Skip to main content

Entry–Exit Video Surveillance: A Benchmark Dataset

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1022))

Abstract

Techniques to automate video surveillance around places where cameras are forbidden due to privacy concerns are yet under-addressed. This can be achieved by building conceptual models and algorithms to investigate the credibility of monitoring of events using the video frames captured by mounting the cameras so as to have the view of the entrances of such camera-forbidden areas. Evaluation of these models and algorithms require standard datasets. The proposal here is to introduce a new benchmark dataset—“EnEx dataset” as no traces specific to the problem were found in the literature. The dataset comprises of video frames captured in 5 different locations accounting 90 entry–exit event pairs based on 9 different sequences involving 36 participants. Ground statistics of the dataset is reported. This work ventures a new sub-domain for research in the area of automated video surveillance.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Westin, Alan F.: Privacy and Freedom, 5th edn. Atheneum, New York (1968)

    Google Scholar 

  2. von Silva-Tarouca Larsen, B.: Setting the Watch: Privacy and the Ethics of CCTV Surveillance, p. 226. Hart Publishing, Oxford (2011)

    Google Scholar 

  3. Macnish, K.: The Ethics of Surveillance: An Introduction. Taylor and Francis Group, London (2017)

    Google Scholar 

  4. Rajpoot, Q.M., Jensen, C.D.: Video surveillance: privacy issues and legal compliance, pp. 69–92 (2015). https://doi.org/10.4018/978-1-4666-8502-4.ch004

  5. Chen, A., Biglari-Abhari, M., Wang, K.: Trusting the computer in computer vision: a privacy-affirming framework (2017). https://doi.org/10.1109/CVPRW.2017.178

  6. Alexandrie, G.: Surveillance cameras and crime: a review of randomized and nat-ural experiments. J. Scand. Stud. Criminol. Crime Prev. 18(2), 210–222 (2017). https://doi.org/10.1080/14043858.2017.1387410

    Article  Google Scholar 

  7. Mathur, G., Bundele, M.: Research on intelligent video surveillance techniques for suspicious activity detection critical review. In: 2016 International Conference on Recent Advances and Innovations in Engineering (ICRAIE), Jaipur, pp. 1–8 (2016)

    Google Scholar 

  8. Wang, X.: Intelligent multi-camera video surveillance: a review. Pattern Recognit. Lett. 34, 3–19 (2013). https://doi.org/10.1016/j.patrec.2012.07.005

    Article  Google Scholar 

  9. Ibrahim, S.W.: A comprehensive review on intelligent surveillance systems. Commun. Sci. Technol. 1, 7–14 (2016)

    Google Scholar 

  10. Gray, D., Brennan, S., Tao, H.: Evaluating appearance models for recognition, reacquisition, and tracking. In: Proceedings of IEEE International Workshop on Performance Evaluation for Tracking and Surveillance (PETS) (2007)

    Google Scholar 

  11. Schwartz, W.R., Davis, L.S.: Learning discriminative appearance-based models using partial least squares. In: Proceedings of the XXII Brazilian Symposium on Computer Graphics and Image Processing (SIBGRAPI’2009), Rio de Janeiro, Brazil, 11–14 October 2009 (2009)

    Google Scholar 

  12. Cheng, D.S., Cristani, M., Stoppa, M., Bazzani, L., Murino, V.: Custom pictorial structures for re-identification. In: BMVC (2011)

    Google Scholar 

  13. Zheng, L., Wang, S., Shen, L., Tian, L., Bu, J., Tian, Q.: Person re-identification meets image search. Technical report (2015)

    Google Scholar 

  14. Ma, X., Zhu, X., Gong, S., Xie, X., Hu, J., Lam, K.-M., Zhong, Y.: Person re-identification by unsupervised video matching. Pattern Recognit. 65, 197–210 (2017). (PR)

    Google Scholar 

  15. Wang, T., Gong, S., Zhu, X., Wang, S.: Person re-identification by discriminative selection in video ranking. IEEE Trans. Pattern Anal. Mach. Intell. 38(12), 2501–2514 (2016). (TPAMI)

    Google Scholar 

  16. Wang, T., Gong, S., Zhu, X., Wang, S.: Person re-identification by video ranking. In: Proceedings of European Conference on Computer Vision (ECCV), Zurich, Switzerland, September 2014 (2014)

    Google Scholar 

  17. Liu, C., Gong, S., Loy, C.C.: On-the-fly feature importance mining for person re-identification. Pattern Recognit. 47(4), 1602–1615 (2014). (PR)

    Google Scholar 

  18. Gou, M., Karanam, S., Liu, W., Camps, O., Radke, R.J.: DukeMTMC4ReID: a large-scale multi-camera person re-identification dataset. In: 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), Honolulu, HI, pp. 1425–1434 (2017)

    Google Scholar 

  19. Baltieri, D., Vezzani, R., Cucchiara, R.: 3DPes: 3D people dataset for surveillance and forensics. In: Proceedings of the 1st International ACM Workshop on Multimedia Access to 3D Human Objects, Scottsdale, Arizona, USA, pp. 59–64, 28 November–1 December 2011 (2011)

    Google Scholar 

  20. Hirzer, M., et al.: Person re-identification by descriptive and discriminative classification. In: Image Analysis (2011)

    Google Scholar 

  21. Wang, S.M., Lewandowski, M., Annesley, J., Orwell, J.: Re-identification of pedestrians with variable occlusion and scale. In: IEEE International Conference on Computer Vision (ICCV), Barcelona, Spain, 6–13 November 2011 (2011). (2011 IEEE International Conference on Computer Vision Workshops (ICCV workshops))

    Google Scholar 

  22. Martinel, N., Micheloni, C., Piciarelli, C.: Distributed signature fusion for person re-identification. In: ICDSC (2012)

    Google Scholar 

  23. Bialkowski, A., et al.: A database for person re-identification in multi-camera surveillance networks. In: DICTA (2012)

    Google Scholar 

  24. Li, W., Zhao, R., Wang, X.: Human Re-identification with Transferred Metric Learning, pp. 31–44. Springer, Berlin (2012)

    Google Scholar 

  25. Li, W., Wang, X.: Locally aligned feature transforms across views. In: CVPR, pp. 3594–3601 (2013)

    Google Scholar 

  26. Li, W., et al.: DeepReId: deep filter pairing neural network for person re-identification. In: CVPR (2014)

    Google Scholar 

  27. Das, A., Chakraborty, A., Roy-Chowdhury, A.K.: Consistent re-identification in a cam-era network. In: ECCV (2014)

    Google Scholar 

  28. Figueira, D., et al.: The HDA+ data set for research on fully automated re-identification systems. In: ECCV Workshops (2014)

    Google Scholar 

  29. Karanam, S., Gou, M., Wu, Z., Rates-Borras, A., Camps, O., Radke, R.J.: A systematic evaluation and benchmark for person re-identification: features, metrics, and datasets. IEEE Trans. Pattern Anal. Mach. Intell. 99, 1–14 (2018)

    Google Scholar 

  30. Loy, C.C., Liu, C., Gong, S.: Person re-identification by manifold ranking. In: 2013 IEEE International Conference on Image Processing, Melbourne, VIC, pp. 3567–3571 (2013). https://doi.org/10.1109/ICIP.2013.6738736; Author, F.: Article title. Journal 2(5), 99–110 (2016)

  31. Zhao, R., Ouyang, W., Wang, X.: Unsupervised salience learning for person re-identification. In: 2013 IEEE Conference on Computer Vision and Pattern Recognition, Port-land, OR, pp. 3586–3593 (2013). https://doi.org/10.1109/CVPR.2013.460

  32. Al-Hmouz, R., Challa, S.: Optimal placement for opportunistic cameras using genetic algorithm. In: ICISSNIP, pp. 337–341 (2005)

    Google Scholar 

  33. Indu, S., Chaudhury, S.: Optimal sensor placement for surveillance of large spaces. In: Proceedings of ACM/IEEE International Conference on Distributed Smart Cameras, September 2009 (2009)

    Google Scholar 

  34. Pito, R.: A solution to the next best view problem for automated surface acquisition. IEEE Trans. Pattern Anal. Machl Intell. 21, 1016–1030 (1999)

    Article  Google Scholar 

Download references

Acknowledgements

The first author acknowledges Union Grants Commission, Government of India for providing financial aid to carry out this research work. The research scholars and students of the Department of studies in Computer Science, University of Mysore, Mysuru and the students of NIE Institute of Technology, Mysuru are acknowledged for their active participation in the efforts of collection of dataset and willingness to reveal their identities for publication with the consent of their respective educational institutions for research purposes only.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to V. Vinay Kumar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Vinay Kumar, V., Nagabhushan, P., Roopa, S.N. (2020). Entry–Exit Video Surveillance: A Benchmark Dataset. In: Chaudhuri, B., Nakagawa, M., Khanna, P., Kumar, S. (eds) Proceedings of 3rd International Conference on Computer Vision and Image Processing. Advances in Intelligent Systems and Computing, vol 1022. Springer, Singapore. https://doi.org/10.1007/978-981-32-9088-4_30

Download citation

  • DOI: https://doi.org/10.1007/978-981-32-9088-4_30

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-32-9087-7

  • Online ISBN: 978-981-32-9088-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics