Skip to main content
Log in

Improving security surveillance by hidden cameras

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Increasing solicitudes about security demand better, robust and effective solutions. Security cameras are playing a vital role in this regard and the surveillance technology is improving rapidly. However, these cameras are usually installed at obvious and visible locations which are often exploitable by the criminals either by hiding themselves from the camera, choosing an alternative path or deceiving the camera. This situation can be overcome to a large extent if the cameras are installed at hidden places looking through narrow regions, e.g. camera fixed inside the building and looking through the window curtain slits. However, this solution poses new challenges in terms of capturing the video through slits and accumulating the information to a meaningful view. In this paper we propose an effective and robust solution to this problem that automatically extracts the slit regions and merges them over a large number of frames to construct a panoramic view. Moreover, such a security surveillance system will be subjected to the sudden illumination variations. We effectively handle such variations by incorporating robustness in the proposed framework. A large number of experiments are performed on various indoor and outdoor real video sequences. The results demonstrate the effectiveness of the proposed framework. Experiments are also performed to objectively assess the perceptual quality of the resulting panoramic images. Our results are even better than the existing commercial software.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

Notes

  1. http://www.cs.bath.ac.uk/brown/autostitch/autostitch.html

  2. http://www.arcsoft.com/panorama-maker/

References

  1. Aach T, Dumbgen L, Mester R, Toth D (2001) Bayesian illumination-invariant motion detection. In: Proceedings of the international conference image process. (ICIP), vol 3, pp 640–643

  2. Agaian S, Silver B, Panetta K (2007) Transform coefficient histogram-based image enhancement algorithms using contrast entropy. IEEE Trans Image Process 16 (3):741–758

    Article  MathSciNet  Google Scholar 

  3. Bergen J, Anandan P, Hanna K, Hingorani R (1992) Hierarchical model-based motion estimation. In: Proceedings 2nd European conference on computer vision, ECCV ’92. Springer, London, pp 237– 252

    Chapter  Google Scholar 

  4. Chang CH, Sato Y, Chuang YY (2014) Shape-preserving half-projective warps for image stitching. In: Proceedings of the IEEE computer society conference on computer vision and pattern recognition (CVPR), pp 3254–3261

  5. Cristofaro A, Salaris P, Pallottino L, Giannoni F, Bicchi A (2014) On time-optimal trajectories for differential drive vehicles with field-of-view constraints. In: IEEE 53rd annual conference on decision and control (CDC), pp 2191–2197

  6. Dornaika F, Chakik F (2012) Efficient object detection and tracking in video sequences. J Opt Soc Am A 29(6):928–935

    Article  Google Scholar 

  7. Elibol A, Gracias N, Garcia R, Kim J (2014) Graph theory approach for match reduction in image mosaicing. J Opt Soc Am A 31(4):773–782

    Article  Google Scholar 

  8. Farid M, Mahmood A (2012) Image morphing in frequency domain. J Math Imaging Vis 42(1):50–63

    Article  MathSciNet  MATH  Google Scholar 

  9. Farid M, Mahmood A (2014) An image composition algorithm for handling global visual effects. Multimed Tools Appl 71(3):1699–1716

    Article  Google Scholar 

  10. Fu Z, Wang L (2014) Optimized design of automatic image mosaic. Multimed Tools Appl 72(1):503–514

    Article  Google Scholar 

  11. Guizar-Sicairos M, Thurman ST, Fienup JR (2008) Efficient subpixel image registration algorithms. Opt Lett 33(2):156–158

    Article  Google Scholar 

  12. Harris C, Stephens M (1988) A combined corner and edge detector. In: Proceedings Alvey vision conference, pp 23.1–23.6

  13. Hou J, Wu C, Yuan Z, Tan J, Wang Q, Zhou Y (2008) Research of intelligent home security surveillance system based on zigbee. In: International symposium on intelligent information technology application workshops, pp 554–557

  14. Kosmopoulos DI, Doulamis ND, Voulodimos AS (2012) Bayesian filter based behavior recognition in workflows allowing for user feedback. Comput Vis Image Underst 116(3):422–434. Special issue on Semantic Understanding of Human Behaviors in Image Sequences

    Article  Google Scholar 

  15. Li B, Wang W, Ye H (2013) Multi-sensor image registration based on algebraic projective invariants. Opt Express 21(8):9824–9838

    Article  Google Scholar 

  16. Li X, Cheah CC (2015) Robotic cell manipulation using optical tweezers with unknown trapping stiffness and limited fov. IEEE/ASME Trans Mechatronics 20 (4):1624–1632

    Article  Google Scholar 

  17. Lin WY, et al. (2011) Smoothly varying affine stitching. In: Proceedings of the IEEE computer society conference on computer vision and pattern recognition (CVPR), pp 345–352

  18. Litvinov A, Schechner YY (2005) Radiometric framework for image mosaicking. J Opt Soc Am A 22(5):839–848

    Article  Google Scholar 

  19. Lowe D (2004) Distinctive image features from scale-invariant keypoints. Int J Comput Vis 60(2):91–110

    Article  Google Scholar 

  20. Lu T, Li S, Fu W (2014) Fusion based seamless mosaic for remote sensing images. Sensing and Imaging 15(1):101

    Article  Google Scholar 

  21. Microsoft Image Composite Editor. http://research.microsoft.com/ivm/ice/. Version 1.4.4.0

  22. Monroe D (2003) Ground based security surveillance system for aircraft and other commercial vehicles. US Patent 6,545,601

  23. Mubasher M, Farid M, Khaliq A, Yousaf M (2012) A parallel algorithm for change detection. In: Proceedings 15th international multitopic conference (INMIC), pp 201–208

  24. Ng M, Wang W (2013) A variational approach for image stitching ii: using image gradients. SIAM J Imaging Sci 6(3):1345–1366

    Article  MathSciNet  MATH  Google Scholar 

  25. Phong B (1975) Illumination for computer generated pictures. Commun ACM 18(6):311–317

    Article  Google Scholar 

  26. Ponomarenko N, Lukin V, Zelensky A, Egiazarian K, Carli M, Battisti F (2009) Tid2008-a database for evaluation of full-reference visual quality assessment metrics. Adv Mod Radioelectron 10(4):30–45

    Google Scholar 

  27. Prados R, Garcia R, Neumann L (2014) State of the art in image blending techniques. In: Image blending techniques and their application in underwater mosaicing. Springer, pp 35–60

  28. Radke R, Andra S, Al-Kofahi O, Roysam B (2005) Image change detection algorithms: a systematic survey. IEEE Trans Image Process 14(3):294–307

    Article  MathSciNet  Google Scholar 

  29. Raty T (2010) Survey on contemporary remote surveillance systems for public safety. IEEE Trans Syst, Man, Cybern C 40(5):493–515

    Article  Google Scholar 

  30. Shah M, Javed O, Shafique K (2007) Automated visual surveillance in realistic scenarios. IEEE Multimed 14(1):30–39

    Article  Google Scholar 

  31. Silva F, Hiraga A, Artero A, Paiva M (2014) StitchingPHm-A new algorithm for panoramic images. Pattern Recog Image Anal 24(1):41–56

    Article  Google Scholar 

  32. Srikantha A, Sidib D (2012) Ghost detection and removal for high dynamic range images: recent advances. Signal Process Image Commun 27(6):650–662

    Article  Google Scholar 

  33. Suen ST, Lam EY, Wong KK (2007) Photographic stitching with optimized object and color matching based on image derivatives. Opt Express 15(12):7689–7696

    Article  Google Scholar 

  34. Szwed P, Skrzynski P, Chmiel W (2014) Risk assessment for a video surveillance system based on fuzzy cognitive maps. Multimed Tools Appl:1–24

  35. Uyttendaele M, Eden A, Skeliski R (2001) Eliminating ghosting and exposure artifacts in image mosaics. In: Proceedings of the IEEE computer society conference on computer vision and pattern recognition (CVPR), vol 2, pp II–509

  36. Wang W, Ng M (2012) A variational method for multiple-image blending. IEEE Trans Image Process 21(4):1809–1822

    Article  MathSciNet  MATH  Google Scholar 

  37. Wang Z, Bovik A, Sheikh H, Simoncelli E (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612

    Article  Google Scholar 

  38. Wu G, Wu Y, Jiao L, Wang YF, Chang EY (2003) Multi-camera spatio-temporal fusion and biased sequence-data learning for security surveillance. In: Proceedings of the ACM international conference on multimedia, pp 528–538

  39. Xu Z (2013) Consistent image alignment for video mosaicing. Signal Image Video Process 7(1):129–135

    Article  Google Scholar 

  40. Zagrouba E, Barhoumi W, Amri S (2009) An efficient image-mosaicing method based on multifeature matching. Mach Vis Appl 20(3):139–162

    Article  Google Scholar 

  41. Zaragoza J, Chin TJ, Brown M, Suter D (2013) As-projective-as-possible image stitching with moving dlt. In: Proceedings of the IEEE computer society conference on computer vision and pattern recognition (CVPR), pp 2339–2346

  42. Zeng L, Zhang S, Zhang J, Zhang Y (2014) Dynamic image mosaic via sift and dynamic programming. Mach Vis Appl 25(5):1271–1282

    Article  Google Scholar 

  43. Zeng L, Zhang W, Zhang S, Wang D (2014) Video image mosaic implement based on planar-mirror-based catadioptric system. Signal Image Video Process 8 (6):1007–1014

    Article  Google Scholar 

  44. Zitov B, Flusser J (2003) Image registration methods: a survey. Image Vis Comput 21(11):977–1000

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Muhammad Shahid Farid.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Tazeem, H., Farid, M.S. & Mahmood, A. Improving security surveillance by hidden cameras. Multimed Tools Appl 76, 2713–2732 (2017). https://doi.org/10.1007/s11042-016-3260-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-3260-2

Keywords

Navigation