchain to the blockchain.
e node collaboration of the CBcP network of this model is divided into 3 steps, which are specifically introduced as follows: (1) After joining CBcP, the root CA initiates a trust-authorized transaction about BcRCert and sends it to nonverified nodes; (2) e nonverification node verifies the transaction signature received from the client, classifies the transaction according to the transaction timestamp, and in turn transmits it to the verification node.
(3) e verification node leads to consensus in the block based on the consensus algorithm and connects the block to Estimated value is the mean of N/2-1 data in the series N is not divisible by 2 and N + 1 can be divisible by 4 e estimated value is the mean of (N − 1)/2 data in the sequence N is not divisible by 2 and N + 1 is not divisible by 4 Estimated value is the mean of (N − 1)/2 − 1 data in the series 6 Advances in Multimedia the chain.Figure 4 shows the topology of the blockchain platform node.
T he incentive system of the blockchain is that the random notary node suspends the block generation work during the term of office and thus loses the opportunity to successfully generate the block and obtain work remuneration.If it wants to quantify the loss during the tenure of a random notary node, it can share the work rewards obtained after a single successful block generation according to the probability of successfully generating a block.Since all working nodes on the blockchain network are free to come and go, it is difficult for us to accurately count the total computing power of the real-time blockchain system, and even the number of real-time working nodes on the network is difficult to count.erefore, in order to facilitate the calculation, we need to find a reference value for the number of working nodes of the blockchain in the network, which is defined as the benchmark value in this article.
e first benchmark value is set according to the initial scale of the blockchain system, and the subsequent benchmark values can be calculated.Figure 5 is a comparison chart of benchmark values.
Based on the analysis of the shadow detection algorithm, this paper proposes an improved algorithm for shadow removal based on the Gaussian mixture model.e algorithm divides moving target detection into two parts: foreground detection and shadow removal.Firstly, according to the Gaussian mixture model algorithm, it is judged whether the pixel of the current video frame belongs to the background point or the premovement scenic spot.If the pixel is the former scenic spot, the shadow removal algorithm is used to remove the shadow, and finally, the moving foreground target is obtained.e specific process is shown in Figure 6.
According to the proposed algorithm, the contour of the moving target is extracted.is article selects three video sequences indoors, outdoors and under different lighting for experiments.Quantitative analysis of a moving object's detection speed includes the pixel level and the object level.In this work, the object level is used to determine the detection rate of a moving target and the error detection rate.
e test results are shown in Table 3.
Based on the result of the moving target lifting image based on the color image, the threshold value is changed for experiment.Compared with the reference image, based on the dynamic image target that the gray image is often discarded, the reference image and the pixels in the image are counted.Figure 7 shows the reference image change diagram of the moving target image.
It can be seen from Figure 7 that in different pixel percentages, the processing results based on the grayscale image are different from the reference image, and it can be seen that the two are the closest when the threshold Te � 21, and only about 1% of the pixels are different.
Among the many moving target detection algorithms, the interframe difference method is easy to optimize due to its simple method, small amount of calculation, fast speed, and easy optimization.At the same time, it is suitable for the advantages of DSP implementation, and is currently widely used in the detection and monitoring of moving targets in video image sequences, and its detection effect is significant.e core idea of the interframe difference method is to subtract two frames of the image, subtract the part of the image whose gray information is unchanged or whose amplitude is less than a certain threshold, and find the part where the gray level information changes greatly, so as to determine whether there is a moving target in the video.
e interframe difference method uses a series of video images instead of affecting two adjacent frames so that moving objects can be effectively used and is usually best for viewing scenes with clear motion.
e frame difference technology has many advantages.e algorithm is simple, requires a lot of computer resources, and is easy to implement.In response to the above problems, the frame difference method is improved, and the three-frame difference method is adopted, which increases the number of difference functions between two proposed adjacent frames.
e specific implementation steps of the improved threeframe difference method are as follows: (3) In the selected motion area, find the smallest rectangular area that can contain the motion area (lx, ly, width, height).lx represents the x coordinate of the upper left corner of the rectangular area, ly represents the y coordinate of the upper left corner of the rectangular area, width is the width of the   rectangular area, and height is the height of the rectangular area.( 4) Canny edge extraction is performed on Image2 to obtain Image2_canny image, and a morphological closing operation is performed.For the obtained Image2_canny image, take out a small rectangular frame according to the rectangular area in the previous step.en extract the closed contour formed by the inner edges of the rectangular area and fill it with white.(5) Median filter the image to get the final result image.
Figure 8 shows the flow chart of the three-frame differential method.
e reason why the three-frame difference method can solve the problem of the unclear target contour detected by the two-frame difference method is that it compares the different results of two adjacent frames of images with an AND operation.Figure 9 can clearly understand the reason why the target contour extracted by the three-frame difference method is relatively clear.
As shown in Figure 9, A, B, and C represent images of different frames in the video image sequence, B represents the current frame image at time k, A represents the frame image at time k − 1, and C represents the frame image at time k + 1. Differential operations are performed on adjacent frame images, where D is the difference result of A and B, and E is the difference result of B and C. It can be seen that D and E are the results obtained according to the two-frame difference method, respectively.e contour of the central part of the target image is not extracted, so the problem of unclear contour will occur.According to the steps of the three-frame difference method, D and E are then logically ANDed, and the obtained F is the same part between D and E. It can be seen that the target extracted in the detection result F contains all the target contour information, which is the principle that the three-frame difference method can extract the target contour more completely than the two-frame difference method.
e experimental materials are two different views, as shown in Figure 10, one is the floating garbage view in the ocean, and the other is the experimental result.
Recognizing floating objects in three typical working environments: good vision, more reflections in the water, and strong light interference.Each working environment has 100 images to be tested, a total of 300 images, and read the next image after processing one image.In order to facilitate the viewing of the recognition results, the images after the recognition processing are stored in the designated folder.In actual use, there is no need to store them in order to save resources.
e recognition results are shown in Table 4.

Discussion
e consensus mechanism of the blockchain is a mechanism that enables the entire network to reach a consensus on the generated block data information.Among them, the research and development of the workload certification mechanism, the equity certification mechanism, the authorized share certification mechanism, and the Raft mechanism started early and currently occupy a dominant position and become the basis of a variety of derivative mechanisms.
e following is a brief introduction to the above consensus mechanism: (1) e workload proof mechanism requires all nodes to participate in the computing power game of finding a random number, and the one who calculates first can get the right to this bookkeeping and a certain reward.(2) e equity certification mechanism is similar to the shareholder mechanism.Whoever invests more capital will have greater equity and a greater possibility of obtaining the right to bookkeeping.is mechanism converges fast and saves resources, but its security needs to be studied in depth.(3) e authorized share certification mechanism is a professionalization of the role of the bookkeeper.It requires participants to choose their own trusted nodes and authorize them. is mechanism consumes less resources, reaches consensus quickly, and has high throughput, but there is a risk of agents cheating.(4) Raft is a mechanism in which nodes jointly elect to determine the accounting node.If the accounting node fails, a new accounting node can be reelected.is mechanism has good fault tolerance and high system operation efficiency.Surface garbage is also known as floating garbage.Water surface garbage refers to various wastes floating in the upper layer of various water bodies (lakes, rivers, landscape etc.), which deteriorate the water quality of the water bodies and cause a visual impact on the public.It mainly includes the wastes that are caused by people's weak environmental protection awareness.Discarded various household items, such as food packaging bags, plastic bags, plastic bottles, etc.; various on-board supplies discarded by ships sailing on the water, such as fishing nets, buoys, etc.; surface vegetation that has been washed into the water body due to rain or wind; pollution of dead fish and shrimp, rotten fruits and vegetables, etc.
For different application scenarios, the processing requirements and purposes of shadows in video frames are also different.Such as some target tracking or target shape extraction, the processing requirements for shadows are relatively high, which requires accurate identification of target shadow components in motion and separation and extraction of targets.In the fields of remote sensing imaging and photogrammetry, in order to improve the visibility and quality of images, it is necessary to detect shadows and deal with the influence of shadows, reduce or eliminate their influence as much as possible, and restore the objects in the shadows original appearance.
erefore, the accuracy of shadow detection directly affects the subsequent shadow processing.

Conclusion
With the rapid development of urban construction in our country, people's needs for a better life are increasing, and improving the urban ecological environment has become the primary task.In recent years, garbage pollution in small water areas such as urban ponds, artificial lakes, and water parks has gone from bad to worse.e cleanup of surface garbage has become an important environmental governance issue, which is directly related to the entire urban ecosystem.is paper proposes an improved algorithm for shadow removal based on the Gaussian mixture model, which divides the motion garbage detection into two parts: foreground detection and shadow removal.Firstly, according to the Gaussian mixture model algorithm, it is judged whether the pixel of the current video frame belongs to the background point or the premovement scenic spot.If the pixel is the former scenic spot, the shadow removal algorithm is used to remove the shadow, and finally, the moving foreground target is obtained.
is paper mainly studies and analyzes the moving target detection algorithm.Although the research work has made some progress, the results still have many shortcomings.In this paper, the improved algorithm of mixed Gaussian model and color features improves the accuracy of moving target detection algorithm in complex scenes, but the accuracy of background modeling is relatively high, the algorithm is relatively complex, and the amount of calculation is large, so the real-time application is limited to a certain extent.How to improve the algorithm operation speed on the basis of ensuring the detection effect will become a practical topic for moving target detection.

Figure 6 :
Figure 6: Flow chart of shadow removal algorithm based on Gaussian mixture model.

Table 1 :
Comparison of the characteristics of the three forms of blockchain.

Table 2 :
e mean value of the intermediate data.Features of data number N Estimated value of abnormal data N is divisible by 4Estimated value is the mean of N/2 data in the series N is divisible by 2 but not divisible by 4

Table 3 :
Object level detection rate.

Table 4 :
Recognition result.However, this algorithm can only guarantee the activity of the bookkeeper, and there is a security risk of the bookkeeper's deception.
Working environmentNumber of inspections Number of successful detections Recognition rate (%) Average recognition time