Abstract
Surveillance for security requires communication between systems and humans, involves behavioural and multimedia research, and demands an objective benchmarking for the performance of system components. Metadata representation schemes are extremely important to facilitate (system) interoperability and to define ground truth annotations for surveillance research and benchmarks. Surveillance places specific requirements on these metadata representation schemes. This paper offers a clear and coherent terminology, and uses this to present these requirements and to evaluate them in three ways: their fitness in breadth for surveillance design patterns, their fitness in depth for a specific surveillance scenario, and their realism on the basis of existing schemes. It is also validated that no existing metadata representation scheme fulfils all requirements. Guidelines are offered to those who wish to select or create a metadata scheme for surveillance for security.
Similar content being viewed by others
References
Alexander C (1977) A Pattern Language: Towns, Buildings, Construction
Annesley J, Colombo A, Orwell J, Velastin S (2007) A profile of MPEG-7 for visual surveillance, IEEE Int. Conf. AVSS, 482–487
Bouma H, Vogels J, Aarts O, Kruszynski C, Wijn R, Burghouts G (2013) Behavioral profiling in CCTV cameras by combining multiple subtle suspicious observations of different surveillance operators, Proc. SPIE 8745
Burghouts GJ, Marck J (2011) Reasoning about threats: from observables to situation assessment. IEEE Trans Syst Man Cybern 41(5):608–616
Buschmann F, Meunier R, Rohnert H, Sommerlad P (1996) Pattern-Oriented Software Architecture, Volume 1: A System of Patterns. John Wiley & Sons
CAVIAR: Context aware vision using image-based active recognition. http://homepages.inf.ed.ac.uk/rbf/CAVIAR/
CVML: Computer vision markup language. http://homepages.inf.ed.ac.uk/tlist/cvml/spec.html
Doermann D, Mihalcik D (2000) Tools and techniques for video performance evaluation. ICPR 4:167–170
Dutch top sector high tech systems & materials: Roadmap security, passive sensors. http://www.htsm.nl/Roadmaps/Security
ETISIO: Video understanding evaluation. http://www-sop.inria.fr/orion/ETISEO/
Fisher RB (2004) The PETS04 surveillance ground-truth data sets. Proc. 6th IEEE Int. Workshop on Performance Evaluation of Tracking and Surveillance, pp 1–5
Francois AR, Nevatia R, Hobbs J, Bolles RC, Smith JR (2005) VERL: an ontology framework for representing and annotating video events. Multimedia, IEEE 12(4):76–86
HUMAN ML: Human markup language. https://www.oasis-open.org/committees/download.php/60/HM.Primary-Base-Spec-1.0.html
I-LIDS: Imagery library for intelligent detection systems. Home Office, UK
INCOSE, a consensus of the INCOSE fellows. http://www.incose.org
Kester LJHM (2008) Designing networked adaptive interactive hybrid systems. IEEE Multisensor Fusion and Integration for Intelligent Systems, 2008, MFI 2008, pp 516–521
Kipp M (2013) Anvil: the video research annotation tool. http://www.anvil-software.org/ accessed January 4th 2013
Kipp M (2013) Anvil 4.0 Annotation of video and spoken language
La Vigne NG (2011) Evaluating the use of public surveillance cameras for crime control and prevention
Lenat DB, Guha RV (1990) Building large knowledge-based systems: representation and inference in the CYC project. Addison–Wesley, Reading
List T, Fisher RB (2004) CVML-an XML-based computer vision markup language. Int Conf Pattern Recog (ICPR) 1:789–792
Lyon D (2007) Surveillance studies: an overview. Polity Press, Cambridge
Mariano VY, Min J, Park J-H, Kasturi R, Mihalcik D, Li H et al (2002) Performance evaluation of object detection algorithms. ICPR 3:965–969
Masolo C, Borgo S, Gangemi A, Guarino N, Oltramari A (2003) Ontology library (final). IST Project 2001–33052 WonderWeb Deliverable D18
Milestone. http://www.milestonesys.com/
MPEG-7: Moving pictures expert group
Neely H (2010) Modeling Threat Behaviors in Surveillance Video Metadata for Detection using an Analogical Reasoner, IEEE Aerospace conference
Nghiem AT, Bremond F, Thonnat M, Valentin V (2007) ETISEO, performance evaluation for video surveillance systems. IEEE Conference On Advanced Video and Signal Based Surveillance, AVSS 2007, pp 476–481
Niles I, Pease A (2001) Towards a Standard Upper Ontology. In: Welty C, Smith B (eds) Proceedings of the 2nd International Conference on Formal Ontology in Information Systems (FOIS-2001), Ogunquit, Maine, October 17–19, 2001
Noldus. www.noldus.com
Online resource pickpocket video
ONVIF: Open network video interface forum. http://www.onvif.org/Home.aspx
Over P, Awad G, Fiscus J, Antonishek B, Michel M, Smeaton AF, et al (2011) Proceedings of TRECVID 2010—An overview of the goals, tasks, data, evaluation mechanisms, and metrics, Gaithersburg, Md., USA
PETS: Performance evaluation of tracking and surveillance. http://pets2012.net
PSIA: Physical security interoperability alliance. http://www.psialliance.org/
SanMiguel JC, Martinez JM, Garcia A (2009) An ontology for event detection and its application in surveillance video, IEEE Int. Conf. AVSS, pp 220–225
Schallauer P, Bailer W, Hofmann A, Mörzinger R (2009) SAM: An interoperable metadata model for multimodal surveillance applications. Proc. SPIE, 7344
Sowa JF (1976) Conceptual graphs for a database interface. IBM J Res Dev 20(4):336–357
Sowa JF (1984) Conceptual graphs. Information Processing in Mind and Machine, 39–44
Steinberg AN, Bowman CL, White FE (1999) Revisions to the JDL data fusion model. Environmental Research Institute of Michigan Arlington VA
Surveillance of Unattended Baggage and the Identification and Tracking of the Owner (SUBITO) consortium (December 2011), SUBITO Deliverable D100.2: Final Report
Suzić R (2005) A generic model of tactical plan recognition for threat assessment. Proc. SPIE
TRECVID: TREC video retrieval evaluation. http://trecvid.nist.gov/
UK Home Office, Invitation to Tender Efficient Archive Retrieval & Auto Searching (EARS) CONTEST Project http://www.homeoffice.gov.uk/publications/science-research-statistics/research-statistics/home-office-science/eoi-ears-hos, Accessed June 2012
Westermann U, Jain R (2007) Toward a common event model for multimedia applications. IEEE Multimedia 14(1):19–29
Acknowledgements
This work was performed as independent research of the applied research programme Dutch Top sector High Tech Systems & Materials: Roadmap Security, Passive Sensors. [9]. The authors thank Aart Beukers (Eye-D Security Experts) and the Amsterdam police for kindly providing the instruction video.
Author information
Authors and Affiliations
Corresponding author
Electronic supplementary material
Below is the link to the electronic supplementary material.
(MPG 7337 kb)
Rights and permissions
About this article
Cite this article
van Rest, J., Grootjen, F.A., Grootjen, M. et al. Requirements for multimedia metadata schemes in surveillance applications for security. Multimed Tools Appl 70, 573–598 (2014). https://doi.org/10.1007/s11042-013-1575-9
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-013-1575-9