Automated video protection, monitoring & detection

被引:10
|
作者
Lipton, AJ [1 ]
Heartwell, CH [1 ]
Haering, N [1 ]
Madden, D [1 ]
机构
[1] Object Video, Reston, VA 20191 USA
关键词
D O I
10.1109/MAES.2003.1201453
中图分类号
V [航空、航天];
学科分类号
08 ; 0825 ;
摘要
The latest generation of computer vision technology is revolutionizing concepts, applications, and products in video surveillance and CCTV. This is of prime relevance to security for large outdoor facilities such as commercial airfields, refineries, power plants, and office/industrial campuses. Most airfields, for example, have open (unfenced) perimeters, high volume heterogeneous traffic, are easily accessed on foot or by water, and exist in areas where regulations providing a safety buffer are difficult to legislate or enforce. And all airfields require 24/7 outdoor monitoring - snow, fog, rain, or shine. Likewise, most high-value facilities appealing to criminals and terrorists are in close proximity to public areas (roads, residences, city, etc.). The appeal of automated real-time surveillance is obvious - maximizing efficiency and effectiveness of security personnel and resources while increasing the probability of preventing a serious security breach. Computer vision based solutions have the potential for very discriminating detection and very low false alarms. The bottom line is that applied computer vision has the potential for the greatest return on investment (ROI), both short-term and long-term.
引用
收藏
页码:3 / 18
页数:16
相关论文
共 50 条
  • [31] Moving target detection in video monitoring system
    Li, Gang
    Zeng, Ruili
    Lin, Ling
    WCICA 2006: SIXTH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-12, CONFERENCE PROCEEDINGS, 2006, : 489 - 489
  • [32] A review of chewing detection for automated dietary monitoring
    Wei, Yanxin
    Minhad, Khairun Nisa'
    Selamat, Nur Asmiza
    Md Ali, Sawal Hamid
    Sobhan Bhuiyan, Mohammad Arif
    Ooi, Kelvin Jian Aun
    Samdin, Siti Balqis
    JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 2022, 45 (04) : 331 - 341
  • [33] Detection and monitoring of passengers on a bus by video surveillance
    Chee, Boon Chong
    Lazarescu, Mihai
    Tan, Tele
    14TH INTERNATIONAL CONFERENCE ON IMAGE ANALYSIS AND PROCESSING, PROCEEDINGS, 2007, : 143 - +
  • [34] Detection of patient movement for video EEG monitoring
    Chang, YD
    Lee, DG
    Ryoo, SY
    Lee, DS
    PROCEEDINGS OF THE 20TH ANNUAL INTERNATIONAL CONFERENCE OF THE IEEE ENGINEERING IN MEDICINE AND BIOLOGY SOCIETY, VOL 20, PTS 1-6: BIOMEDICAL ENGINEERING TOWARDS THE YEAR 2000 AND BEYOND, 1998, 20 : 959 - 962
  • [35] Scam Detection Assistant: Automated Protection from Scammers
    Kim, Myeongsoo
    Song, Changheon
    Kim, Hyeji
    Park, Deahyun
    Kwon, Yeeji
    Namkung, Eun
    Harris, Ian G.
    Carlsson, Marcel
    2019 FIRST INTERNATIONAL CONFERENCE ON SOCIETAL AUTOMATION (SA), 2019,
  • [36] Dual Video Watermarking for CCL Protection and Manipulation Detection
    Moon, Sung-Won
    Kim, Hee-Dong
    Lee, Ji-won
    Lee, Heung-Kyu
    2012 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS 2012), 2012, : 1420 - 1423
  • [37] Automated In-Home Assistive Monitoring with Privacy-Enhanced Video
    Edgcomb, Alex
    Vahid, Frank
    2013 IEEE INTERNATIONAL CONFERENCE ON HEALTHCARE INFORMATICS (ICHI 2013), 2013, : 192 - 198
  • [38] POSSIBILITIES OF AUTOMATED VIDEO MONITORING OF MECHANICAL LUNG VENTILATION - A CASE STUDY
    Kontorovich, M.
    Purtov, K.
    Chistyakov, A.
    Kublanov, V.
    SLEEP MEDICINE, 2017, 40 : E273 - E273
  • [39] Automated Video Monitoring of Unmarked and Marked Honey Bees at the Hive Entrance
    Rodriguez, Ivan F.
    Chan, Jeffrey
    Alvarez Rios, Manuel
    Branson, Kristin
    Agosto-Rivera, Jose L.
    Giray, Tugrul
    Megret, Remi
    FRONTIERS IN COMPUTER SCIENCE, 2022, 3
  • [40] Automated Bug Finding in Video Games: A Case Study for Runtime Monitoring
    Varvaressos, Simon
    Lavoie, Kim
    Masse, Alexandre Blondin
    Gaboury, Sebastien
    Halle, Sylvain
    2014 IEEE SEVENTH INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION (ICST), 2014, : 143 - 152