Video analytics for surveillance camera networks

International usage and interest in Closed-Circuit Television (CCTV) for surveillance of public spaces has proved to be an effective in forensic, or reactive response to crime and terrorism. In the ideal scenario, it would be useful to detect events, in real-time or close to real-time, in order to mitigate possible harm. However, it is an issue to adequately monitor the video feeds with security guards. In this paper, we address the key problems in the existing surveillance system, followed by some discussions on the integration of social signal and video search to enhance the traditional surveillance system. We shows the performance of face-based identity inference under surveillance. as well as video indexing and search results. Finally, we discuss the related future research direction in this area.

[1]  Yongkang Wong,et al.  On robust face recognition via sparse coding: the good, the bad and the ugly , 2013, IET Biom..

[2]  Thomas B. Moeslund,et al.  Face Quality Assessment System in Video Sequences , 2008, BIOID.

[3]  Yongwei Zhu,et al.  TRECVID 2010 Known-item Search (KIS) Task by I2R , 2010, TRECVID.

[4]  B. Martin,et al.  Quality Assessment of Facial Images , 2006, 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference.

[5]  Marc'Aurelio Ranzato,et al.  Sparse Feature Learning for Deep Belief Networks , 2007, NIPS.

[6]  Kong-Wah Wan,et al.  Known-item video search via query-to-modality mapping , 2011, ACM Multimedia.

[7]  Gabriela Csurka,et al.  Visual categorization with bags of keypoints , 2002, eccv 2004.

[8]  Anil K. Jain,et al.  Face Matching and Retrieval in Forensics Applications , 2012, IEEE MultiMedia.

[9]  Marwan Mattar,et al.  Labeled Faces in the Wild: A Database forStudying Face Recognition in Unconstrained Environments , 2008 .

[10]  Yongkang Wong,et al.  Patch-based probabilistic image quality assessment for face selection and improved video-based face recognition , 2011, CVPR 2011 WORKSHOPS.

[11]  Nick Tilley,et al.  Surveillance of Public Space: Cctv, Street Lighting and Crime Prevention , 1999 .

[12]  Hyeonjoon Moon,et al.  The FERET Evaluation Methodology for Face-Recognition Algorithms , 2000, IEEE Trans. Pattern Anal. Mach. Intell..

[13]  Y. C. Pati,et al.  Orthogonal matching pursuit: recursive function approximation with applications to wavelet decomposition , 1993, Proceedings of 27th Asilomar Conference on Signals, Systems and Computers.

[14]  Brian C. Lovell,et al.  Multi-Region Probabilistic Histograms for Robust and Scalable Identity Inference , 2009, ICB.

[15]  Yi Yang,et al.  Harry Potter's Marauder's Map: Localizing and Tracking Multiple Persons-of-Interest by Nonnegative Discretization , 2013, 2013 IEEE Conference on Computer Vision and Pattern Recognition.

[16]  Sridha Sridharan,et al.  A Database for Person Re-Identification in Multi-Camera Surveillance Networks , 2012, 2012 International Conference on Digital Image Computing Techniques and Applications (DICTA).