{"id":6085,"date":"2016-09-02T08:05:50","date_gmt":"2016-09-02T08:05:50","guid":{"rendered":"http:\/\/nes-new.nes.aau.at\/?p=6085"},"modified":"2017-04-03T13:29:33","modified_gmt":"2017-04-03T12:29:33","slug":"6085","status":"publish","type":"post","link":"https:\/\/nes.aau.at\/?p=6085","title":{"rendered":"Vision-based surveillance systems"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/nes.aau.at\/wp-content\/uploads\/2016\/09\/Lukas_Kamera_small.jpg\" alt=\"\" width=\"1200\" height=\"800\" class=\"alignnone size-full wp-image-6149\" srcset=\"https:\/\/nes.aau.at\/wp-content\/uploads\/2016\/09\/Lukas_Kamera_small.jpg 1200w, https:\/\/nes.aau.at\/wp-content\/uploads\/2016\/09\/Lukas_Kamera_small-300x200.jpg 300w, https:\/\/nes.aau.at\/wp-content\/uploads\/2016\/09\/Lukas_Kamera_small-768x512.jpg 768w, https:\/\/nes.aau.at\/wp-content\/uploads\/2016\/09\/Lukas_Kamera_small-1024x683.jpg 1024w, https:\/\/nes.aau.at\/wp-content\/uploads\/2016\/09\/Lukas_Kamera_small-83x55.jpg 83w, https:\/\/nes.aau.at\/wp-content\/uploads\/2016\/09\/Lukas_Kamera_small-800x533.jpg 800w, https:\/\/nes.aau.at\/wp-content\/uploads\/2016\/09\/Lukas_Kamera_small-360x240.jpg 360w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/p>\n<p><strong>Researchers from the Institute of Networked and Embedded Systems at the University of Klagenfurt have published results on different aspects of vision-based surveillance systems.<\/strong><!--more--><\/p>\n<p><HR WIDTH=\"60%\" NOSHADE><\/p>\n<figure id=\"attachment_2170\" aria-describedby=\"caption-attachment-2170\" style=\"width: 300px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-2170 size-medium\" src=\"https:\/\/nes.aau.at\/wp-content\/uploads\/2016\/09\/Khalid_BMVC2016-fig-300x163.jpg\" alt=\"Khalid_BMVC2016-fig\" width=\"300\" height=\"163\" \/><figcaption id=\"caption-attachment-2170\" class=\"wp-caption-text\">Modelling the tracker state (yellow box) and the region around it (red box)<\/figcaption><\/figure>\n<p>Together with <a href=\"http:\/\/www.eecs.qmul.ac.uk\/~andrea\/\">Queen Mary University of London<\/a> we have proposed a <strong>novel framework<\/strong> for determining time instants when a video tracker fails. Video tracking is a fundamental task for surveillance systems, and detecting when a tracker looses its assigned object, is important for improving the robustness of a surveillance system. Our approach first determines the tracking quality by comparing the distributions of the tracker state and the region around its state. We then model the tracking quality score as time series and employ and ARMA model to forecast future values.<\/p>\n<ul>\n \tObaid Khalid, Bernhard Rinner and Andrea Cavallaro.<br \/>\n<a href=\"https:\/\/pervasive.aau.at\/BR\/pubs\/2016\/Khalid_BMVC2016.pdf\">Detecting tracking errors via forecasting<\/a>.<br \/>\nIn <em> Proc. British Machine Vision Conference (BMVC)<\/em>, York, UK. September 2016.<\/li>\n<\/ul>\n<div data-canvas-width=\"408.001088\">\n<figure id=\"attachment_998\" aria-describedby=\"caption-attachment-998\" style=\"width: 300px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-998 size-medium\" src=\"https:\/\/nes.aau.at\/wp-content\/uploads\/2013\/07\/e690f567bf1-300x172.jpg\" alt=\"e690f567bf\" width=\"300\" height=\"172\" \/><figcaption id=\"caption-attachment-998\" class=\"wp-caption-text\">Demo of aerial surveillance<\/figcaption><\/figure>\n<p>Multiple unmanned aerial vehicles (UAVs) are increasingly applied for surveillance tasks such as disaster management and environmental monitoring. Due to limited battery capacity and bounded wireless communication, small-scale UAVs pose fundamental challenges for achieving persistence. J\u00fcrgen Scherer and Bernhard Rinner tackle this problem and <strong>propose an offline path planning algorithm<\/strong> that ensures that the UAVs can always reach the base station to replace their batteries and that each UAV is always connected with the base station via a single or multi-hop link. In a simulation study, a single base station scenario is compared with several extensions for multiple base stations based on the maximum time a sensing location has not been visited.<\/p>\n<ul>\n \tJ\u00fcrgen Scherer and Bernhard Rinner.<br \/>\n<a href=\"https:\/\/pervasive.aau.at\/BR\/pubs\/2016\/Scherer_CASE2016.pdf\">Persistent Multi-UAV Surveillance with Energy and Communication Constraints<\/a>.<br \/>\nIn <em> Proc. IEEE International Conference on Automation Science and Engineering (CASE)<\/em>, Dallas, TX, USA. August 2016.<\/li>\n<\/ul>\n<figure id=\"attachment_2173\" aria-describedby=\"caption-attachment-2173\" style=\"width: 300px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-2173 size-medium\" src=\"https:\/\/nes.aau.at\/wp-content\/uploads\/2016\/09\/Nawaz_ICDSC2016-fig-300x139.jpg\" alt=\"Nawaz_ICDSC2016-fig\" width=\"300\" height=\"139\" \/><figcaption id=\"caption-attachment-2173\" class=\"wp-caption-text\">User-centric monitoring with edge-based data processing<\/figcaption><\/figure>\n<p>Surveillance and monitoring tasks are performed in various everyday scenarios, where security and privacy-protection is an important concern. Researchers of NES and the <a href=\"http:\/\/www.reading.ac.uk\/search\/search-staff-details.aspx?id=1319\">University of Reading<\/a> have developed a <strong>concept for trustful and user-centric monitoring for a health-care use case<\/strong>. This new approach that involves sensor edge computing to enable sensor-level security and privacy protection and allows observed individuals to interact and control their data without impacting on the quality of the data for further processing.<\/p>\n<ul>\n \tTahir Nawaz, Bernhard Rinner and James Ferryman.<br \/>\n<a href=\"https:\/\/pervasive.aau.at\/BR\/pubs\/2016\/Nawaz_ICDSC2016.pdf\">User-centric, embedded vision-based human monitoring: A concept and a healthcare use case<\/a>.<br \/>\nIn <em> Proc. ACM\/IEEE International Conference on Distributed Smart Cameras (ICDSC)<\/em>, Paris, France. September 2016.<\/li>\n<\/ul>\n<div data-canvas-width=\"393.7551606666667\">\n<figure id=\"attachment_2175\" aria-describedby=\"caption-attachment-2175\" style=\"width: 300px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-2175 size-medium\" src=\"https:\/\/nes.aau.at\/wp-content\/uploads\/2016\/09\/Sawar_AVSS2016-fig-300x189.jpg\" alt=\"Sawar_AVSS2016-fig\" width=\"300\" height=\"189\" \/><figcaption id=\"caption-attachment-2175\" class=\"wp-caption-text\">Adaptive privacy filtering maintains a constant target pixel resolution independent on the input resolution (left colon).<\/figcaption><\/figure>\n<p>Airborne cameras on low-flying unmanned vehicles introduce new privacy challenges due to their mobility and viewing angles. Omair Sarwar, Bernhard Rinner and <a href=\"http:\/\/www.eecs.qmul.ac.uk\/~andrea\/\">Andrea Cavallaro<\/a> focus on face recognition from airborne cameras and explore the design space to determine when a face in an airborne image is inherently protected, that is when an individual is not recognizable. Moreover, when individuals are recognizable by facial recognition algorithms, we propose an <strong>adaptive filtering mechanism<\/strong> to lower the face resolution in order to preserve privacy while ensuring a minimum reduction of the fidelity of the image.<\/p>\n<\/div>\n<ul>\n \tOmair Khan, Bernhard Rinner and Andrea Cavallaro.<br \/>\n<a href=\"https:\/\/pervasive.aau.at\/BR\/pubs\/2016\/Sawar_AVSS2016.pdf\">Design Space Exploration for Adaptive Privacy Protection in Airborne Images<\/a>.<br \/>\nIn <em> Proc. IEEE International Conference on Advanced Video and Signal-based Surveillance (AVSS)<\/em>, Colorado Springs, CO, USA. August 2016.<\/li>\n<\/ul>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Researchers from the Institute of Networked and Embedded Systems at the University of Klagenfurt have published results on different aspects of vision-based surveillance systems.<\/p>\n","protected":false},"author":8,"featured_media":6149,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":true,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_post_was_ever_published":false},"categories":[2],"tags":[41,240,241],"class_list":["post-6085","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-publications","tag-camera","tag-camera-networks","tag-surveillance"],"jetpack_featured_media_url":"https:\/\/nes.aau.at\/wp-content\/uploads\/2016\/09\/Lukas_Kamera_small.jpg","jetpack_sharing_enabled":false,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/nes.aau.at\/index.php?rest_route=\/wp\/v2\/posts\/6085","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nes.aau.at\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nes.aau.at\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nes.aau.at\/index.php?rest_route=\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/nes.aau.at\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=6085"}],"version-history":[{"count":11,"href":"https:\/\/nes.aau.at\/index.php?rest_route=\/wp\/v2\/posts\/6085\/revisions"}],"predecessor-version":[{"id":6695,"href":"https:\/\/nes.aau.at\/index.php?rest_route=\/wp\/v2\/posts\/6085\/revisions\/6695"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nes.aau.at\/index.php?rest_route=\/wp\/v2\/media\/6149"}],"wp:attachment":[{"href":"https:\/\/nes.aau.at\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=6085"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nes.aau.at\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=6085"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nes.aau.at\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=6085"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}