Skip to main content

Real-Time Automatic Camera Sabotage Detection for Surveillance Systems

  • Conference paper
  • First Online:
Advances in Signal Processing and Intelligent Recognition Systems

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 425))

Abstract

Video surveillance is very common for security monitoring of premises and sensitive installations. Criminals tamper the surveillance camera settings so that their (criminal) activities in the scene are not recorded properly, thereby making the captured video frames useless. Various camera tampering/sabotage include - changing the normal view of the camera by turning the camera away from the scene, obstructing the camera lens by placing some objects in front of the camera or spraying paint on it and defocusing the camera lens by changing the camera focus settings, spraying water or some viscous fluid on it. Manual monitoring of the surveillance systems have many limitations - human fatigue, lack of continuous monitoring, etc. Hence, real-time automated analysis and detection of suspicious events have gained importance. In this paper, we propose an efficient algorithm for camera tamper detection based on background modeling, edge details, foreground object size and its movement. In our testing or experimental setup, the results are encouraging with high precision and low false alarm rate. As the proposed method can process \(320 \times 240\) resolution videos at \(60-70\) frames/sec, it can be implemented for real-time applications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hati, K.K., Sa, P.K., Majhi, B.: Intensity range based background subtraction for effective object detection. Signal Processing Letters 20(8), 759–762 (2013)

    Article  Google Scholar 

  2. Gil-Jimnez, P., et al.: Automatic control of video surveillance camera sabotage. In: NatureInspired Problem-Solving Methods in Knowledge Engineering, pp. 222–231. Springer, Heidelberg (2007)

    Google Scholar 

  3. Aksay, A., Temizel, A., Cetin, A.E.: Camera tamper detection using wavelet analysis for video surveillance. In: Proc. IEEE Conf. Adv. Video Signal Based Surveillance, pp. 558–562 (2007)

    Google Scholar 

  4. Ribnick, E., Atev, S., Masoud, O., Papanikolopoulos, N., Voyles, R.: Real-time detection of camera tampering. In Proc. IEEE Conf. Adv. Video Signal Based Surveillance, p. 10 (2006)

    Google Scholar 

  5. Saglam, A., Temizel, A.: Real-time adaptive camera tamper detection for video surveillance. In: IEEE Conference on Advanced Video and Signal Based Surveillance, Genova, pp. 430–435 (2009)

    Google Scholar 

  6. Ellwart, D., Szczuko, P., Czyżewski, A.: Camera sabotage detection forsurveillance systems. In: Security and Intelligent Information Systems, pp. 45–53. Springer, Heidelberg (2012)

    Google Scholar 

  7. Wang, Y.K., Fan, C.T., Cheng, K.Y., Deng, P.S.: Real-time camera anomaly detection for real-world video surveillance. In: International Conference on Machine Learning and Cybernetics, Guilin, China, pp. 1520–1525 (2011)

    Google Scholar 

  8. Kryjak, T., Komorkiewicz, M., Gorgon, M.: FPGA implementation of camera tamper detection in real-time. In: 2012 Conference on Design and Architectures for Signal and Image Processing (DASIP). IEEE (2012)

    Google Scholar 

  9. Lin, D.-T., Wu, C.-H.: Real-time active tampering detection of surveillance camera and implementation on digital signal processor. In: Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP). IEEE (2012)

    Google Scholar 

  10. Tung, C.-L., Tung, P.-L., Kuo, C.-W.: Camera tamper detection using codebook model for video surveillance. In: 2012 International Conference on Machine Learning and Cybernetics (ICMLC), vol. 5. IEEE (2012)

    Google Scholar 

  11. Yi, H., Jiao, X., Luo, X., Yi, C.: Sift-based camera tamper detection for video surveillance. In 25th Chinese Control and Decision Conference, pp. 665–668 (2013)

    Google Scholar 

  12. Tsesmelis, T., Christensen, L., Fihl, P., Moeslund, T.B.: Tamper detection for active surveillance systems. In: 2013 10th IEEE International Conference on, Advanced Video and Signal Based Surveillance (AVSS), pp. 57–62 (2013)

    Google Scholar 

  13. Huang, D.-Y., Chen, C.-H., Chen, T.-Y., Hu, W.-C., Chen, B.-C.: Rapid detection of camera tampering and abnormal disturbance for video surveillance system. Journal of Visual Communication and Image Representation 25, 1865–1877 (2014)

    Article  Google Scholar 

  14. i-LIDS dataset for AVSS (2007). http://www.elec.qmul.ac.uk/staffinfo/andrea/avss2007_d.html (cited July 8, 2015)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Sitara .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Sitara, K., Mehtre, B.M. (2016). Real-Time Automatic Camera Sabotage Detection for Surveillance Systems. In: Thampi, S., Bandyopadhyay, S., Krishnan, S., Li, KC., Mosin, S., Ma, M. (eds) Advances in Signal Processing and Intelligent Recognition Systems. Advances in Intelligent Systems and Computing, vol 425. Springer, Cham. https://doi.org/10.1007/978-3-319-28658-7_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-28658-7_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-28656-3

  • Online ISBN: 978-3-319-28658-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics