By Topic

2007 IEEE Conference on Advanced Video and Signal Based Surveillance

5-7 Sept. 2007

Filter Results

Displaying Results 1 - 25 of 110
  • 2007 IEEE Conference on advanced video and signal based surveillance

    Publication Year: 2007, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (161 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2007, Page(s): ii
    Request permission for commercial reuse | PDF file iconPDF (85 KB)
    Freely Available from IEEE
  • Welcome

    Publication Year: 2007, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (78 KB) | HTML iconHTML
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2007
    Request permission for commercial reuse | PDF file iconPDF (159 KB)
    Freely Available from IEEE
  • Looking at people

    Publication Year: 2007, Page(s): 1
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (66 KB) | HTML iconHTML

    The ability to recognize humans and their activities by vision is key for a machine to interact intelligently and effortlessly with a human-inhabited environment. Because of many important applications, "Looking at People" is currently the most active application domain in computer vision. This talk provides an overview of recent developments, with focus on methodologies for detecting, tracking pe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A journey from signal processing to surveillance

    Publication Year: 2007, Page(s): 2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (59 KB)

    Traditionally, signal processing is considered simply low-level processing. In the past decade, however, signal processing has grown to become the area where a variety of tools are created to solve high-level problems that conventionally would be studied by computer vision or machine learning researchers exclusively. For example, multiresolution analysis created popular image features like SIFT (s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer-aided facial reconstruction using skulls

    Publication Year: 2007, Page(s): 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (54 KB) | HTML iconHTML

    The ability to determine the identity of a skull found at a crime scene is of critical importance to the law enforcement community. Traditional clay-based methods attempt to reconstruct the face so as to enable identification of the deceased by members of the general public. However, these reconstructions lack consistency from practitioner to practitioner and it has been shown that the human recog... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stereo vision and segmentation

    Publication Year: 2007, Page(s): 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (53 KB)

    I will describe models and algorithms for the real-time segmentation of foreground from background layers in stereo video sequences. Automatic separation of layers from color/contrast or from stereo alone is known to be error-prone. Here, color, contrast and stereo matching information are fused to infer layers accurately and efficiently. The stereo-match likelihood is then fused with a contrast-s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Technology, applications and innovations in physical security - A home office perspective

    Publication Year: 2007, Page(s): 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (59 KB)

    Summary form only given. This overview talk will first introduce the Home Office Scientific Development Branch (HOSDB) as organisation and then will offer a summary of our programmes in the area of the physical security sector. The talk will explain how HOSDB is contributing to protection and law enforcement. I will use a series of examples to cover this area. In the second part, the talk shall fo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Directions in automatic video analysis evaluations at NIST

    Publication Year: 2007, Page(s): 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (58 KB)

    NIST has been conducting a series of evaluations in the automatic analysis of information in video since 2001. These began within the NIST text retrieval evaluation (TREC) as a pilot track in searching for information in large collections of video. The evaluation series was spun off into its own evaluation/workshop series called TRECVID. TRECVID continues to examine the challenge of extracting fea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detecting hidden objects: Security imaging using millimetre-waves and terahertz

    Publication Year: 2007, Page(s):7 - 9
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (133 KB) | HTML iconHTML

    There has been intense interest in the use of millimetre wave and terahertz technology for the detection of concealed weapons, explosives and other threats. Radiation at these frequencies is safe, penetrates barriers and has short enough wavelengths to allow discrimination between objects. In addition, many solids including explosives have characteristic spectroscopic signatures at terahertz wavel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Issues in video analytics and surveillance systems: Research / prototyping vs. applications / user requirements

    Publication Year: 2007, Page(s):10 - 14
    Cited by:  Papers (2)
    Request permission for commercial reuse | PDF file iconPDF (349 KB) | HTML iconHTML
    Freely Available from IEEE
  • Verbal aggression detection in complex social environments

    Publication Year: 2007, Page(s):15 - 20
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1146 KB) | HTML iconHTML

    The paper presents a knowledge-based system designed to detect evidence of aggression by means of audio analysis. The detection is based on the way sounds are analyzed and how they attract attention in the human auditory system. The performance achieved is comparable to human performance in complex social environments. The SIgard system has been deployed in a number of different real-life situatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scream and gunshot detection and localization for audio-surveillance systems

    Publication Year: 2007, Page(s):21 - 26
    Cited by:  Papers (69)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (189 KB) | HTML iconHTML

    This paper describes an audio-based video surveillance system which automatically detects anomalous audio events in a public square, such as screams or gunshots, and localizes the position of the acoustic source, in such a way that a video-camera is steered consequently. The system employs two parallel GMM classifiers for discriminating screams from noise and gunshots from noise, respectively. Eac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Acoustic Doppler sonar for gait recogination

    Publication Year: 2007, Page(s):27 - 32
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (494 KB) | HTML iconHTML

    A person's gait is a characteristic that might be employed to identify him/her automatically. Conventionally, automatic for gait-based identification of subjects employ video and image processing to characterize gait. In this paper we present an Acoustic Doppler Sensor(ADS) based technique for the characterization of gait. The ADS is very inexpensive sensor that can be built using off-the-shelf co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Compression for 3D face recognition applications

    Publication Year: 2007, Page(s):33 - 38
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (175 KB) | HTML iconHTML

    This paper proposes a novel 3D lossy compression algorithm tailored for 3D faces. We analyse the effects of compression on the face verification rate and measure recognition performances on the face recognition grand challenge database. Whilst preserving the spatial resolution enabling reconstruction of surface details, the proposed scheme achieves substantial compression to the extent that person... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards fast 3D ear recognition for real-life biometric applications

    Publication Year: 2007, Page(s):39 - 44
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (617 KB) | HTML iconHTML

    Three-dimensional data are increasingly being used for biometric purposes as they offer resilience to problems common in two-dimensional data. They have been successfully applied to face recognition and more recently to ear recognition. However, real-life biometric applications require algorithms that are both robust and efficient so that they scale well with the size of the databases. A novel ear... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automated 3D Face authentication & recognition

    Publication Year: 2007, Page(s):45 - 50
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (608 KB) | HTML iconHTML

    This paper presents a fully automated 3D face authentication (verification) and recognition (identification) method and recent results from our work in this area. The major contributions of our paper are: (a) the method can handle data with different facial expressions including hair, upper body, clothing, etc. and (b) development of weighted features for discrimination. The input to our system is... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 2D face pose normalisation using a 3D morphable model

    Publication Year: 2007, Page(s):51 - 56
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (429 KB) | HTML iconHTML

    The ever growing need for improved security, surveillance and identity protection, calls for the creation of evermore reliable and robust face recognition technology that is scalable and can be deployed in all kinds of environments without compromising its effectiveness. In this paper we study the impact that pose correction has on the performance of 2D face recognition. To measure the effect, we ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • View adaptive detection and distributed site wide tracking

    Publication Year: 2007, Page(s):57 - 62
    Cited by:  Papers (5)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (535 KB) | HTML iconHTML

    Using a detect and track paradigm, we present a surveillance framework where each camera uses local resources to perform real-time person detection. These detections are then processed by a distributed site-wide tracking system. The detectors themselves are based on boosted user-defined exemplars, which capture both appearance and shape information. The detectors take integral images of both inten... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Intelligent vision sensor: Turning video into information

    Publication Year: 2007, Page(s):63 - 68
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1067 KB) | HTML iconHTML

    Video analytics for security and surveillance applications is becoming commonplace. Advances in algorithm robustness and low-cost video platforms have allowed analytics to become an ingredient for many different devices ranging from cameras to encoders to routers to storage. As algorithms become more refined, the analytics paradigm shifts from a human-support model to an automation model. In this ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Camera mote with a high-performance parallel processor for real-time frame-based video processing

    Publication Year: 2007, Page(s):69 - 74
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (750 KB) | HTML iconHTML

    This paper describes a new smart camera mote with a high performance SIMD (single-instruction multiple-data) processor. Previous versions of our camera mote were equipped with IC3D, a line-based processor. The mote described in this paper is equipped with Xetal-II, a processor designed for frame-based real-time video analysis. The processor uses 320 processing elements in parallel to achieve perfo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Searching surveillance video

    Publication Year: 2007, Page(s):75 - 80
    Cited by:  Papers (12)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (530 KB) | HTML iconHTML

    Surveillance video is used in two key modes, watching for known threats in real-time and searching for events of interest after the fact. Typically, real-time alerting is a localized function, e.g. airport security center receives and reacts to a "perimeter breach alert", while investigations often tend to encompass a large number of geographically distributed cameras like the London bombing, or W... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Camera selection in visual sensor networks

    Publication Year: 2007, Page(s):81 - 86
    Cited by:  Papers (29)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (219 KB) | HTML iconHTML

    Wireless networks of visual sensors have recently emerged as a new type of sensor-based intelligent system, with performance and complexity challenges that go beyond that of existing wireless sensor networks. The goal of the visual sensor network we examine is to provide a user with visual information from any arbitrary viewpoint within the monitored field. This can be accomplished by synthesizing... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed video surveillance using hardware-friendly sparse large margin classifiers

    Publication Year: 2007, Page(s):87 - 92
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (190 KB) | HTML iconHTML

    In contrast to video sensors which just "watch " the world, present-day research is aimed at developing intelligent devices able to interpret it locally. A number of such devices are available on the market, very powerful on the one hand, but requiring either connection to the power grid, or massive rechargeable batteries on the other. MicrelEye, the wireless video sensor node presented in this pa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.