Skip to main content

Automatic Control of Video Surveillance Camera Sabotage

  • Conference paper
Nature Inspired Problem-Solving Methods in Knowledge Engineering (IWINAC 2007)

Abstract

One of the main characteristics of a video surveillance system is its reliability. To this end, it is needed that the images captured by the videocameras are an accurate representation of the scene. Unfortunately, some activities can make the proper operation of the cameras fail, distorting in some way the images which are going to be processed. When these activities are voluntary, they are usually called sabotage, which include partial o total occlusion of the lens, image defocus or change of the field of view.

In this paper, we will analyze the different kinds of sabotage that could be done to a video surveillance system, and some algorithms to detect these inconveniences will be developed. The experimental results show good performance in the detection of sabotage situations, while keeping a very low false alarm probability.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Foresti, G.L., Mähönen, P., Regazzoni, C.S.: Multimedia video-based surveillance systems. Requirements, issues and solutions, 1st edn. Kluwer Academic Publishers, Norwell (2000)

    Google Scholar 

  2. Di Stefano, L., Neri, G., Viarani, E.: Analysis of pixel-level algorithms for video surveillance applications. In: CIAP01, pp. 541–546 (2001)

    Google Scholar 

  3. Toyama, K., Krumm, J., Brumitt, B., Meyers, B.: Wallflower: Principles and practice of background maintenance. In: ICCV, vol. 1, pp. 255–261 (1999)

    Google Scholar 

  4. Boult, T., Micheals, R., Gao, X., Eckmann, M.: Into the woods: Visual surveillance of noncooperative and camouflaged targets in complex outdoor settings. Proceedings of the IEEE 89, 1382–1402 (2001)

    Article  Google Scholar 

  5. Dawson-Howe, K.: Active surveillance using dynamic background subtraction. Technical Report TCD-CS-96-06, Dept of Computer Science, Trinity College, Dublin, Ireland (1996)

    Google Scholar 

  6. Harasse, S., Bonnaud, L., Caplier, A., Desvignes, M.: Automated camera dysfunctions detection. In: Image Analysis and Interpretation, pp. 36–40. IEEE Computer Society Press, Los Alamitos (2004)

    Google Scholar 

  7. Pentland, A.P.: A new sense for depth of field. IEEE Transactions on Pattern Analysis and Machine Intelligence 9(4), 523–531 (1987)

    Article  Google Scholar 

  8. Roma, N., Santos-Victor, J., Tomé, J.: A comparative analysis of cross-correlation matching algorithms using a pyramidal resolution approach. World Scientific, Singapore (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

José Mira José R. Álvarez

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Berlin Heidelberg

About this paper

Cite this paper

Gil-Jiménez, P., López-Sastre, R., Siegmann, P., Acevedo-Rodríguez, J., Maldonado-Bascón, S. (2007). Automatic Control of Video Surveillance Camera Sabotage. In: Mira, J., Álvarez, J.R. (eds) Nature Inspired Problem-Solving Methods in Knowledge Engineering. IWINAC 2007. Lecture Notes in Computer Science, vol 4528. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73055-2_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-73055-2_24

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-73054-5

  • Online ISBN: 978-3-540-73055-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics