Abstract:
Seeing (surveillance) but not understanding (poor security performance)" is common problem in most security systems. Although in recent years significant progress has bee...Show MoreMetadata
Abstract:
Seeing (surveillance) but not understanding (poor security performance)" is common problem in most security systems. Although in recent years significant progress has been achieved in biometric identification technology, the progress of single technologies does not dramatically improve the overall performance or solve the system-level problems of social security. Currently in addition to improvements of single technology, the following system-level technical bottlenecks must be solved to improve the overall performance of social security: 1. Blind spots of perception exist in surveillance area of due to the non-overlap of surveillance sensors, 2. The performance of single identification technology decreases sharply in complex surveillance scenarios such as poor lighting conditions or disguise, 3. Traditional warning technologies become invalid due to the multi-stage non-stationary evolution feature of complex events. Three challenges listed above closely relate to three scientific problems in the analysis technology of big visual data on three levels: sensing data, identification technology and pattern recognition. Our study aims at (1) exploiting the complete mapping mechanism between physical space and multivariate sensing spaces to fill-in the blind spots of sensing data, (2) exploring the correlative mechanism of multi-modal objects in multivariate sensing spaces to improve the analytical performance from single identification technology, (3) studying the spatial-temporal evolution mechanism in the entire lifecycle of complex events to extend pattern recognition from local space and time. The security space is the physical space with comprehensive protective ability, which includes ubiquitous sensing, reliable identification, penetrating trend analysis and approaching danger warning at any time, at any location, for any object and for any behavior. Aiming to build the theory of security space, this study is divided into three levels: information acquisition and ...
Date of Conference: 13-16 August 2016
Date Added to IEEE Xplore: 16 January 2017
ISBN Information: