Intelligent CCTV for Mass Transport Security: Challenges and Opportunities for Video and Face Processing

CCTV surveillance systems have long been promoted as being e ffective in improving public safety. However due to the amount of cameras installed, many sites ha ve abandoned expensive human monitoring and only record video for forensic purposes. One of the sough t-after capabilities of an automated surveillance system is “face in the crowd” recognition, in public sp aces such as mass transit centres. Apart from accuracy and robustness to nuisance factors such as pose var iations, in such surveillance situations the other important factors are scalability and fast performance. We evaluate recent approaches to the recognition of faces at large pose angles from a gallery of frontal images an d propose novel adaptations as well as modifications. We compare and contrast the accuracy, robustnes s and speed of an Active Appearance Model (AAM) based method (where realistic frontal faces are synth esized from non-frontal probe faces) against bag-of-features methods. We show a novel approach where the performance of the AAM based technique is increased by side-stepping the image synthesis step, als o resulting in a considerable speedup. Additionally, we adapt a histogram-based bag-of-features techniqu e to face classification and contrast its properties to a previously proposed direct bag-of-features method. We further show that the two bag-of-features approaches can be considerably sped up, without a loss in class ific tion accuracy, via an approximation of the exponential function. Experiments on the FERET and PIE data bases suggest that the bag-of-features techniques generally attain better performance, with significa ntly lower computational loads. The histogrambased bag-of-features technique is capable of achieving an average recognition accuracy of 89% for pose angles of around 25 degrees. Finally, we provide a discussio n on implementation as well as legal challenges surrounding research on automated surveillance.

[1]  Andrea Cavallaro,et al.  Performance evaluation of event detection solutions: the CREDS experience , 2005, IEEE Conference on Advanced Video and Signal Based Surveillance, 2005..

[2]  Barbara Caputo,et al.  Recognition with local features: the kernel recipe , 2003, Proceedings Ninth IEEE International Conference on Computer Vision.

[3]  Frédéric Jurie,et al.  Sampling Strategies for Bag-of-Features Image Classification , 2006, ECCV.

[4]  Sergio A. Velastin,et al.  From tracking to advanced surveillance , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).

[5]  Tai Sing Lee,et al.  Image Representation Using 2D Gabor Wavelets , 1996, IEEE Trans. Pattern Anal. Mach. Intell..

[6]  Samy Bengio,et al.  Measuring the performance of face localization systems , 2006, Image Vis. Comput..

[7]  Gavin C. Cawley,et al.  On a Fast, Compact Approximation of the Exponential Function , 2000, Neural Computation.

[8]  Tsuhan Chen,et al.  Learning Patch Dependencies for Improved Pose Mismatched Face Verification , 2006, 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'06).

[9]  Brian C. Lovell,et al.  Face Recognition Robust to Head Pose from One Sample Image , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[10]  Michael Brady,et al.  Saliency, Scale and Image Description , 2001, International Journal of Computer Vision.

[11]  Shigeo Abe DrEng Pattern Classification , 2001, Springer London.

[12]  Timothy F. Cootes,et al.  View-based active appearance models , 2000, Proceedings Fourth IEEE International Conference on Automatic Face and Gesture Recognition (Cat. No. PR00580).

[13]  Andrew Zisserman,et al.  Video Google: a text retrieval approach to object matching in videos , 2003, Proceedings Ninth IEEE International Conference on Computer Vision.

[14]  Norbert Krüger,et al.  Face recognition by elastic bunch graph matching , 1997, Proceedings of International Conference on Image Processing.

[15]  Keith Hanna,et al.  Critical infrastructure security confidence through automated thermal imaging , 2006, SPIE Defense + Commercial Sensing.

[16]  C. Taylor,et al.  Active shape models - 'Smart Snakes'. , 1992 .

[17]  P. Jonathon Phillips,et al.  Face recognition vendor test 2002 , 2003, 2003 IEEE International SOI Conference. Proceedings (Cat. No.03CH37443).

[18]  Hyeonjoon Moon,et al.  The FERET evaluation methodology for face-recognition algorithms , 1997, Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition.

[19]  Y. Mukaigawa,et al.  Large Deviations Estimates for Some Non-local Equations I. Fast Decaying Kernels and Explicit Bounds , 2022 .

[20]  Terence Sim,et al.  The CMU Pose, Illumination, and Expression Database , 2003, IEEE Trans. Pattern Anal. Mach. Intell..

[21]  Samy Bengio,et al.  User authentication via adapted statistical models of face images , 2006, IEEE Transactions on Signal Processing.

[22]  P. Jonathon Phillips,et al.  Face recognition based on frontal views generated from non-frontal images , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).

[23]  Patrick J. Flynn,et al.  A survey of approaches and challenges in 3D and multi-modal 3D + 2D face recognition , 2006, Comput. Vis. Image Underst..

[24]  Norbert Krüger,et al.  Face Recognition by Elastic Bunch Graph Matching , 1997, IEEE Trans. Pattern Anal. Mach. Intell..

[25]  Samy Bengio,et al.  On transforming statistical models for non-frontal face verification , 2006, Pattern Recognit..

[26]  King-Sun Fu,et al.  IEEE Transactions on Pattern Analysis and Machine Intelligence Publication Information , 2004, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[27]  Timothy F. Cootes,et al.  Active Shape Models - 'smart snakes' , 1992, BMVC.

[28]  Timothy F. Cootes,et al.  Active Appearance Models , 1998, ECCV.