scholarly journals Ray-Tracing-Based Event Detection and 3D Visualization for Automated Video Surveillance System

2015 ◽  
Vol 20 (2) ◽  
pp. 29-39
Author(s):  
Jaromir Przybyło ◽  
Mirosław Jabłoński

Abstract Automated and intelligent video surveillance systems play important role in current home care and facilities security applications. Among many research problems is graphical visualization of semantic messages to the human operator that he can percept information in more natural way. The other essential research question is how to recognize 3D objects and their state on the monitored scene only from their views (2D images from the camera). In this paper we continue our previous work on data fusion in visualization of 3D scene semantic model and propose to recognize events and states of scene objects under surveillance in an automatic way using feedback provided by the renderer. We developed ray-tracing based visualization for surveillance system, that is capable of recognizing object’s state and at the same time present relevant information to the human operator.

2021 ◽  
Vol 6 (44) ◽  
Author(s):  
A. O. Babaryka ◽  
R. P. Khoptynskyi ◽  
S. M. Tabenskyi ◽  
A. S. Ploshchyk ◽  
R. O. Horodyskyi

In this article, indicator of the effectiveness object detection in video surveillance systems (VSS) was proposed. The results of experimental calculations, have been indicated to increase the efficiency of using VSS with video analytics functions. After modeling the obtained expressions in the software package Mathcad and using the main indicators of the conditional software and hardware, it is obvious that the probability of detection of the object (person) by the video surveillance system operator depends on a number of parameters (geometric dimensions of the observed object). , parameters of the video surveillance camera, parameters of the information display device (monitor), features of the visual system of the human operator, the level of his fatigue and level of training, etc.). Areas of further research determine the software implementation of the proposed criterion, analysis of modern models for determining the probabilities of detecting alarming events by video surveillance system operators.Keywords: probability of detection, human operator, criterion, criterion for evaluating efficiency, indicator, indicator of task success.


Sensors ◽  
2021 ◽  
Vol 21 (13) ◽  
pp. 4419
Author(s):  
Hao Li ◽  
Tianhao Xiezhang ◽  
Cheng Yang ◽  
Lianbing Deng ◽  
Peng Yi

In the construction process of smart cities, more and more video surveillance systems have been deployed for traffic, office buildings, shopping malls, and families. Thus, the security of video surveillance systems has attracted more attention. At present, many researchers focus on how to select the region of interest (RoI) accurately and then realize privacy protection in videos by selective encryption. However, relatively few researchers focus on building a security framework by analyzing the security of a video surveillance system from the system and data life cycle. By analyzing the surveillance video protection and the attack surface of a video surveillance system in a smart city, we constructed a secure surveillance framework in this manuscript. In the secure framework, a secure video surveillance model is proposed, and a secure authentication protocol that can resist man-in-the-middle attacks (MITM) and replay attacks is implemented. For the management of the video encryption key, we introduced the Chinese remainder theorem (CRT) on the basis of group key management to provide an efficient and secure key update. In addition, we built a decryption suite based on transparent encryption to ensure the security of the decryption environment. The security analysis proved that our system can guarantee the forward and backward security of the key update. In the experiment environment, the average decryption speed of our system can reach 91.47 Mb/s, which can meet the real-time requirement of practical applications.


Author(s):  
Qasim Mahmood Rajpoot ◽  
Christian Damsgaard Jensen

Pervasive usage of video surveillance is rapidly increasing in developed countries. Continuous security threats to public safety demand use of such systems. Contemporary video surveillance systems offer advanced functionalities which threaten the privacy of those recorded in the video. There is a need to balance the usage of video surveillance against its negative impact on privacy. This chapter aims to highlight the privacy issues in video surveillance and provides a model to help identify the privacy requirements in a video surveillance system. The authors make a step in the direction of investigating the existing legal infrastructure for ensuring privacy in video surveillance and suggest guidelines in order to help those who want to deploy video surveillance while least compromising the privacy of people and complying with legal infrastructure.


2016 ◽  
Vol 12 (4) ◽  
pp. 45-62 ◽  
Author(s):  
Reza Mohammadi ◽  
Reza Javidan

In applications such as video surveillance systems, cameras transmit video data streams through network in which quality of received video should be assured. Traditional IP based networks cannot guarantee the required Quality of Service (QoS) for such applications. Nowadays, Software Defined Network (SDN) is a popular technology, which assists network management using computer programs. In this paper, a new SDN-based video surveillance system infrastructure is proposed to apply desire traffic engineering for practical video surveillance applications. To keep the quality of received videos adaptively, usually Constraint Shortest Path (CSP) problem is used which is a NP-complete problem. Hence, heuristic algorithms are suitable candidate for solving such problem. This paper models streaming video data on a surveillance system as a CSP problem, and proposes an artificial bee colony (ABC) algorithm to find optimal solution to manage the network adaptively and guarantee the required QoS. The simulation results show the effectiveness of the proposed method in terms of QoS metrics.


Author(s):  
Jie Xu

Abstract Recent advances in the field of object detection and face recognition have made it possible to develop practical video surveillance systems with embedded object detection and face recognition functionalities that are accurate and fast enough for commercial uses. In this paper, we compare some of the latest approaches to object detection and face recognition and provide reasons why they may or may not be amongst the best to be used in video surveillance applications in terms of both accuracy and speed. It is discovered that Faster R-CNN with Inception ResNet V2 is able to achieve some of the best accuracies while maintaining real-time rates. Single Shot Detector (SSD) with MobileNet, on the other hand, is incredibly fast and still accurate enough for most applications. As for face recognition, FaceNet with Multi-task Cascaded Convolutional Networks (MTCNN) achieves higher accuracy than advances such as DeepFace and DeepID2+ while being faster. An end-to-end video surveillance system is also proposed which could be used as a starting point for more complex systems. Various experiments have also been attempted on trained models with observations explained in detail. We finish by discussing video object detection and video salient object detection approaches which could potentially be used as future improvements to the proposed system.


2014 ◽  
Vol 602-605 ◽  
pp. 2317-2320
Author(s):  
Yang Li ◽  
Qing Hong Wu ◽  
Xue Xiao

With the continuous improvement of security awareness, home security has become the focus of attention. The actual demand for home video surveillance system, designed a cheap, practical, small size and low power consumption of video surveillance systems, this paper uses microprocessor S3C2440 ARM9 core as the core hardware control, embedded Linux operating system with software the control core, and cheap, generic USB camera video capture device as a front end to complete the design of a home video surveillance system.


2013 ◽  
Vol 850-851 ◽  
pp. 884-888 ◽  
Author(s):  
Gang Yang ◽  
Xin Tan ◽  
Yong Rui Zhang

Video surveillance technology is playing an important role, and it is widely used in some fields. With the popularity of Android OS, it draws researchers attention to increase the development of video surveillance systems on the platform. This paper presents a smart real-time video surveillance system based on Android smart phone. This system detects moving object by using improved GMM (Gaussian Mixture Mode) algorithm, recognizes invading human with cascade classifier, processes image data with coder & decoder, transmits data over RTP (Real-time Transport Protocol). It also applies some methods to improve the accuracy of moving object detection and recognition, speed up recognition process. The experimental evidences show that it can realize real-time video surveillance and smart alarm.


Author(s):  
Larbi Guezouli ◽  
Hanane Boukhetache ◽  
Imene Kebi

Security problems and decreasing costs, leads to the rapid development of video surveillance systems. It is necessary to implement analytical tools capable of identifying objects that may appear in the video sequence. The work presented in this article consists of designing a video surveillance system for the automatic detection of humans in a video sequence acquired by a fixed camera. The principle of this work is based on the modeling and subtraction of the background. In order to determine the nature of the objects, the authors make the detection of the contours of the foreground image, then by matching this contour with the images of a base, silhouette images of people in different positions. The acquisition of the frames is carried out in real time, the matching of the images takes a considerable time and this time becomes increasingly longer based on the size of the base. To solve this problem, the authors have used the parallelism.


Author(s):  
Yong-Hua Xiong ◽  
◽  
Shao-Yun Wan ◽  
Yong He ◽  
Dan Su

Cloud-based video surveillance systems, as a new cloud computing service model, are an emerging research topic, both at home and abroad. Current research is mainly focused on exploring applications of the system. This paper proposes a design and implementation method for cloud-based video surveillance systems using the characteristics of cloud computing, such as parallel computing, large storage space, and easy expandability. The system architecture and function modules are built, and a prototype cloud-based video surveillance system is established in a campus network using key technologies, including virtual machine task access control, video-data distributed storage, and database-active communicationmethods. Using the system, the user is able to place a webcam in a location that requires monitoring so that video surveillance can be achieved, and video data can be viewed through a browser. The system has the following advantages: low investment and maintenance cost, high portability, easily extendable, superior data security, and excellent sharing. As a private cloud server in the campus network, the system is able to not only provide convenient video surveillance services, but it can also be an excellent practical experimental platform for cloud computing-related research, which carries outstanding application value.


2012 ◽  
Vol 433-440 ◽  
pp. 5906-5910
Author(s):  
Mao Lin ◽  
Yong Wang ◽  
Gang Shi

the reform and open policy has brought us Chinese people rich and colorful. However, the disparity between the rich and poor gap are increasing due to the uneven development in Chinese economic so that state of social security become more and more terrible than the pass. Thus, it is very meaningful to establish a social security video surveillance system to achieve security linkage management by this way that monitors the important insecure point by installing one or more camera to capturing the situation real-time. When there is something happen, the monitoring center will cause an alert signal to administer for further processing. In this paper, we present a scheme to achieve the social security requirement.


Sign in / Sign up

Export Citation Format

Share Document