The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes a high capacity and high quality image data hiding scheme based on a causal predictor, predictor error expansion and a local activity indicator. The utilization of the secret data from Galois field GF(q), q ≥ 2 allows to embed more than one bit per pixel in compliance with a high quality of stego image. Moreover, special conditions for location map-free embedding are derived. Experimental...
We demonstrate the synthesis of intermediary views within a sequence of X-ray images that exhibit depth from motion or kinetic depth effect in a visual display. Each synthetic image replaces the requirement for a linear X-ray detector array during the image acquisition process. Scale invariant feature transform, SIFT, in combination with epipolar morphing is employed to produce synthetic imagery....
We propose in this paper a tracking algorithm which is able to adapt itself to different scene contexts. A feature pool is used to compute the matching score between two detected objects. This feature pool includes 2D, 3D displacement distances, 2D sizes, color histogram, histogram of oriented gradient (HOG), color covariance and dominant color. An offline learning process is proposed to search for...
Images or video streams, extracted from data acquired through surveillance systems and intended to be used as evidence in court, should have all attributes of conventional digital evidence, meaning that they should be admissible, authentic, reliable, complete and believable. This paper discusses the first three attributes that surveillance systems should comply with to be submitted as evidence in...
Even with the high accuracy of automated fingerprint identification in matching plain to rolled prints, latent to rolled print matching continues to require human input. Latent prints are those that are lifted from a surface, typically at a crime scene, whereas plain prints are obtained under supervision with quality control. In comparison to plain or rolled prints, latent prints are usually of poor...
In this paper, we propose a novel approach for multi-object tracking for video surveillance with a single static camera using particle filtering and data association. The proposed method allows for real-time tracking and deals with the most important challenges: 1) selecting and tracking real objects of interest in noisy environments and 2) managing occlusion. We will consider tracker inputs from...
In this work, the activity of the facial blood vessels of drunk persons is studied using thermal infrared images. Nonlinear anisotropic diffusion is applied to enhance the vessels on the images and after that top-hat transformation is used for isolating them from the rest information on the face. Simple thresholding is applied to raise the more active vessels. Registration procedures are employed...
Detecting and recognizing people is important in surveillance. Many detection approaches use local information, such as pattern and colour, which can lead to constraints on application such as changes in illumination, low resolution, and camera view point. In this paper we propose a novel method for estimating the 3D head region based on analysing the gait motion derived from the video provided by...
With the recent explosion of surveillance videos, media management has gained an increasing popularity. Addressing this challenge, in this paper, we propose a Surveillance Media Management framework for object detection and classification based on behaviour patterns. The objectives of the paper are: (i) demostrating the discriminative power of behaviour features for object recognition and classification,...
3D shape information is crucial in many video analytic applications, such as face recognition and expression analysis. However, most commercial 3D modeling systems rely on dedicated equipment, which lacks operational flexibility. We present an efficient approach to reconstruct 3D face from low quality video, concentrated on recovering the depth information lost in imaging process. There are two novelties...
Distributed Video Coding (DVC) is well known for low complexity encoding which provides coding solutions for a wide range of applications, in particular wireless video surveillance. In this paper, we address the problem of distortion variation introduced by typical rate control algorithms, especially in a various bit rate environment. A distortion quantization model derived from a MPEG-2 distortion...
Most camera identification schemes focus on finding image features that can increase classification accuracy as well as computational efficiency. For forensic investigation purposes, however, these selection criteria are not enough since most real-world photos may have undergone common image processing due to various reasons. Therefore, source camera classifiers must have the capability to resist...
Visual cryptography schemes have been introduced in 1994 by Naor and Shamir [9]. These kind of schemes have been also well described by C. Blundo, A. De Santis and D.R. Stinson in [3]. In this case, a secret image I may be encoded into n shadowimages called the shares, and to give exactly one such shadowimage to each member of a group P of n persons. Certain qualified subsets of participants can visually...
We propose a visual surveillance based person-to-person hostile intent and behavior detection method in elevators. The view of an elevator by a surveillance camera is typically of a small confined space with abrupt changes in illumination due to opening and closing of the elevator door. We extract three levels of features in a sequential process for the violent event detection. First, as low-level...
Human face recognition is, indeed, a challenging task, especially under the illumination and pose variations. It is challenging as well as attractive for its usefulness in the area of crime detection and identity verification. We examine in the present paper effectiveness of two simple algorithms using coiflet packet and Radon transforms to recognize human faces from some databases of still graylevel...
This paper focuses on the development and novel application of data mining techniques for convoy analysis of vehicles based on the automatic number plate recognition (ANPR) system. The amount of ANPR data captured daily by traffic cameras in the road networks is very substantial. Data mining techniques are commonly used to extract relevant information and to reduce the amount of data processing and...
Due to its uniqueness and potential in forensic applications, the sensor pattern noise (SPN) has drawn much attention in the digital forensic community and academia in the past few years. While much work has been done on the application of the SPN, little investigation into its characteristics has been reported in the literature. It is our intention to fill this gap by providing insight into the dependency...
Large sets of visual data are now available both, in real time and off line, at time of investigation in multimedia forensics, however passive querying systems often encounter difficulties in retrieving significant results. In this paper we propose an iterative active querying system for video surveillance and forensic applications based on the continuous interaction between the user and the system...
We investigated differences in visual search of dangerous events between security experts and naïve observers during the observation of large scenes, typically encountered on the grandstand of stadiums during soccer matches. Our main technical objective was the reduction of computational effort required for the detection and recognition of such events. To overcome the scarcity and legal issues associated...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.