A.C.E. Surveillance (next generation surveillance based on automatic extraction of Annotated Critical Evidence from video) Dmitry O. Gorodnichy Computational.

Slides:



Advertisements
Similar presentations
Detection and tracking of pianist hands and fingers Dmitry O. Gorodnichy 1 and Arjun Yogeswaran 23 1 Institute for Information Technology, National Research.
Advertisements

1. XP 2 * The Web is a collection of files that reside on computers, called Web servers. * Web servers are connected to each other through the Internet.
Archiving and Retrieving Purchase Orders and Invoices
1 Senn, Information Technology, 3 rd Edition © 2004 Pearson Prentice Hall James A. Senns Information Technology, 3 rd Edition Chapter 7 Enterprise Databases.
Zhongxing Telecom Pakistan (Pvt.) Ltd
Towards Automating the Configuration of a Distributed Storage System Lauro B. Costa Matei Ripeanu {lauroc, NetSysLab University of British.
1 State Wildlife Action Plans Wiki: Business Transformation Tutorial Brand Niemann July 5, 2008
XP New Perspectives on Microsoft Office Word 2003 Tutorial 7 1 Microsoft Office Word 2003 Tutorial 7 – Collaborating With Others and Creating Web Pages.
24/10/02AutoArch Overview Computer Vision and Media Group: Selected Previous Work David Gibson, Neill Campbell Colin Dalton Department of Computer Science.
GR2 Advanced Computer Graphics AGR
16.1 Si23_03 SI23 Introduction to Computer Graphics Lecture 16 – Some Special Rendering Effects.
Microsoft Office 2010 Basics and the Internet
What's new?. ETS4 for Experts - New ETS4 Functions - improved Workflows - improvements in relation to ETS3.
Processing and Exporting Images Doncho Minkov Telerik Corporation Change this with you info.
Configuration management
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Output Devices.
1 ECE 495 – Integrated System Design I Introduction to Image Processing ECE 495, Spring 2013.
Database Performance Tuning and Query Optimization
Université du Québec École de technologie supérieure Face Recognition in Video Using What- and-Where Fusion Neural Network Mamoudou Barry and Eric Granger.
Taming User-Generated Content in Mobile Networks via Drop Zones Ionut Trestian Supranamaya Ranjan Aleksandar Kuzmanovic Antonio Nucci Northwestern University.
1 Sizing the Streaming Media Cluster Solution for a Given Workload Lucy Cherkasova and Wenting Tang HPLabs.
Outline Minimum Spanning Tree Maximal Flow Algorithm LP formulation 1.
Matthias Wimmer, Bernd Radig, Michael Beetz Chair for Image Understanding Computer Science TU München, Germany A Person and Context.
Wireless H.264 Mage-Pixel PT Internet Camera
Executional Architecture
Multimedia Components (Develop & Delivery System)
Pasewark & Pasewark Microsoft Office XP: Introductory Course 1 INTRODUCTORY MICROSOFT WORD Lesson 8 – Increasing Efficiency Using Word.
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
® Microsoft Office 2010 Browser and Basics.
Group Meeting Presented by Wyman 10/14/2006
Chapter 13 The Data Warehouse
An Idiot’s Guide to Exposure a.k.a. John’s Guide to Exposure.
SECAM Systems Product Presentation SECAM Systems © 2010.
Modeling Pixel Process with Scale Invariant Local Patterns for Background Subtraction in Complex Scenes (CVPR’10) Shengcai Liao, Guoying Zhao, Vili Kellokumpu,
ADVISE: Advanced Digital Video Information Segmentation Engine
Real-Time Face Detection and Tracking Using Multiple Cameras RIT Computer Engineering Senior Design Project John RuppertJustin HnatowJared Holsopple This.
Automated video surveillance: challenges and solutions. ACE Surveillance (Annotated Critical Evidence) case study. Dmitry Gorodnichy and Tony Mungham Laboratory.
Remote Surveillance System Presented by: Robarin Holdings Limited Telephone: Facsimile:
Surveillance camera in terms of business. Index *surveillance systems * Types of control systems * Elements of control systems * Types of monitoring camera.
Topic 4 - Video Data Basic Concepts
Video Surveillance Capturing, Management and Analysis of Security Videos. -Abhinav Goel -Varun Varshney.
1 CCTV SYSTEMS RESOLUTIONS USED IN CCTV. 2 CCTV SYSTEMS CCTV resolution is measured in vertical and horizontal pixel dimensions and typically limited.
Visual Representation of Information
Unit 30 P1 – Hardware & Software Required For Use In Digital Graphics
NV V5.7 Product Presentation. Brand New Professional GUI  Multiple User Interface for different look and feel  Audio indicator on camera (play audio.
Video Technology for security: Problems and Solutions Dr. Dmitry Gorodnichy Video Recognition Systems* Project Leader Rail and Urban Transit Security Workshop.
Digital Camcorder and Video Computer Multimedia. Two most important factors that make up a video Frames per second ( fps ) The resolution ( # of pixels.
Shooting. Initial Camera Settings Cameras have default settings for picture quality. The school’s cameras are no exception. Camera resets to default settings.
Multimedia Databases (MMDB)
Knowledge Systems Lab JN 9/10/2002 Computer Vision: Gesture Recognition from Images Joshua R. New Knowledge Systems Laboratory Jacksonville State University.
 Refers to sampling the gray/color level in the picture at MXN (M number of rows and N number of columns )array of points.  Once points are sampled,
How to use the internet The internet is a wide ranging network that thousands of people use everyday. It is a useful tool in modern society that once one.
National Research Council Canada Conseil national de recherches Canada National Research Council Canada Conseil national de recherches Canada Institute.
Digital Cameras, Digital Video and Scanners Vince DiNoto
Risk Management. What we offer? We provide IP video monitoring solutions for safety and security through our systems integration capabilities.
Unit 1: Task 1 By Abbie Llewellyn. Vector Graphic Software (Corel Draw) Computer graphics can be classified into two different categories: raster graphics.
2005/12/021 Fast Image Retrieval Using Low Frequency DCT Coefficients Dept. of Computer Engineering Tatung University Presenter: Yo-Ping Huang ( 黃有評 )
MACHINE VISION GROUP MOBILE FEATURE-CLOUD PANORAMA CONSTRUCTION FOR IMAGE RECOGNITION APPLICATIONS Miguel Bordallo, Jari Hannuksela, Olli silvén Machine.
Software Design and Development Storing Data Part 2 Text, sound and video Computing Science.
ITMT 1371 – Window 7 Configuration 1 ITMT Windows 7 Configuration Chapter 8 – Managing and Monitoring Windows 7 Performance.
Day 3: computer vision.
VIDEO.
Basic Concepts Video is a collection of bit-mapped still images (called frames) that are taken one after the other. When the file is played these pictures.
Remote Demos Remote Demo.
Basic Camera Settings.
Data Representation.
Representing Images 2.6 – Data Representation.
Jiwon Kim Steve Seitz Maneesh Agrawala
Presentation transcript:

A.C.E. Surveillance (next generation surveillance based on automatic extraction of Annotated Critical Evidence from video) Dmitry O. Gorodnichy Computational Video Group Institute for Information Technology National Research Council Canada 4th Toronto-Montreal Computer Vision Workshop May 28-29, 2006, Ottawa

2 Two Big problems: on user side 1. Storage space consumption Typical assignment: cameras, 7 or 30 days of recording, 2-10 Mb per min. 1.5 GB per day per camera / GB total ! 2. Data management and retrieval London bombing video backtracking experience: Manual browsing of millions of hours of digitized video from thousands of cameras (by the Scotland Yard officers trying to back-track the suspect and everybody who resembled him) proved impossible within time-sensed period Conclusion: highest picture quality and resolution, complete Pan/Tilt control, powerful 44X Zoom", ``total remoteness", "multi-channel support of up-to 32 cameras", ``extra fast capture of 240 fps is all good, but you may just not have enough time to browse it all in order to detect that only piece of information that is important to you.

3 Two Big problems: on research side 1. Low video quality: low resolution, blurring, out-of-focus, interlacing, due to wireless - just see the snapshots from real surveillance monitoring ! 2. Real-time constraint Real-time: 12 fps) for Short-term & Short Range: objects close to camera (or captured at close zoom) smaller image required can be done faster ! Quasi real-time: < 500msec (2 fps) for Long-term & Long-range: objects away from camera (or wide zoom) larger image required can be done slower ! Besides vision recognition: is very ill-posed, and has high complexity and diversity of monitoring scenarios and data recognition and retrieval tasks that may have to be executed and integrated

4 Example and test-bed Monitoring the front of the houseMonitoring the back of the house Who was visiting my house while I was away? Long-term monitoring of rarely visited premises with undedicated computers and off-the-shelf video-cameras 2 GHz computer with 60 GB hard-drive Time - priceless Webcams / Analog (8mm) / CCTV cameras (wireless and connected) An unlocked bike to be stolen one day

5 Required Criteria For video surveillance to be operational, it is critical to store only that video data which is useful, i.e. the data containing new evidence. 1. As much useful video evidence should be collected as possible. 2. However, the collected video evidence, besides being useful, has also to be easily manageable, i.e. it should be succinct and non-redundant. What type of evidence and how much of it to be collected is determined by the quality video data and the setup. 1.in bright illumination and at close-range: information about visitors faces can be collected (when i.o.d. > 12 pixels) 2.at night or at a distance: the time and number of passing objects.

6 New concept: C.E.S. Definition: Critical Evidence Snapshot (CES) is defined as a video snapshot that provides to a viewer a piece of information that is both useful and new. Definition: A surveillance that deals with extraction and manipulation of Annotated Critical Evidence snapshots from a surveillance video is defined as ACE-Surveillance. Limited number of evidence types for moving objects: –1. Appear. –2. Move: left, right, closer, further. –3. Stay on the same location (with a certain range). –4. Disappear. Between Appear and Disappear only a few shots are needed!

7 CES & their annotations 1. Even if there are some wrongly-extracted CESes, saving CESes instead of.avi file, makes archived video data much more manageable! 2. Adding Annotations to CES makes them even more so! 1.Text-based - for log reports 2.Graphic image augmentations - as attention guide to viewer NB: Annotations are not answers, but suggestions and guides to a viewer Specific interest: faces* (*- some of this still done) –Track until person-looking blob is at least 20 pixels wide (IOD>12), after that discard or blobs/faces or worse resolution/quality –Video is very suitable for face classification task (e.g. similarity ranking of faces) [Gorodnichy05] –ACE Surveillance makes it possible to browse and retrieve stored video-data, compressed as a collections of CES-es, by associative similarity.

8 ACE Surveillance architecture CES-Client(s): –real-time video processing and object/motion detection & recognition –extracting & annotating CESes CES-Server: –receives CESes from CES-Client(s), –tool for browsing CESes: by camera, by time, by context (associatively)

9 CES Client tasks C1: Detect new or moving object(s) in video. C2: Compute of the attributes of the detected object(s): –location and size, measured by the size of the detected motion blob (x,z,w,h) and their derivatives (changes) in time: d(x,z,w,h)/dt –colour (Histogrammed): Pcolour(i,j) * (2D H + Cb) –texture/edge (Histogrammed): Ptexture(i,j)* (with Local Binary Patterns and Consensus Transform) * * - replace histograms with associative memory [Gorodnichy06] C3: Based on attributes, recognize object(s) as either new or already seen C4: Classify frame as CES (i.e providing new information) or not. C5: Create CES annotations: timestamps, outlines,counters, contours. C6: If a video frame is CES, then it is sent to the CES server along with the annotations Techniques: For C1: Combination of change detection, background maintainance and dominant motion estimation [Espina05, Tian05, Magee01, Toyama99]

10 ACE Summarization (ACES) a) By log of text-annotations (already sufficient to see that nothing unusual happened) b) By CES thumbnails (8Kb each) c) By ACES video Overnight monitoring: 22:00-8:00 Cam: USB webcam. # CESes=23. ACES video = 360 Kb

11 CES extraction results: Home station Day-long monitoring: 22:00-17:00. Graphical annotations: timestamp & attention guiding boxes (Blue - changing moving blob. Red - foreground history. Green - around the object). Cam1 (monitoring front): wireless black-n-white CCTV camera. # CES=177. ACES video = 360 Kb Cam2 (monitoring back of the house): webcam. #CES=~2000. … …

12 CES extraction results: Office station Indoor overnight monitoring (from office door): 17:00-9:00. Over weekend monitoring (from office window): 17:00 on Fri - 9:00 on Mon. Cam1: webcam. # CES=148. ACES video = 360 Kb Cam2: 8mm SHARP camera. # CES=~2000. ACES video = ~5 Mb … …

13 DEMO & More DEMO (over web): (a.c.e.) One day in a life of 3-cam monitoring with ACE-surveillance (archived): Cam 1 - overviews carport in the front of the house: USB web-cam (summary avi - 74Kb) Cam 2 - overviews carport in the front of the house: b/w wireless CCTV cam+ Video2USB converter (summary avi - 800Kb) Cam 3 - overviews the road in the back of the house: USB web-cam (summary avi - 4Mb)summary avi Reference: D.O. Gorodnichy. ACE Surveillance - the next generation surveillance for long-term monitoring and activity summarization. The First International Workshop on Video Processing for Security. Quebec City, QC. June 7-9, NRC Acknowledgements: –ACE Surveillance client-server architecture is implemented with a help of Kris Woodbeck