1,135 Hits in 4.6 sec

Risk Entropy Modeling of Surveillance Camera for Public Security Application

Hongzhou Zhang, Peiyue Li, Zhiguo Du, Wei Dou
2020 IEEE Access  
In this paper, we proposed an entropy model for measuring the uncertainty based on attributions of video surveillance for law enforcement.  ...  INDEX TERMS Police video surveillance, public security, risk entropy, system effectiveness evaluation. VOLUME 8, 2020 This work is licensed under a Creative Commons Attribution 4.0 License.  ...  AN EXAMPLE OF VISUAL SURVEILLANCE RISK ENTROPY APPLICATION In the above sections, we proposed a risk entropy model for police video surveillance applications.  ... 
doi:10.1109/access.2020.2978247 fatcat:cj2jevztizfx7pr4brgxurvhhe

Attacks and Preventive Measures on Video Surveillance Systems: A Review

Preethi Vennam, Pramod T. C., Thippeswamy B. M., Yong-Guk Kim, Pavan Kumar B. N.
2021 Applied Sciences  
This provides insight for the better identification of the security risks associated with the design and deployment of these systems and promotes further research in this emerging field.  ...  Video surveillance systems are widely deployed with large systems for use in strategic places such as home security, public transportation, banks, ATM centers, city centers, airports, and public roads,  ...  A new risk measurement named "entropy-based risk score (ERS)" is introduced where entropy values are calculated from user applications based on the definition.  ... 
doi:10.3390/app11125571 fatcat:i5tdoyz5mncqjltfap4wyou3ne

Causality Inspired Retrieval of Human-object Interactions from Video

Liting Zhou, Jianquan Liu, Shoji Nishimura, Joseph Antony, Cathal Gurrin
2019 2019 International Conference on Content-Based Multimedia Indexing (CBMI)  
For this we first extract the key frames and generate the labels or annotations using the state-of-the-art image captioning models.  ...  Notwithstanding recent advances in machine vision, video activity recognition from multiple cameras still remains a challenging task as many real-world interactions cannot be automatically recognised for  ...  Acknowledgments This publication has emanated from the research at NEC Corporation reserving all rights of the contents, and also was partially supported by research grants from Irish Research Council  ... 
doi:10.1109/cbmi.2019.8877392 dblp:conf/cbmi/ZhouLNAG19 fatcat:gavrcfgiwralzptiwqtz423n3u

RiskWheel: Interactive visual analytics for surveillance event detection

Yu Cheng, L. Brown, Q. Fan, R. Feris, S. Pankanti, Tao Zhang
2014 2014 IEEE International Conference on Multimedia and Expo (ICME)  
Thus an interactive tool designed to support this task with human in the loop is of significance in various domains including public safety and security.  ...  Detecting human behaviors in vast amounts of video is a challenging task in a variety of real-world applications.  ...  It is a fundamental problem for a variety of highlevel applications of critical importance to public safety and security.  ... 
doi:10.1109/icme.2014.6890286 dblp:conf/icmcs/ChengBFFPZ14 fatcat:6eyxvv6cmvcghm3gnewf7aidkm

Secure and Privacy-Preserving Stored Surveillance Video Sharing atop Permissioned Blockchain [article]

Alem Fitwi, Yu Chen
2021 arXiv   pre-print
The BC-based solution creates an environment auspicious for creating decentralized, reliable SACs and storage sites with secure and privacy-aware sharing of stored surveillance videos across SAC nodes  ...  Hence, the traditional video surveillance system (VSS) cannot guarantee the protection of the privacy of individuals caught on CCTV cameras.  ...  Even today, CCTV cameras are not secure and they greatly risk the privacy of many individuals. B.  ... 
arXiv:2104.05617v1 fatcat:zb42p46ktjhldcmufpatpswyyy

Guest Editorial: Intelligent Audio-Visual Observation Systems for Urban Environments

Andrzej Dziech, Mikołaj Leszczuk, Remigiusz Baran
2016 Multimedia tools and applications  
The paper discusses an application of a new risk assessment method, in which risk calculation is based on fuzzy cognitive maps (FCMs) to a complex automated video surveillance system.  ...  The paper presents a smart camera aimed at security and law enforcement applications for intelligent transportation systems. An extended background is presented first as a scholar literature review.  ... 
doi:10.1007/s11042-016-3805-4 fatcat:herbom4zbzbujnsaywmhwg6fai

Intelligent Video Data Security: A Survey and Open Challenges

Jin-Yong Yu, Yujun Kim, Young-Gab Kim
2021 IEEE Access  
surveillance camera. 2.  ...  "Camera A" extracts the features of the detected risk and shares it in real-time with the camera (Camera B) that controls "AREA C" in common. 4.  ... 
doi:10.1109/access.2021.3057605 fatcat:ysfjqskz2rgwtfgcjmjx4nqiky

A Study on Effectiveness Evaluation for the Physical Protection System of a High Security Prison Based on the Cloud Model

Ke Yin
2018 Security and Communication Networks  
The research results show that the cloud model that we constructed for effectiveness evaluation can greatly reduce the influence of subjective factors in the risk evaluation for the physical protection  ...  A case study was used to discuss the risk controllability of such a system with the evaluation method based on the cloud model.  ...  Forest Police College, and the Fundamental Research Funds for the Central Universities under grant of LGZD201602.  ... 
doi:10.1155/2018/9583982 fatcat:lnjbsfkw6nditckg4dbfms6nyu

Comparative study and enhancement of Camera Tampering Detection algorithms [article]

Mabrouka Hagui, Mohamed Ali Mahjoub, Ahmed Boukhris
2016 arXiv   pre-print
Different places are equipped by camera surveillances such as hospitals, schools, airports, museums and military places in order to ensure the safety and security of the persons and their property.  ...  In this paper, comparative study of performance of three algorithms that can detect abnormal disturbance for video surveillance is presented.  ...  Introduction Safety and prevention against accidental or malicious risks are an extreme necessity for many places and areas requiring security measures such as video surveillance used for several years  ... 
arXiv:1608.02385v1 fatcat:kkajmhb6rzc4diulet52iounpa

Deep Neural Networks for Gun Detection in Public Surveillance

Erssa Arif, Syed Khuram Shahzad, Rehman Mustafa, Muhammad Arfan Jaffar, Muhammad Waseem Iqbal
2022 Intelligent Automation and Soft Computing  
The use of real-time object detection system for the improvement of surveillance is a promising application of Convolutional Neural Networks (CNN).  ...  We are concerned about the real-time detection of weapons for the surveillance cameras, so we focused on the implementation and comparison of faster approaches such as Region (R-CNN) and Region Fully Convolutional  ...  Funding Statement: The authors received no specific funding for this study. Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.  ... 
doi:10.32604/iasc.2022.021061 fatcat:yunzcw2dczdltf3clm5a2mzi7q


Davide Baltieri, Roberto Vezzani, Rita Cucchiara
2011 Proceedings of the 2011 joint ACM workshop on Human gesture and behavior understanding - J-HGBU '11  
In this paper we present 3DPeS, a new dataset for 3D/multiview surveillance and forensic applications.  ...  The new assessed version of the dataset contains hundreds of video sequences of 200 people taken from a multi-camera distributed surveillance system over several days, with different light conditions;  ...  Thus, in the case of common settings with surveillance cameras (low resolution, poor views, non collaborative people) they are not always applicable. • Geometric approaches: when more than one camera or  ... 
doi:10.1145/2072572.2072590 dblp:conf/mm/BaltieriVC11 fatcat:fc5fsmmkovcpnj4bviueymcfsu

Event Analogy Based Privacy Preservation in Visual Surveillance [chapter]

Wei Qi Yan, Feng Liu
2016 Lecture Notes in Computer Science  
The outcome will not affect visual effects and surveillance security much however it is able to achieve the objectives of privacy preservation.  ...  The advantage of taking use of this approach is to leverage the utility and privacy of surveillance events.  ...  Privacy of surveillance video [17] has been modelled by the parameters 'who', 'when' and 'where' due to the applications of events.  ... 
doi:10.1007/978-3-319-30285-0_29 fatcat:olicfqp54vffdjqdyim47likqq

Border security and surveillance System using IoT

2022 International Journal of Information Retrieval Research  
With the advancements in wireless IoT technology, it has become much easier to design, develop and deploy a cost-effective, automatic and efficient system for intrusion detection in the context of surveillance  ...  Our system is based on the classification of the human gestures drawn from videos envoy by Drones equipped with cameras and sensors in real-time.  ...  Joseph Fourier University of Grenoble.  ... 
doi:10.4018/ijirr.289953 fatcat:pnjpszmj7nbwni3yx5bim3hu5a

Anomaly Detection in Road Traffic Using Visual Surveillance: A Survey [article]

Santhosh Kelathodi Kumaran, Debi Prosad Dogra, Partha Pratim Roy
2019 arXiv   pre-print
In this paper, we present a survey on relevant visual surveillance related researches for anomaly detection in public places, focusing primarily on roads.  ...  Computer vision has evolved in the last decade as a key technology for numerous applications replacing human supervision.  ...  INTRODUCTION W ITH the widespread use of surveillance cameras in public places, computer vision-based scene understanding has gained a lot of popularity amongst the CV research community.  ... 
arXiv:1901.08292v1 fatcat:qehtkb2imfbmpfahkgsjrx7544

The Security of IP-Based Video Surveillance Systems

Naor Kalbo, Yisroel Mirsky, Asaf Shabtai, Yuval Elovici
2020 Sensors  
Unfortunately, like other IoT systems, there are inherent security risks which can lead to significant violations of a user's privacy.  ...  The purpose of this review is to provide researchers and engineers with a better understanding of a modern surveillance systems' security, to harden existing systems and develop improved security solutions  ...  However, there is more risk for a camera to be compromised for its capabilities (observing the video footage) or to act as a stepping stone in a grander attack.  ... 
doi:10.3390/s20174806 pmid:32858840 fatcat:3fp4iwcbojcszft4iqtkjmmvhq
« Previous Showing results 1 — 15 out of 1,135 results