INTELLIGENT SURVEILLANCE FOR TRAJECTORY ANALYSIS - Detecting Anomalous Situations in Monitored Environments

J. Albusac, J. J. Castro-Schez, L. Jimenez-Linares, D. Vallejo, L. M. Lopez-Lopez

2009

Abstract

Recently, there is a growing interest in the development and deployment of intelligent surveillance systems capable of finding out and analyzing simple and complex events that take place on scenes monitored by cameras. Within this context, the use of expert knowledge may offer a realistic solution when dealing with the design of a surveillance system. In this paper, we briefly describe the architecture of an intelligent surveillance system based on normality components and expert knowledge. These components specify how a certain object must ideally behave according to one concept. A specific normality component which analyzes the trajectories followed by objects is studied in depth in order to analyze behaviors in an outdoor environment. The analysis of trajectories in the surveillance context is an interesting issue because any moving object has always a goal in an environment, and it usually goes towards one destination to achieve it.

References

  1. Allen, J. and Ferguson, G. (1994). Actions and events in interval temporal logic. In Journal of Logic and Computation, volume 4(5), pages 531-579.
  2. Bauckhage, C., Hanheide, M., Wrede, S., and Sagerer, G. (2004). A cognitive vision system for action recognition in office environments. In Computer Vision and Pattern Recognition, Proceedings of the 2004 IEEE Computer Society Conference on.
  3. Collins, R., Lipton, A., Kanade, T., Fujiyoshi, H., Duggins, D., Tsin, Y., Tolliver, D., Enomoto, N., and Hasegawa, O. (2000). A system for video surveillance and monitoring. In Technical report CMU-RI-TR-00- 12. Robotics Institute, Carnegie Mellon University.
  4. Dee, H. and Hogg, D. (2004). Detecting inexplicable behaviour. In British Machine Vision Conference, pages 477-486.
  5. Haritaoglu, I., Harwood, D., and Davis, L. (2000). w4: Real-time surveillance of people and their activities. In Patter Analysis and Machine Intelligence, volume 22(8), pages 809-830.
  6. Henning, M. (2004). A new approach to object-oriented middleware. In IEEE Internet Computing, volume 8(1), pages 66-75.
  7. Hudelot, C. and Thonnat, M. (2003). A cognitive vision platform for automatic recognition of natural complex Constraint values 0.8 0.8 0.6 0.6 0.6 0.7 0.6 0.0 0.7 0.3 0.0 objects. In International Conference on Tools with Artificial Intelligence, ICTAI, pages 398-405.
  8. Johnson, N. and Hogg (1996). Learning the distribution of object trajectories for event recognitio. In Image and Vision Computing, Elsevier, volume 14(8), pages 609-615.
  9. Lin, L., Gong, H., Li, L., and Wang, L. (2008). Semantic event representation and recognition using syntactic attribute graph grammar. In Pattern Recognition Letters, ARTICLE IN PRESS.
  10. Makris, D. and Ellis, T. (2002). Path detection in video surveillance. In Image and Vision Computing, volume 12(20), pages 895-903.
  11. Piciarelli, C., Foresti, G., and Snidaro, L. (2005). Trayectory clustering and its applications for video surveillance. In IEEE Conference on Advanced Video and Signal Based Surveillance, pages 40-45.
  12. Wang, W. and Maybank, S. (2004). A survey on visual surveillance of object motion and behaviors. In Systems, Man and Cybernetics, Part C, IEEE Transactions on, volume 34(3), pages 334-352.
  13. Zadeh, L. (1996). Fuzzy sets. Fuzzy Sets, Fuzzy Logic, and Fuzzy Systems: Selected Papers.
Download


Paper Citation


in Harvard Style

Albusac J., Castro-Schez J., Jimenez-Linares L., Vallejo D. and Lopez-Lopez L. (2009). INTELLIGENT SURVEILLANCE FOR TRAJECTORY ANALYSIS - Detecting Anomalous Situations in Monitored Environments . In Proceedings of the 11th International Conference on Enterprise Information Systems - Volume 2: ICEIS, ISBN 978-989-8111-85-2, pages 103-108. DOI: 10.5220/0001953901030108


in Bibtex Style

@conference{iceis09,
author={J. Albusac and J. J. Castro-Schez and L. Jimenez-Linares and D. Vallejo and L. M. Lopez-Lopez},
title={INTELLIGENT SURVEILLANCE FOR TRAJECTORY ANALYSIS - Detecting Anomalous Situations in Monitored Environments},
booktitle={Proceedings of the 11th International Conference on Enterprise Information Systems - Volume 2: ICEIS,},
year={2009},
pages={103-108},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001953901030108},
isbn={978-989-8111-85-2},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 11th International Conference on Enterprise Information Systems - Volume 2: ICEIS,
TI - INTELLIGENT SURVEILLANCE FOR TRAJECTORY ANALYSIS - Detecting Anomalous Situations in Monitored Environments
SN - 978-989-8111-85-2
AU - Albusac J.
AU - Castro-Schez J.
AU - Jimenez-Linares L.
AU - Vallejo D.
AU - Lopez-Lopez L.
PY - 2009
SP - 103
EP - 108
DO - 10.5220/0001953901030108