The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We present a prototype for remote surveillance aiming at reducing the bandwidth requirements without compromising the reliability. The system consists of a network of off-the-shelf proximity sensors and a point-tilt-zoom (PTZ) camera. The camera captures video when an interrupt is received by one of the sensors. A remote server controls the operation of sensors and the camera, and is capable of receiving...
This demonstrator serves as a proof-of-concept of our multi-camera remote surveillance system that supports 1080p still image capture with a 10-second refresh rate. Image capture, compression, and broadcast are implemented in each Raspberry Pi 2 camera node. Image compression is conducted with an open-source Kvazaar HEVC encoder that outputs HEVC images in BPG format. The BPG images are broadcast...
Single-Camera Video Surveillance (SCVS) has mainly been applied in the passive monitoring. Video surveillance covers small area, the video information is not sufficient without the joint tracking capability. Currently poor performance in most similar networks is mainly due to unintelligence and low real-time. In this paper we proposed a distributed smart multi-eyes camera network by utilizing smart...
Many homes are still not considered environmentally friendly. In addition, home safety and comfort is still an issue today. Because of that, energy efficient, safe and comfortable home that can act intelligently in order to solve the problems and meet the needs of its users need to be created. That is to create a single unified management system in a home. In this thesis, intelligent home management...
Nowadays, more and more videos are transmitted for video analytics purposes rather than human perceptions. In mobile surveillance networks, a cloud server collects videos delivered from multiple moving cameras and detects suspicious people in all the camera views. However, all the videos recorded by moving cameras such as phone or dash cameras are uploaded through bandwidth-limited wireless networks...
Mobile surveillance systems like vehicle mounted cameras (i.e. police dash cams) and body cameras play an important role in securing physical spaces. However, these systems can generate too much data that hampers timely analysis. Furthermore, existing infrastructure wireless networks may not have sufficient bandwidth to support real time streaming of videos to backend servers. This paper presents...
Overseas patent lawsuits and infringements of intellectual property rights have been increasing. As the Internet expands and globalization progresses, Japanese companies become more exposed to the risk of lawsuits overseas. Thus, digital forensics technology has been attracting attention. This technology enables the digital data a company manages to be disclosed as proof when a lawsuit is generated...
This paper presents a software architecture for audio transmission to network cameras while integrating multiple types of cameras from different manufacturers under a web-based surveillance system. Adding audio streams in surveillance system will enhance the capabilities for remote monitoring. This architecture offers a plug-and-play service of audio transmission to cameras over the network for numerous...
In recent years, the management of personal or privacy information has attracted much attention. Privacy laws and regulations, specifically regarding facial images and other information obtained from surveillance cameras, have not been fully established. People who have been photographically surveilled have begun to demand the right to control how such information is obtained and used. Therefore,...
Through we experienced at the Eastern Japan Great Earthquake on March 11, 2011, a disaster information gathering systems are strongly needed to widely collect the disaster state around the evaluated areas, correctly analyze the degree of damages and quickly make decision of disaster recovery response. For this requirement, a mobile video surveillance system on a vehicle based on wireless network is...
Unmanned Aerial Systems (UAS) have raised a great concern on privacy recently. A practical method to protect privacy is needed for adopting UAS in civilian airspace. This paper examines the privacy policies, filtering strategies, existing techniques, then proposes a novel method based on the encrypted video stream and the cloud-based privacy servers. In this scheme, all video surveillance images are...
Recently the demand for large-scale surveillance systems automated by video analysis technologies has been increased. A key to developing real-world systems of this type is the streamlining of analysis execution on the basis of application characteristics including video contents. This paper proposes novel middleware we call “Analysis Control Middleware (ASCOT)” for achieving and customizing analysis...
Nowadays, digital surveillance systems are ubiquitously installed and continuously generate huge amount of video data. Very often, human inspection of the recorded videois still required for threat detection. Even though automated techniques exist to facilitate the detection of potential security problems, it remains a highly computation demanding task to process these data. The emergence of cloud...
Surveillance cameras account for a large portion of the security devices market and are used in an increasing number of areas. Recently, surveillance cameras have been evolved into high performance intelligent surveillance camera systems using many image processing algorithms including face and object recognition, image reconstruction, super resolution, and tracking. Most image processing algorithms...
Modern society has recently had problems with a variety of crimes. Surveillance cameras have been installed in various locations to protect assets from these crimes. When the incident occurred, it is needed to manually find out suspicious people in a large number of footage. Manually extracting prowlers is inefficient in which a lot of surveillance cameras have been installed and have taken a large...
The approach and rationale used to create controlled data sets encompassing video, track, and reference data and meta-data is described in this paper. The data sets are designed to support the development of automated technologies for the detection of situational and operational behaviors of interest. A custom tool for the concurrent visualization and access of the data is also introduced.
This paper presents Virtual Lock, a novel smart phone application for personal surveillance using camera sensor networks. The proposed system consists of a smart phone and a set of easily deployable wireless camera sensor motes and enables an inexpensive solution to continuous monitoring of one's surroundings. Once camera sensor motes are deployed, a user can define multiple regions of interest for...
In this paper, we present a novel system for enhancing enterprise virtual worlds by supplying information about real-world events and activities at near real-time. With more enterprises realizing the commercial benefits of virtual worlds, the requirement for spontaneous replication of the real-world has become essential. In the proposed system, we detect and classify different real-life human activities...
This paper describes the efficiency distributed video content management in surveillance system. The main project was to develop an IP-based physical security follow ONVIF standard. This ICL ONVIF middleware was using iSCSI distributed network to establish distributed surveillance system. In this paper, we aim at the combination of multimedia content processing by load balance control and building...
Increasingly, despite the protests and concerns of consumers and consumer advocates, privacy is becoming encroached upon and whittled away. Here, the author offers an unconventional approach on how to handle this loss of privacy and empower the average person.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.